BCIS FINAL Flashcards

1
Q

Binary

A

uses only two digits, 1 and 0, is commonly used for representing values in computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bits

A

short for binary digit—is a digit that can be 1 or 0. A bit is the smallest unit of information that a digital electronics device can manipulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bytes

A

A group of eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer fluency

A

refers to a functional understanding of the fundamentals of computers and their uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital literacy

A

refers to an understanding of how computers represent different types of data with digits and how the usefulness of that representation assists people in leading productive lives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Embedded systems

A

are hardwired into a computer component, such as ROM or flash memory, to control a special-purpose computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoT

A

refers to the ability of physical objects to communicate over the Internet using embedded computing devices. (unit 3-1.8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile computer

A

ex. cell phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Personal computer

A

or PC , is any general-purpose computer designed to meet the many computing needs of one individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technology ecosystem

A

a family of devices and software designed by the manufacturer to work together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of computers (not brands)

A

General purpose- designed to carry out a wide variety of activities, depending on the software being used. General-purpose computers include personal computers (PCs), mobile computers, servers, and supercomputers

Special purpose- designed for a specific computing purpose. Game devices, digital music players, digital cameras, GPS navigators, digital thermostats and other smart appliances, and a host of industry-specific devices, such as pacemakers, airport security scanners, and bank ATMs, are all special-purpose computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wearables

A

are clothing and accessories that incorporate digital technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ALU

A

Contains the millions of circuits created to carry out instructions, such as mathematical and logical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BYOD

A

(for “bring your own device”), workers who have fallen in love with their iPhones, iPads, and MacBooks at home are bringing them to work and pressuring employers to support Apple products at work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cache

A

A temporary storage area for frequently accessed or recently accessed data; speeds up the operation of the computer; size measured in megabytes (MB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud storage

A

stores data on Internet servers for access from any Internet-connected device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CPU

A

a group of circuits that perform the processing in a computer, typically in one integrated circuit called a microprocessor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Input devices

A

assists in capturing and entering data into a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Motherboard

A

the primary circuit board of a computer to which all components are connected, including the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Output devices

A

allows a user to observe the results of computer processing with one or more senses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Processor

A

carries out the instructions provided by software, using specially designed circuitry and a well-defined routine to transform data into useful outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Resolution

A

A printer’s output resolution depends on the number of dots printed per inch. A printer with a 600 dots-per-inch (dpi) resolution prints more clearly than one with a 300-dpi resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ROM vs. RAM

A

ROM- provides permanent storage for data and instructions that do not change, such as firmware—programs and data from the computer manufacturer, including the boot process used to start the computer. ROM stores data, using circuits with states that are fixed

RAM- Random access memory (RAM) is temporary, or volatile, memory that stores bytes of data and program instructions for the processor to access. RAM acts as the primary storage area in a computer for software and the data that it works with. RAM plays a crucial role in computer systems and can contribute to or detract from a computer’s performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Storage: Solid state vs. Optical vs. Magnetic

A

Solid state- device stores data using solid-state electronics such as transistors and, unlike magnetic and optical media, does not require any moving mechanical parts.

Optical state- media is convenient in terms of mobility but has limited storage capacity and is slow to write to.

Magnetic state- devices have high capacity and are convenient in terms of read and write ability, but they have slow data access rates due to the use of mechanical moving parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Types of printers

A

Laser printer

A laser printer uses techniques similar to those of photocopiers to provide the highest-quality printed output. Color laser printers can be rather expensive, so many home users settle for either a less expensive black and white laser or a color ink-jet printer.

Ink- jet printer

An ink-jet printer sprays droplets from ink cartridges onto paper to create pixels. Although ink-jet printers create good-looking hard copy, it is not quite as polished as what laser printers provide. Also, ink may run if it gets wet, so use care when printing addresses onto envelopes and hope they aren’t delivered on a rainy day.

Photo printer

A photo printer is an ink-jet printer that is specially designed for printing photo-quality images on special photo-quality paper. Cameras can be connected directly to the printer and sometimes photos can be previewed and edited from the printer’s display.

