All Deck Flashcards

1
Q

What is the system unit?

A

The main part of a computer housing essential hardware components (CPU, memory, and storage) responsible for processing and storing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the system unit not include?

A

External devices like the monitor, keyboard, or mouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is user support in IT systems?

A

Provides support to enable employees to complete their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does data and information management involve?

A

Efficient storage and dissemination of organization data with a focus on disaster recovery and business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of networks in IT systems?

A

Supports communication between elements of an IT system using hardware and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is systems integration?

A

Combining various systems to work seamlessly to support organizational functions like human resources or project tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do software systems do?

A

Implement algorithms, perform calculations, manipulate files, and automate repetitive or dangerous tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of software system tasks?

A

Sending emails, editing text, controlling a robotic arm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the risks of unauthorized data access?

A

Data loss, exposure to competitors, and disruptions in availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an intranet?

A

Resources available for the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an internet (internal)?

A

Resources available only for specific users or systems within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an extranet?

A

Internal resources available to other specific organizations or users, like third-party consultants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does computer engineering (CE) focus on?

A

Designing hardware systems and the software that makes them function, including embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does computer science (CS) focus on?

A

Design and implementation of software, including robotics, AI, and problem-solving algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does software engineering (SE) focus on?

A

Creating and maintaining reliable and efficient software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does information systems (IE) focus on?

A

Integrating IT solutions to meet organizational business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does information technology (IT) emphasize?

A

The technology that supports information systems, not the information itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does an IT administrator do?

A

Sets policies for IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does an IT architect do?

A

Sets strategy and usage for technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does an IT engineer do?

A

Implements IT architect plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a help desk professional do?

A

Troubleshoots IT problems, supporting users like those using Apple or Google.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does a DevOps professional do?

A

Admins, programmers, and engineers work together to fix IT issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a system administrator do?

A

Provides technical support for hardware/software issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does a network administrator do?

A

Designs, sets up, and maintains an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does a database administrator do?

A

Installs and configures databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does a security administrator do?

A

Installs, administers, and troubleshoots network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does a web administrator do?

A

Troubleshoots error messages on a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does a cloud architect do?

A

Oversees cloud computing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does a network architect do?

A

Designs networks and monitors traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does an automation architect do?

A

Modernizes business processes and evaluates automation potential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does a cybersecurity architect do?

A

Designs, builds, tests, and implements security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does a machine learning engineer do?

A

Enables organizations to take full control of their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does a software engineer do?

A

Designs and develops software for systems, including operating and embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does a network engineer do?

A

Sets up, maintains, and upgrades systems supporting data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does a cloud engineer do?

A

Identifies cloud migration opportunities to enhance IT operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does technical support do?

A

Supports, monitors, and maintains workplace technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does a help desk technician do?

A

Provides first-line support to customers in person or over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does a project manager do?

A

Organizes resources to ensure projects are completed on time and within budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does a web developer do?

A

Builds and maintains websites and their infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does a software tester do?

A

Creates and executes test plans for system anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does technical sales do?

A

Identifies and helps clients adopt IT services or technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does a data analyst do?

A

Uses statistical methods to gain insights that support decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does a systems analyst do?

A

Investigates business problems and creates information systems solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does a security analyst do?

A

Monitors a network for security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does a cybersecurity specialist do?

A

Secures information systems and ensures data integrity, confidentiality, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the data pyramid?

A

Data: raw values, Information: understanding relations, Knowledge: understanding patterns, Wisdom: applied knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is Infrastructure as a Service (IaaS)?

A

Provides virtualized computing resources like virtual server space and network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is Platform as a Service (PaaS)?

A

Offers a platform for developing and managing web applications, with reduced infrastructure needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is Software as a Service (SaaS)?

A

Delivers software via subscriptions with online access. Examples: Gmail, Google Docs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is big data?

A

A large collection of data that cannot be processed by traditional tools, used by companies like Amazon and Netflix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are information systems?

A

Data collections used to support decision-making, often involving technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is data quality and its importance?

A

Data is valuable for decision-making; poor-quality data leads to financial losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are types of bad data?

A

Duplicate, conflicting, incomplete, invalid, or unsynchronized data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Precision (Quality Data Attributes)

A

Data must be accurate for its intended use; healthcare often requires higher precision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Validity (Quality Data Attributes)

A

Data should meet collection criteria; invalid data can mislead decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Reliability (Quality Data Attributes)

A

Data should be consistent regardless of how or where it’s stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Timeliness (Quality Data Attributes)

A

Data must be current for decision-making; outdated info can cause poor decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Completeness (Quality Data Attributes)

A

Data should be comprehensive; incomplete data can lead to misinterpretations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Computer System (Definition)

A

A system of hardware and software that stores, retrieves, and processes data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Uses of Computer Systems

A

Typing, emails, gaming, web browsing, creating docs, storing data, analyzing results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Presence of Computers

A

Now embedded in many devices like cameras, elevators, and temperature systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

IPO Model

A

Input, Process, Output: Explains how a computer system functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

IPOS Model

A

IPO Model plus Storage for holding input, output, and results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Main Functions of a Computer System

A

Input, Process, Output, Storage: Performs tasks based on user or environment input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Network (Definition)

A

A system connecting two or more devices to share data and info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

LAN (Network Type)

A

Local Area Network, connects devices in a single location (home or office).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

WAN (Network Type)

A

Wide Area Network, connects devices over large distances, e.g., the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Client-to-Server Network Design

A

Servers manage access and resources like user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Peer-to-Peer Network Design

A

Devices share resources directly without a server, e.g., BitTorrent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Physical Topology

A

The actual layout of devices in a network, e.g., star topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Logical Topology

A

How data flows within the network, important for traffic management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Bus Topology

A

All devices share a single communication line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Star Topology

A

All devices connect to a central hub or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Ring Topology

A

Each device connects to two others, forming a circle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Mesh Topology

A

Devices are interconnected for redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Protocols (Definition)

A

Languages for data exchange, e.g., TCP/IP used online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Network Hardware

A

Devices like routers, access points, and switches that enable communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Cable Media

A

Media like fiber optic and Ethernet used for data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Abacus

A

Strings of beads used for calculations, one of the earliest calculating tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

First Generation Computers (1946–1959)

A

Used vacuum tubes, large size, high power consumption, prone to malfunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

First Gen Computers Programming

A

Relied on machine languages, could run one program at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

First Gen Computers Input/Output

A

Used punched cards for input, printed output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

First Gen Notable Models

A

ENIAC, EDVAC, UNIVAC, IBM-701, IBM-650.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Second Generation Computers (1959–1965)

A

Used transistors, smaller, more reliable, and economical than first-gen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Second Gen Input/Output

A

Continued using punched cards, with tapes and disks for storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Second Gen Programming Languages

A

Assembly languages and early high-level languages like FORTRAN and COBOL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Second Gen Notable Models

A

Honeywell 400, IBM 7094, CDC 1604, CDC 3600, UNIVAC 1108.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Third Generation Computers (1965–1971)

A

Used integrated circuits (ICs) on silicon chips, reducing size and improving speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Third Gen User Interaction

A

Users interacted via keyboards and monitors, with operating systems enabling multitasking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Third Gen Notable Models

A

PDP-8, PDP-11, ICL 2900, IBM 360, IBM 370.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Fourth Generation Computers (1971–Present)

A

Used microprocessors, significantly reducing size, increasing processing capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Fourth Gen Notable Chip

A

Intel 4004 (1971) integrated all components on one chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Fourth Gen Home Computers

A

IBM home computer (1981) and Apple Macintosh (1984) introduced personal computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Fourth Gen Operating Systems

A

Developed MS-DOS, Microsoft Windows, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Fifth Generation Computers (1980s–Present)

A

Uses ultra-large-scale integration (ULSI) and supports AI development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Fifth Gen Key Features

A

Parallel processing, AI, natural language processing, robotics, neural networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Quantum Computing

A

Non-classical computation model, expected to be more efficient than modern computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Quantum Computing Power Efficiency

A

Expected to reduce power consumption by 100 to 1000 times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Nanotechnology

A

Involves building structures at the molecular level using nanoscale tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Nanotechnology Applications

A

Medicine, automotive, aerospace, food, and electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Computer Hardware

A

Physical components of a computer (monitor, keyboard, mouse, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

CPU (Central Processing Unit)

A

Processes all information from programs, measured in gigahertz (GHz).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

RAM (Random Access Memory)

A

Temporarily stores data for quick access, found in memory slots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Hard Drive

A

Stores permanent and temporary data (programs, photos, documents).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

HDD

A

Hard Disk Drive, uses spinning magnetic disks to store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

SSD

A

Solid State Drive, uses flash memory chips for faster data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

GPU (Graphics Processing Unit)

A

Processes graphic data, crucial for 3D rendering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Expansion Card

A

Circuit board inserted to add functionality to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

IPOS Model

A

Input-Process-Output-Storage model explaining how computers work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Von Neumann Architecture

A

Another name for the IPOS model, includes CPU, storage, and peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

ALU (Arithmetic Logic Unit)

A

Performs operations on data like addition or subtraction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Control Unit

A

Coordinates the activities of the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Registers

A

Temporary holding areas for data before processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

MAR (Memory Address Register)

A

Holds the memory location of data to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

MDR (Memory Data Register)

A

Holds data being transferred to/from memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

AC (Accumulator)

A

Holds results from the ALU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

PC (Program Counter)

A

Holds the address of the next instruction to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

CIR (Current Instruction Register)

