Unit 2 Flashcards
Central Processing Unit (CPU)
Central processor: Brain and director of the computer.
Random Access Memory (RAM)
Fast and short term working memory that allows data to be accessed in any order without accessing storage media such as hard drives. known as primary storage.
Client/Server relationships
information( apps, databases, documents) stored in central server computer. serves client computers that are connected to it, can be connected by wire or cloud.
Network interface card (NIC)
connects a computer to a network
Three types of computer software are?
Application software ( MS word, MS excel) System software (MS windows, MacOS) Utility software (antivirus protection, printer drivers)
Mainframe computers
massive, room sized computers process and stores enormous amounts of bulk data and information. typically used by credit card processors.
Midrange computers
less powerful and smaller in physical size. do the same things, just on a smaller scale
Virtual Memory
is a section of a hard disk that mimics a computers RAM. Plays an important role in the OS by allowing end users to run more apps than the system has physical RAM to support.
Cache Memory
faster that the RAM but has minimal storage capacity. The CPU stores more frequently used data in the cache memory so that the cpu can access the data faster.
Registers
smallest and fastest type of memory. they are built into the CPU itself and hold the instructions or operands that are currently being accessed by the CPU
Six components of an IT infrastructure
hardware, software, networks, data information system, people and processes.
What is the defining characteristic of application software?
It performs a specific task for the user.
Which software supports a computer’s basic functions such as scheduling software tasks, executing applications, and controlling peripherals?
Systems software
Which type of memory plays an important role in a computer’s ability to perform multitasking?
Virtual memory
Infrastructure
is the underlying foundation or basic framework for something
Process
Any task a computer does is called a process. when a computer does more than one processes at a time it is called multitasking.
Spreadsheets
is a file that consists of rows and columns of data that can be manipulated and analyzed for business purposes. Examples include.. Microsoft Excel and Google Sheets
Word Processor
is an application software used to create, compose, edit, format, and print documents. examples include MS word and google docs
Database System Management Software
(DBMS)
is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information. The data retrieved by these queries become information that can be used to make business decisions.
Copy and Paste
allows the user to select data in one application (source data), copy the data into temporary memory, switch to a different application, and then paste the data into the desired application
Object Embedding
allows a user to select an entire area from one application and a part of another. A budget spreadsheet (source file), for example, can be embedded in a proposal document (destination file). Object embedding is static and only takes a snapshot.
Object Linking
When the source file is linked into the destination file, both files stay up to date. Unlike object embedding, which simply takes a picture, object linking is a dynamic link where both files are current and editable.
4 basic components of a network
NIC(ethernet card), network protocol(TCP/IP), physical cable that connects them(twisted pair), network hub(serves as a traffic cop)
Computer Security
is concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system.
Computer files that infect IT systems and reproduce like a biological virus by making copies of themselves within a host, such as a computer’s memory or storage or on a network. (Virus)
Requires a host program.
Causes system failure, corrupts data, steals personal information.
A program that uses networks to travel by sending copies of themselves to other parts of the network without a user’s knowledge or intervention. (Worms)
Does not require a host program.
Causes system failure, corrupts data, steals personal information.
A program that misleads users of its true intent. When executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system. (trojan horse)
Spread through social engineering (i.e. harmful email attachments, fake advertisements, etc.)
A program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent (spyware)
Secretly monitors a user’s keystrokes and behavior.
A program that automatically displays or downloads advertising to a computer. (Adware)
Less malicious than other malware.
Generates revenue for its developer by generating online advertisements that users may click on. Comes in the form of a static box display, a banner display, a video, or pop-up ad.
A program that uses an electronic email system to arbitrarily send millions of unsolicited bulk messages to various users and accounts. (spamming)
Most often used through email; can also be found in text messaging, and mobile apps.
A program that simply records every keystroke made at the workstation’s keyboard (keylogging)
Used to record sensitive login information such as a login ID, password, or any other sensitive information.
Click Fraud
Fraudulent schemes have been developed by hackers by writing programs inserted into advertising network websites that automatically pass a user to the advertiser whether they had any intention of visiting or not, and subsequently collecting the per-click fee.
Phishing
criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details, by masquerading as a legitimate business organization, typically in a legitimate-looking email.
Data and information exchange software and techniques
can be categorized as electronic computing tools
collaborative software and techniques
can be categorized as management tools