Terms in this set (72)Sets with similar termsOther sets by this creatorVerified questions
COMPUTER SCIENCE Verified answer
COMPUTER SCIENCE Relate to a recursive sorting algorithm called QuickSort, which is described as follows: A one-element list is already sorted; no further work is required. Otherwise, take the first element in the list, call it the pivot element, then walk through the original list to create two new sublists, $L_{1}$ and $L_{2}.$ $L_{1}$ consists of all elements that are less than the pivot element and $L_{2}$ consists of all elements that are greater than the pivot element. Put the pivot element between $L_{1}$ and $L_{2}.$ Sort each of L1 and L2 using QuickSort (this is the recursive part). Eventually all lists will consist of 1 element sublists separated by previous pivot elements, and at this point the entire original list is in sorted order. This is a little confusing, so here is an example, where pivot elements are shown in brackets: Original list: 6, 2, 1, 7, 9, 4, 8; After 1st pass: 2, 1, 4, [6], 7, 9, 8; After 2nd pass: 1, [2], 4, [6], [7], 9, 8; After 3rd pass: 1, [2], 4, [6], [7], 8, [9] Sorted. How many comparisons between list elements are required for pass 1 of QuickSort on an n-element list? Verified answer
COMPUTER SCIENCE Verified answer
COMPUTER SCIENCE Verified answer Recommended textbook solutions
Other Quizlet setsRelated questionsUpgrade to remove ads Only ₩37,125/year
Terms in this set (72)LAN connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs and to wide area networks. WAN spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. WANs are essential for carrying out the day-to-day activities of many companies and government organizations, allowing them to transmit and receive information among their employees, customers, suppliers, business partners, and other organizations across cities, regions, and countries and around the world
attenuation represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls. repeater receives and repeats a signal to reduce its attenuation and extend its range. metropolitan area network a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN national service providers private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI internet service provider which specializes in providing management, support, and maintenance to a network. ISPs vary services provided and available bandwidth rates regional service provider offer Internet service by connecting to NSPs, but they also can connect directly to each other. modem a device that enables a computer to transmit and receive data. A connection with a traditional telephone line and a modem, which most residential users had in the 1990s, is called dial-up access. Today, many users in underdeveloped countries and in rural areas in developed countries still use dial-up broadband a high-speed Internet connection that is always connected. High-speed in this case refers to any bandwidth greater than 2 Mbps. digital subscriber line provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines. high speed internet cable connections provide Internet access using a cable television company's infrastructure and a special cable modem. cable modem a type of digital modem used with high-speed cable Internet service. Cable modems connect a home computer (or network of home computers) to residential cable TV service; DSL modems connect to residential public telephone service. packet a single unit of binary data routed through a network. broadband over power line technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems. BPL works by transmitting data over electrical lines using signaling frequencies higher than the electrical (or voice in the case of DSL) signals. BPL allows computer data to be sent back and forth across the network with no disruption to power output in the home standard packet formats include a packet header, packet body containing the original message, and packet footer. packet header lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data. packet footer represents the end of the packet or transmission end traceroute a utility application that monitors the network path of packet data sent to a remote computer. Traceroute programs send a series of test messages over the network (using the name or IP address) until the last message finally reaches its destination. When finished, traceroute displays the path from the initial computer to the destination computer proxy software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons. protocol a standard that specifies the format of data as well as the rules to be followed during transmission. Computers using the same protocol can communicate easily, providing accessibility, scalability, and connectability between networks file transfer protocol
a simple network protocol that allows the transfer of files between two computers on the Internet. transmission control protocol/Internet protocol (TCP/IP), provides the technical foundation for the public Internet as well as for large numbers of private networks. IP address a unique number that identifies where computers are located on the network. IP addresses appear in the form of xxx.xxx.xxx.xxx, though each grouping can be as short as a single digit. Dynamic Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network. DHCP allows a computer to access and locate information about a computer on the server, enabling users to locate and renew their IP address domain name system (DNS) to convert IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions. Therefore, instead of trying to remember 97.17.237.15, users can simply specify a domain name to access a computer or website, such as www.apple.com unified communications the integration of communication channels into a single service. UC integrates communication channels, allowing participants to communicate using the method that is most convenient for them. UC merges instant messaging, videoconferencing, email, voice mail, and Voice over IP (VoIP) voice over IP uses IP technology to transmit telephone calls. For the first time in more than 100 years, VoIP is providing an opportunity to bring about significant change in the way people communicate using the telephone. VoIP service providers—specialists as well as traditional telephone and cable companies and some ISPs—allow users to call anyone with a telephone number, whether local, long distance, cellular, or international. peer 2 peer a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server Internet Protocol TV (IPTV) distributes digital video content using IP across the Internet and private IP networks. Comcast provides an example of a private IP network that also acts as a cable TV provider. Traditional television sends all program signals simultaneously to the television, allowing the user to select the program by selecting a channel. With IPTV, the user selects a channel and the service provider sends only that single program to the television. Like cable TV, IPTV uses a box that acts like a modem to send and receive the content intranet a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes extranet an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers. virtual private network Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, secure sockets layer a standard security technology for
establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private SSL Certificate an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.
