100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Summary Information Technology IT Theory

Puntuación
4.0
(1)
Vendido
3
Páginas
15
Subido en
12-01-2018
Escrito en
2016/2017

Provides first-year IBMS Students with all the theory needed to complete the IT exams.

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

¿Un libro?
No
¿Qué capítulos están resumidos?
All chapters needed for all exams
Subido en
12 de enero de 2018
Número de páginas
15
Escrito en
2016/2017
Tipo
Resumen

Temas

Vista previa del contenido

Application software consists of programs that help users solve particular computing problems. applies
the power of a computer to give individuals, workgroups and the entire enterprise the ability to solve
problems and perform specific tasks. Is used throughout the medical profession to save and prolong
lives.
Example: Application software can help sales managers track sales of a new item in a test market.
Application service provider (ASP)
A company that provides software, support and the computer hardware on which to run the software
from the user’s facilities over a network.
ASP risks: sensitive information could be compromised
Application Software for Information, Decision Support and Specialized Purposes
Specialized application software for information, decision support and their purposes is available in every
industry.
Artificial intelligence (AI)
the ability of computer systems to mimic or duplicate the functions or characteristics of the human brain
or intelligence.
Arpanet
A project started by the US department of defense (DoD) in 1969 as both an experiment in reliable
networking and a means to link the DoD and military research contractors, including many universities
doing military-funded research


Business Intelligence
The process of gathering enough of the right info in a timely manner and useable form and analyzing it
to have a positive impact on business strategy, tactics or operations.
Batch processing system
A form of data processing where business transactions are accumulated over a period of time and
prepared for processing as a single unit or batch.
Business-to-consumer (B2C) e-commerce
A form of e- commerce in which customers deal directly with an organization and avoid intermediaries.
B2Me
A form of e-commerce where the business treats each customer as a separate market segment. Typical
B2Me features include customizing a website for each customer, perhaps based on their precious
purchases and personalizes(Electronic) marketing literature.
Business-to-business (B2B) e-commerce
A subset of e- commerce where all the participants are organizations.
Broadband communications
A relative term but generally means a telecommunications system that can exchange data very quickly.
Bluetooth
A wireless communications specification that describes how cell phones, computers, faxes, printers, and
other electronic devices can be interconnected over distance

Concurrency control
A method of dealing with a situation in which two or more people need to access the same record in a
database at the same time
Cascading style sheet (CSS)
A markup language for defining the visual design of a web page or group of pages

, Content streaming
A method of transferring large media files over the internet so that the data stream of voice and picture
plays more or less continuously as the file is being downloaded
Client/server System (architecture)
An approach to computing wherein multiple computer platforms are dedicated to special functions, such
as database management, printing, communications and program execution

9.2 computer Crime
Social engineering
Using one’s social skills to get computer users to provide you with info to access an info system or its
data
Cyberterrorist
Someone who intimidates or coerces a government or organization to advance his or her political or
social objective by launching computer-based attacks against computers, networks, and the info stored
on them
Cracker
A person who enjoys computer technology and spends time learning and using computer systems
Script Kiddie
A cracker with little technical savvy who downloads programs called scripts, which automate the job of
breaking into computers
Insider
An employee, disgruntled or otherwise, working solo or in concert with outsider to compromise
corporate systems
Worms
A parasitic computer program that can create copies of itself on the infected computer or end copies to
other computers via a network
Trojan Horse
A malicious program that disguises itself as a useful application and purposely does something the user
does not expect
Antivirus program Software that runs in the background to protect your computer from dangers lurking
on the internet and other possible sources of infected les
Equipment Theft
during illegal access to computer systems, data can be stolen.
Software privacy
The act of illegally duplicating software
Common methods used to Commit Computer Crimes

Methods Examples

Add, delete, or change inputs to the computer system Delete records of absences from class in a student’s school records

Modify or develop computer programs that commit Change a bank’s program for calculating interest to make it deposit
the crime rounded amounts in the criminal’s account

Alter or modify the data *les used by the computer
Change a student’s grade from C to A
system
$10.18
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Reseñas de compradores verificados

Se muestran los comentarios
7 año hace

4.0

1 reseñas

5
0
4
1
3
0
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
zoee1996 Hogeschool van Amsterdam
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
15
Miembro desde
8 año
Número de seguidores
14
Documentos
10
Última venta
3 año hace

3.8

6 reseñas

5
1
4
3
3
2
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes