CIS120 Intro to IT

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/110

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

111 Terms

1
New cards

Information Technology

The use of computers, networks, and other technology to manage and process information.

2
New cards

Hardware

The physical components of a computer system, including the CPU, memory, and storage devices.

3
New cards

Software

The programs and applications that run on a computer, enabling it to perform specific tasks.

4
New cards

Network

A collection of computers and devices connected to share resources and information.

5
New cards

Database

An organized collection of data that can be easily accessed, managed, and updated.

6
New cards

Cloud Computing

The delivery of computing services over the internet, allowing for on-demand access to resources.

7
New cards

Cybersecurity

The practice of protecting systems, networks, and data from digital attacks and unauthorized access.

8
New cards

Operating System

Software that manages computer hardware and provides services for application programs.

9
New cards

Programming

The process of designing and building executable computer software to accomplish a specific task.

10
New cards

User Interface

The means by which a user interacts with a computer or software application.

11
New cards

IT Support

Services that assist users in resolving technical issues with their hardware or software.

12
New cards

Data Backup

The process of copying and archiving computer data to prevent loss in case of failure.

13
New cards

14
New cards

IT Governance

The framework for decision-making and accountability in managing IT resources and investments.

15
New cards

E-commerce

The buying and selling of goods and services over the internet.

16
New cards

Artificial Intelligence

The simulation of human intelligence processes by machines, especially computer systems.

17
New cards

Big Data

Extremely large data sets that can be analyzed computationally to reveal patterns and trends.

18
New cards

Web Development

The work involved in developing a website for the internet or an intranet.

19
New cards

Social Media

Platforms that enable users to create and share content or participate in social networking.

20
New cards

IT Infrastructure

The composite of hardware, software, networks, and facilities that support IT services.

21
New cards

Digital Transformation

The integration of digital technology into all areas of a business, fundamentally changing operations.

22
New cards

Information Technology (IT)

The use of computers, networks, software, and data to store, process, and transmit information in organizations.

23
New cards

Computer System

A complete working computer, including hardware, operating system (OS), and peripheral devices used to input, process, output, and store data.

24
New cards

Hardware

The physical components of a computer system, such as the CPU (Central Processing Unit), RAM (Random Access Memory), storage devices, motherboard, and peripherals.

25
New cards

Software

A collection of programs and data that tell the hardware what to do and how to do it, including applications and system software.

26
New cards

System Software

Software that manages hardware and provides core services, such as operating systems (OS), utility programs, and device drivers.

27
New cards

Application Software

Programs that help users perform specific tasks, such as word processing, web browsing, spreadsheets, or games.

28
New cards

Operating System (OS)

System software that manages computer hardware and software resources and provides common services for computer programs.

29
New cards

User Interface (UI)

The part of a system that users interact with, including screens, menus, windows, icons, and command prompts.

30
New cards

Graphical User Interface (GUI)

A type of user interface that uses windows, icons, menus, and pointers (WIMP) instead of only text commands.

31
New cards

Command-Line Interface (CLI)

A text-based interface where the user types commands to interact with the operating system or applications.

32
New cards

CPU (Central Processing Unit)

The 'brain' of the computer that executes instructions and performs calculations.

33
New cards

RAM (Random Access Memory)

Short-term, volatile memory used by the computer to store data and programs that are currently in use.

34
New cards

Storage Device

Hardware used to store data long term, such as HDDs (Hard Disk Drives), SSDs (Solid-State Drives), USB flash drives, and optical discs.

35
New cards

Hard Disk Drive (HDD)

A storage device that uses spinning magnetic disks to store data; high capacity but slower and mechanical compared to SSDs.

36
New cards

Solid-State Drive (SSD)

A storage device with no moving parts that stores data on flash memory chips; faster and more durable than HDDs.

37
New cards

Input Device

A device used to send data or commands into a computer, such as a keyboard, mouse, scanner, or microphone.

38
New cards

Output Device

A device that receives data from a computer and presents it to the user, such as a monitor, printer, or speakers.

39
New cards

Peripheral Device

Any external device that connects to a computer, such as a keyboard, mouse, printer, webcam, or external drive.

40
New cards

Firmware

Software programmed into read-only memory (ROM) on hardware devices that provides low-level control (for example, BIOS/UEFI).

41
New cards

BIOS / UEFI

Firmware that initializes hardware when the computer starts and helps boot the operating system (OS).

42
New cards

Data

Raw, unprocessed facts such as numbers, text, or images, without context or meaning.

43
New cards

Information

Data that has been processed, organized, or structured to make it meaningful and useful.

44
New cards

Bit

The smallest unit of data in computing, represented as a 0 or 1.

45
New cards

Byte

A group of 8 bits, typically representing a single character like a letter or number.

46
New cards

File

A named collection of data stored on a drive, such as a document, image, or program.

47
New cards

Folder (Directory)

A container used to organize files and other folders on a storage device.

48
New cards

File Extension

The suffix at the end of a filename (such as .docx, .jpg, .exe) that indicates the file type.

49
New cards

File Format

The structure or layout of a file that defines how data is stored and encoded (for example, .txt, .jpg, .mp4).

50
New cards

Database (DB)

An organized collection of related data stored electronically and accessed by software.

51
New cards

Database Management System (DBMS)

Software that creates, manages, and provides access to databases (examples: MySQL, SQL Server).

52
New cards

Computer Network

A group of two or more connected devices that can share data and resources.

53
New cards

Node

Any device connected to a network, such as a computer, printer, or router.

