Computer Systems and Information Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

This set of flashcards contains key terms and definitions related to computer systems, information security, and business concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Supercomputer

An expensive, fastest computer used by large organizations for demanding tasks with a lot of data.

2
New cards

Mainframe computer

A high-performance and reliable computer capable of performing trillions of operations and millions of transactions per day.

3
New cards

Microcomputer

The smallest and cheapest general computer, commonly referred to as a personal computer (PC).

4
New cards

Input devices

Devices that accept data and instructions for translation to the computer; examples include keyboards and scanners.

5
New cards

Output devices

Devices that accept data from a computer and translate it into human-readable form, such as monitors and printers.

6
New cards

Central Processing Unit (CPU)

The component that controls data and tasks performed by the computer components, consisting of the arithmetic logic unit, control unit, and cache memory.

7
New cards

Random Access Memory (RAM)

Primary storage that temporarily holds software and small data for processing.

8
New cards

Read-Only Memory (ROM)

Memory that safeguards critical instructions, retaining data even when the computer is powered off.

9
New cards

Local Area Network (LAN)

A network that connects computers within a limited area, allowing resource sharing.

10
New cards

Wide Area Network (WAN)

A network that covers larger geographic areas, connecting multiple LANs.

11
New cards

Software as a Service (SaaS)

Software hosted on a remote server managed for users.

12
New cards

Public Cloud

Cloud resources built and operated by a third party for public consumption over the internet.

13
New cards

Data mining

The process of discovering patterns in large data sets for analysis.

14
New cards

Malware

Software designed to cause damage to a computer.

15
New cards

Phishing

An act of trying to acquire sensitive information by pretending to be a trustworthy source.

16
New cards

Blockchain

A decentralized system that securely stores data across a computer network, ensuring immutability and transparency.

17
New cards

Crowdfunding

The practice of obtaining contributions from a large group of people to fund a project.

18
New cards

Business model canvas

A strategic management tool that outlines the economics of a business.