CIS 1000 – Flashcards

Unlock all answers in this set

Unlock answers
question
What is a computer network?
answer
two or more connected computers via software or hardware
question
What is a node?
answer
any device connected to a network
question
What are the benefits of computer networking?
answer
facilitates resource sharing i.e. high speed Internet connections, peripheral devices such as printers, files
question
What are the disadvantages of computer networking?
answer
network administration i.e. installing new computers and devices, monitoring the network's performance, updating and installing new software, configuring network security
question
What is network architecture?
answer
the design of the network
question
What is peer to peer network?
answer
most common example of a locally administered network where each node can communicate directly with every other node
question
What is a client/server network?
answer
most common example of central administration where tasks performed at one computer can affect the other computers on the network; a client is a computer where users accomplish tasks and make requests and the server provides information or resources to the client computers on the network
question
What does LAN stand for?
answer
local area network, nodes are located within a small geographic area
question
What does HAN stand for?
answer
home area network, used to connect all of a home's digital devices (computers, printers, phones, gaming devices, televisions, DVRs
question
What does WAN stand for?
answer
wide area network, made up of LANs connected over long distances
question
What does MAN stand for?
answer
metropolitan network area, provide access to a specific geographic area, such as an entire city
question
What is transmission media?
answer
wireless networks that connect nodes with radio waves or wired networks that use cables to connect nodes
question
What types of cables are used for wired networks?
answer
twisted-pair cable (twisted copper wires surrounded by a plastic jacket), coaxial cable (single copper wire surrounded by plastic), fiber-optic cable (plastic or glass fibers, transmit data at fast speeds)
question
What is data transfer rate?
answer
also known as bandwidth, the maximum speed at which data can be transmitted between two nodes on a network (measured in megabits per second, Mbps)
question
What is throughput?
answer
the actual speed of data transfer achieved, always less than or equal to the data transfer rate (measured in megabits per second, Mbps)
question
What are network adapters?
answer
devices connected to or installed in network nodes which enable nodes to communicate with each other and access the network (adapters already installed into devices known as network interface card or NIC)
question
What is the main concern with wireless signals?
answer
might have decreased throughput i.e. interference from magnetic and electrical sources, interference with other wireless networks, building materials and metal, distance from networking equipment, coded signals to protect data (however, once coded data travels at usual speeds)
question
What do network navigation devices do?
answer
control the flow of data through a network, data sent in bundles called packets
question
What are the two most common navigation devices?
answer
routers (transfers packets between two or more networks) and switches (send packets to intended nodes on same network)
question
What consists of networking software?
answer
home networks and client/server networks
question
What is known about home networks?
answer
need operating system (OS) software that supports peer to peer networking
question
What is known about client/server networks?
answer
controlled by centralized servers that have specialized network operating system (NOS) software (ex; Windows Server 2008 R2 and SUSE Linux Enterprise Server)
question
What is known about Home Ethernet Networks?
answer
use Ethernet protocol as standard for network communication
question
What are the Internet Protocol standards for Ethernet networks?
answer
wireless 802.11 (Wi-Fi) and wired 802.3
question
In terms of home Ethernet networks, what do wireless routers and network adapters do?
answer
translate electronic data into radio waves, broadcast radio waves to other nodes, receive signals from other nodes
question
How are throughput speeds measured?
answer
measured using utilities like Net Meter; wired Ethernet connections can receive higher rates of throughput as opposed to wireless due to less susceptibility to interference
question
What is Wi-Gig designed to do?
answer
joint effort between Wireless Gigabit Alliance and the Wi-Fi Alliance to provide 7 Gbps of throughput which will be faster than current wired or wireless standards (won't be available for several years)
question
What is the most popular transmission media option for wired Ethernet networks?
answer
unshielded twisted-pair (UTP) cable that is composed of four pairs of wires that are twisted around each other to reduce electrical interference
question
What are the other components of network cabling in terms of UTP?
answer
RJ-45 or Ethernet connectors used on cable ends, Cat 6 cable best UTP for home networks, signal degrades after 100 m (328 ft)
question
What does Home Ethernet Network Equipment consist of?
answer
broad band router (includes integrated switches, most have wireless capability, can contain broadband modem), wireless devices need wireless network interface cards (NICs) and network ready devices can connect directly to router
question
What are NAS devices?
answer
specialized computing devices designed to store and manage your data
question
What is a more sophisticated type of NAS?
answer
home network server, device designed to provide a specific set of services to computers on a home network; performs only a limited set of functions performed on client/server networks
question
What consists of digital entertainment devices?
answer
connecting to network to access and share digital content, use gaming devices to play multiplayer games with players all over the world, network ready TVs and home theater systems, blu-ray players, DVRs
question
What is the main function of an Internet appliance?
answer
easy access to the Internet, social networking sites, e-mail, video, news and entertainment
question
What are specialized devices?
answer
Internet appliances (Apple iPad), digital picture frames, security monitoring cameras
question
What is piggybacking?
answer
connecting to a wireless network other than your own without permission of the user, can be unintentional, most wireless adapters are set up to access the strongest wireless signal detected
question
What is a firewall?
answer
hardware or software solution that helps shield your network from computers outside of your network; however, hackers can intercept packets of information broadcast on a wireless network that can allow them to bypass firewall
question
What precautions are needed to secure a wireless network?
answer
change your network name (SSID), disable SSID broadcast, change the default password on your router, turn on security protocols, implement media access control, limit your signal range, apply firmware upgrade
question
What is known about configuring a home network?
answer
windows 7 automates setting up networks with wizards, before running the automated wizards make sure there are network adapters on each node, for any wired connections, plug all the cables into the router, nodes, and so on, make sure your broadband modem is connected to your router and that the modem is connected to the Internet
question
When configuring a home network, what order should the equipment be turned on?
answer
broadband modem, router, all computers and peripherals (printers, scanners); allow the modem and router about one minute each to power up and configure
question
What are the last few steps to configuring a home network?
answer
access network and sharing center from within the control panel, turn network discovery on, turn file and printer sharing on, turn public folder sharing on, use set up a new connection wizard, use connect to the internet wizard, use set up a wireless router wizard
question
How do you connect Macs wirelessly?
answer
set up router security (like in windows), logging onto network requires SSID and passphrase, choose network, enter password, and join, networks with SSID broadcast turned off will not appear as an available network, therefore, click other and enter the network name and password
question
How do you hook up devices like DVRs or gaming consoles?
answer
wired connection: plug a cable into the device and your router wireless connection: follow steps in device's set up menu and a SSID name and security passphrase required of network is secured
question
How do you test Internet connection speed?
answer
Internet sites, such as speedtest.net and broadband.gov, allow you to test speed of downloading and uploading files (run tests several times during the day over a week)
question
___ decreases as device moves farther away from router
answer
throughput
question
How do you increase throughput?
answer
move router within the room or to another room, move the device closer to the router, amplify your wireless signal by adding a wireless range extender
question
What are the advantages of a digital format?
answer
sounds and images reproduce perfectly, easy distribution, small devices can hold huge media collections, easy access to digital information wisely
question
What are the features of cellular phones and smartphones?
answer
auto-redial, voice mail, voice-activated dialing, Internet access, text messaging, personal information management (PIM)
question
What are smartphones?
answer
the most full-featured cell phones
question
How do cell phones and smartphones work?
answer
analog to digital converter chip converts voice sound waves into digital signals, digital signal processor compresses the signal so it can be sent to another phone, digital data is transmitted as radio waves, digital signal processor decompresses incoming calls
question
In terms of cell phones and smartphones, what purpose is the base transceiver?
answer
picks up the request for service
question
In terms of cell phones and smartphones, what is the mobile switching center?
answer
request is passed to mobile switching center where is monitors the strength of the signal and when the signal is weak, it orders the next base station to take charge of your call
question
What is the processor responsible for in cell phone and smartphone hardware?
answer
coordinates sending data between components, runs the operating system
question
What are some popular processors in cell phones and smartphones?
answer
Qualcomm Snapdragon, Texas Instruments OMAP, Marvell XScale
question
What do operating systems in cell phones and smartphones do?