A

Holds the current instruction being processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

RAM

A

Volatile memory that stores data temporarily while the computer is powered on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

ROM

A

Non-volatile memory that stores essential system instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Input Devices

A

Devices like keyboards and mice that move data into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Output Devices

A

Devices like printers and monitors that move information out of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Address Bus

A

Carries the destination address for data processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Data Bus

A

Transfers data between the processor, memory, and I/O devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Control Bus

A

Carries control signals and status signals within the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

System Unit

A

Houses key components like the motherboard, CPU, RAM, and power supply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Motherboard

A

The main circuit board of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

System Clock

A

Sends electrical pulses to synchronize the operation of computer components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Expansion Slots

A

Sockets for installing expansion cards like graphics and network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Ports

A

Sockets for connecting cables, like USB ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Secondary Storage Devices

A

Store data permanently, e.g., hard drives, flash drives, CDs, DVDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Bit

A

Smallest unit of storage, either 0 or 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Byte

A

Group of eight bits, enough to store a single character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Input Devices Examples

A

Keyboard, mouse, barcode reader, stylus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Output Devices Examples

A

Monitor, printer, speaker, 3D printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Modems

A

Send information over phone lines or coaxial cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Network Cards

A

Transfer data over network cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Bluetooth

A

Enables wireless communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Supercomputers

A

Fastest computers used for scientific applications like weather forecasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Mainframe Computers

A

Support hundreds or thousands of users at once, ideal for large organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Workstations

A

Single-user computers designed for technical applications like design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Microcomputers

A

General-purpose computers for individual use, like desktops and laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

PAN (Personal Area Network)

A

Short-range communication network, e.g., Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

LAN (Local Area Network)

A

Network within a single building or complex, like a school or office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

WAN (Wide Area Network)

A

Links systems over large distances, like across countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What is a network?

A

A collection of two or more connected devices that can communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What are the types of transmission media?

A

Wired: Twisted pair cables, coaxial cables, optical fiber cables. Wireless: Radio waves, microwaves, infrared waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What is a twisted pair cable?

A

Most widely used type of transmission media, available as UTP (unshielded) or STP (shielded) with various categories (e.g., CAT5, CAT6).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What is the maximum segment length of twisted pair cables?

A

100 meters (328 feet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is coaxial cable used for?

A

Used in computer networks and cable TV; it has bandwidth 80 times that of twisted pair wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What are fiber-optic cables?

A

Cables that transmit data using light, with bandwidth up to 26,000 times that of twisted pair cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What is wireless transmission?

A

Data transmission using electromagnetic waves (e.g., Wi-Fi, Bluetooth, infrared).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What is the role of a repeater?

A

Extends the range of cabling by amplifying network signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What is the role of a bridge in a network?

A

Connects different types of networks and manages message traffic between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What is a switch used for in a network?

A

Manages LAN traffic, reducing unnecessary broadcasts by sending messages only to the intended device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What does a router do?

A

Enables internet connectivity, acting as a gateway for LANs and forwarding data between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What is the role of Tier 1 ISPs?

A

Backbone of the Internet, with high-speed, high-capacity international WANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What is the role of Tier 2 ISPs?

A

Regional ISPs that work with Tier 1 ISPs to provide communication infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What is the role of Tier 3 ISPs?

A

Provide internet access to homes and businesses, also known as access ISPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is an IP address?

A

A unique identifier for each device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What is the difference between IPv4 and IPv6?

A

IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses for a larger address space.

162
Q

What is the role of ICANN?

A

Manages IP address allocation and domain name registration on the Internet.

163
Q

What does DNS stand for?

A

Domain Name System: It translates human-readable domain names into numerical IP addresses.

164
Q

What is a URL?

A

A unique address for each document on the World Wide Web.

165
Q

What is HTTP?

A

Hypertext Transfer Protocol, the foundation of data communication on the World Wide Web.

166
Q

What does VoIP stand for?

A

Voice over Internet Protocol, enabling voice communication over the Internet.

167
Q

What is streaming?

A

Transporting audio and video data across the Internet in near real-time.

168
Q

What is the function of HTML?

A

A markup language for creating web pages and linking documents via hyperlinks.

169
Q

What is XML?

A

Extensible Markup Language, used for representing data with an emphasis on its meaning.

170
Q

What is computer security?

A

Protection of computer systems from theft, damage, or unauthorized access.

171
Q

What is encryption?

A

A method of protecting data by converting it into a secure format that can only be read by authorized users.

172
Q

What is a firewall?

A

A system that monitors and controls incoming and outgoing network traffic based on security rules.

173
Q

What is malware?

A

Malicious software designed to harm or exploit devices, services, or networks.

174
Q

What is a denial-of-service (DoS) attack?

A

An attack that overloads a system with messages, making it unavailable to legitimate users.

175
Q

What is a brute force attack?

A

Attempts to guess passwords by trying all possible combinations.

176
Q

What are best practices for network security?

A

Use strong passwords, regularly update software, back up data, educate users, implement access controls.

177
Q

What is the purpose of a firewall?

A

To filter traffic, blocking untrustworthy sources and preventing unauthorized access.

178
Q

What is a proxy server?

A

Acts as an intermediary between a client and a server, providing an additional layer of security.

179
Q

Network Auditing Software

A

Monitors network behavior, including traffic origin and volume to enhance overall security.

180
Q

Antivirus Software

A

Detects and removes known viruses from the network to prevent malware infections.

181
Q

Motives for Network Vandalism

A

Attackers may disrupt systems or gain unauthorized access to information.

182
Q

Traditional Access Control

A

Protecting information with passwords, which can be easily compromised during data transfer.

183
Q

Encryption

A

Encodes data to keep it confidential, ensuring unreadability to unauthorized users.

184
Q

Operating Systems (OS)

A

Software that manages hardware and helps run other programs (e.g., Windows, macOS, Linux).

185
Q

Application Software

A

Programs designed for specific tasks, such as Microsoft Word (writing) and Adobe Photoshop (photo editing).

186
Q

Types of Application Software

A

Includes productivity software (e.g., Word), database software (e.g., MySQL), graphic design software (e.g., Adobe Illustrator), and accounting software (e.g., QuickBooks).

187
Q

System Software

A

Helps run the computer and applications, including operating systems and utility software (e.g., antivirus programs).

188
Q

Software Hierarchy

A

Includes application software and system software, which consists of utility software and operating systems.

189
Q

Mei’s Daily Tech Use

A

Uses Android OS on her smartphone, OS on her Smart TV, software in her car GPS, and writes Python code on her computer.

190
Q

What is an Operating System?

A

Software that manages computer hardware and software resources, allowing users to store, retrieve files, and execute programs.

191
Q

Main Functions of OS

A

File management, memory management, process management, and input/output handling.

192
Q

Types of Operating Systems

A

Network OS, server OS, mobile OS, and personal computer OS.

193
Q

Common Personal Computer Operating Systems

A

Windows (closed source), macOS (closed source), Linux (open source).

194
Q

Windows

A

Developed by Microsoft, user-friendly with a graphical interface, widely used.

195
Q

macOS

A

Developed by Apple, known for media editing and integrates well with Apple products.

196
Q

Linux

A

Open source, customizable, used for desktops and servers.

197
Q

Common Mobile Operating Systems

A

Google Android (open-source) and Apple iOS (regulates apps for security).

198
Q

Utility Software

A

Enhances the functionality of the operating system, including file compression and multimedia playback.

199
Q

Kernel

A

The core part of the operating system that handles basic functions like file management.

200
Q

User Interface (UI)

A

How users interact with the operating system.

201
Q

Command-Line Interfaces (CLI)

A

Users type text commands using a keyboard.

202
Q

Graphical User Interfaces (GUI)

A

Users interact using visual elements like icons with a mouse, keyboard, or touch screen.

203
Q

Functionality of UI

A

Acts as a bridge between the user and the operating system; users can choose their preferred interface.

204
Q

Operating Systems Security

A

Protect resources from unauthorized access.

205
Q

User Accounts

A

Unique accounts with a username, password, and specific privileges (e.g., administrator vs. standard).

206
Q

Administrator Account

A

Can make changes to system settings and manage other user accounts.

207
Q

Log-In Process

A

OS checks user credentials to determine access level upon logging in.

208
Q

File Managers

A

Organize files into directories (folders) in a hierarchical structure.

209
Q

Directory Paths

A

Show file location with folder names separated by slashes.

210
Q

Linux File Structure

A

Top level: /home; Sublevels: Mei, JobSearch, MyResumes, MyCoverLetters.

211
Q

Windows File Structure

A

Top level: C:\Users\Mei; Sublevels: JobSearch, MyResumes, MyCoverLetters.

212
Q

Key Differences - Windows

A

Uses backward slashes (), case insensitive, root directory by drive letter (e.g., C:).

213
Q

Key Differences - Linux

A

Uses forward slashes (/), case sensitive, root directory is simply /.

214
Q

Memory Manager

A

Part of the OS kernel that manages the computer’s main memory.

215
Q

Paging

A

Technique creating the illusion of additional memory space by moving programs/data between memories.

216
Q

Virtual Memory

A

Additional memory space created in secondary memory through paging.

217
Q

Device Drivers

A

Software that allows OS to communicate with hardware devices.

218
Q

Print Driver

A

Required to send documents to a printer.

219
Q

Bluetooth Driver

A

Needed for Bluetooth audio devices.

220
Q

Software Categories

A

Collaboration, productivity, and specialized software improve communication and organization.

221
Q

Word Processing Software

A

Create documents like letters and reports (e.g., Microsoft Word, Google Docs).

222
Q

Spreadsheet Software

A

Create worksheets for calculations and charts (e.g., Microsoft Excel, Google Sheets).

223
Q

Database Software

A

Store/manage data and develop reports (e.g., Microsoft Access, MySQL).

224
Q

Presentation Software

A

Create slides for presentations (e.g., Microsoft PowerPoint, Google Slides).

225
Q

Multimedia Software

A

Display audio, video, and image content (e.g., VLC Player, Media Player).

226
Q

Collaboration Software

A

Enables communication and information sharing among users.

227
Q

Online Workplace

A

Run cloud-based services and applications (e.g., Microsoft SharePoint, Google Docs).

228
Q

Document Storage

A

Provide file storage via cloud services (e.g., Google Drive, Dropbox).

229
Q

Video Conferencing Software

A

Conduct video calls among multiple locations (e.g., WebEx, Adobe Connect).

230
Q

Instant Messaging Software

A

Enable real-time text communication (e.g., Google Hangouts, Facebook Messenger).

231
Q

Email Software

A

Send and receive email messages (e.g., Gmail, Microsoft Outlook).

232
Q

What is specialized software?

A

Software designed for specific professional tasks.

233
Q

What is an example of computer-aided design software?

A

AutoCAD

234
Q

What is the use of graphic design software?

A

Create and edit drawings and artwork.

235
Q

What type of software manages patient data?

A

Medical software (e.g., Kareo, MedClarity)

236
Q

What does scientific software help manage?

A

Scientific research processes.

237
Q

What is the purpose of financial software?

A

Track and manage financial information.

238
Q

What type of software provides entertainment?

A

Gaming software (e.g., World of Warcraft, Candy Crush)

239
Q

What is the definition of personal information managers?

A

Software that manages contracts, calendars, tasks, and reminders.

240
Q

What are the three types of application software?

A

Bespoke, Off-the-Shelf, Hybrid.

241
Q

What is bespoke software?

A

Custom-made for a specific organization.

242
Q

What is off-the-shelf software?

A

Provides a general set of features for a broad range of users.

243
Q

What is hybrid software?

A

Off-the-shelf software customized for specific organizational needs.

244
Q

What are local applications?

A

Stored on individual computers, commonly used on personal machines.

245
Q

What are cloud applications?

A

Services delivered through a cloud service provider.

246
Q

What is proprietary software?

A

Software that requires purchasing licenses and is not modifiable.

247
Q

What is open-source software?

A

Software that allows users to modify the operating system’s kernel.

248
Q

What is shareware?

A

Trial versions with limited time/functionality; full access requires purchase.

249
Q

What is freeware?

A

Free software protected by EULA and copyright laws.

250
Q

What is public domain software?

A

Software available for unrestricted use, with no EULA or copyright protection.

251
Q

What does copyright protect?

A

Original works for at least 35 years in the U.S.

252
Q

What do patents protect in software?

A

Unique methods or processes, encouraging innovation.

253
Q

What is programming?

A

Writing programs as step-by-step instructions for computers.

254
Q

What do humans need to use to communicate with computers?

A

High-level programming languages (source code).

255
Q

What is machine code?

A

The binary representation of programs (0s and 1s).

256
Q

What is a compiler?

A

A tool that translates source code into machine language.

257
Q

What does a compiler check for?

A

Errors in the source code before translating it.

258
Q

How does an interpreter work?

A

It translates and executes source code line by line.

259
Q

What happens when an interpreter encounters an error?

A

Stops execution and displays an error message.

260
Q

Why is studying compilers and interpreters important?

A

It improves coding skills and provides insights into the programming process.

261
Q

What are the benefits of effective data management?

A

Aligns information systems with business goals and improves efficiency.

262
Q

What role does a database administrator (DBA) play?

A

Oversees data maintenance, access management, and data backup.

263
Q

What is a Database Management System (DBMS)?

A

A system that converts large volumes of data into a usable format.

264
Q

What is a relational database?

A

A database allowing access from various perspectives through internal links.

265
Q

What is the contrast between relational databases and flat file systems?

A

Flat file systems are one-dimensional and lead to data duplication.

266
Q

What does database research involve?

A

Analyzing and converting raw data into actionable information.

267
Q

How do database systems support the web?

A

They process requests and organize data to deliver relevant information.

268
Q

Overview of Database Applications

A

Two Major Layers: Application Layer and Database Management Layer.

269
Q

Application Layer Functionality

A

Interacts with users and communicates requests to the DBMS.

270
Q

DBMS Role

A

Functions as a support system for application software and data management.

271
Q

Database Structure

A

A database table consists of records (rows) and fields (columns).

272
Q

Flat-File Database Definition

A

Stores data in a plain text file; each line is a single record.

273
Q

Flat-File Database Structure

A

Flat structure; cannot contain multiple tables; all data in a single file.

