1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Moore's Law
The observation that, over the history of computing hardware, the number of transistors in a dense integrated circuit doubles approximately every two years.
Primary Storage
High-speed storage located directly on the motherboard that stores data to be processed by the CPU, instructions telling the CPU how to process the data, and operating system programs.
Secondary Storage
Technology that can store very large amounts of data for extended periods.
Porter's Competitive Forces Model
A model that identifies FIVE major forces that can endanger or enhance a company's position in a given industry: Threat of New Entrants, Supplier Power, Threat of Substitute Products or Services, Buyer Power, and Competing Organizations.
Database
A collection of related files or tables containing data.
Network
A connecting system (wireline or wireless) that enables multiple computers to share resources.
Hardware
A device such as a processor, monitor, keyboard, or printer. Together, these devices accept, process, and display data and information.
Software
A program or collection of programs that enable the hardware to process data.
Privacy
The right to be left alone and to be free of unreasonable personal intrusions.
Accountability
A tenet of ethics that refers to determining who is responsible for actions that were taken.
Liability
A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Responsibility
A tenet of ethics in which you accept the consequences of your decisions and actions.
Cyberterrorism
Can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
Identity Theft
Crime in which someone uses the personal information of others to create a false identity and then uses it fraudulently.
Vulnerability
The possibility that an information resource will be harmed by a threat.
Public Key
The locking key when sending an encrypted message
Private Key
The unlocking key for opening an encrypted message
VPN (Virtual Private Network)
A private network that uses a public network (usually the Internet) to securely connect users by using encryption.
RFID (Radio-Frequency Identification)
A wireless technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.
ERP (Enterprise Resource Planning) Systems
Information systems that correct a lack of communication among the functional area Information Systems by tightly integrating the functional area Information Systems via a common database.
TPS (Transaction Processing System)
A system that supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
DDos (Distributed Denial of Service) Attack
A denial of service attack that sends a flood of data packets from many compromised computers simultaneously.
Data Lake
A central repository that stores all of an organization's data, regardless of their source or format.
Big Data
A collection of data so large and complex that it is difficult to manage using traditional database management systems.
SQL (Structured Query Language)
The most popular query language for requesting information from a relational database.
Web Authoring
A Personal Application Software that allows users to design websites and publish them on the Web. ex. Wordpress, Adobe Workshop
IPv4
An IP addressing scheme with 32 bits, or 4,294,967,295 distinct addresses. Introduced in 1981, with nine numbers.
IPv6
An IP addressing scheme with 128 bits, basically an infinite number of addresses. Introduced in 1998, with 32 numbers and letters.
LAN (Large-Area Network)
A network that connects communications devices in a limited geographic region, such as a building, so that every user device on the network can communicate with every other device.
WAN (Wide-Area Network)
A network, generally provided by common carriers, that covers a wide geographical area.
MAN (Metropolitan-Area Network)
Relatively large networks that cover a metropolitan area.
PAN (Personal-Area Network)
Short-range networks—typically a few meters—that are used for communication among devices close to one person. They can be wired or wireless. ex. telephones, personal digital assistants, smartphones
Order of AN by size (smallest to largest)
PAN, LAN, MAN, WAN
Fiber-optic
A communications medium consisting of thousands of very thin filaments of glass fibers, surrounded by cladding, that transmit information through pulses of light generated by lasers.
Wireless Communication
Communications in which electromagnetic waves, rather than some form of wire or cable, carry the signal between communicating devices such as computers, smartphones, and iPads.
OSI Model
Application, Presentation, Session, Transport, Network, Data Link, Physical
TCP/IP (Transmission Control Protocol/Internet Protocol)
A file transfer protocol that can send large files of information across sometimes-unreliable networks with the assurance that the data will arrive uncorrupted.
E-commerce Business Models
The e-commerce method by which a company generates revenue to sustain itself. ex. online direct marketing, electronic tendering system, affiliate marketing, online auctions
Security
The degree of protection against criminal activity, danger, damage, or loss.
Artificial Intelligence (AI)
A subfield of computer science that is concerned with studying the thought processes of humans and re-creating the effects of those processes with machines such as computers.
Machine Learning
The ability to accurately perform new, unseen tasks, built on known properties learned from training or historical data that are labeled.
Communications Act of 1934
The U.S. government provided a universal service guarantee that mandated that every resident have a baseline level of telecommunications services
Network Interface Card (NIC)
A card that allows the device to physically connect to the LAN's communications medium
Sarbanes-Oxley Act (SARBOX!!!!)
Requires (1) Public companies to evaluate and disclose the effectiveness of their internal financial controls and (2) Independent auditors for these companies agree to this disclosure. The law also holds CEOs and CFOs personally responsible for such disclosures.