answer
translate the user's commands into instructions for the processor
question
What are examples of operating systems in cell phones?
answer
windows mobile, windows phone 7 series, OS X (Apple's iPhone), palm-developed webOS (Palm Pre), symbian OS (open source), android (developed by Google)
question
What is ROM?
answer
stores the operating system and the basic programs (calendar, to-do list) in cell phones
question
Forms of memory storage in cell phones
answer
ROM, separate internal memory chips store additional applications and data, flash cards are used for additional storage (32 GB)
question
What are the input devices of cell phones?
answer
microphone, keypad, touch screen, digital camera
question
What are the output devices of cell phones?
answer
speaker, LCD display
question
What consists of standard software in cell phones and smartphones?
answer
to-do list, contact manager, calendar
question
What consists of additional software in cell phones and smartphones?
answer
microsoft word, excel, outlook, powerpoint, games, tools, reference applications
question
How can cell phone and smartphone files be transferred to a desktop?
answer
via flash card readers, cradles
question
What is synchronizing?
answer
the process of updating your data so the files on your cell phone or smartphone and computer are the same
question
How do you synchronize your cell phone or smartphones?
answer
via sync cables, windows sync center
question
What are wireless transfers in terms of cell phones?
answer
bluetooth (use radio waves), IrDA (transmits data signals using infrared light waves)
question
What is SMS?
answer
short message service, also known as text messaging, that allows you to send short text messages (160 characters) over mobile networks
question
What is MMS?
answer
multimedia message service, an extension of SMS, allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses
question
What does microbrowser software do?
answer
provides a web browser that is optimized to display web content effectively on the smaller screen (designed for cell phones)
question
What is WML?
answer
wireless markup language, designed content which is text based and contains no graphics
question
What are wireless Internet service providers?
answer
often phone companies that provide calling plans (T-mobile, Verizon); allow you to connect phone to the Internet
question
What are data plans?
answer
internet connectivity plans, often include text messaging
question
What do 3G and EDGE (enhanced data rate for global evolution) do?
answer
allow connectivity speeds of up to 1.4 Mbps, conditions must be ideal to get this transfer rate, more reliable and less susceptible to interference than Wi-Fi
question
What do 4G networks offer?
answer
up to 3 to 6 Mbps
question
What are MiFi devices?
answer
create mobile hot spot, fit in a shirt pocket, run up to four hours on a single charge, connects to the Internet through 3G network, distributes WiFi signal over 30 feet
question
For the iPhone 3G, ______ gives computer Internet access using 3G signal
answer
bluetooth tethering
question
What is VoIP?
answer
voice over Internet Protocol, a standard Internet connection can be used to make a phone call, free or low-cost long distance
question
What are the basic requirements for VoIP?
answer
speakers, microphone, Internet connection, VoIP provider
question
What are cell phone and smartphone security precautions?
answer
since viruses can target cell phones, keep your cell phone or smartphone number private (use a virtual phone number)
question
What is a virtual phone number?
answer
is a phone number you create that can be assigned to ring on existing phone numbers (such as your cell phone or smartphone)
question
What are portable media players (PMPs)?
answer
small devices that store and play music, many also handle video and still images (MP3, AAC, WMA for music, DivX, MPEG-4, WMV and XviD for video), how much music/video stored depends on the PMPs storage space
question
What are other choices for portable media management?
answer
some digital camera models, Sony Playstation Portable, Global positioning systems (GPS)
question
What are flash cards (in terms of PMP)?
answer
flash cards can add memory to portable media players, which are nonvolatile (won't loose data while its off), quiet, use very little power, hold between 64 MB and 4GB of data
question
What are the two ways you can legally download music?
answer
tethered downloads and DRM-free downloads
question
What are tethered downloads?
answer
you pay for the music and you own it, you are subjected to restrictions on its use
question
What are DRM-free downloads?
answer
no digital rights management on the files, song files can be moved from system to system and shared among users
question
What are subscription services for music downloads?
answer
unlimited downloads to your PMP, songs usable only as long as you pay your monthly subscription fee
question
What is podcasting?
