DOC PREVIEW
TAMU ISYS 210 - Exam 1 Study Guide

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Two types of people buy computers:Leader- buys new technology as it comes out in hopes that they will give them a competitive edge. Also called a first adapter.ISYS 210 Exam # 1 Study Guide Chapters 1-6Chapters 1-3You need a good attitude when starting anything new.Moore’s Law: computer processing power will double every 18 months. In other words, when you buy new technology, within 18 months something better will have come out.Parts of the computer:- Hardware: physical part of the computero Mainframeo Midrangeo Microcomputer Laptops Desktops Handhelds- Software: collection of computer programs that accomplish a specific tasko Application- set of one or more programs designed to carry out operations for a specific application.o System- type of computer program that is designed to run a computer's hardware and application programs. Requires less interaction.- Operating System or “Platform”- collection of computer programs that work together to manage hardware and software to make sure they are working properlyo The platform is the groundwork for all system software and performs jobslike allocating memory, administrating input and output, and file management.o Popular Operating systems include Windows, Mac OS, Linux, and UNIX.o Different kinds of operating systems include: Real Time OS- Has to stay up to date every second. Used by 911, government security agencies, airline reservations, banks, etc. Multi-User Operating System- multiple people can be on at the same time. Single User- can only be accessed by one person at a time Single User Multi-Tasking- this is the one everyone uses todayTwo types of people buy computers:o Leader- buys new technology as it comes out in hopes that they will give them a competitive edge. Also called a first adapter.o Follower- abstains from buying new technology and wait for it to improve from its original version, understanding that there is no competitive advantage to be gained.Volatile memory: The data is lost on reboot. Not savedNonvolatile memory: data that is saved on a hard drive, USB, disk, etc.RAM: Primary storage that can be accessed in any order without physical movement which makes it very fast, and where “work’ is done. Information in RAM must be saved to secondary storage to be used again.Input is data and information that enters a computer system and is subsequently translated for processing.Ex. Typing a resume, scanning a picture.Output is data and information that exits a computer system and is translated for human comprehension. Output’s data and information has many forms like a printed document, an image on a screen, or music playing from speakers.In the maintenance of file systems, defragmentation is a process that reduces the amount of fragmentation. It does this by physically organizing the contents of the mass storage device usedto store files into the smallest number of contiguous regions (fragments).Networking: two or more computers connected together to share resources. Resources include software, storage, hardware, and the Cloud.Chapters 2-6Computers are binary, made up of two parts: o Positive or negative charges on the hard drive.o Represented by 1s and 0s.o Any file on a computer is converted to 1s and 0so A 1 is a bit and a 0 is a bit. When 8 bits are combined they become a byte.o Bytes can be combined to represent characters.o These 1s and 0s are called Machine CodesThere are many different kinds of storage. When deciding which kind to use consider the following:o Capacity: how much data needs to be saved and backed up?o Access Time: how long does it take to get my data and info back?o Security: who gets to see my data and info?o Cost: what does it cost to back up my data and info?o Disaster Recovery: if there is a natural disaster will I still be in business?o Also consider how old the storage system is.Application Software:o Word Processor: for creating, updating, and editing documents. (Word)o Spreadsheets: interface of information in a grid form. Separated by columns and rows. Often for financial calculators. Provides a “what if” scenario. (Excel)o Database Software: well thought out collection of files. Consists of records. One of the most commonly used applications in business. (Access)o Presentation Software: Displays information in a slideshow. Projected for an audience. Allows users to include pictures, texts, graphs, and video. (Powerpoint)o 1-6-6 rule in Powerpoint.  1 idea per slide. No more than 6 bullets per slide. And no more than 6 words per bullet.Murphy’s Law: anything that can go wrong WILL go wrongBest Practices: things that a business should do to be successful, or a management process, technique, or method that is most effective at arriving at a desired outcome, or best outcome than any other process, technique, or method.Ten Best Practice:o Protect the brand your costumers trust o Know your business and support it with secure solutionso Understand the technology of the softwareo Ensure compliance to governance, regulations, and privacyo Know the basic tenets of software securityo Ensure the protection of sensitive informationo Design software with secure featureso Develop software with secure featureso Deploy software with secure featureso Educate yourself and others on how to build secure software.When you own a business with software you need to consider doing the following:1) You need to set a software policy with business.2) You need to take inventory of all software.3) Retire old applications.4) Collect records of all software.5) Run regular reports.6) Create/Communicate to employees clear policies about license violations.How will the policies be enforced if violations occur?People could be fired, they lose money, are fined.7) Only use latest approved versions.Create a blacklist of software that can’t be installed. 8) Implement policies in IT to enforce complianceCreate a plan to remove software from old computers9) Make license compliance strategic.When creating a disaster recovery program you need to create one, plan the details, and then test it.Windows is the operating system most known for being hacked.Unplanned downtime is when a hurricane, lightening, plane crash, etc. causes your system to bedown. Command formats in Word are called ribbons.Collaborative Application Software- software where you can share video between two peopleEnterprise Resource Planning- when a business takes all of its data bases and compiles it into one.


View Full Document

TAMU ISYS 210 - Exam 1 Study Guide

Documents in this Course
Load more
Download Exam 1 Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 1 Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 1 Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?