Large format printer

Also called a plotter, this is a type of printer used for printing large graphics designs. Businesses typically use plotters to generate paper or acetate blueprints and schematics or to print drawings of buildings or new products on paper or transparencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

USB

A

An external hardware interface that enables you to connect to a USB device as a plug and play device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Acquiring new software

A

refers to the several methods by which software can be purchased or accessed, including packaged software, downloaded software, cloud apps, and custom designed software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Application software

A

consist of programs written to perform tasks or solve problems for people, groups, and organizations on PCs, mobile devices, and wearables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Collaborative software

A

a comprehensive communication environment that helps the information on a project to flow within, to, and from an organization; also called groupware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Copyright

A

the legal right to copy, distribute, modify, and sell an original work; creator of the work owns the copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Executable file

A

file that can be transported safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Mobile operating system

A

are lightweight versions of their PC equivalents. They require fewer system resources, and so can run on smaller processors with less storage and provide a streamlined user interface for smaller touchscreens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Open- source

A

Linux is a free, open-source operating system for PCs, servers, and other types of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Operating system

A

a set of computer programs that runs or controls the computer hardware and acts as a user interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Personal information management software

A

assist people in managing their personal lives, including their contacts, calendar, to-do list, health, and money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Software

A

refers to the electronic instructions that govern a computer’s actions in order to provide a computing service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Software license

A

defines the permissions, rights, and restrictions assigned to the person who purchases a copy of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Software suite

A

a collection of applications sold together as a package. Office suites typically include word processors, spreadsheets, and presentation software, and they sometimes include database-management systems, personal information managers, and other applications (see the table below).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

System software

A

is any software that coordinates the activities of the hardware and assists the computer in functioning safely, effectively, and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

User interface

A

A user interface (UI) allows one or more people to have access to and command of a computer system or computer software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

VM

A

also referred to as virtualization software, allows one operating system to run on top of another by creating a virtual machine on which the guest operating system can run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Advantages and disadvantages of cloud-based services

A

Advantages: The beauty of cloud computing is that users access services from their own computers or mobile devices but don’t have to be concerned with installation, maintenance, or security.

Disadvantages: Many cloud services are only accessible when the user is connected to the Internet. So, business travelers with intermittent Internet access could suffer. However, the amount of time anyone spends without Internet access is becoming less and less, and cloud service suppliers are working to support work offline. Another issue has to do with lack of control over the data. Some worry that cloud service companies will not adequately secure their data. They may also fear that sensitive information stored in the cloud could be subject to snooping eyes. In fact, government agencies have declined some cloud services because they do not meet government regulations for privacy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Cascading style sheets

A

allows easy application of visual styles for fonts, colors, layouts, and other page attributes to create visual themes for webpages and sites. (unit 3-2.5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Cloud computing models

A

serve various environments, including private clouds, community clouds, public clouds, and hybrid clouds. (unit 3-3.2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Cookies

A

sometimes called an HTTP cookie, is a small text file placed on a user’s computer by a web server in order to identify the user whenever he or she returns to visit a website. (unit 3-2.7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Digital divide

A

refers to the social and economic gap between those who have access to computers and the Internet and those who do not. (unit 2-6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Domain name

A

maintains a database of all domain names and IP addresses used on the Internet and acts like a phonebook, supplying information to Internet nodes and routers working to get data packets to their destination. (unit 3-1.4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

GPS uses for apps

A

maintains a database of all domain names and IP addresses used on the Internet and acts like a phonebook, supplying information to Internet nodes and routers working to get data packets to their destination. (unit 3-1.4)

49
Q

HTML5

A

the primary markup language used to specify the formatting of a webpage. (unit 3-2.4)

50
Q

IaaS

A

Infrastructure as a Service (IaaS) provides hardware resources to users over the Internet. This is especially useful for storage.

