History of Computer Tech (Ch.1) Flashcards
end user
used to describe if user is interested in tech. for business or personal purposes
1940
One large CPU and limited peripheral devices are introduced into the corporate market
50 - 60’s
Trained computer professionals programmed & managed the oversized mainframe (CPU) in attempt to increase workplace productivity.
Mainframe
Unusable to average employee, communication was facilitated by punch cards that were transported from employees in bulk to the mainframe location
70’s
computers became smaller & less expensive. Terminals (keyboards & screens) were added to make them more user friendly.
80-90’s
Tech staff was unable to fulfill frequent requests for new software features leading to a backlog. Eventually results in the creation of specialized software packages. Industries become less reliant on computer professionals for personalized software. Point and click devices were added to computers making them even more intuitive to end users.
Moore’s Law
Devloped by Intel co-founder Gordon Moore in 1975. Predicts capabilities of tech industry that will double every two years while consumer prices drop.
Knowledge Worker
employee who collects, preps, processes, & distributes information using technology
Microcomputer
computer built at much smaller scale using a microprocessor as the CPU
90’s - 2000
Computers become indiviudalized resources connected through varyious networking channels.
Distributed Computing
reliant on servers (wired & wireless) combined with the internet to link workers with clients as well as the organization as a whole
2010
advanced microprocessors enable smaller devices than before with same amount of power and even greater capabilities. Cloud computing becomes a standard method of storage & delivery. What was once called data processing is now more broad and named IS or IT to encompase the networking needs of organizations.
Cloud Computing
servers process and store info on remote servers using internet networks to deliver and update information.
Keystroke Logger
Malware that captures & transmits keystroke log to external source
KSA’s
Knowledge skills and abilities required to fill a position