100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Information Technology IT Theory

Rating
4.0
(1)
Sold
3
Pages
15
Uploaded on
12-01-2018
Written in
2016/2017

Provides first-year IBMS Students with all the theory needed to complete the IT exams.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Study
Course

Document information

Summarized whole book?
No
Which chapters are summarized?
All chapters needed for all exams
Uploaded on
January 12, 2018
Number of pages
15
Written in
2016/2017
Type
Summary

Subjects

Content preview

Application software consists of programs that help users solve particular computing problems. applies
the power of a computer to give individuals, workgroups and the entire enterprise the ability to solve
problems and perform specific tasks. Is used throughout the medical profession to save and prolong
lives.
Example: Application software can help sales managers track sales of a new item in a test market.
Application service provider (ASP)
A company that provides software, support and the computer hardware on which to run the software
from the user’s facilities over a network.
ASP risks: sensitive information could be compromised
Application Software for Information, Decision Support and Specialized Purposes
Specialized application software for information, decision support and their purposes is available in every
industry.
Artificial intelligence (AI)
the ability of computer systems to mimic or duplicate the functions or characteristics of the human brain
or intelligence.
Arpanet
A project started by the US department of defense (DoD) in 1969 as both an experiment in reliable
networking and a means to link the DoD and military research contractors, including many universities
doing military-funded research


Business Intelligence
The process of gathering enough of the right info in a timely manner and useable form and analyzing it
to have a positive impact on business strategy, tactics or operations.
Batch processing system
A form of data processing where business transactions are accumulated over a period of time and
prepared for processing as a single unit or batch.
Business-to-consumer (B2C) e-commerce
A form of e- commerce in which customers deal directly with an organization and avoid intermediaries.
B2Me
A form of e-commerce where the business treats each customer as a separate market segment. Typical
B2Me features include customizing a website for each customer, perhaps based on their precious
purchases and personalizes(Electronic) marketing literature.
Business-to-business (B2B) e-commerce
A subset of e- commerce where all the participants are organizations.
Broadband communications
A relative term but generally means a telecommunications system that can exchange data very quickly.
Bluetooth
A wireless communications specification that describes how cell phones, computers, faxes, printers, and
other electronic devices can be interconnected over distance

Concurrency control
A method of dealing with a situation in which two or more people need to access the same record in a
database at the same time
Cascading style sheet (CSS)
A markup language for defining the visual design of a web page or group of pages

, Content streaming
A method of transferring large media files over the internet so that the data stream of voice and picture
plays more or less continuously as the file is being downloaded
Client/server System (architecture)
An approach to computing wherein multiple computer platforms are dedicated to special functions, such
as database management, printing, communications and program execution

9.2 computer Crime
Social engineering
Using one’s social skills to get computer users to provide you with info to access an info system or its
data
Cyberterrorist
Someone who intimidates or coerces a government or organization to advance his or her political or
social objective by launching computer-based attacks against computers, networks, and the info stored
on them
Cracker
A person who enjoys computer technology and spends time learning and using computer systems
Script Kiddie
A cracker with little technical savvy who downloads programs called scripts, which automate the job of
breaking into computers
Insider
An employee, disgruntled or otherwise, working solo or in concert with outsider to compromise
corporate systems
Worms
A parasitic computer program that can create copies of itself on the infected computer or end copies to
other computers via a network
Trojan Horse
A malicious program that disguises itself as a useful application and purposely does something the user
does not expect
Antivirus program Software that runs in the background to protect your computer from dangers lurking
on the internet and other possible sources of infected les
Equipment Theft
during illegal access to computer systems, data can be stolen.
Software privacy
The act of illegally duplicating software
Common methods used to Commit Computer Crimes

Methods Examples

Add, delete, or change inputs to the computer system Delete records of absences from class in a student’s school records

Modify or develop computer programs that commit Change a bank’s program for calculating interest to make it deposit
the crime rounded amounts in the criminal’s account

Alter or modify the data *les used by the computer
Change a student’s grade from C to A
system

Reviews from verified buyers

Showing all reviews
7 year ago

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
zoee1996 Hogeschool van Amsterdam
Follow You need to be logged in order to follow users or courses
Sold
15
Member since
8 year
Number of followers
14
Documents
10
Last sold
3 year ago

3.8

6 reviews

5
1
4
3
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions