Insight
Save
Terms in this set (262)
Network The communication systems that enable connectivity
(two or more devices that connect), data sharing, and
collaboration between different components and
users within the IT infrastructure.
Technology Puts in structure reports, analyses, and info gleaned
to support business
Information Technology Backbone of business.
Central Processing Unit (CPU) Brain of the computer that performs instructions
defined by software
Random Access Memory (RAM) Short term working memory supports the CPU aka
primary storage
Motherboard A circuit board that contains all of the computer
system's main components.
Network Interface Card (NIC) A card that enables one computer to send and
receive data to and from another computer.
USB A type of connection used to attach devices such as
flash drives, scanners, cameras, and printers to a
computer. Attaches peripheral devices to a CPU
,disk drive A device that reads data from and writes data onto a
disk. The disk can be a hard disk - removable or fixed;
a floppy disk. It is an example of an input and output
device.
peripheral device A device that is attached to the computer and aids in
input and/or output.
Midrange Computers Sometimes called minicomputers, midrange
computers are less powerful and smaller in physical
size than mainframe computers, but do many of the
same things, simply on a smaller scale.
Microcomputer Smaller mainframe. Most used in business. A single-
user computer that comes in many forms, such as a
desktop model, a portable laptop/notebook, or a
handheld computer; also called a personal
computer.
computer software The programs and applications that operate on top
of hardware to enable specific functions and
business operations within the IT infrastructure.
Application Software computer software created to allow the user to
perform a specific job or task
system software Consists of the programs that control or maintain the
operations of the computer and its devices.
Utility Software Performs a particular function in the background,
such as virus protection & printer drivers
Software Program that enables the computer to work
Operating system enables and becomes the platform for the app to
work
,object linking and embedding (OLE) Method of sharing and saving data. Software
developed by MS that allows embedding and linking
to documents.
How does a network connect? Client laptop/server (Central CPU).
Device connected to a network Node
Nodes Communicate through wires (Ethernet, cable, fiber
optics)
Examples of radio waves Wifi, celltower
Examples of GPS & satellite radio Satellite
Topology The mapping of a physical network and logical
interconnections between nodes(computers).
Nodes Devices connected as part of a computer network
(cpu, printer, router)
Bus topology node is connected to a common liner backbone that
had two end points
Star topology Radiate around a central node, most common. If
central fails then all will fail
Ring Topology Connected to another node with first and last
computer, data is transmitted in a circular manner
Virus spread themselves attaching to files and infection
webistes, and emails,, disable systems
malware used for financial gain, plant spyware that can
monitor cpu actions
, Dumpster diving searching the trash for important information that can
help gain access to a company's or individual's
important information
Phishing the fraudulent practice of sending emails purporting
to be from reputable companies in order to induce
individuals to reveal personal information, such as
passwords and credit card numbers.
Pharming Reroutes requests for legitimate websites to false
websites
Denial of service cyber attack to make machine or network disrupt
service
tailgaiting "piggy backing" attacker seeing entry to a restricted area that lacks
proper authentiiaction
Cpu worm virus that is self replicating but doesn't attach itself to
an existing program to spread
Trojan horse seems harmless, when executed may release a virus
or worm
Spywear installed covertly on a computer or take control of
system without user knowledge
Adwear adertising typically irritating but not malicious, ads
automatically display on a computer
internet fraud used for fraudent activity in an online setting such as
an email, media board, chat room
cookies TXT files stays on a computer so next time the client
visits the website it fills in the info such as a user id
and password, can be tracked and compromised for
your privacy