1/95
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Computer Waste
Errors or misuse that decrease productivity or waste resources
Computer Mistakes
Human errors in input, processing, or procedures leading to incorrect results
Social Engineering
Manipulating people into giving confidential information by exploiting trust
Dumpster Diving
Searching through trash to find sensitive data like passwords or account numbers
Cyberterrorism
Technology-based attacks intended to casue harm, fear, or major disruption
Identity Theft
Stealing someone’s personal information to impersonate them for fraud
Phishing
Fake email or messages designed to trick users into revealing sensitive info
Hacker
A skilled computer user who gains access to systems; can be ethical or unethical
Cracker
A malicious hacker who breaks into systems to cause damage or steal data
Virus
Malicious software that attaches to files and spreads when those files open
Worm
Self-replicating malware that spreads across networks without user action
Malware
Any harmful software designed to damage or infiltrate computer systems
Antivirus Program
Software that detects, prevents, and removes malware
Sniffer
Tool that captures network traffic; use for troubleshooting or hacking
Piracy
Illegal copying, distribution, or use of copyrighted software
Biometrics
Authentication using physical traits like fingerprints or facial recoginition
Managed Security Service Provider
Third-party company that monitors and manages an organization’s security systems
Privacy at Work
Employer monitoring of employee computer, email, and internet usage
Internet Privacy
Protection of personal data collected through online activity
Fairness
Ethical requirement to handle user data transparently and responsibly S
State Privacy Laws
Regulations governing collection and use of personal data in a specific state
Corporate Privacy Policies
Internal rules for protecting customer and employee information
RSI (Repetitive Strain Injury)
Injury caused by repeated motion like typing C
Carpal Tunnel Syndrome (CTS)
Wrist nerve condition caused by repetitive movements and poor ergonomics
Ergonomics
Designing a workspace to improve comfort, safety, and health
Business to consumer (B2C)
Businesses selling products directly to individual consumers online
Business to Business (B2B)
Businesses selling products/services to other businesses
Consumer to Consumer (C2C)
Consumers selling directly to other consumers using a marketplace platform
Demand Planning
Predicting customer demand to guide production and inventory
Supply Planning
Arranging materials and resources to meet expected demand
Demand Fulfillment
Delivering products to customers accurately and efficiently
Retail & Wholesale E-Commerce
Online selling of goods directly or in bulk
Manufacturing E-Commerce
Using online systems to coordinate supply chains and production
Marketing E-Commerce
Online advertising and customer engagement
Finance E-Commerce
Digital banking, payments, investing, and financial services
Hardware (E-Commerce Infrastructure)
Physical equipment that supports online business operations
Web Server Software
Programs that send/receive web pages, handle security, and track visitors
E-Commerce Software
Tools for managing product catalogs, shopping carts, and configuration
Transaction Processing Software
Handles payments, orders, web tracking, and customer data
Electronic Cash
Digital form of currency used for online payments
Electronic Wallet
Stores payment information for quick and secure checkout (apple pay)
Smart Card
Plastic Card containing a microchip for secure transactions
Digital Certificate
Digital document verifying identity for secure online communication
Theft of Intellectual Property
Unauthorized use of someone’s copyrighted digital content
Fraud (Phishing & Spam)
Tricking users or sending unwanted message to steal data or money
Clickstream Data
User browsing behavior collected by websites to analyze or target ads
Building Web Presence
Creating and maintaining an effective online business website
M-Commerce
Mobile commerce conducted on smartphones and apps
Amazon Go Model
Checkout-free stores using sensors and automation
Communication System
Process of transmitting signals between a sender and receiver through a medium
Synchronous Communication
Real-time communication where both parties interact at the same moment
Asynchronous Communication
Communication where messages are sent and received at different times
Telecommunications
Electronic transmission of signals such as voice, data, or video
Data Communications
Movement of data between computer devices using telecom technology
Telecommunication Device
Hardware that converts, transmits, and receives signals
Transmission Medium
Physical or wireless path that carries electronic signals
Bits per Second (bps)
Unit measuring how fast data is transmitted
Simplex Channel
Transmits data in one direction only
Half Duplex Channel
Transmits data in both directions, but not at the same time
Full Duplex Channel
Transmits data in both directions simultaneously
Twisted Pair Cable
Copper wires twisted together to reduce interference; widely used
Coaxial Cable
cable with shielding that supports high-frequency signals
Fiber Optic Cable
Glass fibers transmitting data as light; high speed and long distance
Wireless Media
Transmit data through air via radio, microwave, or infrared waves
Personal Area Network (PAN)
Small network for one person, usually within a few feet
Local Area Network (LAN)
Network connecting devices in a building or small area
Metropolitan Area Network (MAN)
City-wide network connecting multiple buildings or campuses
Wide Area Network (WAN)
Large network spanning states, countries, or globally
Bus Topology
All devices connect to one central cable; easy but prone to slowdowns
Star Topology
All devices connect to a central hub; easy to manage but hub is a failure point
Ring Topology
Devices connect in a circle, passing data around the ring
Hybrid Topology
Combination of other topologies to meet organizational needs
Wireless Topology
Devices communicate through wireless access points
Terminal to Host Network
Central computer handles most processing tasks
File Server Network
Server stores files while clients do the processing
Client Server Network
Clients request services and servers provide them; most common model
Centralized Processing
Single central computer performs all tasks
Decentralized Processing
Multiple independent computers handle seperate tasks
Distributed Processing
Multiple connected computers share tasks
ARPANET
1st network that eventually became the modern internet
TCP/IP
Main protocol controlling how data is sent, routed, and received on networks
HTML
Language used to create and format web pages
XML
Markup language is used to structure, store, and transport data
Web Browser
Software used to access and display web pages
Search Engine
Tool that finds information on the internet using keywords
Applet
Small application designed to run within a larger program (like a browser)
URL
Unique address of a webpage on the internet
WWW (world wide web)
Collection of web pages accessible through the internet
Intranet
Private internal network for employees
Extranet
Private network extended to outside partners
Internet
Global public network connecting millions of devices
Cookies
Small files websites use to store user data and preferences
Cryptography
Techniques for securing information using codes
Encryption
Converting data into unreadable from to protect it
Decryption
Converting encrypted data back to readable form
Digital Signature
Electronic validation proving the authenticity of a message or document