54
New cards

LAN (Local Area Network)

A network that connects devices in a limited area such as a home, office, or campus.

55
New cards

WAN (Wide Area Network)

A network that covers a large geographic area and often connects multiple LANs (for example, the internet).

56
New cards

Internet

A global network of interconnected networks that use standard protocols (such as TCP/IP) to communicate.

57
New cards

Intranet

A private network that uses internet technologies but is accessible only to an organization's authorized users.

58
New cards

Extranet

A controlled private network that grants external partners limited access to an organization's intranet resources.

59
New cards

IP Address

A numerical label (IPv4 or IPv6) assigned to each device on a network so it can send and receive data.

60
New cards

TCP/IP (Transmission Control Protocol / Internet Protocol)

The basic communication protocols that define how data is packaged, addressed, transmitted, and received on the internet.

61
New cards

DNS (Domain Name System)

The system that translates human-friendly domain names (like example.com) into IP addresses.

62
New cards

Router

A device that forwards data packets between networks and directs traffic on the internet.

63
New cards

Switch

A network device that connects multiple devices on a LAN and forwards data only to the correct destination device (MAC address-based).

64
New cards

Modem

A device that converts signals from an internet service provider (ISP) into a form your router or computer can use.

65
New cards

Wireless Access Point (WAP)

A device that allows wireless devices to connect to a wired network using Wi‑Fi.

66
New cards

Wi‑Fi

A wireless networking technology (IEEE 802.11) that uses radio waves to provide high-speed internet and network connections.

67
New cards

Bandwidth

The maximum amount of data that can be transmitted over a network connection in a given amount of time, often measured in Mbps or Gbps.

68
New cards

Latency

The time delay between sending a request and receiving a response over a network, usually measured in milliseconds (ms).

69
New cards

Download

Receiving data from a remote system to your local device over a network or the internet.

70
New cards

Upload

Sending data from your local device to a remote system over a network or the internet.

71
New cards

Cloud Computing

Delivery of computing services (servers, storage, databases, software, networking, etc.) over the internet on demand.

72
New cards

IaaS (Infrastructure as a Service)

Cloud service model where providers offer virtualized computing resources such as servers, storage, and networks over the internet.

73
New cards

PaaS (Platform as a Service)

Cloud service model that provides a platform (OS, runtime, tools) for developing, testing, and deploying applications without managing underlying infrastructure.

74
New cards

SaaS (Software as a Service)

Cloud service model where software applications are delivered over the internet on a subscription or pay-per-use basis.

75
New cards

Virtualization

Technology that allows multiple virtual machines (VMs) to run on a single physical server, sharing hardware resources.

76
New cards

Virtual Machine (VM)

A software-based simulation of a physical computer that runs its own operating system (guest OS) and applications.

77
New cards

Backup

A copy of data stored separately (on another device, location, or cloud) so it can be restored if the original is lost or damaged.

78
New cards

Redundancy

The duplication of critical components or data (for example, multiple drives in RAID) to increase reliability and availability.

79
New cards

Uptime

The amount of time a system or service is available and functioning correctly, often expressed as a percentage.

80
New cards

Downtime

The amount of time a system or service is unavailable or not functioning correctly.

81
New cards

Scalability

The ability of a system to handle increased workload by adding resources like servers, storage, or bandwidth (vertical or horizontal scaling).

82
New cards

Cybersecurity

The practice of protecting systems, networks, and data from digital attacks, damage, or unauthorized access.

83
New cards

Threat

A potential cause of an unwanted impact to a system or organization, such as malware, hacking, or insider abuse.

84
New cards

Vulnerability

A weakness in a system, network, or process that can be exploited by a threat.

85
New cards

Risk

The combination of the likelihood of a threat exploiting a vulnerability and the impact if it happens.

86
New cards

Malware (Malicious Software)

Software designed to damage, disrupt, or gain unauthorized access to a system (includes viruses, worms, Trojans, ransomware, spyware).

87
New cards

Virus

A type of malware that attaches itself to a legitimate program or file and can replicate and spread when that program or file runs.

88
New cards

Worm

A self-replicating malware program that spreads across networks without attaching to other files.

89
New cards

Trojan Horse

Malware disguised as legitimate software that tricks users into installing it, often creating a backdoor.

90
New cards

Ransomware

Malware that encrypts a victim's data and demands payment (ransom) for the decryption key.

91
New cards

Spyware

Malware that secretly monitors user activity and collects information without consent.

92
New cards

Phishing

A social engineering attack that uses deceptive emails, messages, or websites to trick users into revealing sensitive information.

93
New cards

Social Engineering

Manipulating people into giving up confidential information or performing risky actions, often bypassing technical controls.

94
New cards

Encryption

The process of converting data into a coded form (ciphertext) so that only authorized parties with a key can read it.

95
New cards

Decryption

The process of converting encrypted data (ciphertext) back into its original readable form (plaintext).

96
New cards

Authentication

The process of verifying the identity of a user or device, often using credentials such as usernames, passwords, tokens, or biometrics.

97
New cards

Authorization

The process of determining what an authenticated user is allowed to do or access (permissions, roles).

98
New cards

Multi-Factor Authentication (MFA)

A security method that requires two or more independent credentials (factors), such as password plus code or biometric.

99
New cards

Password Policy

A set of rules for creating and managing passwords (length, complexity, expiration) to improve security.

100
New cards

Firewall

Hardware or software that monitors and controls incoming and outgoing network traffic based on security rules.