1/37
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Volatile Memory
Storage that is wiped clean when power is cut off from a device
Computer Hardware
The physical components of information technology
Software
The precise set of instructions that orchestrates the functioning of the computer
Bottom-to-top order of a computer system
Hardware, Operating System, Application, User
Packet Switching
An efficient way of transmitting data that also makes the network more reliable
The hypertext transfer protocol (http)
Defines the communication between web browsers and web servers
Protocol
The set of rules that enables communication by defining the format of data and rules for exchange
What is the relationship between the internet and the World Wide Web
The World Wide Web is something you can do on the internet
Operating system software
Software that directly manages the resources of the computer
Moore’s Law
Chip performance per dollar doubles every eighteen months
Cost of goods sold
Not part of the total cost of ownership for an information system
Market basket analysis
Data mining to find which products that consumers buy together
Data mining can be a powerful analytics tool because
Computer programs can be designed to process thousands of sales transactions per second
Transaction processing
Not a type of business analytics
Net neutrality
the principal that all internet traffic should be treated equally
Cloud computing
replacing computing resources with services provided over the internet
Open source
software that is free and available for anyone to look at and potentially modify the code
Scalability
The ability of a system to handle increased workloads or be easily expanded to handle workload increases
Encryption
Scrambling data using a code or formula such that the data are hidden from those who do not have the key to unlock the data
Client-server computing
a form of distributed computing where two computers work together to get the job done
variance
Not one of the big Vs of big data
Machine learning
business applications of AI typically use this
Social engineering
tactic used in phishing attacks where attackers manipulate individuals into revealing sensitive information or performing actions that compromise security
Cybersquatting
acquiring a domain name to extort a form, individual, product, or trademark holder
HTML
used to create and format web pages
DDOS attack
overloading a popular social networking site with inbound messages in order to shut down access to the site
The invention of graphical web browsing
a factor that accelerated the development of the internet during the 90s
open-source is fueled on the contributions of loners tooling away for the glory of contributing to better code
An outdated notion regarding open source software that has been shown to be inaccurate
True
Applications software refers to programs that perform the work that users and firms are directly interested in accomplishing
False
With the advent of cloud computing and SaaS, smaller firms no longer have access to the kinds of sophisticated computing power they had access to in the past
True
Virtualization can make one computer function and appear to users like several different computers
False
www.fordham.edu is an example of an IP address
True
A URL is used to identify files and other resources on the internet
XML
A flexible tagging language used to share data between applications
Web services
small pieces of code enabling business-related tasks between systems
Bits per second (BPS)
basic unit of telecom capacity
HTML
language used to compose web pages
TCP/IP
Protocols for communication on the internet