Cs FInals Flashcards

1
Q

allows users
to access one another ‘s hard drives or cloud storage and
exchange files directly via a file shar in g program

A

peer-to-peer (P2P) networksometimes called a file sharing network,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

allows users connected to a network to exchange money
from one account to another via transmission media.

A

Electronic funds transfer (EFT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

provide
home users with the following capabilities
Multiple users can share a single Internet connection.
* Files on each computer, such as photos, can be shared.
* Multiple computers can share a single hardware
resource, such as a pr in ter.
* Game consoles can connect to the Internet to facilitate
on line gamin g

A

Home Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

can be small or
large and can exist in o ne or multiple buildings. Networks
provide the following advantages to businesses:
* Facili tate communication among employees
* Share hardware, such as printers and scann ers
* Share data, information, and software with one another
* Centra ll y store and back up cr itical informatio

A

Business networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sends signals and data through
cables, wh i ch may have to travel through fl oors and walls
to connect to other n etwork devices.

A

wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sends signals
through airwaves and usually does not require cables.

A

wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a network standard
that defines how high-speed cellular transmissions use
broadcast radio to transmit data for mobile communications.

A

LTE (Long Term Evolution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

requires a combination of hardware and software to operate. Smaller networks usually require simple hardware and can rely on the operating system’s features to connect to other devices on the network,

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Connects the sending device to transmission media

A

Communications device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accepts the transmission of data, instructions, or information

A

Receiving device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two basic categories of networks
are

A

home and business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

typically
exist within a single building, are easy to install and
configure, and are accessed by only a few user

A

Home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

meant to accommodate
many users and large amounts of data a nd can be spread
across many buildings

A

Business networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Initiates an instruction to transmit data, instructions or information

A

Sending device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Means by which the data, instructions, or information travel

A

Sending device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Means by which the data, instructions, or information travel

A

transmission media, or communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

name of receiving data

A

downstream rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

name of sending
data).

A

upstream rate (

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

s a navigation system
that consists of one or more earth-based receivers that
accept and analyze signals sent by satellites in order to
determine the receiver’s geographic location.

A

GPS (global positioning system) i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Help users establish a connection to another computer,
mobile device, or network
* Manage the Transmission of data, instructions, and
information
* Provide an interface for users to communicate with one
another

A

Communications software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(the method by which computers and
devices are physicalJy arranged on a network)

A

topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(the log ical d es i gn of all devices on a
network

A

network architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

one or more comp uters
act as a server and the oth er co mputers on the network
request resour ces from the server

A

client/server network,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a computer or mobile device on
the network that relies on the server for its reso urces.

