BCIS FINAL Flashcards
Binary
uses only two digits, 1 and 0, is commonly used for representing values in computers.
Bits
short for binary digit—is a digit that can be 1 or 0. A bit is the smallest unit of information that a digital electronics device can manipulate
Bytes
A group of eight bits
Computer fluency
refers to a functional understanding of the fundamentals of computers and their uses.
Digital literacy
refers to an understanding of how computers represent different types of data with digits and how the usefulness of that representation assists people in leading productive lives.
Embedded systems
are hardwired into a computer component, such as ROM or flash memory, to control a special-purpose computer.
IoT
refers to the ability of physical objects to communicate over the Internet using embedded computing devices. (unit 3-1.8)
Mobile computer
ex. cell phones
Personal computer
or PC , is any general-purpose computer designed to meet the many computing needs of one individual.
Technology ecosystem
a family of devices and software designed by the manufacturer to work together.
Types of computers (not brands)
General purpose- designed to carry out a wide variety of activities, depending on the software being used. General-purpose computers include personal computers (PCs), mobile computers, servers, and supercomputers
Special purpose- designed for a specific computing purpose. Game devices, digital music players, digital cameras, GPS navigators, digital thermostats and other smart appliances, and a host of industry-specific devices, such as pacemakers, airport security scanners, and bank ATMs, are all special-purpose computers
Wearables
are clothing and accessories that incorporate digital technologies.
ALU
Contains the millions of circuits created to carry out instructions, such as mathematical and logical operations
BYOD
(for “bring your own device”), workers who have fallen in love with their iPhones, iPads, and MacBooks at home are bringing them to work and pressuring employers to support Apple products at work
Cache
A temporary storage area for frequently accessed or recently accessed data; speeds up the operation of the computer; size measured in megabytes (MB)
Cloud storage
stores data on Internet servers for access from any Internet-connected device.
CPU
a group of circuits that perform the processing in a computer, typically in one integrated circuit called a microprocessor.
Input devices
assists in capturing and entering data into a computer system.
Motherboard
the primary circuit board of a computer to which all components are connected, including the CPU.
Output devices
allows a user to observe the results of computer processing with one or more senses.
Processor
carries out the instructions provided by software, using specially designed circuitry and a well-defined routine to transform data into useful outputs.
Resolution
A printer’s output resolution depends on the number of dots printed per inch. A printer with a 600 dots-per-inch (dpi) resolution prints more clearly than one with a 300-dpi resolution
ROM vs. RAM
ROM- provides permanent storage for data and instructions that do not change, such as firmware—programs and data from the computer manufacturer, including the boot process used to start the computer. ROM stores data, using circuits with states that are fixed
RAM- Random access memory (RAM) is temporary, or volatile, memory that stores bytes of data and program instructions for the processor to access. RAM acts as the primary storage area in a computer for software and the data that it works with. RAM plays a crucial role in computer systems and can contribute to or detract from a computer’s performance
Storage: Solid state vs. Optical vs. Magnetic
Solid state- device stores data using solid-state electronics such as transistors and, unlike magnetic and optical media, does not require any moving mechanical parts.
Optical state- media is convenient in terms of mobility but has limited storage capacity and is slow to write to.
Magnetic state- devices have high capacity and are convenient in terms of read and write ability, but they have slow data access rates due to the use of mechanical moving parts.
Types of printers
Laser printer
A laser printer uses techniques similar to those of photocopiers to provide the highest-quality printed output. Color laser printers can be rather expensive, so many home users settle for either a less expensive black and white laser or a color ink-jet printer.
Ink- jet printer
An ink-jet printer sprays droplets from ink cartridges onto paper to create pixels. Although ink-jet printers create good-looking hard copy, it is not quite as polished as what laser printers provide. Also, ink may run if it gets wet, so use care when printing addresses onto envelopes and hope they aren’t delivered on a rainy day.
Photo printer
A photo printer is an ink-jet printer that is specially designed for printing photo-quality images on special photo-quality paper. Cameras can be connected directly to the printer and sometimes photos can be previewed and edited from the printer’s display.
Large format printer
Also called a plotter, this is a type of printer used for printing large graphics designs. Businesses typically use plotters to generate paper or acetate blueprints and schematics or to print drawings of buildings or new products on paper or transparencies.
USB
An external hardware interface that enables you to connect to a USB device as a plug and play device.
Acquiring new software
refers to the several methods by which software can be purchased or accessed, including packaged software, downloaded software, cloud apps, and custom designed software.
Application software
consist of programs written to perform tasks or solve problems for people, groups, and organizations on PCs, mobile devices, and wearables.
Collaborative software
a comprehensive communication environment that helps the information on a project to flow within, to, and from an organization; also called groupware
Copyright
the legal right to copy, distribute, modify, and sell an original work; creator of the work owns the copyright
Executable file
file that can be transported safely
Mobile operating system
are lightweight versions of their PC equivalents. They require fewer system resources, and so can run on smaller processors with less storage and provide a streamlined user interface for smaller touchscreens
Open- source
Linux is a free, open-source operating system for PCs, servers, and other types of computers
Operating system
a set of computer programs that runs or controls the computer hardware and acts as a user interface.
Personal information management software
assist people in managing their personal lives, including their contacts, calendar, to-do list, health, and money.
Software
refers to the electronic instructions that govern a computer’s actions in order to provide a computing service.
Software license
defines the permissions, rights, and restrictions assigned to the person who purchases a copy of software.
Software suite
a collection of applications sold together as a package. Office suites typically include word processors, spreadsheets, and presentation software, and they sometimes include database-management systems, personal information managers, and other applications (see the table below).
System software
is any software that coordinates the activities of the hardware and assists the computer in functioning safely, effectively, and efficiently.
User interface
A user interface (UI) allows one or more people to have access to and command of a computer system or computer software.
VM
also referred to as virtualization software, allows one operating system to run on top of another by creating a virtual machine on which the guest operating system can run.
Advantages and disadvantages of cloud-based services
Advantages: The beauty of cloud computing is that users access services from their own computers or mobile devices but don’t have to be concerned with installation, maintenance, or security.
Disadvantages: Many cloud services are only accessible when the user is connected to the Internet. So, business travelers with intermittent Internet access could suffer. However, the amount of time anyone spends without Internet access is becoming less and less, and cloud service suppliers are working to support work offline. Another issue has to do with lack of control over the data. Some worry that cloud service companies will not adequately secure their data. They may also fear that sensitive information stored in the cloud could be subject to snooping eyes. In fact, government agencies have declined some cloud services because they do not meet government regulations for privacy and security.
Cascading style sheets
allows easy application of visual styles for fonts, colors, layouts, and other page attributes to create visual themes for webpages and sites. (unit 3-2.5)
Cloud computing models
serve various environments, including private clouds, community clouds, public clouds, and hybrid clouds. (unit 3-3.2)
Cookies
sometimes called an HTTP cookie, is a small text file placed on a user’s computer by a web server in order to identify the user whenever he or she returns to visit a website. (unit 3-2.7)
Digital divide
refers to the social and economic gap between those who have access to computers and the Internet and those who do not. (unit 2-6)
Domain name
maintains a database of all domain names and IP addresses used on the Internet and acts like a phonebook, supplying information to Internet nodes and routers working to get data packets to their destination. (unit 3-1.4)
GPS uses for apps
maintains a database of all domain names and IP addresses used on the Internet and acts like a phonebook, supplying information to Internet nodes and routers working to get data packets to their destination. (unit 3-1.4)
HTML5
the primary markup language used to specify the formatting of a webpage. (unit 3-2.4)
IaaS
Infrastructure as a Service (IaaS) provides hardware resources to users over the Internet. This is especially useful for storage.
Internet backbone
refers to the main Internet pathways and connections, made up of the many national and international communication networks that are owned by major telecom companies such as Verizon, AT&T, and Sprint—the same companies and networks that provide telephone service. (unit 3-1.2)
IoT
refers to the ability of physical objects to communicate over the Internet using embedded computing devices. (unit 3-1.8)
IP address
The Internet Protocol (the “IP” in “TCP/IP”) defines the format and addressing scheme used for the packets. Routers on the Internet use the information in the packet header to direct the packet to its destination. The Transmission Control Protocol (the “TCP” in “TCP/IP”) enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and guarantees that packets are delivered in the same order in which they were sent. The Internet Protocol requires that all devices connected to the Internet have a unique IP address. An IP address is a unique 32- or 128-bit identifier for Internet users and hosts. Read as decimal numbers, a 32-bit IP address consists of four numbers (0 to 255) separated by periods, such as 64.233.161.104. IP addresses can be static (permanently assigned to a particular computer) or dynamic (assigned to computers as needed). Servers, such as www.facebook.com, use static addresses that don’t change, while clients that connect to the Internet, like your computer or cell phone, are almost always assigned temporary IP addresses that change either with each new connection or based on some time limit. For example, an IP address assigned by Comcast to a residential Internet account will change at least once a week. The current 32-bit IP address system (IPv4) can support 232, or roughly 4.3 billion, addresses. With a population of over 3 billion people online and growing, and many using more than one Internet-connected device, IP addresses are in short supply. Plus, the Internet of Things will significantly add to the demand. For these reasons, the Internet Assigned Numbers Authority (IANA) is in the process of moving Internet hosts to a new IP version, IPv6, which utilizes 128 bits to accommodate 3.403 × 1,038 addresses—an astronomical number of addresses, sufficient for the foreseeable future.