274
Q

Flat-File Database Operations

A

Creating, Deleting, Updating records, and Searching.

275
Q

Hierarchical Database Definition

A

Data organized in a tree structure resembling an organizational chart.

276
Q

Hierarchical Database Structure

A

Each record has one parent and can have multiple children, forming sub-trees.

277
Q

Relational Database Definition

A

Consists of tables that can be logically linked, allowing complex data relationships.

278
Q

Relational Database Key Features

A

Tables, Records, and Unique Identifiers (primary keys).

279
Q

Primary Key Definition

A

A unique identifier for each record in a table, maintaining data integrity.

280
Q

Foreign Key Definition

A

A field linking records from one table to another, establishing relationships between tables.

281
Q

Attributes in Relational Databases

A

Connect tables meaningfully, reflecting real-world interactions and maintaining data consistency.

282
Q

Union Operations

A

Combines results from multiple SELECT statements, including only distinct records.

283
Q

Join Operations

A

Retrieves data from two or more tables based on related columns.

284
Q

Cartesian Join

A

Pairs every row from one table with every row from another table.

285
Q

Subquery

A

A query nested inside another query to provide additional data.

286
Q

Object-Oriented Databases

A

Store complex data as objects, reflecting real-world entities.

287
Q

NoSQL Databases

A

Handle various data models without a fixed schema, ideal for large datasets.

288
Q

Cloud Databases

A

Optimized for cloud environments, allowing dynamic resource allocation.

289
Q

Data Lakes

A

Centralized repositories for storing structured and unstructured data in its raw format.

290
Q

Distributed Databases

A

Data stored across multiple locations, improving access and management.

291
Q

Database Administration

A

Critical functions to ensure databases are secure, available, and scalable.

292
Q

Database Security

A

Measures taken to protect databases from unauthorized access and threats.

293
Q

Database Tuning

A

Adjustments made to optimize database performance and efficiency.

294
Q

High Availability

A

Ensuring database systems are continuously operational and accessible.

295
Q

Business Continuity

A

Plans to maintain operations during unexpected disruptions.

296
Q

Backup and Recovery

A

Processes to create copies of data and restore it in case of loss or corruption.

297
Q

Reporting

A

Generating summaries and analyses from database data for decision-making.

298
Q

Database Applications

A

Programs designed to interact with databases for data management and analysis.

299
Q

Required Skills for DBA

A

Technical and analytical skills needed for effective database administration.

300
Q

Overview of IT Departments

A

IT supports digital enterprises by addressing business challenges in communication, data management, security, CRM, and process improvement.

301
Q

Roles and Responsibilities in IT

A

IT departments have various job roles, each with specific responsibilities contributing to organizational functioning.

302
Q

IT Manager

A

Oversees the IT department, manages budgets, coordinates projects, and aligns technology with organizational goals.

303
Q

Systems Administrator

A

Maintains servers, manages user accounts, and ensures system performance and reliability.

304
Q

Network Administrator

A

Manages network infrastructure, ensuring connectivity and addressing issues.

305
Q

Database Administrator (DBA)

A

Manages databases, performs backups, ensures data integrity, and optimizes performance.

306
Q

Help Desk Technician

A

Provides technical support to users, resolving hardware and software issues.

307
Q

Software Developer

A

Designs, develops, and maintains software applications to meet organizational needs.

308
Q

Information Security Analyst

A

Protects data from breaches, conducts security assessments, and implements security policies.

309
Q

Data Analyst

A

Collects and analyzes data to provide insights for decision-making.

310
Q

Business Analyst

A

Analyzes business processes and collaborates with stakeholders to recommend IT solutions.

311
Q

Communication in IT

A

Transforms organizational communication via tools like phone, email, video conferencing, and social media.

312
Q

Data Collection and Management

A

IT systems facilitate data collection, storage, management, and analysis for decision-making.

313
Q

Information Security Management

A

Secures data against breaches, implements security protocols, and ensures regulatory compliance.

314
Q

Customer Relationship Management (CRM)

A

Tracks customer interactions and provides insights to enhance service and marketing efforts.

315
Q

Process Improvement

A

IT enhances organizational efficiency through automation and process optimization.

316
Q

Purpose of an IT Department

A

Manages technology to support business operations, enhance communication, manage data, and ensure security.

317
Q

Aligning IT Goals with Business Mission

A

Ensures IT initiatives support organizational direction, improving efficiency and customer service.

318
Q

IT Departments’ Internal Organization

A

Composed of various roles like Network Administrator, Systems Administrator, and Cybersecurity Analyst working collaboratively.

319
Q

Importance of Business Continuity

A

Ensures operations continue during disruptions, minimizing downtime and protecting reputation.

320
Q

Buying vs. Building Solutions

A

Organizations decide between purchasing ready-made solutions or developing custom ones based on needs.