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
netwo rk is a network archit ec tur e that typica ll y connects a small number of computers, often fewer than 10.
A peer-to-peer (P2P)
26
All de vices attach to a cent ral cable, called a bus, that carries t he data. If the bus fails, the devices on the net work will no longer be ab le to communicate .
Bus network
27
All devices interconnect with one another. If a single de vice on the network fails, the rest of the net work wil l continue to function by communicat ing via an alternate route.
Mesh network
28
(each device on the network is connected to every other device on the network)
Full mesh topology
29
(each device may or may not be connected to all other devices on the network)
partial mesh technology
30
Data travels from one device to the next in a sequential fashion
Ring network
31
Each device on the network is attached to a central device
Star network
32
is a type of P2P network where users share files with one another over the Internet.
Internet peer-to-peer (Internet P2P) network
33
Networ ks are configured in all sizes and can be defined by n ot only th e num ber of devices th ey co nnect or ph ys i ca l/l ogical arrangeme nt but also by their geographic footprint.
Geographic Reach
34
connects person al digital devices within a range of approximately 30 feet
personal area network (PAN)
35
is a fo rm of personal area n etwork th at consists of sma ll , li ghtweight biosensors implanted in th e bod y
body area network (BAN)
36
specifies the amount of data your provider offers you per monht
data plan
37
define guidelin es that specify th e way computers access a network, the type(s) of hardware used, data transmi ss ion speeds, and the types of cable and wireless technology used.
Network standards
38
is a standard that outlines characteristics of how devices communicate on a network, such as data format, coding schemes, error handling, and the sequence in which data transfers over the netwo rk .
protocol
39
standard controls how network interface cards (1\TJCs), routers, and modems share access to cabl es and phone lines, as well as dictates how to transmit data.
Ethernet
40
that defines how business documents travel across transmi ssi on media.
EDI (electronic data interchange),
41
which is a set of protocols that is used by all computers and devices on the Internet
TCP/IP (Transmission Control Protocol/Internet Protocol),
42
omputers and devices that have the appropriate wireless capability can communicate via radio waves with other computers or devices using
Wifi
43
is a series of network standards that specifies how two wireless devices communicate over the air with each other.
802. 11
44
is a network protocol that defines how two Bluetooth devices use short-range radio waves to transm it data.
Bluetooth
45
Devices communicat i ng with one another over a short range (usual ly less than 30 feet /9 meters)
BlueTooth
46
Remote controls or other data transmission within close proximity
IrDA
47
Used in credit cards, smartphones, and ticke ts to faci l itate close- range communication
NFC( near field communication)
48
is a network stand ard that specifies how two UWB devices use short-range radio waves to communicate at ru gh speeds with each other.
UWB (ultra-wideband)
49
standard to transmit data wirelessly to each other via infrared (IR) li g ht waves
lrDA (Infrared Data Association)
50
is a protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
RFID (radio frequency Identificaiton
51
is a protocol, based on RFID, that defines how a netwo rk uses close-range radio signals to communi cate between two devices or objects equipped wi th NFC t echn ol ogy
NFC (near field communications)
52
can be computers, tablets, mobile phones, printers, game consoles, or smart home devices
Nodes, or devices on a network,
53
also called a broadband modem, is a commun ications device that sends and receives data and information to and from a digital line.
digital modem ,
54
uses a cable TV Connection
A cable modem
55
uses sta nd ard copper telephone wir ing
DSL modem
56
is a broadband modem that sends digital data and information from a computer to an ISDN li ne
ISDN (Integrated Services Dig ital Network) modem
57
is a type of always-on physical connection that is established between two communications devices.
dedicated line
58
is a process that combines multiple anal og or digital signals into a single signal over a shared medium, such as a cable.
Multiplexing
59
enters a building through a single line, usually a coaxial cable, which connects to a modem that typically attaches to your computer via an Ethernet cable
The CATV signal
60
transmits on existing standard copper phone wiring.
DSL (Digital Subscriber Line)
61
is a type of DSL that supports faster downstream rates than upstream rates
ADSL (asymmetric digital subscriber line)
62
refers to both a circuit-switched te lephone network system and a set of communication standards used to transmit data, voice, and signal i ng.
ISDN (Integrated Services Digital Network)
63
uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical permanent location
FTTP (Fiber to the Premises)
64
use multiplexing so that multiple signals share the line.
Digital T-carrier lines
65
provide very fast data transfer rates. Only medium to large companies usual ly can afford the investment in ___________ lines because these lines are so expensive.
