CISC Final Exam

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

66 Terms

1
New cards

Microprocessor

The part of the computer that executes the instructions of a computer program, central processing unit

2
New cards

Green computing

involves reducing the environmental waste generated when using a computer

3
New cards

Supercomputers

largest and fastest computers, capable of storing and processing large volumes of data.

4
New cards

Embedded computers

special-purpose computer that performs specific tasks and can be found in a range of devices such as a digital watch or an MP3 player.

5
New cards

Convergence

the process of integrating different technologies, devices, and services into a single, unified system

6
New cards

Ubiquitous

present or existing everywhere

7
New cards

Spreadsheets

Computer programs that convert data into tables, charts, and graphs.

8
New cards

open source software

source code is made freely available and users can modify it

9
New cards

the internet

A group of computers and servers that are connected to each other.

10
New cards

Software as a service (Saas)

s a way to deliver software over the internet on a subscription basis

11
New cards

Paas

a cloud computing model that provides a pre-built environment for developers to build, run, and manage applications without worrying about the underlying hardware and software infrastructure.

12
New cards

Iaas

where a third-party provider rents out the core IT infrastructure—like servers, storage, and networking—to businesses

13
New cards

Algorithm

a step-by-step procedure for solving a problem

14
New cards

Bluetooth

wireless technology to transfer data

15
New cards

(Random acess memory )RAM

computers short term memory for temporary data storage

16
New cards

Read only memory (ROM)

permanently stores essential instructions, like the basic startup program for a device, and retains its data even when the power is off

17
New cards

3-d printer

a machine that builds a physical object from a digital design by adding material one layer at a time

18
New cards

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

19
New cards

resolution

the number of pixels that make up an image, displayed on a screen or in a digital file

20
New cards

mobile applications

A software program that runs on mobile devices and gives users access to certain content

21
New cards

HTML

Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.

22
New cards

Domain name

the part of a network address that identifies it as belonging to a particular domain.

23
New cards

web browser

a software application that allows users to access and view content on the World Wide Web, such as webpages, images, and videos

24
New cards

IP address

The unique number assigned to each device on the Internet.

25
New cards

instant messaging

Online communication that allows two or more participants to communicate in real time

26
New cards

captcha

A distorted image of letters and numbers used to prevent automated use of websites

27
New cards

information processing cycle

series of steps that convert raw data into meaningful information, consisting of input, processing, output, and storage

28
New cards

properties

a characteristic or attribute of an object that defines its state, behavior, or settings.

29
New cards

coding/syntax

coding is the act of creating instructions,

30
New cards

Syntax is the set of rules governing how those instructions must be written.

31
New cards

B2C ecommerce

is the online sale of goods or services directly from a business to an individual consumer

32
New cards

LAN

local area network, a group of connected computers and devices in a small localized area like a home, office, or school

33
New cards

WAN

wide area network, a computer network that connects smaller networks, like LANS, over larger geographical areas

34
New cards

Buses

electronic pathways through which data can be transferred.

35
New cards

solid state/optical

opical storage uses a laser to read and write date on a spinning disc (cd/dvd), solid-state storage uses electronic chips with no moving parts, making it faster and more durable

36
New cards

hash

a function that converts an input of letters and numbers into an encrypted output of a fixed length

37
New cards

ethernet standards/protocols

38
New cards

router

a networking device that connects different computer networks by forwarding data packets between them

39
New cards

VPN

virtual private network, an. encrypted connection over a public network that protects your data and masks your ip address

40
New cards

phishing

attackers trick people into giving up sensitive information, such as passwords or credit card numbers, by pretending to be a legitimate or trusted source

41
New cards

boolean operators

using words such as "and", "but", and "or" when typing in search terms to focus the results

42
New cards

cyberterrorism

A form of terrorism that makes use of high technology, especially computers and the internet, in the planning and carrying out of terrorist attacks.

43
New cards

shareware

software distribution model where users receive a limited version of software product, either with a free trial period or restricted features, the core concept is "try before you buy"

44
New cards

freemium

a company offers a basic version of a product or service for free, with the option for users to pay for a premium, more advanced version

45
New cards

virus/worm

46
New cards

virus/worm

Both are types of malicious software (malware), but the key difference is the worm's ability to spread autonomously through vulnerabilities, while a virus relies on user action to activate and move.

47
New cards

primary key

a column or a set of columns in a database table that uniquely identifies each row (or record) in that table.

48
New cards

one-to-many relationship

a connection where one item can be linked to multiple other items, but each of those items can only be linked to one original item (single customer who can have many orders)

49
New cards

OSS

open source software, source code is made freely available to the public. Anyone can use, study, change, and distribute the software and its source code, typically for free, under certain licensing terms

50
New cards

SDLC Phases

a structured process for creating software, involving. planning, analysis, design, implementation (coding), testing, deployment, and maintenance

51
New cards

System Requirements

the specifications a computer or system must meet to run a specific software. or hardware. sucessfully

52
New cards

Machine Language

most basic, lowest-level programming language a computer can directly execute without translation, written in binary code (0s an 1s)

53
New cards

VR

virtual reality

54
New cards

AR

augmented reality, technology that overlays computer-generated images and information onto the users view. of the. real world

55
New cards

Project Management SW

designed to help businesses and individuals track projects, tasks, and schedules. T

56
New cards

Service pack

a collection of software product updates, bug fixes, and patches.

57
New cards

Utility software

a program or tool that performs specific tasks to enhance productivity, efficiency, functionality, or maintenance of a computer system

58
New cards

query

commands given to a computer program or a database system to retrieve or modify specific pieces of data.

59
New cards

binary/bits/bytes

binary: base 2 number system

60
New cards

bit: smallest unit of data, can hold one of two values (0 or 1)

61
New cards

byte: group of 8 bits

62
New cards

client/client server/peer to peer

client: comp or sw program that requests services of. resources from another comp known as a server

63
New cards
64
New cards

client server: server. (central powerful comp) provides services/resources to requesting computers (clients)

65
New cards
66
New cards

P2P: all connected computers (referred to as peers) have equal capabilities and can act as both clients and servers.