Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (32)
Information Technology
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
Hardware
Consists of the physical devices associated with a computer system
Software
The set of instructions that the hardware executes to carry out specific tasks
Central Processing Unit
Computers Brain
RAM
Integrated circuits
Input Devices
keyboard mouse scanner
output device
monitor printer headphones
storage device
DVD memory stick hard drive
Communication device
modem wireless card
Connection Device
Cables USB port
CPU
the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other devices work together
Primary Storage
main memory consists of RAM cache memory ROM that is directly accessible to the central processing unit (CPU)
system software
controls how the various tools work together along with application software
operating system software
windows mac OS Linux
Utility Software
Antivirus screensavers Data Recovery
Application software
performs specific information processing needs
word processing software
microsoft word
spreadsheet
microsoft excel
CPU
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
control unit
Interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions
arithmetic logic unit
Performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers
primary storage
- The computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU
secondary storage
Consists of equipment designed to store large volumes of data for long-term storage
magnetic medium
A secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials
magnetic tape
- An older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium
hard drive
A secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism
OPtical Medium
CDROM, CD-RW, DVD, DVD-ROM, DVD-RW
Input Device
Equipment used to capture info and commands
Communication devices
Equipment used to send information and receive it from one location to another
Dial-up access
Cable
Digital subscriber line
Wireless
Satellite
system software
Controls how the various technology tools work together along with the application
software
Operating system software
Utility software
Application software
Utility Software
Crash-proof
Disk image
Disk optimization
Encrypt data
File and data recovery
Text protect
Preventative security
Spyware
Uninstaller
Application Software
Types of application
software
Browser
Communication
Data management
Desktop publishing
Email
Groupware
Presentation graphics
Programming
Spreadsheet
Word processing
info 210 app a
53 terms
catdrake
MIS Quiz 1
22 terms
gnitty123
ISYS 210 Appendix A
42 terms
CodyDowling38
Appendix A
33 terms
SydneyRae10
Sets found in the same folderMIS Chapter B3
26 terms
jshipowitz
Appendix A. Terms
53 terms
trey_thompson10
APPENDIX A
46 terms
letsgetAAA
Appendix B
20 terms
Do-Boy
Other sets by this creatorISYS Exam 3
68 terms
victoriagerald
Chapter 2 ISYS terms
142 terms
victoriagerald
vocab list 8
33 terms
victoriagerald
Vocab Quiz 7
33 terms
victoriagerald
Verified questionsCOMPUTER SCIENCE
Suppose that a root x in a Fibonacci heap is marked. Explain how x came to be a marked root. Argue that it doesn’t matter to the analysis that x is marked, even though it is not a root that was first linked to another node and then lost one child.
Verified answer
COMPUTER SCIENCE
Prove that a two-input multiplexor is also universal by showing how to build the NAND (or NOR) gate using a multiplexor.
Verified answer
COMPUTER SCIENCE
Use the following ideas to develop a nonrecursive, linear-time algorithm for the maximum-subarray problem. Start at the left end of the array, and progress toward the right, keeping track of the maximum subarray seen so far. Knowing a maximum subarray of A[1..j], extend the answer to find a maximum subarray ending at index j + 1 by using the following observation: a maximum subarray of A[1..j + 1] is either a maximum subarray of A[1..j] or a subarray A[i..j + 1], for some 1 ≤ i ≤ j + 1. Determine a maximum subarray of the form A[i..j + 1] in constant time based on knowing a maximum subarray ending at index j.
Verified answer
COMPUTER SCIENCE
T F It is possible to overload a function template and an ordinary (nontemplate) function.
Verified answer
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Starting Out with Python
4th EditionTony Gaddis
629 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Other Quizlet setsUnit 2 Mastery Quizzes - Ethanol and Lipids
28 terms
CPMA2023
Imaging Midterm
70 terms
melissacont1999
AP Biology: Vertebrates Part II
67 terms
distancerunner
Contraception and Family Plannin
46 terms
okrainskyr16
Related questionsQUESTION
Mobile computing typically relies on the use of some type of battery-powered device.
5 answers
QUESTION
What feature is helpful if you own programs that used to work in older versions of Windows but no longer run under the current Windows version?
2 answers
QUESTION
Why does Marvin recommend that you consider and all-in-one?
9 answers
QUESTION
On a typical television show about detectives, a detective walks into a crime scene, finds a computer, logs in, and searches the file system for evidence. Is this evidence admissible? Why or why not?
4 answers