answer
competes with radio and television, podcasts can be information, radio, TV shows, books on tape, audio players, etc., people can listen when they wish, can use podcasting software to automatically transfer new content
question
What is a GPS (global positioning system)?
answer
unit size and price have fallen dramatically, deliver turn by turn driving instructions, new cars often come with a GPS installed, can be accessed through a PDA or smartphone or added to a notebook, built and operated by U.S. dept. of defense, can determine geographical location anywhere on the planet to within 3 feet
question
What are image quality factors?
answer
quality of lenses, file format and compression, colour management software, resolution (number of data points recorded for an image)
question
What is the most common format to store digital photography?
answer
JPEG, joint photographic expert group format
question
____do not use films and you can see your images instantly
answer
Digital cameras
question
Digital video can be captured using...
answer
digital video cameras, cell phones or smartphones, webcams
question
Digital video software allows you to...
answer
edit digital video, review clips frame by frame, reorder segments, correct colour, balance, brightness, or contrast
question
What are common file formats?
answer
QuickTime (for really large files), MPEG, RealMedia, AVI (sending files to a wide range of users because it's popular)
question
What are codecs?
answer
rules implemented in software or hardware that squeeze the same audio and video information into less space
question
How do you get your video out to others?
answer
1) transfer your video from digital device to computer via USB or special sync cable 2) special devices (such as Flip Video camera) can transfer video directly to YouTube
question
What are the methods of distribution for videos?
answer
YouTube, DVD, Webcast
question
How is one able to access digital assets away from home?
answer
- netbooks (subnotebooks): run fully featured operating systems & weigh less than 2 pounds - Internet tablets: lightweight and very portable, no keyboard - Notebook computers: all capabilities of a desktop, weigh more than the other two
question
What are examples of specialized computing devices that are designed for mobility?
answer
Sony PlayStation Portable (Internet access, stores data files, videos, music, images) Apple iPad (9.7 multitouch screen, weighs 1.5 pounds, full colour) Amazon Kindle (stores up to 3, 500 e-books)
question
What is ubiquitous computing?
answer
computing that is inseparable from our everyday lifestyle
question
What is cybercrime defined as?
answer
any criminal action perpetrated primarily through the use of a computer
question
What are cybercriminals?
answer
individuals who use computers, networks, and the Internet to perpetrate crime
question
What are the types of cybercrime?
answer
fraud-related and non-fraud related
question
What is fraud-related crime?
answer
nondelivery of ordered items, credit and debit card fraud, advanced fee scams
question
What is non-fraud-related crime?
answer
computer intrusions, unsolicited e-mail, child pornography
question
What is a virus?
answer
a program that attaches itself to another program and spreads itself to other computers
question
____ are hidden within the code of a host program
answer
viruses
question
Any ____ device can be infected with a virus
answer
computing
question
What do viruses do?
answer
replicate themselves (slow down networks), secondary objectives include displaying annoying messages, deleting files on the hard drive, change computer settings
question
How are viruses spread?
answer
sharing disks or flash drives, opening an e-mail attachment, downloading infected audio or video files
question
What are boot-sector viruses?
answer
replicate themselves in the boot sector of the hard drive
question
What are logic bombs?
answer
type of virus, activate when certain conditions are met, such as opening a file
question
What are time bombs?
answer
type of virus, triggered by the passage of time or on a certain date
question
What are worms?
answer
type of virus, travel between systems through networks
question
What are script viruses?
answer
type of virus, hidden on Web pages as miniprograms
question
What are macro viruses?
answer
type of virus, attached to documents (*macro - short series of commands that usually automates repetitive tasks)
question
What are e-mail viruses?
answer
type of virus, use e-mail address books to distribute themselves
question
What are encryption viruses?
answer
type of virus, compress files using a complex encryption
question
How are viruses classified?
answer
ploymorphic viruses (peridically rewrite themselves to avoid detection) , multipartite viruses (infect multiple file types), stealth viruses (erase their code from the hard drive and reside in the active memory)
question
What do antivirus software do?
