business tech final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/150

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

151 Terms

1
New cards

super computer

most expensive, fastest computer used by large organizations for demanding tasks with complex data

2
New cards

mainframe computer

high performing, reliable computers that perform millions of operations per day

3
New cards

midrange computers/mini computers

relatively small, inexpensive, and compact computers that can perform more limited functions than a mainframe computer

4
New cards

micro computer

the smallest and cheapest general computers

5
New cards

desktop PC

cpu connected to a monitor and keyboard

6
New cards

thin-client systems

less complex computers that do not have the full functionality of a PC and instead pulls data and applications from a network or cloud

7
New cards

laptop/notebook

small, portable and light computers that primarily use internet based services

8
New cards

input devices

devices that accept data and instructions in human form and translate them to the computer

9
New cards

output devices

devices that accept data from a computer and translate them into human form

10
New cards

central processing unit/cpu

part of the computer that controls data and the tasks performed by other components

11
New cards

arithmentic logic unit /alu

part of the cpu that performs simple math and logic operations

12
New cards

control unit/cu

part of the cpu that controls all computer tasks and transfers information to different parts of the computer

13
New cards

cache memory

high speed memory located in the cpu that temporarily stores blocks of data

14
New cards

registers

small storage located in the cpu and stores data/instructions right before and right after processing

15
New cards

random access memory/ram

primary storage that holds software and small data for processing

16
New cards

read only memory/rom

nonvolatile, secure memory that safeguards critical instructions

17
New cards

primary storage

storage that temporarily stores data and program instructions during processing

18
New cards

secondary storage

storage that holds data and programs for longterm, future use

19
New cards

solid state drives/ssd

nonvolatile storage that holds data in memory chips. does not have moving parts

20
New cards

flash memory cards

A type of solid state storage that also has no moving parts and uses 30 times less battery power than alternative storage. often used in portable devices like cameras and smartphones.

21
New cards

bit

an on or off signal, where on = 1, and off = 0. is the smallest unit of data.

22
New cards

byte

smallest addressable unit of data comprised of 8 bits

23
New cards

software program

a series of statements or instructions to the computer

24
New cards

system software

generalized programs that manage the computer’s resources

25
New cards

operating system

software that manages computer hardware, processing systems, user interface, and software resources, providing common services for computer programs.

26
New cards

single user software

software designed for a single user

27
New cards

multiuser software

software designed for multiple simultaneous users

28
New cards

multitasking

the process of executing multiple tasks simultaneously

29
New cards

multiprocessing

use of two or more cpus

30
New cards

multithreading

running one program in multiple different windows

31
New cards

basic input output storage/bios

software program that tells the computer how to turn on once the power is turned on

32
New cards

graphical based user interface

user interface that focuses on the appearance/ease of use

33
New cards

character based user interface

user interface that is just the code

34
New cards

application software

programs written to perform a specific task

35
New cards

personal applications

applications for individual users to use

36
New cards

commerical applications

software designed for/used by companies

37
New cards

proprietary software

software developed by a company that has restrictions on its use, copy, and modification

38
New cards

software licensing

grants a user permission to sue on or more copies of a software without violating copyright law

39
New cards

open source software

software under a certain type of license that allows users to modify and distrbute the software

40
New cards

local area networks/lan

systems that interconnect computers within a limited area such as a home, school, or office.

41
New cards

wide area network/wan

network that extends over a large geographical area, connecting multiple local area networks.

42
New cards

internet protocal address/ip address

A unique identifier assigned to each device connected to a network

43
New cards

IPV4

format of an ip address consisting of 4 clusters of numbers seperated by periods

44
New cards

ipv6

format of an ip address consisting of 6 clusters of letters and numbers seperated by colons

45
New cards

domain name system

simplified names for ip addresses, such as business.miami.edu

46
New cards

top level domain

the last segment of a domain name, such as .com, .net, or .edu

47
New cards

wireless networks

convenient, portable, limited range networks that do not need cables to connect

48
New cards

microwave transmission system

A communication technology that transmits data over long distances, typically between fixed locations. It is often used for point-to-point/line of sight connections and can carry large amounts of information.

49
New cards

satelitte transmission systems

high-bandwidth communication technology used to transmit information over large areas

50
New cards

infrared transmission systems

A type of wireless communication technology that uses red light waves to transmit data over short distances, commonly used for remote controls and data transfer between devices.

51
New cards

bluetooth tramission system

A wireless technology that allows data exchange over short distances by using radio waves to create a personal area network. commonly used for connecting devices like smartphones, headphones, and computers.

52
New cards

wireless fidelity/wifi

A technology that connects devices to an access point/base station, enabling devices to use the internet and communicate over a wireless network using radio waves

53
New cards

4g

cellular radio with 100 mb/s for high mobility communications and 1 gb/s for low mobility communications

54
New cards

lte/long term evolution

technology supporting roaming internet access on phones

55
New cards

xlte/advanced lte

technology handling network congestion when too many people try to access lte

56
New cards

5g

cellular radio that has up to 10 gb/s speed

57
New cards

cloud computing

using internet/network resources to provide on demand data processing and storage. is customizable, flexible, and simple to set up.

58
New cards

software as a service/saas

cloud computing model consisting of software applications delivered the internet on a subscription basis, allowing users to access and use applications without having to install or manage the software.

59
New cards

platform as a service/paas

cloud computing model that provides a platform for developers to build, deploy, and manage applications without worrying about infrastructure.

60
New cards

infrastructure as a service/iaas

cloud computing model that provides computing resources over the internet, allowing users to rent infrastructure components such as servers, storage, and networking.

61
New cards

public cloud

cloud resources are built, owned, and operated by a 3rd party organization for public consumption

62
New cards

private cloud

cloud resources are built and used by the same organization on a private network

63
New cards

hybrid cloud

a mix of private cloud, and public cloud services, allowing for data and application portability.

64
New cards

multicloud

the use of multiple cloud computing services from different providers

65
New cards

business intelligence

a collection of comprehensive and integrated tools/processes that captures, collects, integrates, stores, and analyzes data to help business decision making

66
New cards

business intelligence

the process of transforming data into information, information into knowledge, and knowledge into widsom

67
New cards

data

individual facts and figures

68
New cards

information

data when given context and made organized and structured

69
New cards

knowledge

information given meaning and turned into concepts and ideas

70
New cards

wisdom

knowledge given insight, turned into principles and understandings used to guide decision making

71
New cards

highly strucutred problems

well defined problems with clear objectives and information

72
New cards

semi strucutred problems

problems with some structure but still neeeding human judgement and decision making

73
New cards

highly unstructured decision

complex problems with no clear solutions, requiring critical thinking and creativity

74
New cards

operational control decisions

decisions involving day to day activities and tasks involved in daily business

75
New cards

management control decisions

decisions regarding resources, company performance, logisitics, and employees

76
New cards

strategic planning

decisions that shape the long term direction of a company

77
New cards

OLAP

organizing data into multiple dimensions or categories to allow for more detail and quicker analysis

78
New cards

data mining

discovering patterns and valuable information from large sets of data to help better analyze, recognize, and produce new data/data patterns

79
New cards

accurate, reliable, valid, relevant, complete, timely

6 components needed to have high quality data

80
New cards

applied intelligence

the use of ai and data analysis to solve problems, make decisions, and grow as a company

81
New cards

intelligent automation

the integration of ai, machine learnign, and robotic automation to streamline business operations and reduce manual tasks

82
New cards

machine learning

ai algorithms that learn from data, identify patterns, and make decisions with minimal human intervention.

83
New cards

predictive modeling

predicintg a future occurance based on past data analysis

84
New cards

information security

the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, modification, or destruction

85
New cards

unintentional threats

acts performed without malicious intent that still posed a threat to security, often caused by human error

86
New cards

intentional threats

actions performed with malicious intent that posed a security threat

87
New cards

espionage

spying to gain information

88
New cards

information extortion

stealing information and demanding money before you return it

89
New cards

sabotage/vandalism

defacing a company’s website to harm their reputation

90
New cards

compromises to intellectual property

stealing copyrights, patents, or trade secrets

91
New cards

cyberterrorism/cyberwarfare

hacking computers to spread a political agenda

92
New cards

SCADA

monitoring or controlling chemical, physical, and transport processes in water, oil, and sewage plants to cause public disruption

93
New cards

malware

software designed to cause damage to a computer

94
New cards

phishing

attempting to get sensitive information by pretending to be a trust worthy person

95
New cards

denial of service/dos

attack that aims to make a resource unavailable by overwhelming it with a flood of information requests.

96
New cards

distributed denial of service/ddos

attacker hacks computers, then sends the hacked computers to overwhelm a computer with a massive amount of requests, making it unavailable

97
New cards

trojan horse

malware hidden in other computer programs that hack when activated

98
New cards

back door

password only known by the hacker than enables them to bypass security measures

99
New cards

logic bomb

malware hidden in a program that activates at a certain time or date

100
New cards

colonial pipeline attack

Data breach in which hackers bought Russian ransomware and demanded $4.4 million (75 bitcoin). FBI was able to recover $2.3 million (63.7 bitcoins)