Secure hypertext transfer protocol (SHTTP or HTTPS) a combination of HTTP and SSL to provide encryption and secure identification of an Internet server. digital divide a worldwide gap giving advantage to those with access to technology mobile means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server. wireless refers to any type of operation accomplished without the use of a hard-wired connectio personal area network provides communication for devices owned by a single user that work over a short distance. PANs are used to transfer files, including email, calendar appointments, digital photos, and music. A PAN can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard. Personal area networks generally cover a range of less than 10 meters bluetooth a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices. wireless lan a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. access point the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network wireless access point enables devices to connect to a wireless network to communicate with each other. multiple-in/multiple-out (MIMO) technology have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices. wireless fidelty a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves wifi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal hotspots are designated locations where Wi-Fi access points are publicly available. Hotspots are found in places such as restaurants, airports, and hotels—places where business professionals tend to gather. wireless MAN a metropolitan area network that uses radio signals to transmit and receive data. WMAN technologies have not been highly successful to date, mainly because they are not widely available, at least in the United States. Worldwide Interoperability for Microwave Access a communications technology aimed at providing high-speed wireless data over metropolitan area networks wireless WAN (WWAN) a wide area network that uses radio signals to transmit and receive data. WWAN technologies can be divided into two categories: cellular communication systems and satellite communication systems. Voice over LTE (VoLTE) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls. One easy way to think of VoLTE is as, essentially, a VoIP call on your mobile phone. The functionality is still the same, but the data transfers in a faster and more efficient manner. Wired equivalent privacy (WEP) an encryption algorithm designed to protect wireless transmission data. If you are using a Wi-Fi connection, WEP encrypts the data by using a key that converts the data to a nonhuman readable form. The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks. Unfortunately, the technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA. Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP) and provides more sophisticated data encryption and user authentication. Anyone who wants to use an access point must know the WPA encryption key to access the Wi-Fi connection. war chalking the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured. war driving deliberately searching for Wi-Fi signals while driving by in a vehicle. Many individuals who participate in war driving simply map where Wi-Fi networks are available. Other individuals have a more malicious intent and use war driving to hack or break into these networks. IT consumerization the blending of personal and business use of technology devices and applications mobile device management remotely controls smart phones and tablets, ensuring data security. MIS departments implement MDM by requiring passcodes on organizational smart phones to ensure data encryption and, in the event of a lost smart phone, that all data on the device can be deleted remotely. MDM tools can also enforce policies, track inventory, and perform real-time monitoring and reporting. mobile application management administers and delivers applications to corporate and personal smart phones and tablets. MAM software assists with software delivery, licensing, and maintenance and can limit how sensitive data can be shared among apps. An important feature of MAM is that it provides corporate network administrators with the ability to wipe corporate mobile apps from an end user's device remotely. radio frequency identification uses electronic tags and labels to identify objects wirelessly over short distances. It holds the promise of replacing existing identification technologies such as the bar code. RFID tag an electronic identification device that is made up of a chip and antenna RFID reader a transmitter/receiver that reads the contents of RFID tags in the area. Semi-passive RFID tags use a battery to run the microchip's circuitry but communicate by drawing power from the RFID reader asset tracking when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention. Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines RFID accelerometer a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds RFID tags use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip. global positioning system (GPS) satellite-based navigation system providing extremely accurate position, time, and speed information geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps. For example, GISs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica. Cartography the science and art of making an illustrated map or chart
Edge matching (warping, rubber sheeting) occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors. GIS map automation links business assets to a centralized system where they can be tracked and monitored over time. GIS map automation links business assets to a centralized system where they can be tracked and monitored over time. Sets with similar termsMIS Chapter 766 terms alexis_klotz Chapter 7- Networks: Mobile Business82 terms nathan_shaub ISYS Chapter 7 Terms87 terms shelby_elkins Chapter 788 terms juliajfleming Sets found in the same folderMIS ch 647 terms myguardiangel123 MIS Ch 853 terms myguardiangel123 org behavior test 268 terms micareo MIS ch 951 terms myguardiangel123 Other sets by this creatorMIS ch 555 terms myguardiangel123 MIS ch 459 terms myguardiangel123 MIS-ch 356 terms myguardiangel123 MIS-ch 256 terms myguardiangel123 Verified questionsCOMPUTER SCIENCE T F The exit function can only be called from main. Verified answer COMPUTER SCIENCE T F You cannot use the = operator to assign one object’s values to another object, unless you overload the operator. Verified answer
COMPUTER SCIENCE Illustrate the operation of HEAP-EXTRACT-MAX on the heap A = ⟨15, 13, 9, 5, 12, 8, 7, 4, 0, 6, 2, 1⟩. Verified answer
COMPUTER SCIENCE What are the benefits of a journaling file system such as Linux’s ext3? What are the costs? Why does ext3 provide the option to journal only metadata? Verified answer Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
C Programming: From Problem Analysis to Program Design8th EditionD. S. Malik 1,886 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions Other Quizlet setsSLHS chp 7-837 terms madison_miles49 Davis Edge quiz questions for NUR 121 test 363 terms Lea_KrogmanPLUS PSYC324 Final Exam: Lecture 924 terms Lovefoot12 Christ of the Covenants Ch 1-219 terms gpgp4kwqpj Related questionsQUESTION LDAP or non-SAML compliant auth should implement a custom solution and use STS to issue short-lived AWS credentials? 2 answers QUESTION A characteristic or quality that describes a particular database or entity is called.....? 11 answers QUESTION You need to grant your EC2 Instances the ability to upload and download images from an S3 bucket. Which IAM feature enables you to grant your EC2 instances the ability to access Amazon S3? 4 answers QUESTION Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet. 2 answers What is designed to connect a group of computers in proximity to each other such as in an office building a school or a home?A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school.
What connects a group of computers in close proximity such as in a school or office setting?A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home.
What is designed to connect a group of computers?A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. Wired LANs are most commonly based on Ethernet technology.
What is it called when one computer can connect to another?When two or more computers are connected together so they can communicate with one another, they form a network.
|