answer
programs that detect viruses by scanning files to look for virus signatures (unique codes), provide options for deleting or fixing infected files (also known as quarantining), inoculate files against further infection
question
How do you deal with an infected computer?
answer
boot computer with antivirus installation disc, run directly from DVD/CD, allow software to delete or quarantine infected files, research viruses found to ensure further manual steps are not needed
question
How do you prevent instant messaging viruses?
answer
allow contact from Buddy or Friends List users only, never automatically accept transfers of data, avoid using instant messaging programs on public computers
question
What are other ways to protect your system?
answer
keep your antivirus and operating system (OS) software up to date, load security patches as soon as they are available, enable automatic updates
question
What is a hacker?
answer
anyone who unlawfully breaks into a computer system, whether an individual computer or a network
question
What are the types of hackers?
answer
white hat (do it for the challenge), black hat (destroy information or hack for illegal gain), script kiddies (don't create programs to hack, but use tools created by skilled hackers)
question
What do hackers steal?
answer
data stored on hard drive, credit card numbers, bank account numbers, steal information through packet sniffing or a keylogger, use information to purchase items illegally or to commit identity theft
question
What is a packet sniffer?
answer
computer program deployed by hackers that looks at each packet as it travels on the Internet
question
What is a keylogger?
answer
program that captures all keystrokes made on a computer
question
How are computers attacked?
answer
via Trojan horse (program that appears to be useful or desirable, like a game, but does something malicious without your knowledge), backdoor program ( hackers, referred to as zombies, have complete control (send e-mails, etc., without knowledge), denial of service attacks (DoS, where users are denied access to computer system), distributed denial of service attacks (DDoS, attacks from many zombies at once)
question
How do hackers gain access?
answer
direct access (installing hacking software) or indirect access (via Internet connection and logical ports, which are virtual communication gateways that allow a computer to organize requests for information from other networks or computers)
question
What are Firewalls?
answer
software programs or hardware devices designed to keep computers safe from hackers, most current operating systems include reliable firewalls, security suite often include firewalls, network routers can contain hardware firewall, firewalls are critical if you have an always on broadband connection
question
What is bluesnarfing?
answer
bluetooth attack, relatively easy and available on the Internet, exploits flaw in access software to steal information contained on the device
question
What is bluebugging?
answer
bluetooth attack, difficult and expensive, presents serious dangers, hacker takes control of the device (make phone calls, send messages, etc)
question
Beware of...
answer
"evil twins" that offer free Internet access so the hackers can monitor traffic looking for sensitive information they can use
question
How do you protect yourself from wireless network hackers on the road?
answer
check with authorized personnel for official name of hotspot, do not sure free access from unknown sources
question
What are password managers built into?
answer
operating systems, web browsers, some security packages
question
What are disadvantages of using public computers?
answer
shared computers risk subsequent user viewing your data, might already have viruses or hacking tools installed
question
What are portable privacy devices?
answer
help protect your privacy when working on computers away from your home or office, simply plug the device into a USB port on the machine, sensitive Internet files are stored on the privacy device
question
Take the ___ with you on a flash drive and avoid using the public computer's operating system.
answer
Linux OS
question
What are biometric authentication devices?
answer
devices you can attach to your computer that read a unique personal characteristics such as fingerprints, Iris patterns, voice patterns, face patterns, which allow you to access your computer
question
What is malware?
answer
software that has malicious intent?
question
What are the three primary forms of malware?
answer
1) adware and 2) spyware (known collectively as grayware), which are nondestructive and primarily intrusive, annoying, or objectionable online programs that are downloaded to your computer when you install or use other online content and 3) viruses, which are destructive
question
What is antispyware software?
answer
included in many Internet security suites, stand-alone spyware removal available
question
What is spam?
answer
unwanted or junk e-mail
question
What is spim?
answer
unsolicited instant messages
question
How do you avoid spam?
answer
create free Web-based e-mail account for filling out online forms or making online purchases, use a spam filter, do not try to "unsubscribe" from spam e-mails, use an e-mail forwarding service
question
What are cookies?
