1,688
15
Essay, 4 pages (950 words)

Chapters 11 12 13

Batch ProcessingThe process of accumulating transaction data until a certain point is reached, then processing those transactions all at once

Data CentraliaztionHaving all data in one central location . Helps ensure data entegrity by requiring data to be updated only in one place if the data changes.

Data redundancyWhen the same data exists in more than one place in a database.

Database management system DBMSA type os speically designed application software that interacts with the user, other applications, and the database to capture and analyze data.

Default ValueThe value a database will use for a field unless the user enters another value.

FieldA field where a category of information in a database is stored. Fields are displayed in columns.

Join queryA database query that links two database tables using a common field in both tables and extracts the relevant data from each.

Real time processingThe process of updating a database immediately as changes are made.

RecordA collection of related fields in a database.

SortThe process of organizing a database into a particular order.

SQLMore powerful commands allow complex work to be done in a single sentence.

Transaction processing systemA system used to keep track of everyday business activities.

Different data types and what each storesText= alpahbetic or alphanumeric data
Numeric= numbers
Computational= formulas
Date= dates
Memo= long blocks of text
Object= multimedia files or documents
Hyperlink= a hyperlink to a web page

A good primary keyDrivers license number and a license plate

3 types of databases currently usedrelational, object oriented and multidimensional

2 types of reports in a Management information system. Summary report/Exception report

Knowledge based systemsNatural language processing system/Artificial Intelligence

Authentic servera server that keeps track of who is logging on to the network and which services on the network are available to each user.

Brute force attackan attack delivered by specialized hacking software that tries many combinations of letters, numbers, and pieces of a user ID in an attempt to discover a user password.

Dedicated servera server used to fultill one specific function

Framea container designed to hold multiple data packets

Jam signala special signal sent to all network nodes, alerting them that a data collision has occured.

Local area networka network in which the nodes are located within a small geographic area

Mac addressa unique number assigned to a network adapter by the manufacturer

Metropolitan area networka wide area network that links users in a specific geographic area

Packet screeningexamining incoming data packets to ensure they originated from or are authorized by valid users on the internal network

Protocola set of rules for exchanging data and communication.

Proxy serveracts as a go-between for computers on the internal network and the external network

Repeatera device that is installed on a long cable run to amplify a signal

Routera device that routes packets of data between two or more networks

Wide area networka network made us of local area networks connected over long distances

Bus TopologyPeer-to-peer networks

Star TopologyEthernet networks

Cable typesCable cost for twisted pair extremely low; 1, 000 mbps bandwidth/ for fiber optic high cost; bandwidth 100 mbps to 2 gbps

3 functions of network adapters1. they generate high-powered signals to enable network transmissions
2. they are responsible for breaking the data into packets and preparing the packets for transmission across the network.
3. they act as gatekeepers for information flowing to and from the client computer.

Cascading style sheets (CSS)a list of statements that define in one single location how html/xhtml elements are to be dislayed.

Client/server modela way of describing typical network functions. client computers request services adn servers provide those services returns the response.

Cloud computingthe process of using the internet to deliver business entertainment or other services that were previously delivered by conventional means.

Dynamic Host Configuration Protocolthe protocol that handles dynamic addressing. part of the transmission control/protocol / internet protocol suite, dhcp takes a pool of ip addresses and shares them with hosts on the network on an as-needed basis.

Hypertext Transfer Protocolthe protocol that allows files to be transfered from a web server so that you can see them on your computer by using a browser.

IP addressexternal entities use to communicate with your networks and is similiar to your home street address.

Optical carrier (OC) linea backbone, high speed fiber optic line

Root DNS serversa group of servers maintained throughout the internet to which isp web servers connect to locate the master listings of an entire top-level domain.

Secure sockets layera protocol that provides for the encryption of data transmitted using the internet

Static addressinga means of assigning a internet protocol address that never changes and is most likely assigned manually by a network administrator

Top-level domainthe suffix often of three letters in the domain name that indicates the kind of organization the host is.

Voice over Internet Protocolfree long distance phone calls

What is the purpose of ICANN and W3CICANN = IP address internet corporation for assigned names and numbers.
W3C = web 400 member organization; set html standards for the web and protocols for the web.

What things must a packet contain1. source address
2. destination
3. reassembling instructions
4. data

What is the purpose of the following protocols: FTP, HTTPftp = download or upload files
http = looking at hyper text documents, transfer data to a web browser

What is the version of the original IP addressing schemeTCP/IP / TRANSMISSION CONTROL PROTOCOL

What does an IP address look like? What is an octet? How does it get its name? 197. 24. 72. 157
Octet= each of the four numbers in a dotted decimal number is referred to as an octet.
top level domain=. com, . org, . gov, . edu, . net
second level domain= unique name within a top-level domain. yahoo. com, whitehouse. gov,

ONCHAPTERS 11 12 13 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Chapters 11 12 13. Page 1
Chapters 11 12 13. Page 2
Chapters 11 12 13. Page 3
Chapters 11 12 13. Page 4
Chapters 11 12 13. Page 5
Chapters 11 12 13. Page 6
Chapters 11 12 13. Page 7

This work, titled "Chapters 11 12 13" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Chapters 11 12 13'. 17 January.

Reference

AssignBuster. (2022, January 17). Chapters 11 12 13. Retrieved from https://assignbuster.com/chapters-11-12-13/

References

AssignBuster. 2022. "Chapters 11 12 13." January 17, 2022. https://assignbuster.com/chapters-11-12-13/.

1. AssignBuster. "Chapters 11 12 13." January 17, 2022. https://assignbuster.com/chapters-11-12-13/.


Bibliography


AssignBuster. "Chapters 11 12 13." January 17, 2022. https://assignbuster.com/chapters-11-12-13/.

Work Cited

"Chapters 11 12 13." AssignBuster, 17 Jan. 2022, assignbuster.com/chapters-11-12-13/.

Get in Touch

Please, let us know if you have any ideas on improving Chapters 11 12 13, or our service. We will be happy to hear what you think: [email protected]