click below
click below
Normal Size Small Size show me how
Stack #75296
| OSC1 | Definition |
|---|---|
| Compiler | A program that translates a high-level programming language into a machine-language program |
| CPU | Central Processing Unit - Main processing component of a computer system |
| DBMS | Database Management System - a set of programs that control the creation, maintenance and utilization of the databases of an organization |
| Data loss prevention | Off-site redundant storage, removable storage media |
| Decision support systems | Information systems that utilizes decision models, a database, and a decision maker's own insights in an ad hoc, interactive modeling process to reach a specific decision by a specific decision maker |
| DHCP Protocol | Dynamic Host Configuration Protocol, client-server networking protocol, provides mechanism for assigning IP addresses to client hosts |
| Duplexing | In communication, pertains to a simultaneous two-way independent transmission in both directions |
| Encryption | To scramble data or convert it, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients. Similar to enciphering |
| CSMA/CD | Carrier Sense Multiple Access with Collision Detection. Computer logic that transmits and decodes formatted data frames. |
| Fault tolerance | Computers that have multiple central processors, peripherals and system software and that are able to continue operations even if there is a major hardware or software failure |
| File Sharing | File sharing is the practice of making files available for other users to download over the Internet and smaller networks |
| Hard Drive Recovery Systems | Data recovery is the process of salvaging data from damaged, failed, wrecked or inaccessible primary storage media when it cannot be accessed normally |
| Hardening of passwords | Must be 6 or more characters, use of letters, numbers and/or special characters, not a password that would be easy to guess |
| IP Configuration | An IP address (Internet Protocol address) is a unique address that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address |
| Job of Fault Tolerance Systems | Computers that have multiple central processors, peripherals and system software and that are able to continue operations even if there is a major hardware or software failure |
| LAN devices | Computers, terminals and other computerized devices within a limited physical area such as an office, building manufacturing plant or other worksite, connected by a communication network. |
| MAC Address | In computer networking a Media Access Control address (MAC address) is a unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter, so, for example, the network cards (or built-in net |
| Multi-protocol routers | Has an address database for each protocol it recognizes. Routers exchange information by using one or more routing protocols. |
| NOS Server | Network Operations System Server, software that controls a network and its message, traffic and queues, controls access by multiple users to network resources such as files, including security |
| Novell | nicknamed the "Big Red"[citation needed] is an American software corporation specializing in network operating systems such as Novell NetWare and Linux, secure identity management products, and application integration and collaboration solutions |
| Operating Systems | The main control program of a computer system. It is a system of programs that controls the execution of computer programs and may provide scheduling, debugging, input/output control system accounting, compilation, storage assignment, data management and |
| Widely used Network Protocols | TCP/IP, http, ftp most widely used |
| Proxy Servers | A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services |
| RAID | Redundant Array of Independent Disks, a disk subsystem that is used to increase performance or provide fault tolerance or both. Uses two or more ordinary hard disks and a RAID disk controller |
| Remote Computer Access | Remote administration refers to any method of controlling a computer from a remote location. Software that allows remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system i |
| Routers | A router is a computer networking device that forwards data packets across a network toward their destinations, through a process known as routing. Routing occurs at Layer 3 |
| Scan Disk Utility | SCANDISK or ScanDisk is a utility in MS-DOS and Microsoft Windows systems which checks and repairs filesystems and bad clusters. Also includes Defrag. |
| SCM | Integrating management practices and information technology to optimize information and product flows among the processes and business partners within a supply chain. |
| Security breach – actions | 1. encrypt sensitive information, 2. analyze security architecture, 3. analyze physical storage, 4 determine who has access to system administration |
| Servers | A computer that supports applications and telecommunications in a network as well as the sharing of peripheral devices, software and databases among the workstations in the network. |
| Supply Chain Management | Software that assists in reducing inventory; planning, scheduling and control of the supply chain, which is the sequence or organizations and functions that mine, make or assemble materials and products from manufacturer to wholesaler to retailer to consu |
| Systems analysis | Responsible for user requirements, existing system evaluation and logical system design |
| TCP/IP Host | The Dynamic Host Configuration Protocol (DHCP) is a set of rules used by a communications device such as a computer, router or networking adapter to allow the device to request and obtain an IP address from a server which has a list of addresses available |
| Tracert | traceroute is a computer network tool used to determine the route taken by packets across an IP network. An IPv6 variant, traceroute6, is also widely available. |
| Types of Desktop Software | Word processing, desktop publishing, spreadsheets, presentation graphics, personal information management, groupware |
| Unix | A multi-user, multi-tasking operating system that is widely used as the mater control program in workstations and servers. The Unix OS is made up of the kernel, file system and a shell, which is the command line interface with more than 600 commands |
| VPN – Virtual Private Network | Private communications network usually used within a company or by several different companies organizations to communicate over a public network – encrypted and used over world wide web. |
| Web Browser | A web browser is a software application that enables a user to display and interact with text, images, and other information typically located on a web page at a website on the World Wide Web or a local area network |
| Web Master | A person whose occupation is designing, developing, marketing or maintaining websites. |
| Common Gateway Interface | Relatively compact program written in a language such a Perl, C or C++ that processes data on a Web server. It is commonly used to process a query from the user that was entered on an HTML page and returned as an HTML page, in which case the CGI script |
| Change Management | Managing the process of implementing major changes in information technology, business processes, organizational structures and job assignments to reduce the risks and costs of change and optimize its benefits. |
| Configuration Management | On the network – system for gathering current configurations of nodes on the LAN. In software development – system for keeping track of versions of code / settings in software |