OMIS 34

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

Computer Waste

Errors or misuse that decrease productivity or waste resources

2
New cards

Computer Mistakes

Human errors in input, processing, or procedures leading to incorrect results

3
New cards

Social Engineering

Manipulating people into giving confidential information by exploiting trust

4
New cards

Dumpster Diving

Searching through trash to find sensitive data like passwords or account numbers

5
New cards

Cyberterrorism

Technology-based attacks intended to casue harm, fear, or major disruption 

6
New cards

Identity Theft

Stealing someone’s personal information to impersonate them for fraud

7
New cards

Phishing

Fake email or messages designed to trick users into revealing sensitive info

8
New cards

Hacker

A skilled computer user who gains access to systems; can be ethical or unethical

9
New cards

Cracker 

A malicious hacker who breaks into systems to cause damage or steal data 

10
New cards

Virus

Malicious software that attaches to files and spreads when those files open

11
New cards

Worm

Self-replicating malware that spreads across networks without user action

12
New cards

Malware

Any harmful software designed to damage or infiltrate computer systems

13
New cards

Antivirus Program

Software that detects, prevents, and removes malware 

14
New cards

Sniffer

Tool that captures network traffic; use for troubleshooting or hacking

15
New cards

Piracy

Illegal copying, distribution, or use of copyrighted software

16
New cards

Biometrics

Authentication using physical traits like fingerprints or facial recoginition

17
New cards

Managed Security Service Provider

Third-party company that monitors and manages an organization’s security systems 

18
New cards

Privacy at Work

Employer monitoring of employee computer, email, and internet usage

19
New cards

Internet Privacy

Protection of personal data collected through online activity

20
New cards

Fairness

Ethical requirement to handle user data transparently and responsibly S

21
New cards

State Privacy Laws 

Regulations governing collection and use of personal data in a specific state

22
New cards

Corporate Privacy Policies

Internal rules for protecting customer and employee information

23
New cards

RSI (Repetitive Strain Injury)

Injury caused by repeated motion like typing C

24
New cards

Carpal Tunnel Syndrome (CTS)

Wrist nerve condition caused by repetitive movements and poor ergonomics

25
New cards

Ergonomics 

Designing a workspace to improve comfort, safety, and health 

26
New cards

Business to consumer (B2C)

Businesses selling products directly to individual consumers online

27
New cards

Business to Business (B2B)

Businesses selling products/services to other businesses

28
New cards

Consumer to Consumer (C2C)

Consumers selling directly to other consumers using a marketplace platform 

29
New cards

Demand Planning

Predicting customer demand to guide production and inventory

30
New cards

Supply Planning

Arranging materials and resources to meet expected demand

31
New cards

Demand Fulfillment

Delivering products to customers accurately and efficiently

32
New cards

Retail & Wholesale E-Commerce 

Online selling of goods directly or in bulk 

33
New cards

Manufacturing E-Commerce

Using online systems to coordinate supply chains and production

34
New cards

Marketing E-Commerce

Online advertising and customer engagement

35
New cards

Finance E-Commerce

Digital banking, payments, investing, and financial services 

36
New cards

Hardware (E-Commerce Infrastructure)

Physical equipment that supports online business operations

37
New cards

Web Server Software

Programs that send/receive web pages, handle security, and track visitors

38
New cards

E-Commerce Software

Tools for managing product catalogs, shopping carts, and configuration

39
New cards

Transaction Processing Software 

Handles payments, orders, web tracking, and customer data

40
New cards

Electronic Cash

Digital form of currency used for online payments

41
New cards

Electronic Wallet

Stores payment information for quick and secure checkout (apple pay)

42
New cards

Smart Card

Plastic Card containing a microchip for secure transactions

43
New cards

Digital Certificate 

Digital document verifying identity for secure online communication 

44
New cards

Theft of Intellectual Property

Unauthorized use of someone’s copyrighted digital content

45
New cards

Fraud (Phishing & Spam)