answer
also known as tracking cookies, are small text files that some Web sites automatically store on your computer's hard drive when you visit the site, Web site assigns an ID number to your computer, stored in a cookie file, each time you log in to the site, it notes the visit and keeps track of it in a database, provide info about browsing habits, identify user preferences, pose some privacy risks, but low security threat
question
What information do you need to protect from identity thieves?
answer
social security number, phone number, street address
question
What is a backup?
answer
a copy of a file that can be used to replace the original
question
What types of files need to be backed up?
answer
program files (files to install software) and data files (files you create, such as word files, contacts, etc)
question
What is backup routine?
answer
back up files frequenctly, back up files when you make changes
question
What do software programs do for easy backup?
answer
schedule automatic backups, can back up files, folders, or entire drives, back up to external hard drive, USB device, or DVD
question
What do entire system backup softwares do?
answer
takes an image of the entire system, stores on a separate hard drive, in case of failure, a new drive is inserted
question
Store backups _____.
answer
offsite
question
For online backups...
answer
store backup files on Internet servers, some services free (Windows Live Sky Drive and ADrive), fees for some services
question
What are NAS (network attached storage) devices?
answer
large hard drives that are connected to a network of computers instead of one computer and they can be used to backup multiple computers simultaneously
question
What is social engineering?
answer
uses social skills to generate human interaction to entice individuals to reveal sensitive information, usually does not use a computer or face-to-face interaction (via phone), pretexting (involves creating a scenario that sounds legitimate enough that someone will trust you)
question
What is phishing?
answer
uses e-mail to lure user to fake Web sites, tricks user into revealing private data
question
What is pharming?
answer
malicious code changes Web browser's ability to find Web addresses
question
What is a hoax?
answer
an attempt to make someone believe something that is untrue, target large audiences, perpetrated as practical jokes, agents of social change, or time wasters, perpetrated by e-mail
question
To protect your physical assets (ex; computer), avoid...
answer
sudden movement, excessive heat or cold, dust, food and liquids and use padded case for notebooks
question
What are power surges?
answer
occur when electrical current is supplied in excess of normal voltage (120 volts in the United States) which are caused by old or faulty wiring, downed power lines, malfunctions at electrical substations, lightning strikes
question
What are three approaches to deterring computer theft?
answer
alarming computers, locking them down, or installing devices that alert you when they are stolen (software alerts)
question
What types of tasks are candidates for automation as a software routine?
answer
routine, repetitive, work with electronic data, follow a series of clear steps
question
What is a system?
answer
a collection of pieces working together to achieve a common goal
question
What does an information system include?
answer
data, people, procedures, hardware, software
question
What are the six steps in the system development life cycle?
answer
problem/opportunity identification, analysis, design, development and documentation, testing and installation, maintenance and evolution
question
What happens in the problem and opportunity identification phase?
answer
the existing system is evaluated, problems are defined, new proposals are reviewed, decisions are made to proceed with the projects, the process is documented, relevant problems and opportunities are defined
question
What happens in the analysis phase?
answer
a program specification (goals and objectives of the project) is developed, a feasibility assessment is performed, user requirements are defined, analysts recommend a plan of action
question
What happens in the design phase?
answer
a detailed plan for programmers is developed, flowcharts and data-flow diagrams are used for the current and proposed system
question
What happens in the development and documentation phase?
answer
actual programming takes place, first phase of the program development life cycle (PDLC)
question
What happens in the testing and installation phase?
answer
program is tested for proper operation, program is installed for use, testing and results are documented
question
What happens in the maintenance and evaluation phase?
answer
performance of the system is monitored, corrections and modifications to the program are made, maintenance procedures and results are documented
question
What are the eight principles for ethical software engineering practices established by ACM and IEEE?
answer
1. public (software engineers shall act consistently with the public interest) 2. client and employer (software engineers shall act in a manner that is in the best interests of their clients and employer consistent with the public interest) 3. product (software engineers shall ensure that their products and related modifications meet the highest professional standards possible) 4. judgement (software engineers shall maintain integrity and independence in their professional judgement 5. management (software engineering managers and leaders shall subscribe to and promote an ethical approach to the management software development and maintenance) 6. profession (software engineers shall advance the integrity and reputation of the profession consistent with the public interest) 7. colleagues (software engineers shall be fair to and supportive of their colleagues) 8. self (software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of professiong
question
What is joint application development (JAD)?