T-carrier lines
66
which is an amplifier used to im prove reception and extend the range, for your wireless rout er or wireless access point.
booster , (repeater)
67
Ga i ns admin istra tor-leve l, or root-level, access to a computer or network without the system or users detecti ng its presence
Rootkit
68
devices are one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks.
network attached storage (NAS)
69
a series of numbers and/or letters some- times also referred to as a network security key, to encrypt data sent between devices
wireless network key,
70
constantly assesses the status of a network and sends an email or text message, usually to the network administrator, when it detects a problem.
Network monitoring software
71
software monitors and logs packet traffic for later analysis. Packet sniffing can detect problems, such as why network traffic is flowing slowly
packet sniffer
72
, which occurs when cyberthieves tap into home routers or cable modems or other Internet access points to intercept a paid Internet service
IP hijacking
73
which occurs when cyberthieves exp loit Bluetooth devices that have been paired. Hackers can intercept the signa ls, then ta ke control and read or download persona l data, place calls, monitor con versations, re view text and ema il messages, and modi fy contacts
Bluebugging,
74
is to plan, design, purchase equipment for, set up, secure, and maintain a network
network administrator
75
It developed a code of ethics for system operators that provides standards for network administrators.
USENIX
76
have access to vast amounts of data that needs to be protected.
Network administrator
77
provider is a third-pa rty business that prov ides networking services, such as EDI services, secure data and information transfer, storage, or email programs.
value-added network (VAN )
78
which is a pane in a program window that lets you move between objects
navigation pane,
79
is a crucial component of most organizations,
Data
80
are relied upon to perform the critical job of organizing this data, making it easily accessible when needed, and ensuring the data is kept safe and secure
databases
81
or database program, is software that allows you to create, access, and manage a database.
database management system (DBMS),
82
is a field that uniquely identifies each record in a table, such as Student ID
primary key
83
occurs when you store the same data in more than one place.
Data redundancy
84
that acts as a portal fo r a database, enables governme nt agenci es , schools, and compani es to share information with a wide audienc
database service, or a website
85
class ify data in a hierarchy. Each higher level of data consists of one or more it ems from the lower leve l
Information technology (IT) professionals
86
in Access, is a collection of related records stored on a storage medium, such as a hard drive, or on cloud storage
data file, ca ll ed a table
87
In the ASCII coding scheme, each byte re presents a
Single character
88
is a combination of one or more related characters or byt es and is th e small es t unit of data a user accesses
field
89
uniquely identifi es each fi eld
field name
90
is a group of related fields
record
91
is the highest level in the data hierarchy, as it contains fields and records
table
92
extracts data from a database based on specified criteria, or conditions, for one or more fields
A query
93
, where each field was spaced out on the screen to make it easier to interact with and understand.
data entry form
94
specifies the kind of data a field can contain and how the field is used
data type
95
Unique number automatically assigned by the DBMS to each added record
AutoNumber
96
Lengthy text entries, which may or may not include separate paragraphs; also called l ong tex
Memo
97
Photo, audio, video, or a document created in other programs or apps, such as word processing or spreadsheet, stored as a sequence of bytes in the database; also called BLOB
Object
98
, contains data about each table in the database and each field in those tables
data dictionary, sometimes called a repository
99
is the process of comp aring data w ith a set of rules or va lues to determine if the data meets certain crite- ria)
validation
100
is a popular query language that allows users to manage, update, and retrieve data
Structured Query Language
101
consists of simple, Englis h- like statements that allow users to specify the data they want to display, print, store, update, or delete.
query language
102
a feature that has a graphical user inter- face to assist users with retrieving data
query by example (QBE),
103
, allows users to design a report on the screen, retrieve data into the report design
report writer, also called a report generator
104
which is a listing of activities that modify the contents of the database.
log,
105
uses logs and/or backups, and either a rollforward or a rollback technique, to restore a database when it becomes damaged or destroyed
recovery utility
106
the DBMS uses the log to reenter changes made to the database since the last save or backup.
rollforward, also called forward recovery,
107
the DBMS uses the log to undo any changes made to the database during a certain period.
rollback, also called backward recovery,
108
is a backup plan in which changes are backed up as they are made.
