ITEC CONNECT FINAL STUDY GUIDE

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Describe Apple OS:

Apple/Macintosh operating systems are designed and distributed by Apple Inc. and are known for being very easy to use. Apple operating systems are found in a variety of digital devices including phones, tablets, and laptops. Macintosh computers are the industry standard for photo editing, film/movie development, graphic design, etc.

A major challenge facing software designers and database managers involved with ERP is that with the Internet of Things, the amount of ___ becomes unmanageable.

Data

Electronic Data Interchange

EDI stands for ____?

Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's ___ .

Heat

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

Memristor

Network ___ Systems are designed to support the sharing of resources including databases, workstations, applications, and resources on a local area network

Operating

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.

Quantum

virus

Software that infects a computer and is created using computer code is called a computer _____.

What category of management information systems focuses on tracking sales and inventories?

TPS

1. Internet scams 2. cyberespionage 3. information theft

Which of the following are considered cybercrimes?

1. data manipulation 2. data corruption 3. cyberbullying

Which of the following are considered cybercrimes?

data manipulation

Which of the following would be considered a cybercrime?

fiber optic

Which transmission media has the largest bandwidth?

What are word processing programs?

Word processing programs are used to create an assortment of documents. Word processing programs can also be used for desktop publishing, that is, creating documents that are ready for print. Word processing programs can also be used to create basic Web pages that are saved using Hypertext Markup Language (HTML). Common word processing programs include Microsoft Word, Apple Pages, and Google Docs

Zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

To increase Internet transmission speeds and decrease latency (delays), intermediate Internet servers are placed between users and the cloud servers. Portions of the cloud service are downloaded onto the intermediate servers. This is known as ___ computing.

Edge

Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ___ software.

Facial Recognition

cyberbullying

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

prepaid

If you just need a phone for emergencies, you might consider a ___ phone.

What's productivity software?

Productivity software is a specific type of application designed to allow users to work more efficiently. Traditional productivity applications (apps) include Microsoft Office and other business apps. Productivity apps are broken into two categories: productivity apps for individuals and productivity apps for businesses. If there is a specific task to be done there is more than likely a productivity app you can use that will help you to accomplish the task in a more efficiently

IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ___ .

Radiologists

What are applets?

Small application programs that are often utility programs that perform less complex operational functions. Applets are commonly used to execute tasks in the Control Panel of Microsoft Windows

What are spreadsheet programs?

Spreadsheets are used to format and display numbers and text in cells. Common spreadsheet terms include the following: Worksheet: Single page within a workbook Workbook: A collection of related worksheets Cell reference: Identifies the location of a cell in a worksheet Formula: A mathematical operation used to perform calculations Function: Built-in formulas included in a spreadsheet program

The Da Vinci robot, named after the famous artist and inventor, has a magnified 3D high-definition vision system and tiny wristed instruments that bend and rotate far greater than the human hand that allow ___ to perform intricate procedures.

Surgeons

What's the system management tool in the Mac OS?

System preferences

hacktivism

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

bandwidth

The capacity of a particular transmission medium is called its _____.

router

The device that connects 2 networks is a _____.

What are utility programs?

Utility programs are included with both Mac and Windows operating systems. Utility programs perform maintenance type tasks including disk cleanup, file maintenance, file search, system backup and restore

router

connects 2 networks

switch

connects devices within a network

modem

converts analog signals into digital signals and digital signals into analog signals

MAC address

identifies a device within a network

What are the strengths and weaknesses of Apple OS?

-Strengths: Mac computers have a user friendly interface that has a reputation for being very intuitive. The Macintosh operating system is reliable and has relatively few viruses. Mac computers have an attractive design and are the industry standard for photo and video editing because of their outstanding graphics capabilities -Weaknesses: Mac computers are not as widely used and can only use Apple proprietary or licensed software. Apple devices tend to be more expensive. Mac OS X is not the best choice for gamers

Which of the following is true about the Android OS? 1. It's based on the Windows OS 2. It's widely used for smartphones 3. It's a widely used OS for tablet computers 4. It's a widely used OS for iPhones

1, 2, and 3

Select what's true about Nano Robots

1. A machine that can build and manipulate things precisely whose components are at a scale of a nanometer 2. Detect diseases and can repair or manipulate damaged cells 3. Nano Robots get into a patient's body either by implanting or ingestion

Select what's true about robotic medical checkups

1. May help to reduce healthcare costs 2. InTouch Health manufactures medical robots 3. Can be used to perform routine checkups and to access health records

Zombie

A computer controlled by a hacker is called a _____.

What's an operating system?

A computer's platform; the platform of a computer controls all of the functions of a computer. The platform determines which applications can be used on a device

cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

Trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.

What's Android OS?

Android OS is a Google product. Found in a variety of digital devices including phones and tablet computers, and laptops Chromebook computers also use the Android operating system

unlimited

Because of their popularity and bandwidth demands of video streaming, _____ data plans are more expensive than they were in the past.

data

Being able to surf the Web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the United States.

When talking about business decision making, the acronym BDA stands for _____.

Big Data Analytics

Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.

Blockchain

Using a corporation's data in real-time requires effective data management strategies for developing advanced analytics. This is a fundamental part of ___ .

Business Intelligence (BI)

ERP

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

AviCenna is smart software is being developed by IBM that will be used to assist radiologists with interpreting medical images such as ___ .

