1/150
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
super computer
most expensive, fastest computer used by large organizations for demanding tasks with complex data
mainframe computer
high performing, reliable computers that perform millions of operations per day
midrange computers/mini computers
relatively small, inexpensive, and compact computers that can perform more limited functions than a mainframe computer
micro computer
the smallest and cheapest general computers
desktop PC
cpu connected to a monitor and keyboard
thin-client systems
less complex computers that do not have the full functionality of a PC and instead pulls data and applications from a network or cloud
laptop/notebook
small, portable and light computers that primarily use internet based services
input devices
devices that accept data and instructions in human form and translate them to the computer
output devices
devices that accept data from a computer and translate them into human form
central processing unit/cpu
part of the computer that controls data and the tasks performed by other components
arithmentic logic unit /alu
part of the cpu that performs simple math and logic operations
control unit/cu
part of the cpu that controls all computer tasks and transfers information to different parts of the computer
cache memory
high speed memory located in the cpu that temporarily stores blocks of data
registers
small storage located in the cpu and stores data/instructions right before and right after processing
random access memory/ram
primary storage that holds software and small data for processing
read only memory/rom
nonvolatile, secure memory that safeguards critical instructions
primary storage
storage that temporarily stores data and program instructions during processing
secondary storage
storage that holds data and programs for longterm, future use
solid state drives/ssd
nonvolatile storage that holds data in memory chips. does not have moving parts
flash memory cards
A type of solid state storage that also has no moving parts and uses 30 times less battery power than alternative storage. often used in portable devices like cameras and smartphones.
bit
an on or off signal, where on = 1, and off = 0. is the smallest unit of data.
byte
smallest addressable unit of data comprised of 8 bits
software program
a series of statements or instructions to the computer
system software
generalized programs that manage the computer’s resources
operating system
software that manages computer hardware, processing systems, user interface, and software resources, providing common services for computer programs.
single user software
software designed for a single user
multiuser software
software designed for multiple simultaneous users
multitasking
the process of executing multiple tasks simultaneously
multiprocessing
use of two or more cpus
multithreading
running one program in multiple different windows
basic input output storage/bios
software program that tells the computer how to turn on once the power is turned on
graphical based user interface
user interface that focuses on the appearance/ease of use
character based user interface
user interface that is just the code
application software
programs written to perform a specific task
personal applications
applications for individual users to use
commerical applications
software designed for/used by companies
proprietary software
software developed by a company that has restrictions on its use, copy, and modification
software licensing
grants a user permission to sue on or more copies of a software without violating copyright law
open source software
software under a certain type of license that allows users to modify and distrbute the software
local area networks/lan
systems that interconnect computers within a limited area such as a home, school, or office.
wide area network/wan
network that extends over a large geographical area, connecting multiple local area networks.
internet protocal address/ip address
A unique identifier assigned to each device connected to a network
IPV4
format of an ip address consisting of 4 clusters of numbers seperated by periods
ipv6
format of an ip address consisting of 6 clusters of letters and numbers seperated by colons
domain name system
simplified names for ip addresses, such as business.miami.edu
top level domain
the last segment of a domain name, such as .com, .net, or .edu
wireless networks
convenient, portable, limited range networks that do not need cables to connect
microwave transmission system
A communication technology that transmits data over long distances, typically between fixed locations. It is often used for point-to-point/line of sight connections and can carry large amounts of information.
satelitte transmission systems
high-bandwidth communication technology used to transmit information over large areas
infrared transmission systems
A type of wireless communication technology that uses red light waves to transmit data over short distances, commonly used for remote controls and data transfer between devices.
bluetooth tramission system
A wireless technology that allows data exchange over short distances by using radio waves to create a personal area network. commonly used for connecting devices like smartphones, headphones, and computers.
wireless fidelity/wifi
A technology that connects devices to an access point/base station, enabling devices to use the internet and communicate over a wireless network using radio waves
4g
cellular radio with 100 mb/s for high mobility communications and 1 gb/s for low mobility communications
lte/long term evolution
technology supporting roaming internet access on phones
xlte/advanced lte
technology handling network congestion when too many people try to access lte
5g
cellular radio that has up to 10 gb/s speed
cloud computing
using internet/network resources to provide on demand data processing and storage. is customizable, flexible, and simple to set up.
software as a service/saas
cloud computing model consisting of software applications delivered the internet on a subscription basis, allowing users to access and use applications without having to install or manage the software.
platform as a service/paas
cloud computing model that provides a platform for developers to build, deploy, and manage applications without worrying about infrastructure.
infrastructure as a service/iaas
cloud computing model that provides computing resources over the internet, allowing users to rent infrastructure components such as servers, storage, and networking.
public cloud
cloud resources are built, owned, and operated by a 3rd party organization for public consumption
private cloud
cloud resources are built and used by the same organization on a private network
hybrid cloud
a mix of private cloud, and public cloud services, allowing for data and application portability.
multicloud
the use of multiple cloud computing services from different providers
business intelligence
a collection of comprehensive and integrated tools/processes that captures, collects, integrates, stores, and analyzes data to help business decision making
business intelligence
the process of transforming data into information, information into knowledge, and knowledge into widsom
data
individual facts and figures
information
data when given context and made organized and structured
knowledge
information given meaning and turned into concepts and ideas
wisdom
knowledge given insight, turned into principles and understandings used to guide decision making
highly strucutred problems
well defined problems with clear objectives and information
semi strucutred problems
problems with some structure but still neeeding human judgement and decision making
highly unstructured decision
complex problems with no clear solutions, requiring critical thinking and creativity
operational control decisions
decisions involving day to day activities and tasks involved in daily business
management control decisions
decisions regarding resources, company performance, logisitics, and employees
strategic planning
decisions that shape the long term direction of a company
OLAP
organizing data into multiple dimensions or categories to allow for more detail and quicker analysis
data mining
discovering patterns and valuable information from large sets of data to help better analyze, recognize, and produce new data/data patterns
accurate, reliable, valid, relevant, complete, timely
6 components needed to have high quality data
applied intelligence
the use of ai and data analysis to solve problems, make decisions, and grow as a company
intelligent automation
the integration of ai, machine learnign, and robotic automation to streamline business operations and reduce manual tasks
machine learning
ai algorithms that learn from data, identify patterns, and make decisions with minimal human intervention.
predictive modeling
predicintg a future occurance based on past data analysis
information security
the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, modification, or destruction
unintentional threats
acts performed without malicious intent that still posed a threat to security, often caused by human error
intentional threats
actions performed with malicious intent that posed a security threat
espionage
spying to gain information
information extortion
stealing information and demanding money before you return it
sabotage/vandalism
defacing a company’s website to harm their reputation
compromises to intellectual property
stealing copyrights, patents, or trade secrets
cyberterrorism/cyberwarfare
hacking computers to spread a political agenda
SCADA
monitoring or controlling chemical, physical, and transport processes in water, oil, and sewage plants to cause public disruption
malware
software designed to cause damage to a computer
phishing
attempting to get sensitive information by pretending to be a trust worthy person
denial of service/dos
attack that aims to make a resource unavailable by overwhelming it with a flood of information requests.
distributed denial of service/ddos
attacker hacks computers, then sends the hacked computers to overwhelm a computer with a massive amount of requests, making it unavailable
trojan horse
malware hidden in other computer programs that hack when activated
back door
password only known by the hacker than enables them to bypass security measures
logic bomb
malware hidden in a program that activates at a certain time or date
colonial pipeline attack
Data breach in which hackers bought Russian ransomware and demanded $4.4 million (75 bitcoin). FBI was able to recover $2.3 million (63.7 bitcoins)