Technology - ANSWER Puts in structure reports, analyses, and info gleaned to
support business
Information Technology - ANSWER Backbone of business.
Central Processing Unit (CPU) - ANSWER Brain of the computer that performs
instructions defined by software
Random Access Memory (RAM) - ANSWER Short term working memory supports
the CPU aka primary storage
Motherboard - ANSWER A circuit board that contains all of the computer system's
main components.
Network Interface Card (NIC) - ANSWER A card that enables one computer to send
and receive data to and from another computer.
USB - ANSWER A type of connection used to attach devices such as flash drives,
scanners, cameras, and printers to a computer. Attaches peripheral devices to a
CPU
disk drive - ANSWER A device that reads data from and writes data onto a disk. The
disk can be a hard disk - removable or fixed; a floppy disk. It is an example of an
input and output device.
peripheral device - ANSWER A device that is attached to the computer and aids in
input and/or output.
Midrange Computers - ANSWER Sometimes called minicomputers, midrange
computers are less powerful and smaller in physical size than mainframe computers,
but do many of the same things, simply on a smaller scale.
Microcomputer - ANSWER Smaller mainframe. Most used in business. A single-user
computer that comes in many forms, such as a desktop model, a portable
laptop/notebook, or a handheld computer; also called a personal computer.
computer software - ANSWER list of instructions for computer to follow that is stored
in the computer's memory. It tells the computer how to work and perform computer
tasks
Application Software - ANSWER computer software created to allow the user to
perform a specific job or task
system software - ANSWER Consists of the programs that control or maintain the
operations of the computer and its devices.
,Utility Software - ANSWER Performs a particular function in the background, such as
virus protection & printer drivers
Software - ANSWER Program that enables the computer to work
Operating system - ANSWER enables and becomes the platform for the app to work
object linking and embedding (OLE) - ANSWER Method of sharing and saving data.
Software developed by MS that allows embedding and linking to documents.
Network - ANSWER Backbone of It infrastructure, two or more devices that connect
How does a network connect? - ANSWER Client laptop/server (Central CPU).
Device connected to a network - ANSWER Node
Nodes - ANSWER Communicate through wires (Ethernet, cable, fiber optics)
Examples of radio waves - ANSWER Wifi, celltower
Examples of GPS & satellite radio - ANSWER Satellite
Topology - ANSWER The mapping of a physical network and logical
interconnections between nodes(computers).
Nodes - ANSWER Devices connected as part of a computer network (cpu, printer,
router)
Bus topology - ANSWER node is connected to a common liner backbone that had
two end points
Star topology - ANSWER Radiate around a central node, most common. If central
fails then all will fail
Ring Topology - ANSWER Connected to another node with first and last computer,
data is transmitted in a circular manner
Virus - ANSWER spread themselves attaching to files and infection webistes, and
emails,, disable systems
malware - ANSWER used for financial gain, plant spyware that can monitor cpu
actions
Dumpster diving - ANSWER searching the trash for important information that can
help gain access to a company's or individual's important information
Phishing - ANSWER the fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal personal information,
such as passwords and credit card numbers.
, Pharming - ANSWER Reroutes requests for legitimate websites to false websites
Denial of service - ANSWER cyber attack to make machine or network disrupt
service
tailgaiting "piggy backing" - ANSWER attacker seeing entry to a restricted area that
lacks proper authentiiaction
Cpu worm - ANSWER virus that is self replicating but doesn't attach itself to an
existing program to spread
Trojan horse - ANSWER seems harmless, when executed may release a virus or
worm
Spywear - ANSWER installed covertly on a computer or take control of system
without user knowledge
Adwear - ANSWER adertising typically irritating but not malicious, ads automatically
display on a computer
internet fraud - ANSWER used for fraudent activity in an online setting such as an
email, media board, chat room
cookies - ANSWER TXT files stays on a computer so next time the client visits the
website it fills in the info such as a user id and password, can be tracked and
compromised for your privacy
Business intelligence BI - ANSWER data are more valuable then ever because they
provide historical, current, and predictive analyses for organizations
Structured data (normalized data) - ANSWER well labeled and often with traditional
fields and records common to data tables
Unstructed data - ANSWER Most common - disorganized cannot be easily read or
processed by a cpu because it isn't store in rows or columns
Semi structured data - ANSWER mix of structured and unstructured data
Data center - ANSWER large centralized locations where many cpu are housed for
managing data gathered by organization. Location to house processing of data but
store farm of storage devices to hold data collected and a network mgt center to
allow from remote sites
Security - ANSWER paramount, in back up systems and security is made to protect
these valuable assets.
Local Area Network (LAN) - ANSWER a computer network that covers a small area
Campus Area Network (CAN) - ANSWER type of network spanning multiple
buildings, such as a university or business campus
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller leonardmuriithi061. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.