-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (72)
Sets with similar termsOther sets by this creatorVerified questions
COMPUTER SCIENCE
Verified answer
COMPUTER SCIENCE
Relate to a recursive sorting algorithm called QuickSort, which is described as follows: A one-element list is already sorted; no further work is required. Otherwise, take the first element in the list, call it the pivot element, then walk through the original list to create two new sublists, $L_{1}$ and $L_{2}.$ $L_{1}$ consists of all elements that are less than the pivot element and $L_{2}$ consists of all elements that are greater than the pivot element. Put the pivot element between $L_{1}$ and $L_{2}.$ Sort each of L1 and L2 using QuickSort (this is the recursive part). Eventually all lists will consist of 1 element sublists separated by previous pivot elements, and at this point the entire original list is in sorted order. This is a little confusing, so here is an example, where pivot elements are shown in brackets: Original list: 6, 2, 1, 7, 9, 4, 8; After 1st pass: 2, 1, 4, [6], 7, 9, 8; After 2nd pass: 1, [2], 4, [6], [7], 9, 8; After 3rd pass: 1, [2], 4, [6], [7], 8, [9] Sorted. How many comparisons between list elements are required for pass 1 of QuickSort on an n-element list?
Verified answer
COMPUTER SCIENCE
Verified answer
COMPUTER SCIENCE
Verified answer
Recommended textbook solutions
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (72)
LAN
connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs and to wide area networks.
WAN
spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. WANs are essential for carrying out the day-to-day activities of many companies and government organizations, allowing them to transmit and receive information among their employees, customers, suppliers, business partners, and other organizations across cities, regions, and countries and around the world
wide area network
attenuation
represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
repeater
receives and repeats a signal to reduce its attenuation and extend its range.
metropolitan area network
a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN
national service providers
private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI
internet service provider
which specializes in providing management, support, and maintenance to a network. ISPs vary services provided and available bandwidth rates
Major ISPs in the United States include AOL, AT&T, Comcast, Earthlink, and NetZero
regional service provider
offer Internet service by connecting to NSPs, but they also can connect directly to each other.
modem
a device that enables a computer to transmit and receive data. A connection with a traditional telephone line and a modem, which most residential users had in the 1990s, is called dial-up access. Today, many users in underdeveloped countries and in rural areas in developed countries still use dial-up
broadband
a high-speed Internet connection that is always connected. High-speed in this case refers to any bandwidth greater than 2 Mbps.
digital subscriber line
provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines.
high speed internet cable connections
provide Internet access using a cable television company's infrastructure and a special cable modem.
cable modem
a type of digital modem used with high-speed cable Internet service. Cable modems connect a home computer (or network of home computers) to residential cable TV service; DSL modems connect to residential public telephone service.
packet
a single unit of binary data routed through a network.
Packets directly affect network performance and reliability by subdividing an electronic message into smaller, more manageable packets.
broadband over power line
technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems. BPL works by transmitting data over electrical lines using signaling frequencies higher than the electrical (or voice in the case of DSL) signals. BPL allows computer data to be sent back and forth across the network with no disruption to power output in the home
standard packet formats
include a packet header, packet body containing the original message, and packet footer.
packet header
lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data.
packet footer
represents the end of the packet or transmission end
traceroute
a utility application that monitors the network path of packet data sent to a remote computer. Traceroute programs send a series of test messages over the network (using the name or IP address) until the last message finally reaches its destination. When finished, traceroute displays the path from the initial computer to the destination computer
proxy
software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
protocol
a standard that specifies the format of data as well as the rules to be followed during transmission. Computers using the same protocol can communicate easily, providing accessibility, scalability, and connectability between networks
file transfer protocol
a simple network protocol that allows the transfer of files between two computers on the Internet.
transmission control protocol/Internet protocol (TCP/IP),
provides the technical foundation for the public Internet as well as for large numbers of private networks.
ensures that the size of the data packet is the same throughout its transmission and can even retransmit data until delivered
correctly.
IP address
a unique number that identifies where computers are located on the network. IP addresses appear in the form of xxx.xxx.xxx.xxx, though each grouping can be as short as a single digit.
verifies that the data are sent to the correct IP address, numbers represented by four strings of numbers ranging from 0 to 255 separated by periods. For example, the IP address of www.apple.com is
97.17.237.15.
Dynamic Host Configuration Protocol (DHCP)
allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network. DHCP allows a computer to access and locate information about a computer on the server, enabling users to locate and renew their IP address
domain name system (DNS)
to convert IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions. Therefore, instead of trying to remember 97.17.237.15, users can simply specify a domain name to access a computer or website, such as www.apple.com
unified communications
the integration of communication channels into a single service. UC integrates communication channels, allowing participants to communicate using the method that is most convenient for them. UC merges instant messaging, videoconferencing, email, voice mail, and Voice over IP (VoIP)
voice over IP
uses IP technology to transmit telephone calls. For the first time in more than 100 years, VoIP is providing an opportunity to bring about significant change in the way people communicate using the telephone. VoIP service providers—specialists as well as traditional telephone and cable companies and some ISPs—allow users to call anyone with a telephone number, whether local, long distance, cellular, or international.
peer 2 peer
a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server
Internet Protocol TV (IPTV)
distributes digital video content using IP across the Internet and private IP networks. Comcast provides an example of a private IP network that also acts as a cable TV provider. Traditional television sends all program signals simultaneously to the television, allowing the user to select the program by selecting a channel. With IPTV, the user selects a channel and the service provider sends only that single program to the television. Like cable TV, IPTV uses a box that acts like a modem to send and receive the content
intranet
a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes
extranet
an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
virtual private network
Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet,
secure sockets layer
a standard security technology for
establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private
Millions of websites use SSL to protect their online transactions with their customers.
SSL Certificate
an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.
Secure hypertext transfer protocol (SHTTP or HTTPS)
a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
protects against interception of communications, transferring credit card information safely and securely with special encryption techniques. When a user enters a web address using //, the browser will encrypt the message. However, the server receiving the message must be configured
to receive HTTPS messages.
digital divide
a worldwide gap giving advantage to those with access to technology
helping to make them knowledgeable about computers, programs, and the Internet
mobile
means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server.
wireless
refers to any type of operation accomplished without the use of a hard-wired connectio
personal area network
provides communication for devices owned by a single user that work over a short distance. PANs are used to transfer files, including email, calendar appointments, digital photos, and music. A PAN can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard. Personal area networks generally cover a range of less than 10 meters
bluetooth
a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
wireless lan
a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
access point
the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network
wireless access point
enables devices to connect to a wireless network to communicate with each other.
multiple-in/multiple-out (MIMO) technology
have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices.
wireless fidelty
a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
wifi infrastructure
includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal
hotspots
are designated locations where Wi-Fi access points are publicly available. Hotspots are found in places such as restaurants, airports, and hotels—places where business professionals tend to gather.
wireless MAN
a metropolitan area network that uses radio signals to transmit and receive data. WMAN technologies have not been highly successful to date, mainly because they are not widely available, at least in the United States.
Worldwide Interoperability for Microwave Access
a communications technology aimed at providing high-speed wireless data over metropolitan area networks
wireless WAN (WWAN)
a wide area network that uses radio signals to transmit and receive data. WWAN technologies can be divided into two categories: cellular communication systems and satellite communication systems.
Voice over LTE (VoLTE)
allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls. One easy way to think of VoLTE is as, essentially, a VoIP call on your mobile phone. The functionality is still the same, but the data transfers in a faster and more efficient manner.
Wired equivalent privacy (WEP)
an encryption algorithm designed to protect wireless transmission data. If you are using a Wi-Fi connection, WEP encrypts the data by using a key that converts the data to a nonhuman readable form. The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks. Unfortunately, the technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA.
Wi-Fi protected access (WPA)
a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP) and provides more sophisticated data encryption and user authentication. Anyone who wants to use an access point must know the WPA encryption key to access the Wi-Fi connection.
war chalking
the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.
war driving
deliberately searching for Wi-Fi signals while driving by in a vehicle. Many individuals who participate in war driving simply map where Wi-Fi networks are available. Other individuals have a more malicious intent and use war driving to hack or break into these networks.