Tricking users or sending unwanted message to steal data or money

46
New cards

Clickstream Data

User browsing behavior collected by websites to analyze or target ads

47
New cards

Building Web Presence 

Creating and maintaining an effective online business website 

48
New cards

M-Commerce

Mobile commerce conducted on smartphones and apps

49
New cards

Amazon Go Model

Checkout-free stores using sensors and automation

50
New cards

Communication System

Process of transmitting signals between a sender and receiver through a medium

51
New cards

Synchronous Communication 

Real-time communication where both parties interact at the same moment 

52
New cards

Asynchronous Communication

Communication where messages are sent and received at different times

53
New cards

Telecommunications

Electronic transmission of signals such as voice, data, or video

54
New cards

Data Communications

Movement of data between computer devices using telecom technology

55
New cards

Telecommunication Device

Hardware that converts, transmits, and receives signals 

56
New cards

Transmission Medium

Physical or wireless path that carries electronic signals

57
New cards

Bits per Second (bps)

Unit measuring how fast data is transmitted

58
New cards

Simplex Channel

Transmits data in one direction only

59
New cards

Half Duplex Channel

Transmits data in both directions, but not at the same time 

60
New cards

Full Duplex Channel

Transmits data in both directions simultaneously

61
New cards

Twisted Pair Cable

Copper wires twisted together to reduce interference; widely used

62
New cards

Coaxial Cable

cable with shielding that supports high-frequency signals

63
New cards

Fiber Optic Cable 

Glass fibers transmitting data as light; high speed and long distance 

64
New cards

Wireless Media

Transmit data through air via radio, microwave, or infrared waves

65
New cards

Personal Area Network (PAN)

Small network for one person, usually within a few feet

66
New cards

Local Area Network (LAN)

Network connecting devices in a building or small area

67
New cards

Metropolitan Area Network (MAN)

City-wide network connecting multiple buildings or campuses 

68
New cards

Wide Area Network (WAN)

Large network spanning states, countries, or globally

69
New cards

Bus Topology

All devices connect to one central cable; easy but prone to slowdowns

70
New cards

Star Topology

All devices connect to a central hub; easy to manage but hub is a failure point

71
New cards

Ring Topology 

Devices connect in a circle, passing data around the ring 

72
New cards

Hybrid Topology

Combination of other topologies to meet organizational needs

73
New cards

Wireless Topology

Devices communicate through wireless access points

74
New cards

Terminal to Host Network

Central computer handles most processing tasks

75
New cards

File Server Network 

Server stores files while clients do the processing 

76
New cards

Client Server Network

Clients request services and servers provide them; most common model

77
New cards

Centralized Processing

Single central computer performs all tasks

78
New cards

Decentralized Processing

Multiple independent computers handle seperate tasks 

79
New cards

Distributed Processing 

Multiple connected computers share tasks 

80
New cards

ARPANET

1st network that eventually became the modern internet

81
New cards

TCP/IP

Main protocol controlling how data is sent, routed, and received on networks

82
New cards

HTML

Language used to create and format web pages

83
New cards

XML 

Markup language is used to structure, store, and transport data 

84
New cards

Web Browser

Software used to access and display web pages

85
New cards

Search Engine

Tool that finds information on the internet using keywords

86
New cards

Applet

Small application designed to run within a larger program (like a browser)

87
New cards

URL 

Unique address of a webpage on the internet 

88
New cards

WWW (world wide web)

Collection of web pages accessible through the internet

89
New cards

Intranet

Private internal network for employees

90
New cards

Extranet

Private network extended to outside partners

91
New cards

Internet 

Global public network connecting millions of devices 

92
New cards

Cookies

Small files websites use to store user data and preferences

93
New cards

Cryptography

Techniques for securing information using codes

94
New cards

Encryption

Converting data into unreadable from to protect it

95
New cards

Decryption 

Converting encrypted data back to readable form 

96
New cards

Digital Signature

Electronic validation proving the authenticity of a message or document