ITEC CONNECT FINAL STUDY GUIDE
Describe Apple OS:
Apple/Macintosh operating systems are designed and distributed by Apple Inc. and are known for being very easy to use. Apple operating systems are found in a variety of digital devices including phones, tablets, and laptops. Macintosh computers are the industry standard for photo editing, film/movie development, graphic design, etc.
A major challenge facing software designers and database managers involved with ERP is that with the Internet of Things, the amount of ___ becomes unmanageable.
Data
Electronic Data Interchange
EDI stands for ____?
Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's ___ .
Heat
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
Memristor
Network ___ Systems are designed to support the sharing of resources including databases, workstations, applications, and resources on a local area network
Operating
A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.
Quantum
virus
Software that infects a computer and is created using computer code is called a computer _____.
What category of management information systems focuses on tracking sales and inventories?
TPS
1. Internet scams 2. cyberespionage 3. information theft
Which of the following are considered cybercrimes?
1. data manipulation 2. data corruption 3. cyberbullying
Which of the following are considered cybercrimes?
data manipulation
Which of the following would be considered a cybercrime?
fiber optic
Which transmission media has the largest bandwidth?
What are word processing programs?
Word processing programs are used to create an assortment of documents. Word processing programs can also be used for desktop publishing, that is, creating documents that are ready for print. Word processing programs can also be used to create basic Web pages that are saved using Hypertext Markup Language (HTML). Common word processing programs include Microsoft Word, Apple Pages, and Google Docs
Zombie
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
To increase Internet transmission speeds and decrease latency (delays), intermediate Internet servers are placed between users and the cloud servers. Portions of the cloud service are downloaded onto the intermediate servers. This is known as ___ computing.
Edge
Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ___ software.
Facial Recognition
cyberbullying
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
prepaid
If you just need a phone for emergencies, you might consider a ___ phone.
What's productivity software?
Productivity software is a specific type of application designed to allow users to work more efficiently. Traditional productivity applications (apps) include Microsoft Office and other business apps. Productivity apps are broken into two categories: productivity apps for individuals and productivity apps for businesses. If there is a specific task to be done there is more than likely a productivity app you can use that will help you to accomplish the task in a more efficiently
IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ___ .
Radiologists
What are applets?
Small application programs that are often utility programs that perform less complex operational functions. Applets are commonly used to execute tasks in the Control Panel of Microsoft Windows
What are spreadsheet programs?
Spreadsheets are used to format and display numbers and text in cells. Common spreadsheet terms include the following: Worksheet: Single page within a workbook Workbook: A collection of related worksheets Cell reference: Identifies the location of a cell in a worksheet Formula: A mathematical operation used to perform calculations Function: Built-in formulas included in a spreadsheet program
The Da Vinci robot, named after the famous artist and inventor, has a magnified 3D high-definition vision system and tiny wristed instruments that bend and rotate far greater than the human hand that allow ___ to perform intricate procedures.
Surgeons
What's the system management tool in the Mac OS?
System preferences
hacktivism
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
bandwidth
The capacity of a particular transmission medium is called its _____.
router
The device that connects 2 networks is a _____.
What are utility programs?
Utility programs are included with both Mac and Windows operating systems. Utility programs perform maintenance type tasks including disk cleanup, file maintenance, file search, system backup and restore
router
connects 2 networks
switch
connects devices within a network
modem
converts analog signals into digital signals and digital signals into analog signals
MAC address
identifies a device within a network
What are the strengths and weaknesses of Apple OS?
-Strengths: Mac computers have a user friendly interface that has a reputation for being very intuitive. The Macintosh operating system is reliable and has relatively few viruses. Mac computers have an attractive design and are the industry standard for photo and video editing because of their outstanding graphics capabilities -Weaknesses: Mac computers are not as widely used and can only use Apple proprietary or licensed software. Apple devices tend to be more expensive. Mac OS X is not the best choice for gamers
Which of the following is true about the Android OS? 1. It's based on the Windows OS 2. It's widely used for smartphones 3. It's a widely used OS for tablet computers 4. It's a widely used OS for iPhones
1, 2, and 3
Select what's true about Nano Robots
1. A machine that can build and manipulate things precisely whose components are at a scale of a nanometer 2. Detect diseases and can repair or manipulate damaged cells 3. Nano Robots get into a patient's body either by implanting or ingestion
Select what's true about robotic medical checkups
1. May help to reduce healthcare costs 2. InTouch Health manufactures medical robots 3. Can be used to perform routine checkups and to access health records
Zombie
A computer controlled by a hacker is called a _____.
What's an operating system?
A computer's platform; the platform of a computer controls all of the functions of a computer. The platform determines which applications can be used on a device
cybercrime
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
Trojan
A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.
What's Android OS?
Android OS is a Google product. Found in a variety of digital devices including phones and tablet computers, and laptops Chromebook computers also use the Android operating system
unlimited
Because of their popularity and bandwidth demands of video streaming, _____ data plans are more expensive than they were in the past.
data
Being able to surf the Web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the United States.
When talking about business decision making, the acronym BDA stands for _____.
Big Data Analytics
Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.
Blockchain
Using a corporation's data in real-time requires effective data management strategies for developing advanced analytics. This is a fundamental part of ___ .