Continuous backup
109
shows how data in one table relates to data in another table and is one of th e main advantages of using a database.
relationship
110
is a field in one table that contains data from the primary key in another table.
foreign key
111
connects each record in one table to one or more records in another table.
one-to-many relationship
112
is restricted to exactly one record in the table on each si de of the relationship
one-to-one relationship
113
allows more than one record on the left side of the relationship to be con- nected to more than one record on the ri ght side of the relationship
many-to-many relationship
114
resolve many of the weaknesses of relational databases.
NoSQL databases or nonrelational databases
115
(also ca ll ed key-value stores) create any number of key-value pairs for each record.
Key-value databases
116
consists of two related items: a constant that defines tl1e set (the key) and a variable that belongs to the set (the va lue).
key-value pair
117
The screenshots in this module show a database in Access. Access is designed to work with relational databases, so it more specifically is called a
relational database management system (RDBMS )
118
Th is means the DBMS runs on servers owned by a cloud provider, and users access the database remotely through a browser
database as a service (DBaaS ).
119
is part of a split database that contains the user interface and other objects, but not the tables that are needed for an application
front-end database
120
, is part of a split database that contains table objects and is stored on a file server that all users can access.
back-end database, sometimes simply called the backend
121
work with the back-end components to ensure a company's business data is safe, secure, and well-managed
database administrators (DBAs)
122
is a database object that is created based on a field or combination of fields.
index
123
is a series (or chai n) of records stored in encrypted blocks across a netwo rk.
blockchain
124
is the process of presenting data graphically in the form of charts, maps, or oth er pictorial formats in order to understand the resulting information easily
Data visualization
125
This check t es ts the data in two or mor e associated fi elds to ensur e th at the relationship is logical and their data is in the co rrect format.
Consistency check
126
ver ifi es that a required fi eld contains data.
completeness check
127
is a number(s) or char- acter(s) that is appended to or inserted in a primary key value.
check digit
128
when enabled, requires the user to add information to a particular fie ld and will not allow the user to leave a field blank
Presence check
129
fie ld properties can be used to va li date data entry.
Field property check
130
requires the user to enter information unique to that record
Uniqueness check
131
Access allows the use of an input mask to control how data is formatted in a field
Format check
132
is a field property that provid es a visual guide for users as they enter data. Figure 10-20 shows the Input Mask wizard.
input mask
133
is a tool that guides you through the steps of a process or task by asking a series of questions or presenting options.
wizard
134
This check can be enforced by using a data type that allows users to choose from a preexisting list, such as a list of days of the week.
Multiple Choice check
135
starts as soon as the database is created and lasts as long as the database is used.
Database maintenance
136
implies the need to protect a database from unauthorized acces
Confidentiality
137
refers to protecting data from unauthorized changes
integrity
138
indicates the need to ensure that data is accessible by authorized users when needed
Availability
139
large and compl ex data sources th at defy traditional data processing method
Big data
140
3 "v's" of big data +2 extra
Volume variety Velocity Value Veracity
141
Th e m ass ive amo unt of data that must be stored and analyzed
Volume
142
The different formats in which this data can exist, such as music or video fil es, photos, social media texts, financial transactions, IoT sensor data, and more
Variety
143
Th e fact that this data is often generated and received at high speeds
Velocity
144
The helpfulness of the data in making strategic decisions
Value
145
H ow accurately this data reflects reality
Veracity
146
The processes and technologies used to do this analysis are called
business intelligence (BI)
147
BI systems might collect data from existing databases (such as a product database) and from live data streams (such as an online transaction processing system) into a central repository called a
data warehouse.
148
which is a collection of both structured and unstructured data
data lake,
149
that provide at-a-glance views, with live updates as data continues to pour in
dashboards
150
processes help to inform business decisions and strategies
data analytics
151
occurs when a compa ny uses the technology in t ended for one purpose fo r an entirely differe nt purpose.
Function creep
152
is th e process of creating information systems or p rograms and apps from the id ea stage to distribution to users.
Development
153
is a collection and summary of th e data, information, and deliverables spec ifi c to the project.
Documentation
154
occurs when one ac ti vity h as led to another th at was not planned originall y; thus, the scope of th e project now has grown
