IT imp. definitions Flashcards

1
Q

BIOS

A

It stands for Basic Input Output system. It is a small chip on the motherboard that includes start up code, the set up program and also loads the hardware settings required to operate various devices like keyboard, monitor, disk drives, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ASCII

A

It stands for American Standard Code for Information Interchange. It issued to represent data in main computer memory. It uses the rightmost seven bits of the 8-bit byte to represent numbers, letters and special characters. The 8th bit is used for parity or it may be permanently 1 or 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VPN

A

It stands for Virtual Private Network. It is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection, a VPN uses virtual connections routed through the Internet from the company‘s private network to the remote site or employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

: Bluetooth is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Joystick

A

It is a screen pointing input device. It is a vertical lever usually placed in a ball socket, which can be moved in any direction to control cursor movements around the screen, for computer games and some professional applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCSI

A

Small Computer System Interface (SCSI) is a device interface that is used to solve the problem of a finite and possibly insufficient number of expansion slots. Instead of plugging interface cards into the computer‘s bus via the expansion slots, SCSI extends the bus outside the computer by way of a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Management Database:

A

Management databases store data and information extracted from selected operational and external databases. They consist of summarized data and information most needed by the organization‘s managers and other end users as part of decision support systems and executive information systems to support managerial decision making. They are also called information databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mirror Log

A

It is an optional database file which is a copy of a transaction log (a file that records database modifications) and provides additional protection against the loss of data in the event the transaction log becomes unusable. It has a file extension of .mlg.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Program Debugging

A

Cleansing the computer program from errors is called program debugging. Towards this purpose, the programmers devise a set of test data transactions to test the various alternative branches in the program. The results got from the computer are compared with the ones derived manually prior to computer processing. If the results do not tally, the programmer then verifies the flowcharts and code in a search for the bugs and then fixes the bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Repeater

A

: It is a device that solves the snag of signal degradation which results as data is transmitted along the various cables. It boosts or amplifies the signal before passing it through to the next section of cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fat Client

A

In two-tier architecture, a client is called as a fat client if the business logic and the presentation layer are located on the client machine and data layer is on the server machine. The entire processing load is on the client. It imposes a lot of memory and bandwidth requirement on the client‘s machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDE

A

Direct Data Entry (DDE) refers to entry of data directly into the computers through machine readable source documents. It does not require manual transcription of data from original paper documents. DDE devices can scan source documents magnetically or optically to capture data. Examples of such devices include magnetic ink character readers and optical character readers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key

A

In the context of relational databases, a key is a set of one or more columns whose combined values are unique among all occurrences in a given table. A key is the relational means of specifying uniqueness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EFT

A

EFT stands for Electronic Funds Transfer and represents the way the business can receive direct deposit of all payments from the financial institution to the company‘s bank account. Once the user signs up, money come to him directly and sooner than ever before. Examples of EFT systems in operation include Automated Teller Machines (ATMs) and Point-of-Sale transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Decision Table

A

A decision table is a table listing all the possible contingencies that may be considered within the program, together with the corresponding actions to be taken. Decision tables permit complex decision-making criteria to be expressed in a concise and logical format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flowchart

A

A flowchart is a diagram, prepared by the programmer, of the sequence of steps, involved in solving a problem. It shows the general plan, architecture, and essential details of the proposed structure. It is an essential tool for programming and it illustrates the strategy and thread of logic followed in the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Web Browser

A

: A Web browser is a special client software package which is used to view Web pages on the Internet. It fetches a Web page from a server using a standard HTTP request. Some of the popular browsers are Internet Explorer, Netscape Navigator, Mozilla Firefox, and Opera.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hollerith Code

A

Hollerith Code is used for representing alphanumeric data on punched cards. Each card column holds one character. Each decimal digit, letter, and special character is represented by one, two or three holes punched into designated row positions of the column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virus

A

A virus is a program that instructs the operating system to append it to other programs and thus propagates to other programs via files containing macros which are sent as attachments to electronic mail messages. A virus can be benign like it can cause minor
disruptions by printing laughing messages or can be malignant like it can delete files or corrupt other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Buffering

A

Buffering is a process that enables the processor to execute another instruction while input or output is taking place rather than being idle while transfer is completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

GUI

A

GUI or Graphical User Interface takes the user away from command-driven interfaces to an user-friendly graphics oriented environment, which provide an alternative to cryptic text commands. With the GUI, the user can interact with operating system and other software packages by selecting options from menus that are temporarily super-imposed over whatever is currently on the screen by using mouse to position the graphics cursors over the appropriate icon thus eliminating the need for users to memorize and enter cumbersome commands.

22
Q

System Software

A

System Software comprises of Programming Languages, Operating systems, Subroutines, Utility Programs, Diagnostic Routines and Language translators that control and support the computer system and its data processing applications. In other words, system software includes operating systems and any program that supports application software.

23
Q

Workstation

A

A workstation looks like a personal computer and is typically used by one person. Workstations are more powerful than the average personal computer and are based on different architecture of CPU called Reduced Instruction Set Computing (RISC), which results in faster processing of instructions.

24
Q

ISDN

A

ISDN or Integrated Services Digital Network (ISDN) is a system of digital phone connections to allow simultaneous transmission of voice and data across the world. ISDN allows multiple digital channels to be operated simultaneously through the same regular phone cable meant for analog signals.

