2023/2024
First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user. - ~ANSWER Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files. - ~ANSWER
FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the network. - ~ANSWER Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption - ~ANSWER Public Key Encryption PROVING you are who you say you are which can be done by: what you know, what you have! - ~ANSWER Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures - ~ANSWER Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training - ~ANSWER System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP
ADDRESS - ~ANSWER ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users - ~ANSWER Confidentiality Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - ~ANSWER Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application - ~ANSWER THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one dimension - ~ANSWER Slicing Data
The technology used in creating, maintaining, and making information accessible. -
~ANSWER Information Technology
In charge of all aspects of the COMPUTER NETWORKS - ~ANSWER Network Administrator