Scope creep, al so called feature creep,
155
of a project includes its goals, o bj ectives, and e xp ecta ti ons of the project
scope
156
which is the process of recogniz in g when a change in th e project h as occurred, taking actions to react to th e change, and planning for opporUlruties because of th e change
change management,
157
refers to th e focus on th e user's reaction to a nd in teraction with a pro d uc t, includ in g its efficien cy, effectiveness, and ease of use.
User experience (UX)
158
is a se ries of statemen ts that inst ructs a program or app how to complete a task .
macro
159
T he set of activities used to build an app is ca ll ed th e
software development life cycle (SDLC)
160
what is The sldc (in order)
Plan Analyze Design Implement Support and Secure
161
for a project begi ns with a request for the project and is triggered by the devel opment of the project documentation
planning phase
162
consists of two major components: conducting a prel i minary investigati on and performing detailed analysis.
analysis phase
163
is the measure of the suitability of the devel opment process to the individual project at any given time
Feasibility
164
measures how well the product will work and whether it will meet the requirements of the users
Operational feasibility
165
determines if the deadlines for project phases are reasonable. Issues with schedule feasibility might lead to the project's timeline being extended or the scope of the features to be scal ed back.
Schedule feasibility
166
measures whether the developers have the skills and resources, as we ll as the number of programmers, to complete the features of the product.
Technical feasibility
167
is to use the data gathered during the feasibility study and detailed analysis to present a solution to the need or request
system proposal
168
is when the project team acquires the necessary hardware and programming tools, as well as develops the details of the finished product
design phase
169
is a working model that demonstrates the functionality of the program or app.
prototype
170
is to build the product and deliver it to users.
implementation phase
171
, the user stops using the old product and begins using the new product on a certain date.
direct conversion
172
consists of running the old product alongside the new product for a specified time. Results from both products are compared.
Parallel conversion
173
each location converts at a separate time.
phased conversion,
174
only one location in the organization uses the new product so that it can be tested
pilot conversion,
175
the product receives necessary maintenance, such as fixing errors or improving its functionality.
support and security phase,
176
each function is tested to ensure it works Creating Sys te ms and Applications properly.
testing process,
177
testers perform the testing and report any issues to the developers.
Quality assurance
178
uses a linear, structured development cycle
Predictive development
179
takes each step individually and completes it before continuing to the next phase
waterfall method
180
also called adaptive development, incorporates flexibility in the goals and scope of the project.
Agile development,
181
uses a condensed or shortened development process to produce a quality product.
Rapid application development (RAD )
182
encourages collaboration between the devel opment and operation
DevOps
183
is any tangible item , such as a chart, diagram, report, or program file
deliverable
184
is the process of planning, scheduling, and then controllin g the activities during system devel op ment
Project management
185
developed by Henry L. Gantt, is a bar chart that uses horizontal bars to show project phases or activities
Gantt chart,
186
short for Program Evaluation a nd Review Technique chart, analyzes the time required to complete a task and identifies the minimum time required for an entire project
PERT chart,
187
, consists of a series of lengthy, structured group meetings in which users and IT professionals work together to design or develop an app li cation
joint-application design GAD) session, or focus group
188
an organization usually forms a _________ to work on the project from beginning to end.
Project team
189
is responsible for designing and developing an information system.
systems analyst
190
The goal of ___________ is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs
project management
191
A person dedicated to coord i nating project components and ensuring that each member is progressing as planned
Project manager
192
Develops the program's user interface, including colors, fonts, and layou
Designer
193
Writes code or uses a product development app to create the program's specifications
Programmer
194
Review every aspect and functional ity of a prog ram to ensure it works as intended
Tester
195
Interacts with customers and users of t he product to assist them with any issues that arise
IT department
196
identifies the required product(s).
request for quotation (RFQ)
197
, the vendor selects the product(s) that meets specified requirements and then quotes the price(s)
request for proposal (RFP)
198
is an organization that purchases products from manufacturers and then resells these products to the public - offering additional services with the product
value-added reseller (VAR)
199
is a professional who is hired based on technical expertise, including service and advice.
IT consultant
200
is a set of words, abbreviations, and symbols that a programmer or developer uses to create instructions for a program or app.
Programming language
201
are first generation language; their instructions use a series of binary digits
Machine languages
202
the programmer uses symbolic instruction codes, such as A for add, M for multiply, and L for load
assembly language,
203
use a seri es of English-like words to write instructions, such as ADD for addition, or PRINT for printing.
Procedural languages
204
provide a graphical environment in which the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code.
Fourth generation languages, or 4GLs,
205
was an attempt to create programs that solve problems without requiring the programmer to write algorithms.
Fifth generation languages, or SGLs,
206
is a text editor designed for programming.
source code editor
207
to test code in one section, or an entire program, to determine any errors and provide suggestions to fix them.
debuggers
208
is a separate program that converts the entire source program into machine language before executing it.
compiler
209
translates and executes one statement at a time. Interpreters do not produce or store object code
interpreter
210
is an application that provides multiple pro gramming tools in one environment.
integrated development environment (IDE).
211
is a set of programming tools that includes a programming interface, compiler, debugger, and more.
software development kit (SDK)
212
is anothe r web-based tool programmers use to archive and ho st source code
code repository
213
tools to impleme nt objects in a program
object-oriented programming (OOP)
214
is an item that can contain both data and the procedures that read or manipulate that data.
object
215
is a type of object that defines the format of the object and the actions an object can perform.
class
216
defines the behavior of an objec
method
217
looks at common security practices and ensures that the app or system meets the recommended criteria
security audit
218
developers attempt to break into the app or system.
penetration testing,
219
uses automated tools that test a system by using unexpected input to ensure the app or system does not crash
Fuzz testing (also ca ll ed fuzzing)
220
prerelease versions of the product, ca ll ed a
beta version,
221
verifies that each in dividual program or object works by itself.
unit test
222
verifies that all programs in an appli cation work together properly
systems test
223
verifies that an application works with other applications.
integration test
224
is performed by end users and checks the new system to ensure that it works wi th actual data
acceptance test
225
is a set of evolving principles that developers should fo ll ow to enhance UX
Ethical design
226
is an ale rt se nt throu gh th e user 's device 's notifications, or by email or te xt, th at may let users know abo ut new fe atur es or re mind th em w hen a game boost er is available.
push notification
227
which is sent in response to a user 's actions or request)
pull notification,
228
is a process or set of rules used in prob lem-solving, such as calculations.
algorithm
229
is a named location in memory used to store information, such as a value, that is used in a program
variable
230
is an environment that allows software developers to test their prog rams wi th fictitious data without adversely affecting other programs, information systems, or data.
sandbox
231
you must develop a solid, detailed plan for the website, called a
website plan or design plan.
232
are the results you want your website to accomplish within a specific time frame
Goals
233
are those methods you will use to accomplish the website’s goals.
Objectives
234
summarizes your website’s goals and objectives to ensure they meet the audience’s expectations and needs.
purpose statement
235
is a suggestion or offer that requires the website visitor to interact with the website by purchasing a product
A call-to-action (CTA)
236
is a research-based overview that includes information about potential website visitors’ demographic and psychographic characteristics
target audience profile
237
include gender, age group, educational level, income, location, and other characteristics that define who your website visitors are
Demographic characteristics
238
include social group affiliations, lifestyle choices, purchasing preferences, and political affiliations
Psychographic characteristics
239
is the main webpage around which a website is built that opens every time you start a browser and is the anchor for the entire website
home page
240
subsidiary pages provide detailed content and interest
subsidiary pages
241
, which is the page that a browser navigates to when you click a link in an ad, email message, or other online promotion from a different website.
landing page
242
is information that is relevant, informative, and timely; accurate and of high quality; and usable.
Value-added content
243
unlike static information, updates periodically and can appear on a website’s pages when triggered by a specific event, such as the time of day or by visitor request.
Dynamically generated content,
244
refers to tools to allow search engines to better find or index your website.
