ITEC Flashcards
refers to the physical elements of a computer. This is also
sometimes called the machinery or the equipment of the computer.
Hardware
commonly known as programs or apps, consists of all the
instructions that tell the hardware how to perform a task. These
instructions come from a ____ developer in the form that will be
accepted by the platform (operating system + CPU) that they are based
on.
Software
Helps run the computer hardware and computer
system itself. It includes operating systems, device
drivers, diagnostic tools and more. ______ is almost always preinstalled on your computer.
System software
Allows users to accomplish one or more tasks. It
includes word processing, web browsing and almost any other task for
which you might install software.
Application software
A ______ is a type of software that manages data files in a computer system. It has limited capabilities and is designed to manage individual or group files, such as special office documents and records. It may display report details, like owner, creation date, state of completion and similar features useful in an office environment.
file management system
A file management system is also known as a
file manager
is the process of using computing
techniques and technologies to transmit or transfer
electronic or analog data from one computer node to another.
Data transfer
Data is transferred in the form of _______ over a digital or analog medium, and the process enables digital or analog communications and its movement between devices
bits and bytes
Data transfer is also known as
data transmission
refers to protective digital privacy measures that are applied to prevent unauthorized
access to computers, databases and websites. It also protects data from corruption. ___
is
an essential aspect
of
IT
for
organizations of every size and type.
Data
security
Data security is also known as ____ or ____.
information security
(IS) or computer security
A _____, in computing, is a group of two or more
devices that can communicate. In practice, a _____
consists of a number of different computer
systems connected by physical and/or wireless
connections. The scale can range from a single PC
sharing out basic peripherals to massive data centers
located around the World, to the Internet itself.
Regardless of scope, all networks allow computers
and/or individuals to share information and resources.
network
______ is a maintenance strategy
driven by predictive analytics. The solutions are
used for detecting failure patterns or anomalies,
but are only deployed when there is high
probability of imminent failure.
Predictive maintenance
This helps in
deploying limited resources, maximizing device or
equipment uptime, enhancing quality and supply
chain processes, and thus improving the overall
satisfaction for all the stakeholders involved.
Predictive Maintenance
The process of buying and selling
online or electronically. This term may refer to
online retail as a whole, or more specifically the
transaction type.
E-commerce
A business that has a physical store that customers
can go to rather than just having an online
presence.
Brick and Mortar
The process of selling services or products to
another business, which typically then sells to the
consumer.
Business to Business (B2B)
The process of selling services or products directly from the business to
the consumer
Business to Consumer (B2C)
Typically a slogan or phrase, this is the action you are persuading the user
to take. Sometimes it can be “shop now, buy today, get a quote,” or
typically anything that leaves the audience with something to do. The
call-to-action is often the instruction on what to do next, such as placing
an order or inquiring further
Call-to-Action
Arguably one of the most crucial part of E-commerce.
Conversion
The ___ is
the process of transforming or “converting” the user to a customer. This
is not always a financial transaction. Often, the ____ takes place
when a visiting user requests a quote, fills out a contact form, or places
an order. It can be revenue driven, but not necessarily. The _____
depends solely on what your organization has decided to track
Conversion
The ______ often referred to as a “sales funnel,” is the path the
visitor takes until the end conversion. It is called a funnel, because there
is a larger surface area for users to enter the _____ (meaning
there are multiple entrance points) but it still takes users to the same end
point or conversion.
Conversion Funnel
These are text files sent to a user’s browser related to how the customer
interacts with the website. Often users will get a pop-up that requests
that the user “shares ___.” After confirmation, the information in
these text files is sent back over to the server, based on how the user
responded and interacted with the site.
Cookies
The number of visitors who transformed into paying customers divided
by the total number of visits to the page overall.
Conversion Rate
this day has more deals and
discounts than any other day of the year. Some claim in the last few years
that ____ has exceeded Black Friday in overall sales
Cyber Monday
The main page or main URL for a website. This is often the “homepage”
or root portion of the web address.
Domain
One of the most popular eCommerce sites that allow sales to occur between consumers in an auction format. In this particular site, one consumer takes on the role of “seller,” and the other user is the “buyer.”
There are many online merchants who also sell through ___ as an
alternative sales channel to their own site
eBay
Engaging your audience with products and services promoted through
email. These email lists usually consist of users that have signed up or
expressed an interest in the site or organization
Email Marketing
Digital media piracy is a prominent unethical
practice undertaken with computers. Piracy is the
illegal distribution of music, movies, books and
other intellectual media. Because the internet is
such a vast network, catching pirates is not always
easy. Piracy is an illegal infringement on copyrights
held by the owners of the media. Businesses using
information obtained through piracy may receive a
cease-and-desist letter from the media owner at the
very least. Fines and legal recourse may follow.
Media Piracy
A
common example of ___ occurs when a
business uses a well-known song for an instructional
or promotional YouTube video without obtaining the
rights or providing proper attribution.
media piracy
is an illegal infringement on copyrights
held by the owners of the media.
Piracy
Thieves like to use the anonymity of the internet to attack businesses. By
hacking into a company’s main server, cyber attackers can hold a
business hostage. This type of cyber
attack can happen to any business or organization anywhere in the
world. Reducing susceptibility to this unethical computer use requires
constant updates to server security platforms including protection from
spyware, malware and viruses.
Ransom ware Attacks
The hacker encrypts the entire website, shutting the
business down until the business owners pay the hackers a fee – the
ransom – in what is called a ____ attack.
denial-of-service
Along with protecting a business against ransomware, businesses must
protect consumer information. ____ concerns consumers.
Companies of all sizes are susceptible to data breaches. Major companies
from leading industries have been hacked with consumer personal
information stolen. Hackers obtain everything from names, dates of birth
and Social Security information to addresses and other contact
information that is used to create phony accounts. Not properly
protecting private information is costly to businesses and can result in
legal fines and private lawsuits.
Identify Theft
Some hackers don’t steal the information but
instead hack systems to divert financial information
input away from the company to steal money. For
example, a hacker might redirect the donation
system of a non profit organization and have the
money sent to an offshore account controlled by
the hacker. This unethical practice essentially tricks
a website buyer into thinking a website transaction
is complete when, in fact, the business never gets
notice of the sale, and the money is lost offshore
Financial Theft
Competitors use any number of methods to gain
access to proprietary information that other
companies pay millions to develop. Theft often
includes patented or patent-pending information.
____ is often achieved by
internal moles or contract workers who have access
to a company’s computer server. While security
protocols with virus protection usually help prevent
external theft, it is difficult to protect against
internal infractions.
Intellectual Property Theft
allows a party who believes that his
copyright has been infringed to send a notice of infringement demanding
that the website host remove the content.
Digital Millennium Copyright Act
The “safe harbor” provisions of
the DMCA protect Internet service providers and website hosts from
liability associated with copyrighted material that may be posted on their
website by third parties.
Digital Millennium Copyright Act
one of the major modern copyright laws governing the use
of copyrighted material over the Internet.
Digital Millennium Copyright Act
The ___ provisions of
the DMCA protect Internet service providers and website hosts from
liability associated with copyrighted material that may be posted on their
website by third parties.
“safe harbor”
A ,___ is an electronic device that accept data (input) and, process data arithmetically and logically, produce information (output).
computer
input
data
output
information
It includes not only the computer proper but also the cables, connectors, power supply units, and peripheral devices such as the keyboard, mouse, audio speakers, and printers.
Hardware
is also called components.
Internal Hardware
It includes:
CPU
Motherboard
RAM > ROM
Internal Hardware
It is the brains of the computer. Most of calculations take place here.
Two typical components of a are Arithmetic Logic Unit (ALU) Control Unit (CU)
Central Processing Unit
(CPU)
Is the main circuit board of a microcomputer. It contains the CPU, memory, expansionbslots and all the controllers required to control standard hardware devices.
Motherboard
is the place in a computer where the operating system, application programs, and data in current use are kept.
It is a temporary memory and can be compared to a person’s short-term memory
RANDOM ACCESS MEMORY (RAM)
is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to. It contains the programming that allows a computer to start up or regenerate each time it is turned on.
Read-only memory, or ROM
consists of external devices by which we give information and instructions to the computer.
Input Hardware
Examples:
Keyboard
Mouse
Scanner
Input Hardware
The set of typewriter-like keys that enables you to enter data into a computer
Keyboard
A device that controls the movement of the cursor or pointer on a display screen
Mouse
A device that can read text or illustrations printed on paper and translate the information into a form the computer can use.
Scanner
consists of internal and external devices that transfer information from the computer’s CPU to the computer user.
Output Hardware
Examples:
Monitor
Printer
Speaker
Output Hardware
A display screen used to present output from computer video camera, VCR or other video girerator
Monitor
a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5” by 11” sheets of paper.
Printer
allow hardware devices to communicate with each other.
Connecting Hardware
Examples:
Modem
LAN Card
Connecting Hardware
connect a personal or portable computer to dial-up networks through a regular telephone line
Modems
A _________ card is used to provide wireless Internet access to computer users in home or roamingbnetworks.
Local Area Network (LAN)
A computer ______ is any type of hardware that stores data.
Storage Hardware
Examples:
Hard disc
Floppy Disc
CD ROM
Storage Hardware
A magnetic dak on which you can store computer data. The term __ is used to distinguish it from a soft, or Floppy disk.
Hard Disc
A flexible plastic disk coated with magnetic material and covered by a protective jacket, used primarily by computers to store data magnetically
Floppy Disc
___ is a CD that can be mad by a computer with an optical drive
CD-ROM
A set of instructions that enables physical components of a computer to work in a synchronize way is known as .
Software
Computers cannot do any useful work without instructions from
Software
This set of instructions is often called a ____
program
helps in running the computer hardware and the computer system
System software
Examples:
Operating systems
Device drivers
System Software
is a computer program allowing higher-level computer programs to interact with a hardware device
Device Driver
An ___ is an interface between hardware and user; it is responsible for the management and coordination of activities and the sharing of the limited resources of the computer.
Operating System
is computer software designed to help the user to perform specific tasks.
Application Software
It allows one to surf the Web. Example
Google
Internet Explorer
Web Browsing Software
Allows users to create, edit a document.
Example: MS Word
Word Processing Software
Allows users to create document and perform calculation
Example: MS Excel etc
Spreadsheet Software
Allows users to store and retrieve vast amount of data.
Example: MS Access etc.
Database Software