Essen als/ Western Governors University Business
Admin IT Class Vocab for JZV1 100% VERIFIED CORRECT
NEW!!
Adware
Programs that automa cally display or download adver sing to a computer.
Applica on So ware
So ware that is designed for the user to carry out a specific task.
Best Prac ce
A management process, technique, or method that is most effec ve at arriving at a desired
outcome or a be#er outcome than any other process, technique, or method.
Big Data
Data that is collected from all over the internet, including smartphone metadata, internet usage
records, social media ac vity, computer usage records, and countless other data sources.
Bus Topology
A network topology some mes called a linear bus, where each of a network's nodes is
connected to a common linear backbone that has two endpoints.
Business Analy cs
A#empts to make connec ons between data so organiza ons can try to predict future trends
that may give them a compe ve advantage.
Business Intelligence (BI)
Strategies and technologies used by enterprises for the data analysis of business informa on.
Cache
A hardware or so ware component that stores data so that future requests for that data can be
served faster.
Campus Area Network (CAN)
A computer network that connects two or more LANs that are located on a campus.
,Chief Informa on Officer (CIO)
A job tle for the board-level head of an informa on technology department within a business
organiza on. The CIO's job is to make sure IT assets are in place to ensure a smooth transi on.
Chief Informa on Security Officer (CISO)
The CISO is generally focused on the security of an organiza on's data and informa on, making
sure it is backed up, deciding who gets to see it and who does not, and so on.
Chief Security Officer (CSO)
A CSO is in charge of such things as the physical security and safety of employees, facili es, and
corporate assets and may have a law enforcement background.
AD
Chief Technology Officers (CTO)
The CTO runs the organiza on's IT engineering group and serves as the company's top
technology architect.
Click Fraud
An internet fraud scheme that automa cally passes a user to an adver ser, whether they had
any inten on of visi ng or not, in order to collect a per-click fee.
Clients
An end user's computer in a computer network.
Computer Network
Two or more computers connected together to communicate and share resources.
Cybersecurity
The convergence of technologies, sound prac ce, and processes designed to protect networks
and their devices, programs, and data from a#ack or unauthorized access.
Data Analysis
The applica on of sta s cs and logic techniques to define, illustrate, and evaluate data.
Data Management (DM)
The prac ces, architectural techniques, and tools for achieving consistent access to and delivery
of data across the spectrum of data subject areas and data structure types in the enterprise.
, Data Management Processes
The process of acquiring data, making sure the data are valid, and then storing and processing
the data into usable informa on for a business.
Data Mapping
Extra notes about the defini on of a field, its data, and its use.
Data Mining
The examina on of huge sets of data to find pa#erns and connec ons and iden fy outliers and
hidden rela onships.
AD
Database Administrators (DBAs)
DBAs categorize data requirements and create the database en es and models that ensure
accurate and smooth-flowing informa on throughout a business.
Database Management System So ware (DBMS)
An applica on so ware that is used to create a collec on of related files that consist of records
of data separated by fields that can be queried to produce popula ons of informa on.
Databases
Well-thought-out collec ons of computer files, the most important of which are called tables.
Default-allow Firewall Rule
A rule that all traffic is allowed unless it has been specifically blocked.
Default-deny Firewall Rule
The only network connec ons that are permi#ed are the ones that have been explicitly allowed.
Denial-of-service
An a#empt to make a computer or any of its resources unavailable to its intended users.
Disk Storage
Nonvola le, secondary storage on a physical device like a hard drive or op cal disk with a
read/write apparatus.
Ethernet Card