Chapter 02 Input and output devices
It is a general term for the physical components that make up a computer system.
Computer Hardware
A device used to store data permanently
storage device
RSI stands for
Repetitive Strain Injury
What stage is this,
Look at the existing system and find areas to improve
Analysis Stage
Send out to recipients from a mailing list. They are basically unwanted emails.
Spam
It is a general term for the programs that control the computer system.
Computer Software
storage that can be accessed from anywhere using the internet
Cloud storage
It is a tiny cpu built onto a single chip to control electronic devices.
Microprocessor
Which stage comes after Design?
Development and Testing
Is based on personal experiences and usually updated by one author.
Blog
If you are shopping at Walmart and you need to know the price of an item, you could use a _____________.
Barcode Scanner
Two or more electronic devices, connected together so that they can exchange data.
Network or Computer Network
What is VoIP?
Voice over internet protocol
"I went to a company as a system analyst, sat down to see how the current system works. I did not talk to anyone." Which research method is described above?
Observation
It is a worldwide public network.
Internet
What does OMR stand for?
Optical Mark Recognition
used to connect multiple computers to a single LAN network, using BROADCAST to send data.
Hub
EFT stands for:
electronic funds transfer
The action of sending emails to fraudulently obtain another person's bank details is called:
Phishing
A privacy prevention technique by using a unique number while installing a software to prove the software originality.
Product Keys
Hardware devices that allow data to be transmitted to the computer is called?
Input Devices
Which network device has the capability to send the data packets to a specific port or a device within LAN.
Switch
An email sent to the customer which they printouts as their proof of purchase or as printed copy when they go to the theatre or travelling by flight
e-ticket
A piece of programming code which maliciously deletes files is called
Virus
A software prevention technique where users are required to agree to the term of use before the installation can be completed.
License agreements