100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Samenvatting

Summary Information Technology IT Theory

Beoordeling
4,0
(1)
Verkocht
3
Pagina's
15
Geüpload op
12-01-2018
Geschreven in
2016/2017

Provides first-year IBMS Students with all the theory needed to complete the IT exams.










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Heel boek samengevat?
Nee
Wat is er van het boek samengevat?
All chapters needed for all exams
Geüpload op
12 januari 2018
Aantal pagina's
15
Geschreven in
2016/2017
Type
Samenvatting

Onderwerpen

Voorbeeld van de inhoud

Application software consists of programs that help users solve particular computing problems. applies
the power of a computer to give individuals, workgroups and the entire enterprise the ability to solve
problems and perform specific tasks. Is used throughout the medical profession to save and prolong
lives.
Example: Application software can help sales managers track sales of a new item in a test market.
Application service provider (ASP)
A company that provides software, support and the computer hardware on which to run the software
from the user’s facilities over a network.
ASP risks: sensitive information could be compromised
Application Software for Information, Decision Support and Specialized Purposes
Specialized application software for information, decision support and their purposes is available in every
industry.
Artificial intelligence (AI)
the ability of computer systems to mimic or duplicate the functions or characteristics of the human brain
or intelligence.
Arpanet
A project started by the US department of defense (DoD) in 1969 as both an experiment in reliable
networking and a means to link the DoD and military research contractors, including many universities
doing military-funded research


Business Intelligence
The process of gathering enough of the right info in a timely manner and useable form and analyzing it
to have a positive impact on business strategy, tactics or operations.
Batch processing system
A form of data processing where business transactions are accumulated over a period of time and
prepared for processing as a single unit or batch.
Business-to-consumer (B2C) e-commerce
A form of e- commerce in which customers deal directly with an organization and avoid intermediaries.
B2Me
A form of e-commerce where the business treats each customer as a separate market segment. Typical
B2Me features include customizing a website for each customer, perhaps based on their precious
purchases and personalizes(Electronic) marketing literature.
Business-to-business (B2B) e-commerce
A subset of e- commerce where all the participants are organizations.
Broadband communications
A relative term but generally means a telecommunications system that can exchange data very quickly.
Bluetooth
A wireless communications specification that describes how cell phones, computers, faxes, printers, and
other electronic devices can be interconnected over distance

Concurrency control
A method of dealing with a situation in which two or more people need to access the same record in a
database at the same time
Cascading style sheet (CSS)
A markup language for defining the visual design of a web page or group of pages

, Content streaming
A method of transferring large media files over the internet so that the data stream of voice and picture
plays more or less continuously as the file is being downloaded
Client/server System (architecture)
An approach to computing wherein multiple computer platforms are dedicated to special functions, such
as database management, printing, communications and program execution

9.2 computer Crime
Social engineering
Using one’s social skills to get computer users to provide you with info to access an info system or its
data
Cyberterrorist
Someone who intimidates or coerces a government or organization to advance his or her political or
social objective by launching computer-based attacks against computers, networks, and the info stored
on them
Cracker
A person who enjoys computer technology and spends time learning and using computer systems
Script Kiddie
A cracker with little technical savvy who downloads programs called scripts, which automate the job of
breaking into computers
Insider
An employee, disgruntled or otherwise, working solo or in concert with outsider to compromise
corporate systems
Worms
A parasitic computer program that can create copies of itself on the infected computer or end copies to
other computers via a network
Trojan Horse
A malicious program that disguises itself as a useful application and purposely does something the user
does not expect
Antivirus program Software that runs in the background to protect your computer from dangers lurking
on the internet and other possible sources of infected les
Equipment Theft
during illegal access to computer systems, data can be stolen.
Software privacy
The act of illegally duplicating software
Common methods used to Commit Computer Crimes

Methods Examples

Add, delete, or change inputs to the computer system Delete records of absences from class in a student’s school records

Modify or develop computer programs that commit Change a bank’s program for calculating interest to make it deposit
the crime rounded amounts in the criminal’s account

Alter or modify the data *les used by the computer
Change a student’s grade from C to A
system

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
7 jaar geleden

4,0

1 beoordelingen

5
0
4
1
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
zoee1996 Hogeschool van Amsterdam
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
15
Lid sinds
8 jaar
Aantal volgers
14
Documenten
10
Laatst verkocht
3 jaar geleden

3,8

6 beoordelingen

5
1
4
3
3
2
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen