IT Unit Flashcards
(30 cards)
what is the difference between data and information
data represents a fact, information is data that has been organized
predicts that the number of transistors on a CPU will double every two years
moore’s law
the internet is
a large network of networks
tow or more computers connected using software and hardware so that they can communicate with each other
network
a computer language consisting of 0’s and 1’s
binary
RAM is this type of storage
volatile (temporary)
any device connected to a network such as a computer, printer or game console
node
in binary language, each letter or the alphabet, number and special symbol is made up of a unique combination of eight _______
bits
the amount of RAM storage is measured in ______
gigabytes
software than enables you to display and interact with text and other media on the web is a web ______
browser
the actual speed of data transfer that is received between two nodes on a network and is always less than or equal to the data transfer rate
throughput
smallest unit of measure
megabyte
uses electric memory and has no motor or moving parts
solid-state drive
some of the responsibilities of _____ are installing new hardware and software on the network and monitoring performance
network administrators
a keyboard and touch screen are the most common of ______ devices
input
not an example of cloud storage
flash drive
the unique identification number assigned to your computer when you connected to the internet in NOT known as a ______
path
a network architecture that spans the largest physical distance
WAN
the concept of the internet was developed by the U.S. Department of Defense as a network that ______ in the event of an attack
would not be disrupted easily
action perpetrated primarily through the use of a computer
cybercrime
individuals who use computers, networks, and the Internet to perpetrate crime
cybercriminal
common types of cybercrimes
FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud
break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses
white-hat hacker
break into systems to destroy information or for illegal gain
black-hat hacker