1/72
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Client/Server Computing
A setup where some computers request things and other computers provide them. Each does what it's best at.
Cloud computing
Using computers, storage, and software over the internet instead of having them physically at your location.
Ethernet
Standard networking cable technology.
Hybrid cloud
Using both your own computers/servers AND rented cloud services together.
Infrastructure as a Service (IaaS)
Renting basic computer equipment (servers, storage) over the internet instead of buying it.
Platform as a Service (PaaS)
Renting a ready-made environment to build and run your apps without worrying about the underlying computer stuff.
Software as a Service (SaaS)
Using software through a website instead of installing it on your computer (like Gmail or Netflix).
Legacy System
Old computer systems that companies keep using because replacing them would be too expensive or complicated.
On-demand computing
Paying for extra computer power only when you need it, like paying for extra electricity during peak hours.
Open source software
Free software where anyone can see and modify the code.
Operating system
The main software that runs your computer (like Windows or macOS).
Private Cloud
A company's own personal cloud system that only their employees can use.
Public Cloud
Cloud services that anyone can pay to use (like Google Drive or AWS).
Quantum computing
Super-advanced computers that can process multiple calculations at the same time using physics principles.
Scalability
A system's ability to handle more users or work without crashing or slowing down.
Service Level Agreement (SLA)
A written promise from a service provider about what they'll do and how well they'll do it.
Technology standards
Rules that make sure different products and systems can work together.
Total Cost of Ownership (TCO)
The real total price of technology including purchase, updates, fixes, support, and training—not just the sticker price.
Virtualization
Making computer resources work as if they're all in one place, even when they're physically scattered around.
Application Server
Software that connects websites to a company's databases and business programs.
Big Data
Massive amounts of data that are too big for regular databases to handle easily.
Data Cleansing
Fixing errors, filling gaps, and removing duplicates in databases. Like cleaning up a messy spreadsheet.
Data Redundancy
Having the same information stored multiple times in different places (wasteful).
Data Inconsistency
When the same information has different values in different places (confusing and problematic).
Database
An organized collection of data that multiple programs can use at once.
Database administration
Managing and maintaining databases
Database management system (DBMS)
Special software that creates, organizes, and manages databases so programs can easily get the data they need.
Information policy
Company rules about how to share, organize, and protect information.
Relational DBMS
A database that organizes information in tables (like spreadsheets) and can connect related information between tables.
Bandwidth
How much data can flow through a connection at once—like the width of a pipe.
Bluetooth
Wireless technology for connecting devices over short distances (like your phone to wireless earbuds).
Broadband
Fast internet connection that can handle lots of data at once.
Domain Name System (DNS)
The system that converts website names (like google.com) into number addresses that computers understand.
Hypertext Transfer Protocol (HTTP)
The rules for how web pages are sent and received over the internet.
Hubs
Basic devices that connect network cables together and send data everywhere.
Switch
Smarter network connector that sends data only where it needs to go.
Router
Device that directs internet traffic between different networks.
Internet of things
When everyday objects (like fridges or watches) connect to the internet and communicate with each other.
Internet Protocol (IP) address
Your device's unique number address on the internet (like a street address).
Local area network (LAN)
A network connecting computers in a small area like one building or office.
Near field communication (NFC)
Technology that lets devices share data by touching or getting very close (like tap-to-pay).
Packet switching
Breaking messages into small pieces and sending them through the most efficient route.
Peer-to-peer
A network where all computers have equal status (no boss computer).
Radio frequency identification (RFID)
Tiny chips on items that send signals to track where things are (like security tags in stores).
Search engine optimization (SEO)
Making your website more likely to appear at the top of Google search results.
Transmission Control Protocol/Internet Protocol (TCP/IP)
The main set of rules that makes the internet work—how data gets broken up, sent, and reassembled.
Voice over IP (VoIP)
Making phone calls over the internet instead of phone lines.
Virtual private network (VPN)
A secure, private connection over the internet—like a secret tunnel.
Wide area network (WAN)
A network covering a large geographic area, like connecting offices in different cities.
Click fraud
Repeatedly clicking on ads to waste someone's advertising money.
Disaster recovery planning
Having a plan to get computer systems running again after something goes wrong.
Encryption
Scrambling data so only authorized people can read it.
Firewall
Security barrier that blocks unauthorized access to a network while allowing legitimate traffic.
General controls
Overall rules and systems for keeping all IT secure in an organization.
IT governance
The strategy and rules for how technology should be used in an organization.
Malware
Harmful software designed to damage computers or steal information (viruses, worms, etc.).
Pharming
Tricking people into visiting fake websites even when they type the correct address.
Phishing
Sending fake emails or creating fake websites to trick people into giving away passwords or personal information.
Risk assessment
Figuring out how likely problems are and how bad they'd be if they happened.
Security policy
Written rules about what security risks are and how to protect against them.
Spoofing
Pretending to be someone or something else online to trick people.
Bullwhip effect
When small changes in customer demand get exaggerated as they move backward through the supply chain, causing overreaction.
Churn rate
The percentage of customers who stop buying from a company.
Customer relationship management (CRM)
Systems and strategies for managing all interactions with customers to keep them happy and loyal.
Customer relationship management systems
Software that tracks every interaction with customers and helps improve relationships with them.
Demand planning
Figuring out how much product to make based on how much customers will want.
Enterprise software
Big integrated software packages that handle multiple business functions (like sales, accounting, HR) all in one system.
Just-in-time strategy
Getting materials exactly when needed (not before) to avoid storing excess inventory.
Push-based Model
Making products based on predictions and pushing them out to stores/customers.
Pull-based Model
Only making products after customers actually order them.
Supply Chain
The whole network of getting materials, making products, and delivering them to customers.
Supply Chain Management Systems
Software that coordinates information flow between a company and its suppliers.
Touch point
Any way a customer interacts with a company (phone, email, store visit, website, etc.)