IST195 Practice Exam Introduction to Information Technology

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/86

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts from the IST195 lecture notes on Information Technology.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Digitalization

The process of incorporating digital technology into business processes.

2
New cards

First-party data

Data collected directly from users, such as newsletter signups.

3
New cards

Third-party data

Data purchased from external sources.

4
New cards

Misinformation

False information spread accidentally without intent to deceive.

5
New cards

Disinformation

Deliberately false information spread with intent to mislead.

6
New cards

Velocity

The speed at which data is generated and processed.

7
New cards

Data lake

A storage system that holds vast amounts of raw data in its native format.

8
New cards

Data warehouse

A system for reporting and data analysis, storing structured, processed data.

9
New cards

Semi-structured data

Data that contains both structured and unstructured components, such as email.

10
New cards

CSV

Comma Separated Values, a standard format for transferring data between systems.

11
New cards

GPU

Graphics Processing Unit, optimized for parallel processing tasks.

12
New cards

Moore's Law

The observation that the number of transistors on a chip doubles approximately every two years.

13
New cards

NPU

Neural Processing Unit, designed specifically for AI and machine learning tasks.

14
New cards

Input

The process of entering data into a computing system.

15
New cards

Processing

The manipulation of data to convert it into useful information.

16
New cards

Output

The results produced by a computing system.

17
New cards

Storage (in computing)

The retention of data for future use.

18
New cards

Mainframe

A large, powerful computer designed for high-volume transaction processing.

19
New cards

System on Chip (SoC)

A single chip that integrates multiple processing units and other components.

20
New cards

IBM 305 RAMAC

The first commercial computer system to include a hard disk drive.

21
New cards

RAM

Random Access Memory, providing temporary workspace for active processing.

22
New cards

Embedded operating system

An operating system designed for specialized devices with specific functions.

23
New cards

Predictive analytics

Using historical data to forecast future outcomes.

24
New cards

Artificial General Intelligence (AGI)

A type of AI that can perform any intellectual task that a human can.

25
New cards

RFID

Radio Frequency Identification, a technology for automatic identification using radio waves.

26
New cards

NFC

Near Field Communications, allowing secure data transfer over short distances.

27
New cards

IoT

Internet of Things, connecting everyday objects with sensors to share data online.

28
New cards

SaaS

Software as a Service, cloud-based software accessible via the internet.

29
New cards

BLE

Bluetooth Low Energy, a wireless technology that consumes minimal battery power.

30
New cards

2.4 GHz Wi-Fi

Frequency providing longer range but slower speeds compared to higher frequencies.

31
New cards

5 GHz Wi-Fi

Frequency offering medium range with faster speeds.

32
New cards

6 GHz Wi-Fi

Frequency providing the fastest speeds but the shortest range.

33
New cards

Blockchain

A distributed ledger technology where transactions are recorded in blocks.

34
New cards

Public key cryptography

Cryptography method using pairs of keys: a public key for encryption and a private key for decryption.

35
New cards

Cybersecurity

The practice of protecting systems and networks from digital attacks.

36
New cards

Social media monitoring

Tracking quantitative metrics about social media engagement.

37
New cards

Social listening

Analyzing qualitative aspects of social media conversations.

38
New cards

Influencer

A person who aims to affect the purchasing decisions of others.

39
New cards

Content creator

A person who produces content without necessarily aiming to persuade.

40
New cards

Passive engagement

Interactions like hovering or viewing without active participation.

41
New cards

Data brokers

Companies that aggregate and sell consumer information from various sources.

42
New cards

Functions in Excel

Pre-built operations that perform calculations.

43
New cards

Formulas in Excel

Custom calculations created by users using operators and cell references.

44
New cards

Embedded OS

Operating systems designed to run on specialized devices like smart home devices.

45
New cards

Moore's Law

Predicts the growth of transistor density over time, doubling approximately every two years.

46
New cards

DeepSeek AI model

An AI model notable for achieving competitive results at a low cost.

47
New cards

Project Maven

A Department of Defense initiative using AI for analysis of intelligence data.

48
New cards

CHIPS Act

Legislation aimed at boosting domestic semiconductor manufacturing.

49
New cards

Passive RFID tag

An RFID tag that operates by drawing power from the reader's signal.

50
New cards

Smart devices

Devices equipped with internet connectivity and the ability to communicate data.

51
New cards

Public key encryption

A method to secure data by using a pair of keys for encryption and decryption.

52
New cards

Symmetric encryption

Encryption where the same key is used for both encryption and decryption.

53
New cards

Gordon Moore

Co-founder of Intel, known for Moore's Law.

54
New cards

Satya Nadella

Current CEO of Microsoft.

55
New cards

Sundar Pichai

CEO of Google and Alphabet.

56
New cards

GMAIL

Email service associated with Google.

57
New cards

Netflix

Streaming service providing movies and television shows.

58
New cards

AWS (Amazon Web Services)

Cloud computing platform offering various services including databases.

59
New cards

Cloud-based software

Software without the need for local installation, accessed online.

60
New cards

Turing Test

A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.

61
New cards

Transistor

An electronic component used to amplify or switch electronic signals.

62
New cards

Database

A structured set of data held in a computer.

63
New cards

Data visualization

The graphical representation of information and data.

64
New cards

User experience (UX)

The overall experience of a person using a product, especially in terms of how pleasant or efficient it is.

65
New cards

Digital transformation

The integration of digital technology into all areas of a business.

66
New cards

Business process management

A discipline involving the modeling, analysis, and improvement of business processes.

67
New cards

Computer security

Protection of computer systems from theft or damage to their hardware, software, or data.

68
New cards

Software development life cycle (SDLC)

A process for planning, creating, testing, and deploying software.

69
New cards

API (Application Programming Interface)

A set of rules that allow different software entities to communicate with each other.

70
New cards

Virtualization

Creating a simulated version of a computing resource rather than a physical one.

71
New cards

Big Data

Large and complex datasets that are difficult to process using traditional methods.

72
New cards

Data mining

The process of discovering patterns in large datasets.

73
New cards

Machine Learning (ML)

A subset of AI that uses statistical techniques to enable machines to improve with experience.

74
New cards

Natural Language Processing (NLP)

A branch of AI that helps computers understand, interpret, and manipulate human language.

75
New cards

Augmented reality (AR)

An interactive experience where real-world environments are enhanced by computer-generated information.

76
New cards

Virtual reality (VR)

A simulated experience that can be similar to or completely different from the real world.

77
New cards

Information technology (IT)

The use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.

78
New cards

Cybersecurity framework

A set of industry standards and best practices to help organizations manage cybersecurity risks.

79
New cards

Data privacy

The practice of protecting personal information and ensuring it is used appropriately.

80
New cards

Data governance

The management of data availability, usability, integrity, and security in an organization.

81
New cards

Digital asset management

The process of ingesting, organizing, and distributing digital assets.

82
New cards

E-commerce

Buying and selling goods or services using the internet.

83
New cards

Cloud computing

On-demand delivery of computing services over the internet on a pay-as-you-go basis.

84
New cards

Phishing

A method of trying to gather personal information using deceptive e-mails and websites.

85
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise computer systems.

86
New cards

Ransomware

A type of malware that threatens to publish the victim's data or block access unless a ransom is paid.

87
New cards

Digital footprint

The trail of data you leave behind when using the internet.