Search engine optimization (SEO)
245
are HTML specification tags that tell search engines what data to use.
Meta tags
246
is a series of pages originally developed to present scenes graphically for a movie or television program
storyboard
247
is a diagram that shows steps or processes and is used to determine the paths users will take to find subsidiary pages
flowchart
248
should clearly identify its target, which is the webpage or content to which the link points.
text link
249
assigns a link to a visual element, such as an illustration or a photograph.
image link
250
can group links in menus, bars, tabs, or a combination of techniques.
Navigation areas
251
is an evaluation that generally takes place in a structured environment, such as a testing laboratory
usability test
252
studies use various technologies to analyze the movement of visitors’ eyes
Eye-tracking
253
, an analytical tool that uses color to represent data
heat maps
254
is software used to create plain (ASCII) text files.
text editor
255
is a text editor enhanced with special features that easily insert HTML tags and their attributes.
HTML editor
256
is a coding system that uses tags to provide instructions about the appearance, structure, and formatting of a document
A markup language
257
is a predesigned model webpage that you can customize for fast website or webpage creation and updating
web template
258
is a tool used to create professional-looking websites, by dragging and dropping predefined elements to their desired locations on a page, without coding.
website builder
259
is software that provides website creation and administrative tools that enable the management of web content development, including authoring, reviewing, editing, and publishing.
content management system (CMS)
260
The templates, style sheets, and other frequently used content elements, such as a logo graphic, are stored in a database called a
content repository.
261
is an object, such as a web app, that is embedded in a webpage and provides access to resources that are stored elsewhere.
widget
262
is a third-party program that extends the built-in functionality of an application or browser.
plug-in
263
is programming code that performs a series of commands and can be embedded in a webpage.
script
264
that is, scripts that run in a browser to control a webpage’s behavior and often make it interactive.
client-side scripts,
265
written in HTML to describe the content of information on a webpage.
tags,
266
is a markup language that uses both predefined and customized tags to facilitate the consistent sharing of information, especially within large groups.
Extensible Markup Language (XML)
267
or additional information needed to completely specify the tag.
attributes
268
indicate the different sections of a webpage. HTML supports six levels of headings.
Headings
269
identify the location of resources in the current website.
Relative references
270
identify the location of resources from other websites.
Absolute references
271
display a collection of items in a list format, with each list item preceded by a bullet symbol
Unordered lists
272
by default, precede each list item with a number.
Ordered lists,
273
can include audio, photos, or videos stored on media sharing websites; media content, such as online calendars, documents, and slideshows
Multimedia content
274
items on a website, you place a copy of an object created in a source file into a destination file so that a one-way connection to the source program becomes part of the destination file
embed
275
Include this attribute to play the audio or video automatically when the page loads (may not work on mobile devices)
autoplay
276
Include this attribute to display audio or video controls, such as play, pause, and volume; if you do not include this option, the only way to stop playing the audio is to close the page
Controls
277
uses rules to standardize the appearance of webpage content by defining styles for elements, such as font, margins, positioning, background colors, and more.
cascading style sheet (CSS)
278
are specifications that define one or more formatting properties and their values (declarations) for specific HTML tags (selectors).
Style rules
279
You also can create style sheets using
CSS editor software.
280
, within tags placed in the head section of an HTML document,
embedded styles
281
, specified as a style attribute of most HTML tags within the body section.
inline style
282
is a group of related fonts.
font family
283
to encrypt data that helps protect consumers and businesses from fraud and identity theft when conducting commerce on the Internet.
Transport Layer Security (TLS)
284
, which is an organization that sells and manages domain names.
domain registrar
285
is a measure of a web host’s reliability. It could be costly to you if your website goes down due to an issue with your hosting provider;
Uptime
286
is a term commonly used to describe the capacity of a communication channel.
Bandwidth
287
involves collecting, measuring, evaluating, and reporting how your website is used.
Web analytics
288
, which is the sequence of pages or activities the user performs on the website.
click path or clickstream
289
gets users to spend long periods of time engaging and encourages them to return for future visits.
Sticky content
290
