Sunday, March 18, 2012

Chapter 4 Key Terms:

Agents:
Software programs that can ask questions, respond to commands, pay attention to users' work patterns, serve as a guide and a coach, take on owners' goals, and use reasoning to fabricate their own goals.

Example:
Algorithm:
A set of step-by-step instructions that, when completed, solves a problem.

Example: Algorithm step by step procedures for accomplishing a task.
Autosave:
A feature of many software applications that automatically saves your work every few minutes, so you don't lose more than a few minutes of work in a freeze or crash.

Example: Autosave even if your computer turns of while you are writing it will autosaved.
Booting:
Loading the non-ROM part of the operating system into memory.

Example: The operating system is loaded into memory in a process called Booting.
Bug:
An error in programming.

Example: Bug could be when something is not working probably or something is wrong.
Character-Based Interface:
A user interface based on text characters rather than graphics.

Example: Character-Based interface a user interface based on characters rather than on graphics.
Clean Install:
A completely new installation of an operating system or application.

Example: When you reinstall your computer you Clean install.
Command-Line Interface:
User interface that requires the user to type text commands on a command-line to communicate with the operating system.

Example: Unlike the windows desktop MS-DOS used a Command –Line Interface that required the user to typ commands to which the computer respond to.
Compatibility:
The ability of a software program to run on a specific computer system. Also, the ability of a hardware device to function with a particular type of computer.

Example: A computer software buyer must be concerned with Compatibility.
Compiler:
A translator program that translates an entire program from a high-level computer language before the program is run for the first time.

Example: Most common translator program.
Context-Sensitive Menus:
Menus offering choices that depend on the context.

Example: Context-sensitive menus offer choices that depend on which on-screen object the user has currently selected.
Contract:
A type of law that covers trade secrets.

Example: Contract covers trade secrets.
Copyright:
A type of law that traditionally protects forms of literary expression.

Example: Protect people from copy you.
Copyrighted Software:
Software that prevents a disk from being copied.

Example: Copyrighted software can’t be legally duplicated for distribution to others.
Custom Application:
An application programmed for a specific purpose, typically for a specific client.

Example: Restaurant management software, and other applications designed specifically for a particular business or industry are called Custom Application.
Debugging:
Finding and correcting errors bugs in computer software.

Example: Debugging to correct errors.
Defragmentation utility:
A program that eliminates fragmented files by changing the assignment of clusters to files.

Example: A Defragmentation utility eliminates as much as possible, fragments files by changing the assignment.
Device Drivers:
Small programs that allow input/output devices to communicate with the computer.

Example: Device drivers are small programs that enable I/O devices-keyboard, mouse,  printer and others.
Documentation:
Instructions for installing the software on a computer's hard disc.

Example: A computer software package generally includes printed documentation.
End-User License Agreement (EULA):
An agreement typically including specifications for how a program may be used, warranty disclaimers, and rules concerning the copying of the software.

Example: Here’s the first paragraph from a typical software warranty, which is par of a longer end-user license agreement.
File-Management Utility:
A program that allows you to view, rename, copy, move, and delete files and folders.

Example: A File-management utility lets you view, rename, copy, move, and delete files and folders.
Force Quit:
A way to shut down your computer if it freezes. In Windows, press the Ctrl + Alt + Del keys at the same time, and then click Task Manager; then select the frozen program and click End Task. On a Mac, press Command-Option-Esc or choose Force Quit from the Apple menu; then select the frozen app from the list and click Force Quit.

Example: Force quit is a way of closing a program.
Formatting:
The function of software, such as word processing software, that enables users to change the appearance of a document by specifying the font, point size, and style of any character in the document, as well as the overall layout of text and graphical elements in the document.

Example: Formatting a disk means putting electronic marks on the disk, dividing the disk into a series of concentric tracks.
Fragmented File:
A file allocated to noncontiguous clusters on a disk, thus degrading the disk's performance.

Example: A Fragmented file is a file allocated to noncontiguous clusters.
Graphical User Interface (GUI):
A user interface based on graphical displays. With a mouse, the user points to icons that represent files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.

Example:  Graph display and individually control every dot on the screen.
Hierarchical Menus:
Menus that organize commands into compact, efficient submenus.

Example: Hierarchical menus in windows and Mac OS organize frequently need commands into compact, efficient submenus.
High-Level Language:
A programming language that falls somewhere between natural human languages and precise machine languages, developed to streamline and simplify the programming process.