ISP
A company that provides individuals and organizations with access to the Internet
Packets
a small group of bytes that includes the data being sent and a header containing information about the data, such as its destination, origin, size, and identification number.
Peer-to-peer network
a network architecture that does not utilize a central server but facilitates communication directly between clients with user
Protocols
allow different types of networks to communicate
Social media
sometimes referred to as social networks, refers to websites that allow people to share information, ideas, photos, and other forms of media in virtual communities and to comment on items shared.
Social networks
Other social networks, such as Ello, have attempted to lure users away from Facebook by promising that they won’t collect your personal data or show you ads.
Synchronous vs asynchronous
In synchronous communication, people communicate in real time, exchanging thoughts in a fluid conversation. Face-to-face conversations, video chat, telephone conversations, online chat, and instant messaging are examples of synchronous communication. Asynchronous communication allows participants to leave messages for each other to be read, heard, or watched and then responded to at the recipient’s convenience. Answering machines, voicemail, social network posts, text messages, tweets, and email are examples of asynchronous communication.
Web applications
an application program that is stored on a remote server and delivered over the Internet through a browser interface.
Web browser
or just browser (sometimes called a web client), such as Chrome, Internet Explorer/Edge, Safari, or Firefox, is used to request webpages from web servers, interpret the HTML code in the webpage that is delivered, and display the content as defined by the HTML onscreen.
What can be stored in the cloud
Everything you got from the internet
Antivirus software
protects a computer from the vast majority of these types of attacks.
Authentication- what is it, types
a security process in which the identity of a person is verified.
Something you know- Information such as a password or personal identification number (PIN)
Something you have- An item such as a phone, computer, ID card, smart card, badge, keychain fob, or other item designed to be used to authorize access to secure areas and systems
Something about you- Unique physical characteristics such as fingerprints, retinal patterns, and facial features that can be scanned and used for authentication
Cyber
relating to or characteristic of the culture of computers, information technology, and virtual reality.
DDoS
They are also used in distributed denial-of-service attacks (DDoS) in which many computers simultaneously access a web server, making it impossible for the server to respond to legitimate requests.
Guest accounts
is for someone who does not have a permanent account and needs to temporarily access computer or network resources
Information security concerns
Network connections
Network usage policy
a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization.
Phishing scam
utilize spoofed email and webpages to fool users into believing the source of the email is legitimate.
Software patch
a set of changes to a computer program or its supporting data designed to update, fix, or improve it
Spoofing
Impersonating legitimate businesses on the web or in email
Types of hackers
Black-hat hacker
A hacker who takes advantage of security vulnerabilities to gain unlawful access to private networks for unethical purposes
White-hat hacker
An individual who considers himself/herself to be working for the common good by hacking into networks in order to call attention to flaws in security so that they can be fixed
Gray-hat hacker
A hacker of questionable ethics
Hacktivist
A hacker who hacks networks for a social cause or perceived greater good
Types of network threats
Interior threats: ex. Malware, hackers
User permissions
provide a second layer of security for computer networks. Usernames and passwords and the login process are the primary way of keeping unregistered users out of the system. User permissions provide registered users with access to the files they need while restricting access to private resources. User permissions become even more important for files accessible on the Internet
Zombie computer
infected computers that are being used in a botnet to attack other computers or send spam
Accessibility
refers to the provision of equal access to computers and information technology for individuals with disabilities
Green computing
refers to the efforts of individuals, businesses, and governments to utilize environmentally conscious practices in the manufacturing and use of digital technologies.
Hacktivists
hack computer networks for a perceived righteous cause. Hack collectives such as Anonymous, LulzSec, and AntiSec have claimed responsibility for breaking into the networks belonging to hundreds of businesses, law enforcement agencies, and government agencies, including the FBI and U.S. defense contractors, all in the name of “justice.” Typically, hacktivists choose their targets based on some injustice that has occurred or in order to retaliate against agencies that threaten hacktivists.
Personal computer ethics
refers to the responsible use of computers by individuals outside of professional environments
Two main types of government computer ethic responsibilities
protection and empowerment. (unit 2-3)
Automatic identification
a process of automatic data identification via a set of methods, technologies and devices, such as bar code readers, radio frequency identification (RFID), magnetic stripe cards/readers and optical memory cards
Bluetooth
enables a wide assortment of digital devices to communicate directly with each other wirelessly over short distances.
Geotagging
the process of adding geographic identification metadata to digital media and messages
Hotspot
Areas around access points where users can connect to the Internet
Near Field Communications
wireless telecommunications that take place at a distance of about 8 inches (20 cm) or less.
