ISTM 210 Exam 2 Beatty

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 84

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

85 Terms

1

How many organizations have been impacted by environmental factors?

1 in 4 organizations.

New cards
2

What are the environmental factors that could impact business?

  • Weather Concerns

  • Deletion of fresh water

  • depletion and use of fossil fuels

  • waste production

  • air & water quality

    • Employee health

New cards
3

5 Business impacts of environmental risk

  • Operational

  • Scarcity/ Cost of resources

  • Regulatory/Political Uncertainty

  • Increase or lack of insurance

    • Reputational Damage

New cards
4

What is green or sustainable commuting?

Practice of using computer systems & IT infrastructure in an environmentally sustainable way.

New cards
5

What are the four characteristics of green computing

  • Reduce the use of hazardous materials

  • Maximize energy efficiency

  • Promoting the recyclability of defunct products

    • Reducing factory waste from the production of computer goods.

New cards
6

What is EPEAT?

Electronic Product Environmental Assessment tool. Global standard for measuring the environmental impact of electronic products.

New cards
7

What are the 8 environmental attribute evaluation criteria?

  • Reduction or elimination of chemicals in computer manufacturing

  • Renewable biobased plastic in computer manufacturing

  • Design for end-of-life computer technology

  • Product longevity: extended warranties

  • Manufacturer end of life: tach tech back

  • Corporate performance: sound environmental policy

  • Packaging: reduce or eliminate toxins

  • Energy conservation: adopt energy star qualifications

New cards
8

How many required and optional criteria is there in EPEAT?

51 required criteria & 75 optional.

Gold: 100:75

Silver: 100:50

Bronze: 100:0

New cards
9

What is the energy star program?

Gov initiative that promotes energy efficiency.

New cards
10

What is a green pc?

built w/ energy efficiency & environmental sustainability

New cards
11

What are the green standards?

  • Energy efficient power supplies

  • Power supplies and processor that use less energy

  • Eliminate or minimize environmentally harmful materials

    • Use recycled & aluminum parts

New cards
12

What are the energy efficient modes of a computer?

Active Use > Sleep > Standby

New cards
13

What is the 80% standard?

Makes sure PSU is at least 80% energy efficient at different loads.

New cards
14

How many workers telecommute?

4.7 millionworkers in the United States as of 2020.

New cards
15

What is a network?

System of connected devices that communicate & share data.

New cards
16

What is a server, client & a client server network?

  • Server- provides resources services or data to other computers

  • Client- device that requests and uses resources

  • Client-server network- multiple clients rely on server to provide information.

New cards
17

What is a Node?

any device connected to a network

New cards
18

What is an IP address

Number assigned to each device on a network

New cards
19

What is a LAN, WLAN, PAN, CAN, MAN, WAN

Local Area Network < Wireless Local Network < Personal ““ < Campus““ < Metropolitan ““ < Wide ““

New cards
20

What is peer to peer (P2P)

Devices act as both servers and clients keeping each other connected.

New cards
21

What percent of business transactions are conducted online?

29.7%

New cards
22

What companies were used as examples of network outages?

Delta Airlines & Amazon

New cards
23

What are network advantages?

  • Economics: share printers,copiers,scanners

  • Software: install & share software

  • Collaboration: employees can communicate with each other

  • Backup

New cards
24

What are the 4 basic components needed to build a network?

NIC, Protocol, Physical Cables, Network Hub

New cards
25

What is a NIC?

  • Network Interface Card.

  • It is plugged into an expansion slot on motherboard

  • Allows for computers to interface w/ the network.

New cards
26

Most PC’s are _____ ready.

Network. meaning the card is already in the box.

New cards
27

What is the most common NIC card?

Ethernet card

New cards
28

The ethernet card has a unique _______ address.

48-bit Media Access Control

New cards
29

No 2 NIC cards have the same MAC address.

True

New cards
30

Protocol

A set of common conventions or rules that are used to connect a myriad of unique devices to a network.

New cards
31

What is the most common protocol?

Transmission Control Protocol/Internet Protocol (TCB/IP)

New cards
32

What does TCB/IP do?

Provides reliable, ordered, and error checked delivery of a stream of data between apps running on servers communicating via a server.

New cards
33

What are packets?

Smaller pieces of the complete file being sent across the network.

New cards
34

User Datagram Protocol (UDP)

Protocol used for data transfers where some data could be lost in transit: video streaming

New cards
35

Physical Cables

Cables that plug into the NIC card and then connect to the network.

New cards
36

What is the most common type of cable?

Ethernet Cable

New cards
37

What is the most common type of ethernet cable?

Twisted pair

New cards
38

What is the network hub?

Central location that serves as a “traffic cop” and administrator for network communications and connections.

New cards
39

What’s the most common type of network hub?

Ethernet Hub

New cards
40

What is the network operating system (NOS)

manages network resources & allows multiple devices to connect.

New cards
41

What are the 4 major functions of the NOS?

  • Network Traffic Control

  • Administrating Packets

  • File management

  • Backup & security

New cards
42

What is a network administrator

An IT pro. responsible for maintaining network infrastructure.