answer
a style of interaction that is useful in creating successful, flexible results, helps designers adapt to change in program specifications, includes customer involvement, no communication delays, also referred to as accelerated design and facilitated team technique
question
What is programming?
answer
involves the process of translating a task into a series of commands a computer will use to perform that task, involves identifying the parts of a task that computer can perform, describing tasks in a specific and complete manner, translating the tasks into a language understood by the computer's CPU
question
What are the stages of program development life cycle (PDLC)?
answer
describing the problem (the problem statement), making a plan (algorithm development), coding (speaking the language of the computer), debugging (getting rid of errors), finishing the project (testing and documentation) * chapter 10, see steps *
question
What is a top-down design?
answer
systematic approach in which a problem is divided into a series of high-level tasks, detailed sub tasks are created from high-level tasks
question
What happens in object-orientated analysis?
answer
classes (categories of inputs) are identified, classes are defined by information (data) and actions (methods or behaviours), re-usability is key
question
What is compilation?
answer
the process of converting code into machine language, a compiler reads the source code and translates it into machine language, after compilation, programmers have an executable programs
question
What is an interpreter?
answer
translates source code into a line-by-line intermediate form, each line is executed before the next line is compiled, programmers do not have to wait for the entire program to be recompiled each time they make a change, programmers can immediately see the results of the changes as they are making them
question
What is an integrated development environment?
answer
tool that helps programmers as they enter the code by highlighting keywords and alerting them to typos, once editing is complete, the compilation begins
question
What is a syntax error?
answer
identified via compiling, mistake in use of the language
question
What is a warning?
answer
identified via compiling, suggestion from compiler that the code might not work as intended
question
What is a logic error?
answer
mistake caught only when the program executes
question
What is a runtime error?
answer
mistake in the algorithm
question
What is internal testing?
answer
group within the software company tests the program
question
What are the most popular programming languages?
answer
C/CC++ and Java
question
What are the four considerations when choosing which language to use?
answer
space available, speed required, organizational resources available, type of target application
question
What is visual basic?
answer
an object-orientated language that gives the programmer powerful tools to develop useful application that run in Windows, Visual Basic 2010 (VB 10.0) is the current version
question
What is C?
answer
developed for system programmers, combines high and low level programming features, modern operating systems are written in C
question
What is C++?
answer
uses the same features as C, includes object-orientated design
question
What is Java?
answer
object-orientated features, large set of existing classes, architecture neutral
question
What is HTML/XHTML?
answer
HyperText Markup Language/eXtensible HyperText Markup Languag, not a true programming language, uses special symbols (tags) to control how Web pages are viewed
question
What are scripting languages?
answer
limited to performing a specific set of specialized tasks
question
What is JavaScript?
answer
used to make Web pages more visually appealing and interactive
question
What is VBScript?
answer
subset of VB used to add interactivity to Web pages
question
What is PHP?
answer
another scripting language gaining in popularity
question
What do active server pages (ASP), java server pages (JSP) and PHP do?
answer
add interactivity to Web pages, translate user information into a request for more information from a company's computer
question
What is Adobe Flash?
answer
used to develop Web-based multimedia, includes its own scripting language, ActionScript
question
What is Microsoft SilverLight (XML)?
answer
supports development of multimedia and interactive Web applications
question
What is AJAX?
answer
Asynchronous JavaScript and XML, uses a combination of existing technologies like JavaScript, CSS, and XML, allows for information updates without page refresh, allows for a more responsive user experience
question
What is XML?
answer
eXtensible MarkUp Language, enables designers to define data-based tags, groups can agree on standard systems of tags
question
What is a blender?
answer
video game development tool, open source, built-in game engine, built-in physics engine, uses logic bricks to simplify programming
question
What is the next great language?
answer
large projects may take 30 minutes to compile, therefore, interpreted languages (such as Python, Ruby, Smalltalk) might become more important because they have minimal compile times
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New