RFID
radio frequency identification , uses tiny transponders in devices or tags that can be attached to merchandise or other objects and read wirelessly using an RFID reader, typically for inventory and supply chain management or to facilitate commercial transactions.
Full transparency
All surveillance and information should be accessible to every law-abiding citizen. Governments and law enforcement should not maintain exclusive control over surveillance. Citizens should have the ability to turn the cameras onto authority to ensure that power is not being abused
One-to-one marketing
a customer relationship management (CRM) strategy emphasizing personalized interactions with customers
Threats to privacy
?
Transparent
broadcasting their every action to the world
B2B, B2C, C2C
B2B- supports transactions between businesses across private networks, the Internet, and the web.
B2C- uses the web or mobile apps to connect individual consumers directly with commercial sellers to purchase products.
C2C- provides a platform for individuals to sell their belongings, products, and services to other individuals.
Digital certificates
help to identify a business as legitimate and transactions as safe, but do not ensure that you are dealing with a reputable business
Electronic exchange
designed to do away with cash, credit cards, and wallets
Etail
a takeoff on the term “retail,” as it is the online equivalent of a brick-and-mortar retail store
Location-based advertising
uses location technologies like the GPS and compass in smartphones to provide mobile users with shopping information and coupons for businesses near their current location.
Mcommerce
When ecommerce is carried out over mobile devices, it’s sometimes called mcommerce. Mcommerce includes purchases made directly from cellular carriers, over mobile apps, via mobile web browsers, through text messages, and over contactless payment technologies like Apple Pay
Reputation management
provides services that include analyzing the online reputation of a company and advising changes to result in improved online image, scouring the web for negative comments or image-tarnishing content and working to have the content taken down, and promoting the company in a manner that results in positive feedback.
Search engine optimization
a set of techniques that businesses use to get search engines to place their links higher in the list of search results.
What is ecommerce
or electronic commerce, refers to systems that support electronically executed business transactions
Copyright
Protects the words, music, and other expressions for the life of the copyright holder plus 70 years. The fair use doctrine describes when and how copyrighted material can be legally used. The Digital Millennium Copyright Act provides global copyright protection.
DRM music files
Most music and movie fans are frustrated by the inconvenient side effects of DRM, which keep them from listening to or viewing legally purchased products whenever and wherever they like on any of their devices. There is concern that restrictions on digital products may become tighter, pushing DRM onto hardware so that it is impossible to make copies of any digital media.
Plagiarism
involves taking credit for someone else’s intellectual property, typically a written idea, by claiming it as your own.
Bioinformatics
combines biology and computer science. Also called computational biology, bioinformatics has been used to map the human genome and conduct research on biological organisms.
Customer relationship management (CRM) system
refers to the use of information systems to store detailed information on prospective, current, and past customers to improve customer service and support targeted marketing.
Enterprise
are information systems designed to support the functions of an enterprise, including knowledge management, content management, and customer relationship management as well as the integration of these functions into enterprise resource planning systems.
ERP system
integrates all data processing in a corporation (enterprise) into one unified system that draws from a central database system to streamline the flow of information throughout an enterprise and provide greater efficiencies and savings.
Informatics
applies computer-based information system technologies to support traditional disciplines such as science and medicine.
Knowledge management system
assists an organization in capturing, storing, and distributing knowledge for use and reuse by the organization and, sometimes, its partners and customers.
Medical informatics
applies information systems to traditional medical research. Medical informatics seeks to reduce medical errors and improve healthcare delivery by using computer systems and technology. The U.S. Centers for Disease Control and Prevention and the Office of the National Coordinator for Health IT have put in place several initiatives to standardize electronic health records (EHR) across the U.S. in efforts to improve public health.
Transactions
an information system used to support and record transactions such as paying for products or paying an employee.
Types of reports in Management Information Systems
Scheduled report: Produced periodically or on a schedule, such as daily, weekly, or monthly.
Key-indicator report: Special type of scheduled report that summarizes the previous day’s critical activities and is typically available at the beginning of each workday.
Demand report: Developed to retrieve certain information at a person’s request—in other words, these reports are produced on demand.
Exception report: Automatically produced when a situation is unusual or requires action.
What are business systems
computer-based information systems that provide organizations with valuable information in a timely and effective manner to allow the functional areas of the enterprise to work together to achieve goals.
Distributed workforce
combines the talents of individuals from different businesses and locations to work together on a common product or project.
Global company
is similar to a multinational company except that it markets its brand and products in the same way across all countries, regardless of cultural differences.
International company
maintains management and operations in its home country, exporting or importing products to and from other countries.
Offshoring
a business practice that relocates an entire production line to another location, typically in another country, in order to enjoy cheaper labor, lower taxes, and other forms of lower overhead.
Outsourcing
refers to a business’ use of an outside company to take over portions of its workload.