25
Q

Spooling Software

A

The purpose of spooling software is to compensate for the speed differences between the computer and its peripheral devices. Spooling utilities can also be used on the input side, so that programs and data to be processed are temporarily stored in an input spooling area on disk.

26
Q

Sort Utilities

A

sort utilities are often found in mainframe and minicomputer environments and are those that sort data. For example, sort routines are commonly found in spreadsheet and database management software.

27
Q

Transaction Server

A

Transaction Server is an integral part of Windows NT, and is installed by default as part of the operating system in NT5. It is a service that is all about managing the way applications use components, and not just about managing transactions.

28
Q

EBCDIC code

A

EBCDIC stands for Extended BCD Interchange Code. It is an 8-bit standard character code without parity for large computers. A 9th bit can be used for parity. With 8 bits, up to 256 characters can be coded. In EBCDIC, the first 4 bits are known as Zone Bits and the remaining 4 bits represent digit values.

29
Q

The Boot Record

A

It is a small program that runs when the computer is started and determines whether the disk has the basic components of DOS or Windows that are necessary to run the operating system successfully. If the required files are present and the disk has a valid format, it transfers control to one of the operating system programs that continues the process of starting up. This process is called Booting because the boot program makes the computer pull itself up by its bootstraps. The boot record also describes other disk characteristics, such as the number of bytes per sector and the number of sectors per track.

30
Q

FAT

A

The FAT or File-Allocation table is a log that records the location of each file and the status of each sector. When a file is written to a disk, the operating system checks the FAT for an open area, stores the file, and then identifies the file and its location in the FAT.

31
Q

Motherboard

A

The motherboard or the system board is the main circuit board on the computer. It acts as a direct channel for the various components to interact and communicate with each other. There are various types of motherboards available depending on the processors that are used.

32
Q

ALU

A

ALU includes a group of registers – high-speed memory locations built directly into the CPU that are used to hold the data currently being processed. Arithmetic operations include addition, subtraction, multiplication, and division whereas Logical operations include comparisons, such as determining whether one number is equal to, greater than, or less than another number.

33
Q

MMX

A

MMX stands for Multimedia Extensions which is defined as a set of instructions built in to the CPU, specifically intended for improving the performance of multimedia or graphic applications – mainly games.

34
Q

Volatile memory

A

It is a type of memory that requires constant power to maintain the stored information and is typically used only for primary storage.

35
Q

Network-attached storage

A

It is secondary or tertiary storage attached to a computer which another computer can access over a local-area network, a private wide-area network, or in the case of online file storage, over the Internet.

36
Q

Storage density

A

Storage density refers to the compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square centimeter).

37
Q

Screen Resolution

A

Screen Resolution is one of the most important features used to differentiate display. Most display devices form images from tiny dots - called pixels that are arranged in a rectangular pattern. The more dots available to display any image on - screen, the sharper the image (the greater the resolution) is.

38
Q

Data Transfer Time

A

Data Transfer Time is defined as the time taken to activate the read/write head, read the requested data and transmit them to primary memory for processing.

39
Q

Data Mart

A

Data Mart is defined as a database which contains selective data from a data warehouse meant for a specific function or department.

40
Q

Port

A

A Port is a hardware device that allows a series of bits to be transferred to a bus for data input or, inversely, the transfer of data from a bus to the port for data output.

41
Q

Latency

A

It is the time taken to access a particular location in storage. It is typically measured in nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage.

42
Q

Alternate Key

A

An Alternate Key of any table is simply that candidate key which is not currently selected as the primary key. An alternate key is a function of all candidate keys minus the primary key.

43
Q

Mobile Commerce (M-commerce)

A

Mobile Commerce (M-commerce) is defined as the buying and selling of goods and services through wireless handheld devices such as cellular telephone and Personal Digital Assistants (PDAs). Known as next-generation E-commerce, M-commerce enables users to access the Internet without needing to find a place to plug in.

44
Q

Graph Plotter

A

Graph Plotter is a device capable of tracing out graphs, designs and maps into paper and even into plastic or metal plates. Plotters may be driven on-line or off-line wherein a high degree of accuracy can be achieved, even upto one thousandth of an inch.

45
Q

Metadata

A

Metadata or “data about data” is used to inform operators and users of the data warehouse about its status and the information held within the data warehouse. Examples of data warehouse metadata include the most recent data load date, the business meaning of a data item and the number of users that are logged in currently.

46
Q

Data warehouse operations

A

Data warehouse operations comprise of the processes of loading, manipulating and extracting data from the data warehouse. Operations also cover user management, security, capacity management and related functions.

47
Q

Directory

A

A directory is like a drawer in a filing cabinet containing files. A computer disk usually contains multiple directories, if necessary, a directory can also contain other directories. The purpose of directories is to enable the user to partition the computer‘s disk/storage devices in an organized and meaningful manner.

48
Q

Syntax of protocol

A

Syntax of protocol defines the format of the data being exchanged, character set used, type of error connection used, type of encoding scheme (eg.. signal levels) during data transmission.

49
Q

Multiprocessing

A

Multiprocessing (or parallel processing) refers to the use of two or more central processing units, linked together, to perform coordinated work simultaneously. Instructions are executed simultaneously by different CPUs at any given time.

50
Q

Fat Server

A

In a fat-server system, more of the processing takes place on the server. Fat- servers try to minimize the processing done by clients. Examples of fat servers are transaction, GroupWare, and web servers. They are also referred to as “3-Tier” systems.