CT Scans

Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.

Diabetes

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically, this could store gigabytes of data within a cubic millimeter.

Holographic

Named for the man in Greek mythology who flew too close to the sun, the ___ drone can deliver urgent medical supplies to remote areas

ICARUS

Popular free and open-source software made by Linus Torvalds:

Linux

What's Linux OS?

Linux is free and open-source software that can be used and modified by anyone for free. Linux is the most common OS on servers, mainframes and supercomputers. Linux is also the underlying OS for most video game consoles and embedded computers as well as the underlying software for the Android OS

The field of study that gives computers the ability to learn without being explicitly programmed is called ___ .

Machine Learning

white hat

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hackers.

What are presentation programs?

Presentation programs aid in creating visual aids that can be projected on a screen or displayed on a digital display. Common Presentation Program Terms Include: Slide Slide Show Slide Master Speaker Notes

dual-band

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

1. line charges 2. data charges 3. taxes and surcharges

Select the expenses found on a typical cell phone bill.

using a cellular data plan

Select the methods of connecting a Smartphone to the Internet.

Pulsed laser technology called lidar to detect and monitor the environment is an integral part of ___ .

Self-driving trucks

Verizon

Sprint, T-Mobile, ATT & ___ are the major national cell phone providers in the U.S.

Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called ___ software:

System

Verizon, ATT, T-mobile, Sprint

The major U.S. cell phone providers.

cyberattack

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

What's a control panel?

The system management tool in the Windows operating system. System management tools allow you to change computer settings, manage tasks, install and uninstall programs and many other options

modulator-demodulator

The word modem stands for ____.

When referring to management information systems, TPS stands for ___ processing systems:

Transaction

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ___ microwave signals.

Weaker

macro virus

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

EDI

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

Name some popular OSs:

Windows OS - most common for personal computers Mac OS - used on Apple computers Android OS - most common phone OS iOS - Operating system used on iPhones

Describe Windows OS:

Windows operating systems are used in a variety of Microsoft's digital devices including desktops, laptops, phones, and tablet computers. Windows 10 is the latest version of Windows. Windows is owned by Microsoft

What are the strengths and weaknesses of Android OS?

-Strengths: Designed by Google, the Android operating system is the world's most popular operating system for phones and tablet computers. Because it is designed by Google, the Android OS works well with Gmail and other Google products -Weaknesses: Many believe that the Apple iPhone operating system is easier to use. Applications on Android phones can be obtained easily and for free, but one of the consequences is the frequency of advertising while using the app

Google and Novartis International Global Healthcare Company teamed up to create a smart contact lens that can help patients with ___ .

Diabetes

Natural language processing is when computers can understand human speech exactly as it is spoken. This is a major challenge being addressed by ___ .

Artificial Intelligence (AI)

Consisting of a network of 500 sensors used to collect data to improve quality of life, The Array-of-Things in the city of ___ feeds data such as pollution levels and traffic patterns to an open site on the Internet.

Chicago

What are the strengths and weaknesses of Linux OS?

-Strengths: Open source software that can be modified by users and is very secure. Free to download and use. Less susceptible to viruses -Weaknesses: Linux takes time and dedication to learn. There are some issues with program compatibility, making it difficult to run some programs when using Linux. There are many different companies that offer Linux-based OS

What are the strengths and weaknesses of Windows OS?

-Strengths: Windows personal computers are by far the most popular computers in the world and are used by most businesses and government agencies; they have the most available software and often the best prices since there's more. -Weaknesses: they are not as intuitive or as easy to use as Macintosh computers and that they are more prone to viruses and other computer problems than Macintosh computers

switches

1. Switches connect computers and other devices within a network 2. Switches are usually integrated in the routers of home networks 3. Switches ensure that correct data is transferred to and from the appropriate devices in networks

dual band routers

1. can transmit Wi-Fi signals in the 2.4 GHz frequency range 2. can transmit Wi-Fi signals in the 5.0 GHz frequency range 3. minimizes the impact of interference from microwave ovens and car alarms

characteristics of a router

1. connects network 2. provides hardware firewall protection 3. usually incorporates a switch

Reasons you might purchase a prepaid phone.

1. no long term contracts 2. useful if you just need a phone for calling or texting 3. useful if you just need a phone for emergencies

characteristics of a modem.

1. usually provided by the ISP 2. converts analog signals into data signals 3. converts digital signals into analog signals

black

A _____ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

What are database programs?

A database is an organized collection of data. Database management software combines structuring data with tools to manage the data. Common Database Terms Include: Field Record Query Primary Key Form Report

worm

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Botnet

A group of compromised computers controlled by a hacker is called a _____.

Hacker

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

Cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

MAC

A switch distinguishes between various devices within a network by their __ addresses.

macro

A virus written in a specific language and placed within a document or spreadsheet is called a _____ virus.

Script kiddies

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .

Dash Replenishment Service enables Internet-connected coffee makers to order filters from ___ when supplies are running low.

Amazon

broadband

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal


Set pelajaran terkait

Chapter 2: Characteristic of Culture

View Set

CRM Exam - Part 2.B.2 - Risk Assessments and Mitigation

View Set

175345 Exam Q5&6 Distributive and Procedural Justice

View Set

UWorld NCLEX: Maternity: Labor and Delivery

View Set