computer skills

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:29 AM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards

Computer Science

the study of computers and computational systems.

2
New cards

Data vs. Information

transformation of raw data (unprocessed facts) into meaningful information through electronic processing

3
New cards

Importance of computer science

  • Used in business, banking, communication

  • Improves efficiency + speed

4
New cards

The Computing Cycle

involves Input (data entry), Processing (manipulation by the CPU), Output (results), and Storage (keeping data for future use)

5
New cards

Role of Computer Science in Business

  • Data Management: Utilizing databases to store client information, inventory, and financial records securely

  • Decision Support: Using software to analyze market trends and financial data to make informed management decisions

  • Automation: Reducing human error and increasing speed in repetitive tasks like payroll or invoicing

  • Communication: Facilitating global collaboration through networks, email (Outlook), and shared digital workspaces

6
New cards

Evolution of Computers (Generations)

First:

  • 1940s–1950s- Vacuum Tubes

    Enormous size, high heat, expensive, and used machine language.

second:

  • 1950s–1960s- Transistors

    Smaller, faster, and more energy-efficient than vacuum tubes.

third:

  • 1960s–1970s- Integrated Circuits (IC)

    Used "chips" to increase speed; introduced keyboards and monitors.

fourth:

  • 1970s–Present- Microprocessors

    Thousands of ICs onto a single silicon chip (the birth of Personal Computers).

fifth:

  • Present–Future- Artificial Intelligence (AI)

    Focuses on parallel processing and natural language recognition.

7
New cards

Hardware (physical parts)

  • things of a computer you can touch

    • Keyboard

    • Mouse

    • Monitor

    • CPU

8
New cards

Software (programs)

  • things you can’t touch. consists of the instructions that tell the hardware what to do.

    • Operating system

    • Apps (Word, Excel)

9
New cards

Internal Components

  • Central Processing Unit (CPU): Known as the "brain" of the computer, it executes instructions from software and hardware

  • RAM (Random Access Memory): Volatile "short-term" memory used to store data currently being processed for quick access

  • ROM (Read-Only Memory): Non-volatile memory that contains permanent instructions needed to start the computer

  • Motherboard: The motherboard is the main circuit board that connects all components

  • Buses:buses are the communication pathways (data highways) that move information between them

10
New cards

Central Processing Unit (CPU):

Known as the "brain" of the computer, it executes instructions from software and hardware.

11
New cards

RAM (Random Access Memory):

Volatile "short-term" memory used to store data currently being processed for quick access

12
New cards

ROM (Read-Only Memory)

Non-volatile memory that contains permanent instructions needed to start the computer

13
New cards

Motherboard and Buses:

The motherboard is the main circuit board that connects all components; buses are the communication pathways (data highways) that move information between them

14
New cards

Input Devices:

Tools used to provide data and control signals. Examples include the keyboard (text entry), mouse (navigation), and scanners

15
New cards

Output Devices:

Hardware that conveys information to the user. Key examples are the monitor (visual display) and printer (physical hard copies).

16
New cards

Hard Disk Drive (HDD):

Traditional magnetic storage; usually offers high capacity at a lower cost

17
New cards

Solid State Drive (SSD)

Newer technology using flash memory; significantly faster and more durable than HDDs, though often more expensive

18
New cards

USB Flash Drives:

Portable, removable storage used for transferring files between workstations

19
New cards

Storage Devices

  • Hard Disk Drive (HDD):

  • Solid State Drive (SSD)

  • USB Flash Drives:

20
New cards

Business Applications of Hardware

  • Server Hardware: High-performance computers designed to manage network resources and store company-wide databases

  • Point of Sale (POS) Systems: Specialized hardware (barcode scanners, receipt printers) used for retail transactions

  • Workstation Ergonomics: Selecting quality monitors and input devices to reduce employee fatigue and increase long-term efficiency

21
New cards

Network

a group of interconnected computing devices (nodes) that exchange data and share resources using common protocols over wired or wireless transmission media

22
New cards

Types of Networks

  • LAN (Local Area Network): Connects computers within a small, limited area like a single office, home, or building. It offers high data transfer speeds

  • MAN (Metropolitan Area Network): Covers a larger area than a LAN, typically a city or a large campus. It connects multiple LANs together across a town.

  • WAN (Wide Area Network): Spans a large physical distance, such as a country, continent, or the entire globe. The Internet is the most well-known example of a WAN.

23
New cards

Internet

public global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.

public global network of interconnected computers that allows people all over the world to share information, communicate, and access services using websites, email, and apps.

24
New cards

Intranet

A private network contained within an organization. It is used by employees to share information, collaboration tools, and operational systems securely. it is protected by firewalls to prevent unauthorized access from the public internet.

25
New cards

Communication Protocols

  • TCP/IP (Transmission Control Protocol/Internet Protocol):

  • HTTP (Hypertext Transfer Protocol):

  • HTTPS (Hypertext Transfer Protocol Secure):

26
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol)

the fundamental suite of communication protocols used to interconnect network devices on the internet and other computer networks

27
New cards

HTTP (Hypertext Transfer Protocol):

protocol used to transfer web pages and data between a web browser and a web server.
It allows users to view websites by sending requests and receiving responses.

28
New cards

HTTPS (Hypertext Transfer Protocol Secure):

The secure version of HTTP, which encrypts data to protect sensitive information like passwords or financial transactions.

29
New cards

Business Importance of Connectivity

  • Resource Sharing: Allowing multiple employees to use the same printer or access a centralized database.

  • Data Security: Implementing intranets and secure protocols (HTTPS) to protect company intellectual property.

  • Remote Work: Utilizing WANs and secure connections to allow staff to work from different locations while staying connected to the main office.

30
New cards

Operating Systems (OS)

critical system software that manages computer hardware and software resources, acting as an intermediary between users/applications and hardware

  • The Intermediary: It acts as a bridge, allowing you to interact with the computer without needing to speak "machine code"

  • Resource Management: The OS decides which programs get to use the CPU, how much RAM they can occupy, and how data is written to the storage drives

  • User Interface (UI): It provides the visual environment (icons, windows, menus) or command line where you perform your daily tasks

    • graphical user interface- users interact with computer by using icons, windows, menus and mouse

    • command line interface- user interacts with computer by typing text commands

31
New cards

types of operating systems

Desktop OS:

  • Microsoft Windows :

    • Standard for most business and office environments.

    • very familiar to most office workers.

  • Mac OS :

    • developed by Apple

    • Preferred for graphic design, video editing, and media.

    • known for its intuitive "plug and play" nature.

  • Linux:

    • developed by Open-source community

    • Used heavily in servers, coding, and specialized technical fields

    • can be complex but offers high customization.

32
New cards

functions of OS

Functions:

  • Runs programs

  • Manages hardware

  • Controls files

33
New cards

File and Program Management

One of the most critical daily functions of an OS is organizing and protecting business data.

File Systems: The OS organizes data into a hierarchy of folders and files, making it possible to retrieve documents quickly.

Process Management: It ensures that if one program (like a web browser) crashes, it doesn't necessarily take down the entire system or your unsaved work.

Access Control: The OS manages user accounts and permissions, ensuring that only authorized personnel can access sensitive financial or personnel files

34
New cards

Why the OS Matters to a Manager

Compatibility: You must ensure the OS you choose supports the specific accounting or management software your team needs to use.

Security: Regular OS updates are the first line of defense against malware and cyber-attacks.

Total Cost of Ownership: Beyond the initial computer price, managers must consider licensing fees (like those for Windows) and training costs for their staff

35
New cards

Digital security and backups

the protection of online identities, devices and systems from unauthorized access, disruption, and other threats.

Involves the use of strong passwords, antivirus softwares, security updates and safe browsing habits

36
New cards

data protection concept

  • Practices and measures to safeguard sensitive data from unauthorized access, corruption, loss, disclosure, or destruction throughout its lifecycle.

37
New cards

key principles of data protection concept

  • Confidentiality: Ensures only authorized users can access data

  • Integrity: Keeps data accurate, unchanged, and reliable

  • Availability: Ensures authorized users can access data when needed

38
New cards

password

  • A secret string of characters used to authenticate and verify user identity, restricting access to devices, accounts, files, and systems.

39
New cards

Authentication

process of verifying a user's identity, usually through something they know (password), something they have (security token), or something they are (biometrics like fingerprints)

40
New cards

Strong Password Criteria:

passwords should be complex, including a mix of uppercase letters, numbers, and symbols

41
New cards

Multi-Factor Authentication (MFA):

This adds a second layer of security, requiring a code from a mobile device in addition to a password

42
New cards

backup

a copy of data stored separately so it can be recovered if the original files are lost, damaged, deleted, or hacked.

43
New cards

types of backup

Local Backups: stores data on a physical device such as an external hard drive, USB flash drive, or another computer.

  • Pros: Fast recovery and full physical control

  • Cons: Vulnerable to physical threats like fire, theft, or hardware failure.

Cloud Backups: stores data on remote online servers through the internet such as Google Drive, iCloud

  • Pros: Accessible from anywhere and protected from local physical disasters.

  • Cons: Requires a stable internet connection and involves monthly subscription costs.

44
New cards

Internet Security Measures

tools, technologies, and practices used to protect devices, networks, data, and online communications from unauthorized access, cyberattacks, and data breaches.

45
New cards

Main Function of internet security measures

  • Protect sensitive information

  • Prevent unauthorized access

  • Reduce cyber risks

  • Detect and respond to security threats

46
New cards

internet security measures- Technical Measures

Firewalls: Software or hardware that monitors and filters incoming and outgoing network traffic based on an organization's security policies

Antivirus/Antimalware: Software designed to detect, stop, and remove malicious software like viruses, worms, and ransomware

Encryption: The process of encoding information so that only authorized parties can read it, especially vital when sending sensitive financial data over the internet (using protocols like HTTPS)

Secure Passwords and Multi-Factor Authentication (MFA): This adds a second layer of security, requiring a code from a mobile device in addition to a password.

47
New cards

internet security measures- Administrative and Physical Measures

Access Control- Limits data access via user accounts and permission levels.


Security Policies and Training-Establishes safe internet use rules, educates on phishing and scams.


Regular Updates and Backups-Software updates patch vulnerabilities, backups prevent data loss.

48
New cards

Business Management Perspective: The Cost of Data Loss

Reputational Risk: Losing client data can destroy trust in your business.

Compliance: Many industries have legal requirements for how long data must be kept and how securely it must be stored.

Disaster Recovery: A proper backup strategy ensures that a business can resume operations quickly after a system failure, minimizing costly downtime.


Explore top notes

note
Chapter 1: Brain Basics
Updated 1342d ago
0.0(0)
note
APES 5.10 Impacts of Urbanization
Updated 1136d ago
0.0(0)
note
2.2 Cell Membrane
Updated 1156d ago
0.0(0)
note
Phonation
Updated 1063d ago
0.0(0)
note
Chemistry-Atoms
Updated 285d ago
0.0(0)
note
Unit 3 Full Guide
Updated 335d ago
0.0(0)
note
Enumeration Guide
Updated 315d ago
0.0(0)
note
Chapter 1: Brain Basics
Updated 1342d ago
0.0(0)
note
APES 5.10 Impacts of Urbanization
Updated 1136d ago
0.0(0)
note
2.2 Cell Membrane
Updated 1156d ago
0.0(0)
note
Phonation
Updated 1063d ago
0.0(0)
note
Chemistry-Atoms
Updated 285d ago
0.0(0)
note
Unit 3 Full Guide
Updated 335d ago
0.0(0)
note
Enumeration Guide
Updated 315d ago
0.0(0)

Explore top flashcards

flashcards
Ancient Greece WH1 Study Set
49
Updated 1215d ago
0.0(0)
flashcards
chimie org
56
Updated 271d ago
0.0(0)
flashcards
Multiplication Facts
109
Updated 493d ago
0.0(0)
flashcards
EC U3: ¿SER o ESTAR?
25
Updated 187d ago
0.0(0)
flashcards
AP Psychology Chapter 12 Vocab
24
Updated 1161d ago
0.0(0)
flashcards
8th Grade History Test
25
Updated 1165d ago
0.0(0)
flashcards
Commerce Term 1 Year 10
39
Updated 1101d ago
0.0(0)
flashcards
Mission 30
64
Updated 1228d ago
0.0(0)
flashcards
Ancient Greece WH1 Study Set
49
Updated 1215d ago
0.0(0)
flashcards
chimie org
56
Updated 271d ago
0.0(0)
flashcards
Multiplication Facts
109
Updated 493d ago
0.0(0)
flashcards
EC U3: ¿SER o ESTAR?
25
Updated 187d ago
0.0(0)
flashcards
AP Psychology Chapter 12 Vocab
24
Updated 1161d ago
0.0(0)
flashcards
8th Grade History Test
25
Updated 1165d ago
0.0(0)
flashcards
Commerce Term 1 Year 10
39
Updated 1101d ago
0.0(0)
flashcards
Mission 30
64
Updated 1228d ago
0.0(0)