New cards
43

What are the responsibilities of a network administrator?

  • Smooth network operations

  • network performance and implementations of new nodes

  • the addition of new networks

  • provide user access (log in) & authentication.

New cards
44

What can failure to pick right topology do?

  • Loss of data

  • Risk of security breach

  • loss of revenue

New cards
45

What is a bus topology & what are the benefits and drawbacks?

  • topology where all nodes are connected to single backbone, but only 1 device communicates at a time.

  • benefits: cheap & expandable

  • drawbacks: single point of failure & limited scalability b/c it becomes slower.

New cards
46

What is Star topology & what are the benefits and drawbacks?

  • All devices are connected to one hub that directs traffic.

  • Benefits: If 1 device fails you’re fine, easy troubleshooting.

  • Drawbacks: if hub goes down everything does, expensive.

New cards
47

What is the ring topology & what are benefits and drawbacks?

  • Devices connected in a circular structure. Data can go 1 or both ways.

  • Benefits: easy to operate and no need for a hub.

    • Drawbacks: difficulty troubleshooting, if network goes down everything does, data must pass through all nodes.

New cards
48

What is the mesh topology, and what are the benefits and drawbacks?

  • All nodes are interconnected and wireless.

  • Benefits: if connections goes down in one device it is still fine. very efficient

  • Drawbacks: complex set up and expensive.

New cards
49

What are the responsibilities of a network administrator?

  • Put in place policies to ensure authorized users can have access to network

  • determines who is given access to network

  • Determine how often user changes pw

New cards
50

What concerns do businesses have about employees’ access to internet?

  • introduce viruses

  • install cookies

  • viewing inappropriate sites.

New cards
51

What does a firewall do?

  • Blocks packets

  • prevents unauthorized access

  • stops malware

  • monitors activity

  • controls users’ access

New cards
52

the ARPANET

first general purpose developed by the department of defense.

New cards
53

Who at CERN is credited with developing network protocols required to allow networks to span borders?

Tim Berners-Lee

New cards
54

What network protocol allowed for users to exchange info on the worldwide web?

HTTP (open source)

New cards
55

In 2023, how many internet users worldwide were there?

5.18 billion

New cards
56

What two IP addresses are assigned to your computer?

  • IPv4: 32-bit number

  • IPv6: 128-bit number

New cards
57

What registrants are there?

godaddy, goggledomains, dreamhost & IONOS.

New cards
58

Most popular web browsers.

Google Chrome, Firefox, DuckDuckGo & Microsoft Edge

New cards
59

What is a webmaster?

Person responsible of creation or maintenance of website.

New cards
60

What are webmaster’s responsibilities?

Maintenance, support new development, maintain, testing

New cards
61

what’s a Web Developer?

programmer who develops web pages using HTML, CSS, and Javascript.

New cards
62

What are the responsibilities of the web developer?

Coding, Support & Planning

New cards
63

Browser features are ___?

bookmarking, caching, graphic displays, javascript

New cards
64

3 most important functionality selection factors

Security, popup blockers, and usability.

New cards
65

What is an Internet Service Provider (ISP) ?

Organization that provides services for assessing, using, managing, or participating on the internet. offers connectivity between user and internet.

New cards
66

ISP’s can also _____

serve as web site registrants, provide internet hosting services.

New cards
67

Search Engines use ________?

kwyqord search, directory search and metaseach

New cards
68

What are viruses?

malware that can copy and infect other computers by attaching to another program.

New cards
69

What are worms?

A malicious computer program that can replicate itself but have no need to attach to a program.

New cards
70

What are trojan horses?

seemingly harmless program that when executed releases viruses on computers.

New cards
71

What is spyware?

malware that is intended for spying.

New cards
72

What is the most common use of the internet?

Email

New cards
73

composition of an email:

  1. email address

  2. header

  3. subject

  4. attachments

  5. body

  6. recipient options

    • CC & BCC

New cards
74

What is Phishing?

Act of tricking users to reveal information.

New cards
75

Technology that allows for voice calls on internet?

Voice Over Internet Protocol (VoIP)

New cards
76

Main providers of VoIP?

Vonage, ringcentral, zoom phone, skype

New cards
77

A new website is developed _______

Every 3 seconds

New cards
78

what percent of business activity is online?

28%

New cards
79

by 2040, an estimated __% of all purchases will be by e-commerce.

95%

New cards
80

______ foundation formalized international connectivity with the standardization of _____ protocol and the use of domain names on the emerging global network.

National Science Foundation; TCP/Ip

New cards
81

Hypertext Markup Language:

the “programming language” of the internet

New cards
82

Hypertext Transfer Protocol:

The “communications protocol” of the internet

New cards
83

Uniform Resource Locater (URL)

the “content (webpage) locator” of the internet

New cards
84

Other programming languages?

Javascript, Adobe Flash, Cascading Style Sheets (CSS) & Hypertext Preprocessor (PHP)

New cards
85

Different ways to purchase ads?

Cost per Click, Cost per thousand impressions, cost per action.

New cards
robot