1/86
These flashcards cover key vocabulary and concepts from the IST195 lecture notes on Information Technology.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Digitalization
The process of incorporating digital technology into business processes.
First-party data
Data collected directly from users, such as newsletter signups.
Third-party data
Data purchased from external sources.
Misinformation
False information spread accidentally without intent to deceive.
Disinformation
Deliberately false information spread with intent to mislead.
Velocity
The speed at which data is generated and processed.
Data lake
A storage system that holds vast amounts of raw data in its native format.
Data warehouse
A system for reporting and data analysis, storing structured, processed data.
Semi-structured data
Data that contains both structured and unstructured components, such as email.
CSV
Comma Separated Values, a standard format for transferring data between systems.
GPU
Graphics Processing Unit, optimized for parallel processing tasks.
Moore's Law
The observation that the number of transistors on a chip doubles approximately every two years.
NPU
Neural Processing Unit, designed specifically for AI and machine learning tasks.
Input
The process of entering data into a computing system.
Processing
The manipulation of data to convert it into useful information.
Output
The results produced by a computing system.
Storage (in computing)
The retention of data for future use.
Mainframe
A large, powerful computer designed for high-volume transaction processing.
System on Chip (SoC)
A single chip that integrates multiple processing units and other components.
IBM 305 RAMAC
The first commercial computer system to include a hard disk drive.
RAM
Random Access Memory, providing temporary workspace for active processing.
Embedded operating system
An operating system designed for specialized devices with specific functions.
Predictive analytics
Using historical data to forecast future outcomes.
Artificial General Intelligence (AGI)
A type of AI that can perform any intellectual task that a human can.
RFID
Radio Frequency Identification, a technology for automatic identification using radio waves.
NFC
Near Field Communications, allowing secure data transfer over short distances.
IoT
Internet of Things, connecting everyday objects with sensors to share data online.
SaaS
Software as a Service, cloud-based software accessible via the internet.
BLE
Bluetooth Low Energy, a wireless technology that consumes minimal battery power.
2.4 GHz Wi-Fi
Frequency providing longer range but slower speeds compared to higher frequencies.
5 GHz Wi-Fi
Frequency offering medium range with faster speeds.
6 GHz Wi-Fi
Frequency providing the fastest speeds but the shortest range.
Blockchain
A distributed ledger technology where transactions are recorded in blocks.
Public key cryptography
Cryptography method using pairs of keys: a public key for encryption and a private key for decryption.
Cybersecurity
The practice of protecting systems and networks from digital attacks.
Social media monitoring
Tracking quantitative metrics about social media engagement.
Social listening
Analyzing qualitative aspects of social media conversations.
Influencer
A person who aims to affect the purchasing decisions of others.
Content creator
A person who produces content without necessarily aiming to persuade.
Passive engagement
Interactions like hovering or viewing without active participation.
Data brokers
Companies that aggregate and sell consumer information from various sources.
Functions in Excel
Pre-built operations that perform calculations.
Formulas in Excel
Custom calculations created by users using operators and cell references.
Embedded OS
Operating systems designed to run on specialized devices like smart home devices.
Moore's Law
Predicts the growth of transistor density over time, doubling approximately every two years.
DeepSeek AI model
An AI model notable for achieving competitive results at a low cost.
Project Maven
A Department of Defense initiative using AI for analysis of intelligence data.
CHIPS Act
Legislation aimed at boosting domestic semiconductor manufacturing.
Passive RFID tag
An RFID tag that operates by drawing power from the reader's signal.
Smart devices
Devices equipped with internet connectivity and the ability to communicate data.
Public key encryption
A method to secure data by using a pair of keys for encryption and decryption.
Symmetric encryption
Encryption where the same key is used for both encryption and decryption.
Gordon Moore
Co-founder of Intel, known for Moore's Law.
Satya Nadella
Current CEO of Microsoft.
Sundar Pichai
CEO of Google and Alphabet.
GMAIL
Email service associated with Google.
Netflix
Streaming service providing movies and television shows.
AWS (Amazon Web Services)
Cloud computing platform offering various services including databases.
Cloud-based software
Software without the need for local installation, accessed online.
Turing Test
A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.
Transistor
An electronic component used to amplify or switch electronic signals.
Database
A structured set of data held in a computer.
Data visualization
The graphical representation of information and data.
User experience (UX)
The overall experience of a person using a product, especially in terms of how pleasant or efficient it is.
Digital transformation
The integration of digital technology into all areas of a business.
Business process management
A discipline involving the modeling, analysis, and improvement of business processes.
Computer security
Protection of computer systems from theft or damage to their hardware, software, or data.
Software development life cycle (SDLC)
A process for planning, creating, testing, and deploying software.
API (Application Programming Interface)
A set of rules that allow different software entities to communicate with each other.
Virtualization
Creating a simulated version of a computing resource rather than a physical one.
Big Data
Large and complex datasets that are difficult to process using traditional methods.
Data mining
The process of discovering patterns in large datasets.
Machine Learning (ML)
A subset of AI that uses statistical techniques to enable machines to improve with experience.
Natural Language Processing (NLP)
A branch of AI that helps computers understand, interpret, and manipulate human language.
Augmented reality (AR)
An interactive experience where real-world environments are enhanced by computer-generated information.
Virtual reality (VR)
A simulated experience that can be similar to or completely different from the real world.
Information technology (IT)
The use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.
Cybersecurity framework
A set of industry standards and best practices to help organizations manage cybersecurity risks.
Data privacy
The practice of protecting personal information and ensuring it is used appropriately.
Data governance
The management of data availability, usability, integrity, and security in an organization.
Digital asset management
The process of ingesting, organizing, and distributing digital assets.
E-commerce
Buying and selling goods or services using the internet.
Cloud computing
On-demand delivery of computing services over the internet on a pay-as-you-go basis.
Phishing
A method of trying to gather personal information using deceptive e-mails and websites.
Malware
Malicious software designed to harm, exploit, or otherwise compromise computer systems.
Ransomware
A type of malware that threatens to publish the victim's data or block access unless a ransom is paid.
Digital footprint
The trail of data you leave behind when using the internet.