Example: C++, Java and Visual Basic.NET These languages referred to as High-level languages.
Intellectual Property:
The results of intellectual activities in the arts, science, and industry.

Example:
Java:
A platform-neutral, object-oriented programming language developed by Sun Microsystems for use on multiplatform networks.

Example: Java = Computer language
Linux:
An operating system based on UNIX, maintained by volunteers, and distributed for free. Linux is used mostly in servers and embedded computers, but is growing in popularity as a PC operating system.

Example: Linux Free open source software.
Machine Language:
The language that computers use to process instructions. Machine language uses numeric codes to represent basic computer operations.

Example: Every computer processes instructions in a native machine language.

Mac OS:

The operating system for the Apple Macintosh computer.

Example: Mac OS however, was eclipsed by a product from Microsoft, the company that produced MS-DOS.
Menu:
An onscreen list of command choices.

Example: Enable users to choose commands from on-screen lists called menus.
Menu-Driven Interface:
User interface that enables users to choose commands from onscreen lists called menus.

Example: Menu-driven interface Enable users to choose commands from on-screen lists called menus.
Microsoft Windows:
The most popular and powerful PC operating system; uses a graphical user interface.

Example: Microsoft Windows most popular operating system for PCs.
MS-DOS:
Microsoft Disk Operating System, an operating system with character-based user interface; it was widely used in the 1980s and early 1990s but has been superceded by Windows.

Example: Microsoft produced MS-DOS.
Multitasking:
Concurrent processing for personal computers. The user can issue a command that initiates a process and continue working with other applications while the computer follows through on the command.

Example: Doing two times at the same time.
Natural Language:
Language that people speak and write every day.

Example: Natural language the languages people speak and write every day.
Open-Source Software:
Software that can be distributed and modified freely by users; Linux is the best-known example.

Example: Open-source software are web browsers.





Operating System (OS):





A system of programs that performs a variety of technical operations, providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware.

Example: Operating System to keep hardware running efficiently and to make the process of communication with that hardware easier.
Patent:
A type of law that protects mechanical inventions.

Example: Patent law protected mechanical inventions.
Pathname:
The unique location specification for every computer file and folder, describing the nesting of folders containing it.

Example: Every file and folder has unique pathname, which describes the nesting of folders containing it.
Platform:
The combination of hardware and operating system software upon which application software is built.

Example: Application software can’t  exist by itself it need to be built on some kind of platform.
Pop-Up Menus:
Menus that can appear anywhere on the screen.

Example: Pop-up menus can appear anywhere on the screen.
Public-Domain Software:
Free software that is not copyrighted, offered through World Wide Web sites, electronic bulletin boards, user groups, and other sources.

Example: Web sites, users groups and other sources commonly offer Public-domain software.
Root Directory:
The main folder on a computer's primary hard disk, containing all the other files and folders kept on the disk.

Example: Root directory contains all the other files and folders kept on the disk.





Safe Mode:





A way to start your machine when it's not working properly because files have been corrupted or applications are clashing with each other. Safe mode will disable most startup applications temporarily. On a Windows machine, press and hold the F8 key on the keyboard as the machine is booting, then use the arrow keys to select Safe Mode in the Windows Advanced Options Menu that appears. On a Mac, hold down the Shift key while restarting until the Apple logo appears.

Example: You can start your machine in safe mode to disable most of these extra programs temporarily.
Shareware:
Software that is free for the trying, with a send-payment if-you-keep-it honor system.

Example: Shareware Free for the trying with a send payment-if-you-keep-it honor system.
Shell:
A program layer that stands between the user and the operating system.

Example: Shell similar to MS-DOS
Software License:
An agreement allowing the use of a software program on a single machine.

Example: When you buy a software package your not buying really buy the software instead you buy the software license.
Software Piracy:
The illegal duplication of copyrighted software.

Example: Software Piracy is the term frequently used to describe the unauthorized copying and selling software.
System Software:
Software that handles the details of computing. Includes the operating system and utility programs.

Example: System software a class of software that includes the operating system and utility programs.
Taskbar:
A button bar that provides one-click access to open applications and tools, making it easy to switch back and forth between different tasks.

Example: The windows task bar provides one-click access to open application.
Trademark:
Legal ownership protection for symbols, pictures, sounds, colors, and smells used by a business to identify goods.

Example: Tradmark law has protected symbols, pictures, sounds, colors, and smells.
UNIX:
An operating system that allows a timesharing computer to communicate with several other computers or terminals at once. UNIX is the most widely available multiuser operating system in use. It is also widely used on Internet hosts.