are the number of times an ad is visible to users on a webpage, regardless of whether the user clicks or interacts with the ad.
Impressions
291
rate is the number of times users click the ad to go to the sponsor’s website.
click-through
292
computer that you use to edit your website is called your
local computer
293
(a web server on the Internet
remote web server
294
with a vendor specifies that you receive commission on any sales that are generated by users of your website.
affiliate agreement
295
consists of groups of users and developers who create guidelines about usage, tools, and education regarding web accessibility
Web Accessibility Initiative (WAI)
296
provides preventive mainte- nance, component installation, and repair services to customers
Technology service and repair field
297
program includes the study of compute rs and tech nology and how they are used
computer science
298
Ide ntifies business requi rements, stra t egies, and solutions for cloud storage and se rvices that meet a company's goals or needs
Cloud architect
299
Develops art ificial-int ell ige nce- ba sed machines and prog rams based on data analysis to mimic huma n thought pro cesses
Cognitive Engineer
300
Spec ifies the structu re, interface, and req uirem ents of a large-scale da t abase; de t ermi nes security and permissions for users
Database Designer
301
, or relying on outside companies to perform certain tasks
outsourcing
302
refers to the use of teclmology by a company's employees to meet the needs of a large business.
Enterprise computing
303
ma nages one or more administrative human resources funct ions, such as main tai ning and managing employee benefits, schedules, and payroll.
human resources information system (HRIS )
304
aids in the development and testing of product des ig ns, and often includes CAD (computer-aided design)
Computer-aided engineering (CAE )
305
) monitors and controls inventory, material purchases, and other processes related to manufacturing operations
Material Requirements Planning (MRP
306
is an extension of MRP that also includes prod- uct packaging and shipping, machine scheduling, fi na ncia l planning, demand fo recasting, tracking labor producti vity, and monitoring product quality
Manufacturing Resource Planning II (MRP II)
307
helps salespeople manage customer contacts, schedule customer meetings, log customer inte ractio ns, manage product information, and place customer orders
Salesforce automation (SFA )
308
manages informa tion about custome rs, past purchases, interests, and the day -to -da y interactions, such as phone calls, email messages, web communications, and Internet messa gi ng sessions
Customer relationship management (CRM )
309
integ rates MRP II with the information flow across an organization to manage and coordinate th e ongoing activities of th e enterprise
Enterprise Resource Planning (ERP)
310
is an in formation system th at ca ptures and processes data from day-to-day business activities.
transaction processing system (TPS)
311
, the computer collects data over time and processes all tran sa ctions la ter, as a group.
batch processing
312
the computer processes each transaction as it is entered
online transaction processing (OLTP),
313
is an information system that generates accurate, timely, and organized information
management information system (MIS)
314
helps users analyze information and make decisions.
decision support system (DSS)
315
Programs that analyze data, such as those in a decision support system, sometimes are called
online analytical processing (OLAP
316
is an informa- tion system that captures and stores the knowledge of human experts and then imitates hum an reasoning and decision making.
expert system
317
is the comb in ed subject knowledge and experiences of the human experts.
knowledge base
318
are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.
inference rules
319
system manages the fl ow of goods and services of a business
supply chain management (SCM)
320
your knowledge in a specific area to employers or potential employers.
certification demonstrates
321
vary in scope from a narrow focus with an emph asis on the repair of a specific device to an integrated hardware solution that addresses a company's current and future technology needs.
Hardware certifications
322
certifications focus on the discovery, co ll ection, and analysis of evidence on computers and networks
Data analysis
323
is acquired through years of experience and training because so many variables exist for a total network solution
Network expertise
324
These certifications focus on particular ski lls of the user, the operator, the system administrator, and the software engineer.
Operating System Certifications
325
These certifications usually are supported with training programs that prepare applicants for the certification test.
Programmer/Developer Certifications
326
measure a candidate's ability to identify and co ntr ol security risks associated with any eve nt or action that could cause a loss of or damage to comp uter hard wa re, software, data, information, or processing capability
Security certifications
327
, or working from home, can mutually benefit emp loyers and em ployees
Telecommuting
328
shows exampl es of your wor k. Graphic artists and other digital media pro ducers may use a portfo li o to de mon strate their abilities, style, and past work
portfolio
329