321
Q

Insourcing vs. Outsourcing

A

Choosing to use internal staff or external vendors for IT functions, each with its pros and cons.

322
Q

User Needs and Information Systems Requirements

A

Understanding user needs, security, accessibility, and design is crucial for effective IT solutions.

323
Q

Project Management Life Cycle

A

A framework guiding projects from inception to completion.

324
Q

Project Initiation

A

The phase where the project is defined, including creating a business case and project charter.

325
Q

Feasibility Study

A

Research conducted to assess if the proposed system meets the needs of the organization.

326
Q

Scope Statement

A

A document outlining the objectives and deliverables of the project.

327
Q

Work Breakdown Structure (WBS)

A

A breakdown of the project into manageable segments or tasks.

328
Q

SMART Goals

A

Specific, Measurable, Achievable, Relevant, Time-bound goals set for the project.

329
Q

Milestones

A

Key points in the project timeline, marking the completion of significant tasks or phases.

330
Q

Communication Plan

A

A strategy outlining how information will be shared among stakeholders throughout the project.

331
Q

Risk Management Plan

A

A plan identifying potential risks and strategies to mitigate them.

332
Q

Project Execution

A

The phase where project tasks are performed, including team assignments and progress monitoring.

333
Q

Kickoff Meeting

A

An initial meeting to align the project team and stakeholders on objectives and roles.

334
Q

Final Documentation

A

Completion of all project-related documents, including performance reports and summaries.

335
Q

Needs Assessment

A

An analysis to identify the current system’s inefficiencies and user needs for the new system.

336
Q

Vendor Evaluation

A

The process of assessing potential vendors for system compatibility and reliability.

337
Q

Integration Testing

A

Testing conducted to ensure the new system works seamlessly with existing infrastructure.

338
Q

Execution Risks

A

Challenges that arise during the execution phase, such as resource availability and schedule delays.

339
Q

Integration Risks

A

Risks associated with ensuring all project components work together, including compatibility and data migration challenges.

340
Q

Unknown Risks

A

Unpredictable risks that may emerge at any time, such as market or regulatory changes.

341
Q

Monitoring Systems

A

Tools and processes put in place to track identified risks throughout the project.

342
Q

Scope Creep

A

The uncontrolled expansion of project scope, leading to additional tasks and costs.

343
Q

Budget Risk

A

Challenges with budget control, including potential cost overruns.

344
Q

Resistance to Change

A

Opposition from departments or individuals towards organizational changes.

345
Q

Resource Risk

A

Difficulties in securing sufficient resources for the project.

346
Q

Stakeholder Support Risks

A

Insufficient support from key stakeholders that can impact project success.

347
Q

Complex Information Systems

A

Systems requiring multiple employees and extended time frames; their staffing requirements often change, making projects longer. Off-the-shelf products may not always be feasible.

348
Q

Lack of Metrics

A

Information systems lack quantitative data for analysis, unlike other engineering fields.

349
Q

System Development Life Cycle (SDLC)

A

A structured approach to system development divided into phases, including traditional (requirements analysis, design, implementation, testing) and cyclical phases (development, use, maintenance).

350
Q

CASE (Computer-Aided Software Engineering)

A

The evolution of methodologies that have replaced outdated practices to solve engineering challenges.

351
Q

Software Development Tools

A

Tools that assist in project planning, documentation, interface design, and programming.

352
Q

Integrated Development Environments (IDEs)

A

Packages combining various tools for software development, like Appery.io, TheAppBuilder, and AppMachine.

353
Q

Guidelines and Standards

A

Organizations like ISO, ACM, and IEEE provide standards for system development, ensuring quality and consistency.

354
Q

Requirements Analysis

A

The process of determining system services, user interactions, and identifying constraints.

355
Q

Methods for Gathering Requirements

A

Gathering input from stakeholders, conducting feasibility studies, and market studies for COTS systems.

356
Q

Requirements Analysis Process

A

Involves compiling system needs, negotiating trade-offs, and developing a set of requirements.

357
Q

System Requirement Specification (SRS)

A

A written agreement that records system requirements, guides development, and helps resolve disputes.

358
Q

Design Phase

A

The stage where a detailed construction plan for the system is created, distinguishing what the system should do from how it will do it.

359
Q

Implementation and Integration

A

The phase of system building involving roles like system analysts and programmers, focusing on success factors like training and communication.

360
Q

System Maintenance

A

The ongoing process of monitoring and modifying the system as needed, including troubleshooting and user support.

361
Q

Categories of Software Maintenance

A

Types of maintenance: corrective (fix errors), adaptive (adjust to changes), perfective (improve performance), preventive (increase lifespan).

362
Q

Quality Control in System Development

A

Emphasizes the importance of quality control beyond debugging, incorporating ISO standards and effective documentation practices for better system development.