IT consumerization
the blending of personal and business use of technology devices and applications
mobile device management
remotely controls smart phones and tablets, ensuring data security. MIS departments implement MDM by requiring passcodes on organizational smart phones to ensure data encryption and, in the event of a lost smart phone, that all data on the device can be deleted remotely. MDM tools can also enforce policies, track inventory, and perform real-time monitoring and reporting.
mobile application management
administers and delivers applications to corporate and personal smart phones and tablets. MAM software assists with software delivery, licensing, and maintenance and can limit how sensitive data can be shared among apps. An important feature of MAM is that it provides corporate network administrators with the ability to wipe corporate mobile apps from an end user's device remotely.
radio frequency identification
uses electronic tags and labels to identify objects wirelessly over short distances. It holds the promise of replacing existing identification technologies such as the bar code.
RFID tag
an electronic identification device that is made up of a chip and antenna
RFID reader
a transmitter/receiver that reads the contents of RFID tags in the area.
Semi-passive RFID tags
use a battery to run the microchip's circuitry but communicate by drawing power from the RFID reader
asset tracking
when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention. Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines
RFID accelerometer
a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
RFID tags
use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.
global positioning system (GPS)
satellite-based navigation system providing extremely accurate position, time, and speed information
geographic information system (GIS)
stores, views, and analyzes geographic data, creating multidimensional charts or maps. For example, GISs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.
Cartography
the science and art of making an illustrated map or chart
Edge matching (warping, rubber sheeting)
occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors.
GIS map automation
links business assets to a centralized system where they can be tracked and monitored over time.
GIS map automation
links business assets to a centralized system where they can be tracked and monitored over time.
Sets with similar termsMIS Chapter 7
66 terms
alexis_klotz
Chapter 7- Networks: Mobile Business
82 terms
nathan_shaub
ISYS Chapter 7 Terms
87 terms
shelby_elkins
Chapter 7
88 terms
juliajfleming
Sets found in the same folderMIS ch 6
47 terms
myguardiangel123
MIS Ch 8
53 terms
myguardiangel123
org behavior test 2
68 terms
micareo
MIS ch 9
51 terms
myguardiangel123
Other sets by this creatorMIS ch 5
55 terms
myguardiangel123
MIS ch 4
59 terms
myguardiangel123
MIS-ch 3
56 terms
myguardiangel123
MIS-ch 2
56 terms
myguardiangel123
Verified questionsCOMPUTER SCIENCE
T F The exit function can only be called from main.
Verified answer
COMPUTER SCIENCE
T F You cannot use the = operator to assign one object’s values to another object, unless you overload the operator.
Verified answer
COMPUTER SCIENCE
Illustrate the operation of HEAP-EXTRACT-MAX on the heap A = ⟨15, 13, 9, 5, 12, 8, 7, 4, 0, 6, 2, 1⟩.
Verified answer
COMPUTER SCIENCE
What are the benefits of a journaling file system such as Linux’s ext3? What are the costs? Why does ext3 provide the option to journal only metadata?
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
C Programming: From Problem Analysis to Program Design
8th EditionD. S. Malik
1,886 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Other Quizlet setsSLHS chp 7-8
37 terms
madison_miles49
Davis Edge quiz questions for NUR 121 test 3
63 terms
Lea_KrogmanPLUS
PSYC324 Final Exam: Lecture 9
24 terms
Lovefoot12
Christ of the Covenants Ch 1-2
19 terms
gpgp4kwqpj
Related questionsQUESTION
LDAP or non-SAML compliant auth should implement a custom solution and use STS to issue short-lived AWS credentials?
2 answers
QUESTION
A characteristic or quality that describes a particular database or entity is called.....?
11 answers
QUESTION
You need to grant your EC2 Instances the ability to upload and download images from an S3 bucket. Which IAM feature enables you to grant your EC2 instances the ability to access Amazon S3?
4 answers
QUESTION
Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet.
2 answers