51
Q

Internet backbone

A

refers to the main Internet pathways and connections, made up of the many national and international communication networks that are owned by major telecom companies such as Verizon, AT&T, and Sprint—the same companies and networks that provide telephone service. (unit 3-1.2)

52
Q

IoT

A

refers to the ability of physical objects to communicate over the Internet using embedded computing devices. (unit 3-1.8)

53
Q

IP address

A

The Internet Protocol (the “IP” in “TCP/IP”) defines the format and addressing scheme used for the packets. Routers on the Internet use the information in the packet header to direct the packet to its destination. The Transmission Control Protocol (the “TCP” in “TCP/IP”) enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and guarantees that packets are delivered in the same order in which they were sent. The Internet Protocol requires that all devices connected to the Internet have a unique IP address. An IP address is a unique 32- or 128-bit identifier for Internet users and hosts. Read as decimal numbers, a 32-bit IP address consists of four numbers (0 to 255) separated by periods, such as 64.233.161.104. IP addresses can be static (permanently assigned to a particular computer) or dynamic (assigned to computers as needed). Servers, such as www.facebook.com, use static addresses that don’t change, while clients that connect to the Internet, like your computer or cell phone, are almost always assigned temporary IP addresses that change either with each new connection or based on some time limit. For example, an IP address assigned by Comcast to a residential Internet account will change at least once a week. The current 32-bit IP address system (IPv4) can support 232, or roughly 4.3 billion, addresses. With a population of over 3 billion people online and growing, and many using more than one Internet-connected device, IP addresses are in short supply. Plus, the Internet of Things will significantly add to the demand. For these reasons, the Internet Assigned Numbers Authority (IANA) is in the process of moving Internet hosts to a new IP version, IPv6, which utilizes 128 bits to accommodate 3.403 × 1,038 addresses—an astronomical number of addresses, sufficient for the foreseeable future.

54
Q

ISP

A

A company that provides individuals and organizations with access to the Internet

55
Q

Packets

A

a small group of bytes that includes the data being sent and a header containing information about the data, such as its destination, origin, size, and identification number.

56
Q

Peer-to-peer network

A

a network architecture that does not utilize a central server but facilitates communication directly between clients with user

57
Q

Protocols

A

allow different types of networks to communicate

58
Q

Social media

A

sometimes referred to as social networks, refers to websites that allow people to share information, ideas, photos, and other forms of media in virtual communities and to comment on items shared.

59
Q

Social networks

A

Other social networks, such as Ello, have attempted to lure users away from Facebook by promising that they won’t collect your personal data or show you ads.

60
Q

Synchronous vs asynchronous

A

In synchronous communication, people communicate in real time, exchanging thoughts in a fluid conversation. Face-to-face conversations, video chat, telephone conversations, online chat, and instant messaging are examples of synchronous communication. Asynchronous communication allows participants to leave messages for each other to be read, heard, or watched and then responded to at the recipient’s convenience. Answering machines, voicemail, social network posts, text messages, tweets, and email are examples of asynchronous communication.

61
Q

Web applications

A

an application program that is stored on a remote server and delivered over the Internet through a browser interface.

62
Q

Web browser

A

or just browser (sometimes called a web client), such as Chrome, Internet Explorer/Edge, Safari, or Firefox, is used to request webpages from web servers, interpret the HTML code in the webpage that is delivered, and display the content as defined by the HTML onscreen.

63
Q

What can be stored in the cloud

A

Everything you got from the internet

64
Q

Antivirus software

A

protects a computer from the vast majority of these types of attacks.

65
Q

Authentication- what is it, types

A

a security process in which the identity of a person is verified.

Something you know- Information such as a password or personal identification number (PIN)

Something you have- An item such as a phone, computer, ID card, smart card, badge, keychain fob, or other item designed to be used to authorize access to secure areas and systems

Something about you- Unique physical characteristics such as fingerprints, retinal patterns, and facial features that can be scanned and used for authentication

66
Q

Cyber

A

relating to or characteristic of the culture of computers, information technology, and virtual reality.

67
Q

DDoS

A

They are also used in distributed denial-of-service attacks (DDoS) in which many computers simultaneously access a web server, making it impossible for the server to respond to legitimate requests.

68
Q

Guest accounts

A

is for someone who does not have a permanent account and needs to temporarily access computer or network resources

69
Q

Information security concerns

A

Network connections

70
Q

Network usage policy

A

a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization.

71
Q

Phishing scam

A

utilize spoofed email and webpages to fool users into believing the source of the email is legitimate.

72
Q

Software patch

A

a set of changes to a computer program or its supporting data designed to update, fix, or improve it

73
Q

Spoofing

A

Impersonating legitimate businesses on the web or in email

74
Q

Types of hackers

A

Black-hat hacker

A hacker who takes advantage of security vulnerabilities to gain unlawful access to private networks for unethical purposes

White-hat hacker

An individual who considers himself/herself to be working for the common good by hacking into networks in order to call attention to flaws in security so that they can be fixed

Gray-hat hacker

A hacker of questionable ethics

Hacktivist

A hacker who hacks networks for a social cause or perceived greater good

75
Q

Types of network threats

A

Interior threats: ex. Malware, hackers

76
Q

User permissions

A

provide a second layer of security for computer networks. Usernames and passwords and the login process are the primary way of keeping unregistered users out of the system. User permissions provide registered users with access to the files they need while restricting access to private resources. User permissions become even more important for files accessible on the Internet

77
Q

Zombie computer

A

infected computers that are being used in a botnet to attack other computers or send spam

78
Q

Accessibility

A

refers to the provision of equal access to computers and information technology for individuals with disabilities

79
Q

Green computing

A

refers to the efforts of individuals, businesses, and governments to utilize environmentally conscious practices in the manufacturing and use of digital technologies.

80
Q

Hacktivists

A

hack computer networks for a perceived righteous cause. Hack collectives such as Anonymous, LulzSec, and AntiSec have claimed responsibility for breaking into the networks belonging to hundreds of businesses, law enforcement agencies, and government agencies, including the FBI and U.S. defense contractors, all in the name of “justice.” Typically, hacktivists choose their targets based on some injustice that has occurred or in order to retaliate against agencies that threaten hacktivists.

81
Q

Personal computer ethics

A

refers to the responsible use of computers by individuals outside of professional environments

82
Q

Two main types of government computer ethic responsibilities

A

protection and empowerment. (unit 2-3)

83
Q

Automatic identification

A

a process of automatic data identification via a set of methods, technologies and devices, such as bar code readers, radio frequency identification (RFID), magnetic stripe cards/readers and optical memory cards

84
Q

Bluetooth

A

enables a wide assortment of digital devices to communicate directly with each other wirelessly over short distances.

85
Q

Geotagging

A

the process of adding geographic identification metadata to digital media and messages

86
Q

Hotspot

A

Areas around access points where users can connect to the Internet

87
Q

Near Field Communications

A

wireless telecommunications that take place at a distance of about 8 inches (20 cm) or less.

88
Q

RFID

A

radio frequency identification , uses tiny transponders in devices or tags that can be attached to merchandise or other objects and read wirelessly using an RFID reader, typically for inventory and supply chain management or to facilitate commercial transactions.

89
Q

Full transparency

A

All surveillance and information should be accessible to every law-abiding citizen. Governments and law enforcement should not maintain exclusive control over surveillance. Citizens should have the ability to turn the cameras onto authority to ensure that power is not being abused

90
Q

One-to-one marketing

A

a customer relationship management (CRM) strategy emphasizing personalized interactions with customers

91
Q

Threats to privacy

A

?

92
Q

Transparent

A

broadcasting their every action to the world

93
Q

B2B, B2C, C2C

A

B2B- supports transactions between businesses across private networks, the Internet, and the web.

B2C- uses the web or mobile apps to connect individual consumers directly with commercial sellers to purchase products.

C2C- provides a platform for individuals to sell their belongings, products, and services to other individuals.

94
Q

Digital certificates

A

help to identify a business as legitimate and transactions as safe, but do not ensure that you are dealing with a reputable business

95
Q

Electronic exchange

A

designed to do away with cash, credit cards, and wallets

96
Q

Etail

A

a takeoff on the term “retail,” as it is the online equivalent of a brick-and-mortar retail store

97
Q

Location-based advertising

A

uses location technologies like the GPS and compass in smartphones to provide mobile users with shopping information and coupons for businesses near their current location.

98
Q

Mcommerce

A

When ecommerce is carried out over mobile devices, it’s sometimes called mcommerce. Mcommerce includes purchases made directly from cellular carriers, over mobile apps, via mobile web browsers, through text messages, and over contactless payment technologies like Apple Pay

99
Q

Reputation management

A

provides services that include analyzing the online reputation of a company and advising changes to result in improved online image, scouring the web for negative comments or image-tarnishing content and working to have the content taken down, and promoting the company in a manner that results in positive feedback.

100
Q

Search engine optimization

A

a set of techniques that businesses use to get search engines to place their links higher in the list of search results.

101
Q

What is ecommerce

A

or electronic commerce, refers to systems that support electronically executed business transactions

102
Q

Copyright

A

Protects the words, music, and other expressions for the life of the copyright holder plus 70 years. The fair use doctrine describes when and how copyrighted material can be legally used. The Digital Millennium Copyright Act provides global copyright protection.

103
Q

DRM music files

A

Most music and movie fans are frustrated by the inconvenient side effects of DRM, which keep them from listening to or viewing legally purchased products whenever and wherever they like on any of their devices. There is concern that restrictions on digital products may become tighter, pushing DRM onto hardware so that it is impossible to make copies of any digital media.

104
Q

Plagiarism

A

involves taking credit for someone else’s intellectual property, typically a written idea, by claiming it as your own.

105
Q

Bioinformatics

A

combines biology and computer science. Also called computational biology, bioinformatics has been used to map the human genome and conduct research on biological organisms.

106
Q

Customer relationship management (CRM) system

A

refers to the use of information systems to store detailed information on prospective, current, and past customers to improve customer service and support targeted marketing.

107
Q

Enterprise

A

are information systems designed to support the functions of an enterprise, including knowledge management, content management, and customer relationship management as well as the integration of these functions into enterprise resource planning systems.

108
Q

ERP system

A

integrates all data processing in a corporation (enterprise) into one unified system that draws from a central database system to streamline the flow of information throughout an enterprise and provide greater efficiencies and savings.

109
Q

Informatics

A

applies computer-based information system technologies to support traditional disciplines such as science and medicine.

110
Q

Knowledge management system

A

assists an organization in capturing, storing, and distributing knowledge for use and reuse by the organization and, sometimes, its partners and customers.

111
Q

Medical informatics

A

applies information systems to traditional medical research. Medical informatics seeks to reduce medical errors and improve healthcare delivery by using computer systems and technology. The U.S. Centers for Disease Control and Prevention and the Office of the National Coordinator for Health IT have put in place several initiatives to standardize electronic health records (EHR) across the U.S. in efforts to improve public health.

112
Q

Transactions

A

an information system used to support and record transactions such as paying for products or paying an employee.

113
Q

Types of reports in Management Information Systems

A

Scheduled report: Produced periodically or on a schedule, such as daily, weekly, or monthly.

Key-indicator report: Special type of scheduled report that summarizes the previous day’s critical activities and is typically available at the beginning of each workday.

Demand report: Developed to retrieve certain information at a person’s request—in other words, these reports are produced on demand.

Exception report: Automatically produced when a situation is unusual or requires action.

114
Q

What are business systems

A

computer-based information systems that provide organizations with valuable information in a timely and effective manner to allow the functional areas of the enterprise to work together to achieve goals.

115
Q

Distributed workforce

A

combines the talents of individuals from different businesses and locations to work together on a common product or project.

116
Q

Global company

A

is similar to a multinational company except that it markets its brand and products in the same way across all countries, regardless of cultural differences.

117
Q

International company

A

maintains management and operations in its home country, exporting or importing products to and from other countries.

118
Q

Offshoring

A

a business practice that relocates an entire production line to another location, typically in another country, in order to enjoy cheaper labor, lower taxes, and other forms of lower overhead.

119
Q

Outsourcing

A

refers to a business’ use of an outside company to take over portions of its workload.