363
Q

Modern Testing Approach

A

A comprehensive approach involving requirements analysis, design validation, and implementation testing to ensure system quality.

364
Q

Testing Methodologies

A

Involves thorough testing, targeted error identification (e.g., Pareto Principle, Basis Path Testing), and two primary types: Glass-Box (White-Box) and Black-Box testing.

365
Q

Stages of Black-Box Testing

A

Includes alpha testing (by developers), beta testing (by end-users), and user acceptance testing (in an operational setting).

366
Q

Importance of Documentation

A

Effective system usage and maintenance depend on thorough documentation, crucial for system development.

367
Q

User Documentation

A

Provides guidance on system features, FAQs, and customer support contacts.

368
Q

System Documentation

A

Describes the internal configuration of the system for maintenance, including versioned software code.

369
Q

Key Elements of System Documentation

A

Indentation conventions, naming conventions for variables, and documentation conventions for adequate program documentation.

370
Q

Technical Documentation

A

Covers installation and maintenance, including update procedures and feedback mechanisms for the development team.

371
Q

Waterfall Model

A

A linear and sequential approach to development, where each phase must be completed before moving to the next, limiting flexibility and adaptation.

372
Q

Incremental Model

A

Builds the system in increments; the first increment is a simplified version of the final product.

373
Q

Prototyping

A

Involves creating and evaluating basic versions of a proposed system, providing stakeholders with a clear picture of how the system will function.

374
Q

Open-Source Development

A

Allows users to modify software code, fostering community collaboration; examples include Linux and PowerShell Core.

375
Q

Agile Methodologies

A

Focus on incremental implementations, adapting to rapidly changing requirements.

376
Q

Scrum

A

A prioritized wish list of features where daily meetings assess progress, ending each sprint with a potentially shippable product increment.

377
Q

Extreme Programming (XP)

A

Developed by small teams working collaboratively, emphasizing informal requirements analysis, design, and testing cycles.

378
Q

Benefits of Agile Development

A

Includes speed, customer satisfaction, employee engagement, and reduced rework.

379
Q

Role of IT in Disaster Recovery

A

Ensures organizational activities execute as planned, requiring contingency plans and regular testing.

380
Q

Uptime Requirements

A

Defined as the time client data/resources are available on servers, expressed in percentages.

381
Q

High Availability Solutions

A

Provide replicas of critical systems for quick deployment during failures.

382
Q

Disaster Recovery Plans (DRPs)

A

Strategies for quick recovery from catastrophic events with minimal data loss.

383
Q

Data Mirroring

A

Writes copies of data across multiple devices for fast recovery.

384
Q

Data Backups

A

Commonly stored on tape drives, cost-effective and transportable.

385
Q

Off-Site Storage

A

Essential for recovery, stored in different locations to minimize risk.

386
Q

Cloud Storage

A

Enhances recovery, with public providers replicating data across locations.

387
Q

Criteria for Assessing Off-Site Storage

A

Accessibility, cost, environment, geographic area, and security.

388
Q

Hot Storage

A

Fast access and high performance, using advanced storage equipment; examples include Azure Hot Blobs.

389
Q

Cold Storage

A

Less frequent access and lower performance; more cost-effective; examples include tape backups.

390
Q

Mobile Computing

A

Use of handheld devices like laptops and smartphones, driven by trends in hardware miniaturization.

391
Q

The Internet of Things (IoT)

A

Interconnected devices with unique identifiers for data transfer without human interaction.

392
Q

Globalization

A

Growing interdependence of economies and cultures, driven by IT revolution.

393
Q

Technology and Ethics

A

Ongoing questions about the societal impact of IT; ethical considerations are essential as technology evolves.

394
Q

Legal, Ethical, and Regulatory Issues

A

Rapid evolution of computing leading to regulatory and social changes; existing laws may not address unique computing nature.

395
Q

Ethics vs. Regulations

A

Regulations are legal requirements with penalties; ethics guide individual and organizational behavior.

396
Q

Continuous Ethical Consideration

A

Computing professionals must assess ethical responsibilities, including security and social impact.

397
Q

Ethics and Information Technology

A

Discusses philosophical approaches, including character-based ethics and other ethical theories.

398
Q

Ten Commandments of Computer Ethics

A

Guidelines established by the Computer Ethics Institute for ethical computer use.

399
Q

Asimov’s Three Laws of Robotics

A

Ethical guidelines for robot behavior proposed by Isaac Asimov; includes preventing harm to humans.

400
Q

Additional Ethical Principles for Robots

A

Guidelines ensuring robots are safe and secure, emphasizing human responsibility and identification of legal accountability.

401
Q

Similarities in Ethical Guidelines

A

Public welfare focus, honesty and integrity, respect for others, and avoiding harm.

402
Q

Differences in Ethical Guidelines

A

Scope of ethics, conflict of interest management, continuous improvement emphasis, and intellectual property respect vary among organizations.