Example: Internet is still heavily populated with computers running the UNIX operating system.
Update:
Improvements software companies make to their programs. They usually contain bug fixes, new features, and/or minor enhancements.

Example: A computer company is might release minor updates.
User Interface:
The look and feel of the computing experience from a human point of view.

Example: As a software evolves so does the user interface.
Utility Program:
Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system.

Example: Utility programs serve as tools for doing for doing system maintenance and repairs.
Vertical-Market Application:
A computer application designed specifically for a particular business or industry.

Example: Restaurant management software, and other applications designed specifically for a particular business or industry are called Custom Application and Vertical-market applications.
Virtual Memory:
Use of part of a computer hard disk as a substitute for RAM.

Example: Virtual memory which means the number of memory.



Virtual Reality (VR):



Technology that creates the illusion that the user is immersed in a world that exists only inside the computer, an environment that contains both scenes and the controls to change those scenes.

Example: Virtual reality user interfaces will create the illusion that the user is immersed in a world inside the computer.

Chapter 10 Key Terms:

Access-Control Software:
Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change.

Example: Access control software doesn’t need to treat all users identically.
Antivirus:
A program designed to search for viruses, notify users when they're found, and remove them from infected files.

Example: Antivirus programs are designed to search for viruses.
Autonomous System:
Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision-making.

Example: Complex system that can complete responsibility for a task without human input.
Backup:
The process of saving data especially for data recovery. Many systems automatically back up data and software onto disks or tapes.

Example: Insurance is a system of making regular backup.
Biometrics:
Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security.

Example: Finger print, Voice print, Retinal scan these measurements are collectively called Biometrics.
Botnets:
A malicious network made up of bots, or zombie computers, often used by spammers, phishers, and other Internet criminals.

Example: Malicious networks are often called Botnets.
Computer Crime:
Any crime accomplished through knowledge or use of computer technology.

Example: Computer crimes are accomplished though knowledge or use of computer technology.
Computer Security:
Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction.

Example: Computer Security refers to protecting computer systems.
Cybercrime:
Any crime accomplished through knowledge or use of computer technology.

Example: Cybercrime accomplished through knowledge or use of computer technology.
Denial-of-Service (DOS) Attack:
A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients.

Example: Bombard servers and websites with so much bogus traffic.
Encryption:
Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it's been reconstructed with a matching key.

Example: To protect transmitted information, many organizations and individuals use encryption software.
Firewall:
A software or hardware "gate" that protects internal networks from unauthorized access.

Example: Firewalls used to keep their networks secure.
Hacking:
Electronic trespassing and vandalism.

Example: Hacking could be stealing information.
Identity Theft:
The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards.

Example: Steal a persons Identity using there information.
Logic Bomb:
A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.

Example: Logic bomb is programmed to attack in response to a particular event or sequence of event.
Malware:
Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.

Example: Modern computer saboteurs commonly use Malware-malicious software.
Passwords:
The most common security tools used to restrict access to computer systems.

Example: Passwords are the most common tools used to restrict access to PCs.
Phishing:
The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information.

Example: Internet fraud technique commonly called Phishing.
Sabotage:
A malicious attack on work, tools, or business.

Example: Sabotage comes from the early days of Industrial Revolution.
Security Patch:
Software programs that plug potential security breaches in an operating system, often provided as free downloads or automatic updates to all owners of the OS.

Example: Microsoft and Apple release Security patches.
Smart Weapons:
A missile that uses computerized guidance systems to locate its target.

Example: Smart weapons missiles that use computerized guidance system.
Social Engineering:
Slang for the use of deception to get individuals to reveal sensitive information.

Example: Credit card theft, password theft and identity theft often involves Social Engineering.
Spoofing:
A process used to steal passwords online.

Example: Trick the target in to doing something they might not otherwise do.
Spyware:
Technology that collects information from computer users without their knowledge or consent.

Example: Spyware refers to technology that collects information.
System Administrator:
A user who has additional access privileges, such as permission to install software applications and change system settings.

Example: At lest one of the accounts on a PC or Mac must be System Administrator.
Trojan Horse:
A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.

Example: Trojan horse is a program that performs a useful task while at the same time carrying out some secret destructive act.
Uninterruptible power Supply (UPS):
A hardware device that protects computers from data loss during power failures.

Example: Uninterruptible power supply can protect computers from data lose during power failures.
Virus:
Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.

Example: Virus software is a piece of code usually hidden in the operating system.
Worms:
Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.

Example: Worms use hosts to reproduce and can travel independently over computer networks.