Business Intelligence (BI)
ERP
Business management software that encompasses nearly all business activities in a corporation is called ___ software.
AviCenna is smart software is being developed by IBM that will be used to assist radiologists with interpreting medical images such as ___ .
CT Scans
Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.
Diabetes
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically, this could store gigabytes of data within a cubic millimeter.
Holographic
Named for the man in Greek mythology who flew too close to the sun, the ___ drone can deliver urgent medical supplies to remote areas
ICARUS
Popular free and open-source software made by Linus Torvalds:
Linux
What's Linux OS?
Linux is free and open-source software that can be used and modified by anyone for free. Linux is the most common OS on servers, mainframes and supercomputers. Linux is also the underlying OS for most video game consoles and embedded computers as well as the underlying software for the Android OS
The field of study that gives computers the ability to learn without being explicitly programmed is called ___ .
Machine Learning
white hat
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hackers.
What are presentation programs?
Presentation programs aid in creating visual aids that can be projected on a screen or displayed on a digital display. Common Presentation Program Terms Include: Slide Slide Show Slide Master Speaker Notes
dual-band
Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.
1. line charges 2. data charges 3. taxes and surcharges
Select the expenses found on a typical cell phone bill.
using a cellular data plan
Select the methods of connecting a Smartphone to the Internet.
Pulsed laser technology called lidar to detect and monitor the environment is an integral part of ___ .
Self-driving trucks
Verizon
Sprint, T-Mobile, ATT & ___ are the major national cell phone providers in the U.S.
Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called ___ software:
System
Verizon, ATT, T-mobile, Sprint
The major U.S. cell phone providers.
cyberattack
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
What's a control panel?
The system management tool in the Windows operating system. System management tools allow you to change computer settings, manage tasks, install and uninstall programs and many other options
modulator-demodulator
The word modem stands for ____.
When referring to management information systems, TPS stands for ___ processing systems:
Transaction
5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ___ microwave signals.
Weaker
macro virus
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
EDI
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
Name some popular OSs:
Windows OS - most common for personal computers Mac OS - used on Apple computers Android OS - most common phone OS iOS - Operating system used on iPhones
Describe Windows OS:
Windows operating systems are used in a variety of Microsoft's digital devices including desktops, laptops, phones, and tablet computers. Windows 10 is the latest version of Windows. Windows is owned by Microsoft
What are the strengths and weaknesses of Android OS?
-Strengths: Designed by Google, the Android operating system is the world's most popular operating system for phones and tablet computers. Because it is designed by Google, the Android OS works well with Gmail and other Google products -Weaknesses: Many believe that the Apple iPhone operating system is easier to use. Applications on Android phones can be obtained easily and for free, but one of the consequences is the frequency of advertising while using the app
Google and Novartis International Global Healthcare Company teamed up to create a smart contact lens that can help patients with ___ .
Diabetes
Natural language processing is when computers can understand human speech exactly as it is spoken. This is a major challenge being addressed by ___ .
Artificial Intelligence (AI)
Consisting of a network of 500 sensors used to collect data to improve quality of life, The Array-of-Things in the city of ___ feeds data such as pollution levels and traffic patterns to an open site on the Internet.
Chicago
What are the strengths and weaknesses of Linux OS?
-Strengths: Open source software that can be modified by users and is very secure. Free to download and use. Less susceptible to viruses -Weaknesses: Linux takes time and dedication to learn. There are some issues with program compatibility, making it difficult to run some programs when using Linux. There are many different companies that offer Linux-based OS
What are the strengths and weaknesses of Windows OS?
-Strengths: Windows personal computers are by far the most popular computers in the world and are used by most businesses and government agencies; they have the most available software and often the best prices since there's more. -Weaknesses: they are not as intuitive or as easy to use as Macintosh computers and that they are more prone to viruses and other computer problems than Macintosh computers
switches
1. Switches connect computers and other devices within a network 2. Switches are usually integrated in the routers of home networks 3. Switches ensure that correct data is transferred to and from the appropriate devices in networks
dual band routers
1. can transmit Wi-Fi signals in the 2.4 GHz frequency range 2. can transmit Wi-Fi signals in the 5.0 GHz frequency range 3. minimizes the impact of interference from microwave ovens and car alarms
characteristics of a router
1. connects network 2. provides hardware firewall protection 3. usually incorporates a switch
Reasons you might purchase a prepaid phone.
1. no long term contracts 2. useful if you just need a phone for calling or texting 3. useful if you just need a phone for emergencies
characteristics of a modem.
1. usually provided by the ISP 2. converts analog signals into data signals 3. converts digital signals into analog signals
black
A _____ hat hacker breaks into computer systems with the intent of causing damage or stealing data.
What are database programs?
A database is an organized collection of data. Database management software combines structuring data with tools to manage the data. Common Database Terms Include: Field Record Query Primary Key Form Report
worm
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
Botnet
A group of compromised computers controlled by a hacker is called a _____.
Hacker
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
Cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
MAC
A switch distinguishes between various devices within a network by their __ addresses.
macro
A virus written in a specific language and placed within a document or spreadsheet is called a _____ virus.
Script kiddies
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .
Dash Replenishment Service enables Internet-connected coffee makers to order filters from ___ when supplies are running low.
Amazon
broadband
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal