1. what module is ag-
Module 1
gregate functions,
sql, and erd
2. Intro to Analyzing
Module 2
and Visualizing data
3. Automating Data
Op- erations Module 3
4. Cybersecurity-Of-
fense and Defense Module 4
5. Input Information or data sent to the computer for
process- ing
6. Process set of instructions (programs) run by
computer
7. output anything that comes out of the computer
8. storage the ability to record and/or retain digital data
9. How computers work input-> Process-> output
^^
| -storage |
10. computer stack user-application-operating system-Hardware
( software ) (Hardware)
11. Hardware Key CPU, RAM, cache, secondary storage, mother-
compo- nents board, graphics card, network interface,
system bus
12. restaurant analogy
the whole restaurant the computer "housing"
13. restaurant analogy
waiter system bus- communication channels, allow
compo- nents to talk to each other
14. Bus speed
1/
6
, MIS 2113 Exam 4 questions well answered already passed graded A+
Measured in megahertz (MHz)
The higher the speed the faster your
computer Typical value 100 MHz
15. Restaurant analogy CPU- executes instructions pulling ingredients
Head chef from the various places in the kitchen
16. restaurant analogy Motherboard- houses/connects all the action
Kitchen
17. restaurant analogy Cache- very small, and very fast, for storing
spice rack frequent- ly used instructions on the cpu
18. restaurant analogy RAM- stores things that are currently being
refrigerator used in "recipes"
19. Restaurant analogy Secondary storage- Disk storage has lots of
warehouse space, will survive if power is cut
20. Types of Spinning disk- "hard drive"
secondary storage (slower,larger,cheaper) Solid state drive
Flash storage- Faster,smaller,expensive
21. cybersecurity the state of being protected against the
criminal or
unauthorized use of electronic data, or the
measures taken to achieve this
22. SMiShing Utilizing text messaging to phish information
from a
user
23. what could happen if malware/ viruses
you use a malicious modern ware/
program or a Stuxnet
phishing email Ransomware
Keylogger
24. social engineering obtaining confidential information by
manipulating
2/
6