Unit 2 Flashcards

1
Q

Central Processing Unit (CPU)

A

Central processor: Brain and director of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Random Access Memory (RAM)

A

Fast and short term working memory that allows data to be accessed in any order without accessing storage media such as hard drives. known as primary storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client/Server relationships

A

information( apps, databases, documents) stored in central server computer. serves client computers that are connected to it, can be connected by wire or cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network interface card (NIC)

A

connects a computer to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three types of computer software are?

A
Application software ( MS word, MS excel)
System software (MS windows, MacOS)
Utility software (antivirus protection, printer drivers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mainframe computers

A

massive, room sized computers process and stores enormous amounts of bulk data and information. typically used by credit card processors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Midrange computers

A

less powerful and smaller in physical size. do the same things, just on a smaller scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual Memory

A

is a section of a hard disk that mimics a computers RAM. Plays an important role in the OS by allowing end users to run more apps than the system has physical RAM to support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cache Memory

A

faster that the RAM but has minimal storage capacity. The CPU stores more frequently used data in the cache memory so that the cpu can access the data faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Registers

A

smallest and fastest type of memory. they are built into the CPU itself and hold the instructions or operands that are currently being accessed by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Six components of an IT infrastructure

A

hardware, software, networks, data information system, people and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the defining characteristic of application software?

A

It performs a specific task for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which software supports a computer’s basic functions such as scheduling software tasks, executing applications, and controlling peripherals?

A

Systems software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of memory plays an important role in a computer’s ability to perform multitasking?

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Infrastructure

A

is the underlying foundation or basic framework for something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process

A

Any task a computer does is called a process. when a computer does more than one processes at a time it is called multitasking.

17
Q

Spreadsheets

A

is a file that consists of rows and columns of data that can be manipulated and analyzed for business purposes. Examples include.. Microsoft Excel and Google Sheets

18
Q

Word Processor

A

is an application software used to create, compose, edit, format, and print documents. examples include MS word and google docs

19
Q

Database System Management Software

(DBMS)

A

is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information. The data retrieved by these queries become information that can be used to make business decisions.

20
Q

Copy and Paste

A

allows the user to select data in one application (source data), copy the data into temporary memory, switch to a different application, and then paste the data into the desired application

21
Q

Object Embedding

A

allows a user to select an entire area from one application and a part of another. A budget spreadsheet (source file), for example, can be embedded in a proposal document (destination file). Object embedding is static and only takes a snapshot.

22
Q

Object Linking

A

When the source file is linked into the destination file, both files stay up to date. Unlike object embedding, which simply takes a picture, object linking is a dynamic link where both files are current and editable.

23
Q

4 basic components of a network

A

NIC(ethernet card), network protocol(TCP/IP), physical cable that connects them(twisted pair), network hub(serves as a traffic cop)

24
Q

Computer Security

A

is concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system.

25
Q

Computer files that infect IT systems and reproduce like a biological virus by making copies of themselves within a host, such as a computer’s memory or storage or on a network. (Virus)

A

Requires a host program.

Causes system failure, corrupts data, steals personal information.

26
Q

A program that uses networks to travel by sending copies of themselves to other parts of the network without a user’s knowledge or intervention. (Worms)

A

Does not require a host program.

Causes system failure, corrupts data, steals personal information.

27
Q

A program that misleads users of its true intent. When executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system. (trojan horse)

A

Spread through social engineering (i.e. harmful email attachments, fake advertisements, etc.)

28
Q

A program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent (spyware)

A

Secretly monitors a user’s keystrokes and behavior.

29
Q

A program that automatically displays or downloads advertising to a computer. (Adware)

A

Less malicious than other malware.
Generates revenue for its developer by generating online advertisements that users may click on. Comes in the form of a static box display, a banner display, a video, or pop-up ad.

30
Q

A program that uses an electronic email system to arbitrarily send millions of unsolicited bulk messages to various users and accounts. (spamming)

A

Most often used through email; can also be found in text messaging, and mobile apps.

31
Q

A program that simply records every keystroke made at the workstation’s keyboard (keylogging)

A

Used to record sensitive login information such as a login ID, password, or any other sensitive information.

32
Q

Click Fraud

A

Fraudulent schemes have been developed by hackers by writing programs inserted into advertising network websites that automatically pass a user to the advertiser whether they had any intention of visiting or not, and subsequently collecting the per-click fee.

33
Q

Phishing

A

criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details, by masquerading as a legitimate business organization, typically in a legitimate-looking email.

34
Q

Data and information exchange software and techniques

A

can be categorized as electronic computing tools

35
Q

collaborative software and techniques

A

can be categorized as management tools