Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Stack #75296

OSC1Definition
Compiler A program that translates a high-level programming language into a machine-language program
CPU Central Processing Unit - Main processing component of a computer system
DBMS Database Management System - a set of programs that control the creation, maintenance and utilization of the databases of an organization
Data loss prevention Off-site redundant storage, removable storage media
Decision support systems Information systems that utilizes decision models, a database, and a decision maker's own insights in an ad hoc, interactive modeling process to reach a specific decision by a specific decision maker
DHCP Protocol Dynamic Host Configuration Protocol, client-server networking protocol, provides mechanism for assigning IP addresses to client hosts
Duplexing In communication, pertains to a simultaneous two-way independent transmission in both directions
Encryption To scramble data or convert it, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients. Similar to enciphering
CSMA/CD Carrier Sense Multiple Access with Collision Detection. Computer logic that transmits and decodes formatted data frames.
Fault tolerance Computers that have multiple central processors, peripherals and system software and that are able to continue operations even if there is a major hardware or software failure
File Sharing File sharing is the practice of making files available for other users to download over the Internet and smaller networks
Hard Drive Recovery Systems Data recovery is the process of salvaging data from damaged, failed, wrecked or inaccessible primary storage media when it cannot be accessed normally
Hardening of passwords Must be 6 or more characters, use of letters, numbers and/or special characters, not a password that would be easy to guess
IP Configuration An IP address (Internet Protocol address) is a unique address that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address
Job of Fault Tolerance Systems Computers that have multiple central processors, peripherals and system software and that are able to continue operations even if there is a major hardware or software failure
LAN devices Computers, terminals and other computerized devices within a limited physical area such as an office, building manufacturing plant or other worksite, connected by a communication network.
MAC Address In computer networking a Media Access Control address (MAC address) is a unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter, so, for example, the network cards (or built-in net
Multi-protocol routers Has an address database for each protocol it recognizes. Routers exchange information by using one or more routing protocols.
NOS Server Network Operations System Server, software that controls a network and its message, traffic and queues, controls access by multiple users to network resources such as files, including security
Novell nicknamed the "Big Red"[citation needed] is an American software corporation specializing in network operating systems such as Novell NetWare and Linux, secure identity management products, and application integration and collaboration solutions
Operating Systems The main control program of a computer system. It is a system of programs that controls the execution of computer programs and may provide scheduling, debugging, input/output control system accounting, compilation, storage assignment, data management and
Widely used Network Protocols TCP/IP, http, ftp most widely used
Proxy Servers A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services
RAID Redundant Array of Independent Disks, a disk subsystem that is used to increase performance or provide fault tolerance or both. Uses two or more ordinary hard disks and a RAID disk controller
Remote Computer Access Remote administration refers to any method of controlling a computer from a remote location. Software that allows remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system i
Routers A router is a computer networking device that forwards data packets across a network toward their destinations, through a process known as routing. Routing occurs at Layer 3
Scan Disk Utility SCANDISK or ScanDisk is a utility in MS-DOS and Microsoft Windows systems which checks and repairs filesystems and bad clusters. Also includes Defrag.
SCM Integrating management practices and information technology to optimize information and product flows among the processes and business partners within a supply chain.
Security breach – actions 1. encrypt sensitive information, 2. analyze security architecture, 3. analyze physical storage, 4 determine who has access to system administration
Servers A computer that supports applications and telecommunications in a network as well as the sharing of peripheral devices, software and databases among the workstations in the network.
Supply Chain Management Software that assists in reducing inventory; planning, scheduling and control of the supply chain, which is the sequence or organizations and functions that mine, make or assemble materials and products from manufacturer to wholesaler to retailer to consu
Systems analysis Responsible for user requirements, existing system evaluation and logical system design
TCP/IP Host The Dynamic Host Configuration Protocol (DHCP) is a set of rules used by a communications device such as a computer, router or networking adapter to allow the device to request and obtain an IP address from a server which has a list of addresses available
Tracert traceroute is a computer network tool used to determine the route taken by packets across an IP network. An IPv6 variant, traceroute6, is also widely available.
Types of Desktop Software Word processing, desktop publishing, spreadsheets, presentation graphics, personal information management, groupware
Unix A multi-user, multi-tasking operating system that is widely used as the mater control program in workstations and servers. The Unix OS is made up of the kernel, file system and a shell, which is the command line interface with more than 600 commands
VPN – Virtual Private Network Private communications network usually used within a company or by several different companies organizations to communicate over a public network – encrypted and used over world wide web.
Web Browser A web browser is a software application that enables a user to display and interact with text, images, and other information typically located on a web page at a website on the World Wide Web or a local area network
Web Master A person whose occupation is designing, developing, marketing or maintaining websites.
Common Gateway Interface Relatively compact program written in a language such a Perl, C or C++ that processes data on a Web server. It is commonly used to process a query from the user that was entered on an HTML page and returned as an HTML page, in which case the CGI script
Change Management Managing the process of implementing major changes in information technology, business processes, organizational structures and job assignments to reduce the risks and costs of change and optimize its benefits.
Configuration Management On the network – system for gathering current configurations of nodes on the LAN. In software development – system for keeping track of versions of code / settings in software
Created by: dcolum
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards