0% found this document useful (0 votes)
10 views

Information Technology Terms

The document defines several IT terms including industrial espionage, hexadecimal base, BCD, batch processing, real time processing, interactive computing, distributed computing, multitasking, transmission medium, LAN, MAN, WAN, uploading, downloading, serial and sequential access, piracy, phishing, physical restriction with respect to data security, database, database administrator, and programming errors.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Information Technology Terms

The document defines several IT terms including industrial espionage, hexadecimal base, BCD, batch processing, real time processing, interactive computing, distributed computing, multitasking, transmission medium, LAN, MAN, WAN, uploading, downloading, serial and sequential access, piracy, phishing, physical restriction with respect to data security, database, database administrator, and programming errors.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

‭INFORMATION TECHNOLOGY TERMS‬

I‭ndustrial espionage- The term‬‭industrial espionage‬‭refers to the illegal and‬


‭unethical theft of business trade secrets for use by a competitor to achieve a‬
‭competitive advantage.‬‭This is referred to as spying.‬

‭Hexadecimal base- base 6‬

‭ CD- Binary Coded Decimal (BCD) is a code that represents decimal digits using a‬
B
‭fixed number of binary bits.‬
‭Each decimal digit (0-9) is encoded into a group of four binary bits.‬
‭For example:‬
‭Decimal 0 = BCD 0000‬
‭Decimal 1 = BCD 0001‬
‭…‬
‭Decimal 9 = BCD 1001‬
‭Advantages of BCD:‬
‭Ease of Conversion: BCD allows straightforward conversion between decimal‬
‭(base-10) and binary (base-2) systems.‬

‭Batch processing-‬‭: Batch processing is a method where a large amount of data is collected‬
‭and processed all at once, typically in a single batch.‬

‭Real time-‬‭Real-time processing‬‭handles and analyzes data almost instantaneously upon input.‬
‭It ensures timely insights.‬

‭Interactive-‬ ‭Interactive computing‬‭refers to software that accepts user input while running. It‬
‭enables real-time interaction between the computer and the operator.‬

‭Distributed-‬‭Distributed computing‬‭involves multiple computers working together to solve a‬


‭ ommon problem. It creates a powerful single virtual computer from a network of interconnected‬
c
‭devices.‬

‭Multitasking-‬‭Multitasking allows‬‭a computer to keep all its resources at work as much as‬
‭possible.‬

‭ ‬ I‭t involves overlapping and interleaving the execution of several programs.‬



‭●‬ ‭The operating system (OS) manages multitasking by loading programs into the computer‬
‭for processing and overseeing their execution until completion.‬
‭Transmission medium-‬‭a transmission medium refers to the physical pathway through which‬
‭ ata is transmitted from one device to another in a computer network. These communication‬
d
‭channels play a crucial role in ensuring efficient and reliable data transfer.‬

‭ an‬
M
‭Wan‬
‭Lan‬

‭Explore‬

‭Certainly! Let’s explore the different types of networks based on the area they cover:‬

‭1.‬ ‭Local Area Network (LAN)‬‭:‬


‭○‬ ‭Full Form‬‭: LAN stands for‬‭Local Area Network‬‭.‬
‭○‬ ‭Geographic Span‬‭: Operates in small areas, such as‬‭within the same‬
‭building or campus.‬
‭○‬ ‭Ownership‬‭: Privately owned.‬
‭○‬ ‭Transmission Speed‬‭: High.‬
‭○‬ ‭Propagation Delay‬‭: Short.‬
‭○‬ ‭Congestion‬‭: Less congestion.‬
‭○‬ ‭Design & Maintenance‬‭: Easy.‬
‭○‬ ‭Fault Tolerance‬‭: More fault tolerance.‬
‭○‬ ‭Examples‬‭: LANs are commonly used in offices, schools,‬‭hospitals, and‬
‭homes.‬
‭2.‬ ‭Metropolitan Area Network (MAN)‬‭:‬
‭○‬ ‭Full Form‬‭: MAN stands for‬‭Metropolitan Area Network‬‭.‬
‭○‬ ‭Geographic Span‬‭: Operates in larger areas, such as‬‭a city.‬
‭○‬ ‭Ownership‬‭: Can be private or public.‬
‭○‬ ‭Transmission Speed‬‭: Average.‬
‭○‬ ‭Propagation Delay‬‭: Moderate.‬
‭○‬ ‭Congestion‬‭: More congestion than LAN.‬
‭○‬ ‭Design & Maintenance‬‭: More difficult than LAN.‬
‭○‬ ‭Fault Tolerance‬‭: Less fault tolerance.‬
‭○‬ E ‭ xamples‬‭: MANs connect computers within the same or different‬
‭cities.‬
‭ .‬ ‭Wide Area Network (WAN)‬‭:‬
3
‭○‬ ‭Full Form‬‭: WAN stands for‬‭Wide Area Network‬‭.‬
‭○‬ ‭Geographic Span‬‭: Operates in even larger areas, such as a country or‬
‭continent.‬
‭○‬ ‭Ownership‬‭: May or may not be owned by one organization.‬
‭○‬ ‭Transmission Speed‬‭: Low.‬
‭○‬ ‭Propagation Delay‬‭: Long.‬
‭○‬ ‭Congestion‬‭: More congestion than MAN.‬
‭○‬ ‭Design & Maintenance‬‭: Difficult.‬
‭○‬ ‭Fault Tolerance‬‭: Less fault tolerance.‬
‭○‬ ‭Examples‬‭: WANs connect countries, continents, and global networks.‬

‭Uploading -‬‭Uploading involves‬‭sending data from your local device to the Internet or a remote‬
‭server.‬

‭●‬ ‭Process‬‭:‬
‭○‬ ‭When you make a file visible to everyone on the Internet (like adding a picture to‬
‭Facebook), you upload it.‬
‭○‬ ‭Examples include uploading web pages, images, videos, and other content to‬
‭social networking sites.‬

‭Downloading-‬‭Downloading refers‬‭to receiving data from the Internet onto your local device‬
‭(such as a computer or mobile).‬

‭●‬ ‭Process‬‭:‬
‭○‬ ‭When you copy a file from the Internet to your device, you are downloading it.‬
‭○‬ ‭Examples include downloading web pages, songs, pictures, or any other files.‬

‭Serial and sequential access -‬‭Sequential Access‬‭(also known as Serial Access):‬

‭●‬ D ‭ efinition‬‭: Sequential access is a method of retrieving‬‭data from a storage device where‬
‭the device must move through all the information up to the location it is attempting to‬
‭read or write.‬
‭●‬ ‭Process‬‭:‬
‭○‬ ‭When using sequential access, data is accessed in a predetermined, ordered‬
‭sequence.‬
‭Piracy-‬‭Piracy refers to the‬‭illegal copying‬‭of protected digital content, infringing on the owner’s‬
‭copyright.‬

‭Phishing-‬‭Phishing is a type of cyberattack that manipulates human behavior rather than‬


‭exploiting technological vulnerabilities.‬

‭Physical restriction with respect to data security-‬‭physical restriction refers to‬


‭safeguarding tangible information-related assets against real-world threats.‬
‭-‬ ‭Protection Against Unauthorized Physical Access:‬
‭-‬ ‭Theft Prevention‬
‭-‬ ‭Fire and Flood Protection:‬
‭-‬ ‭Uninterruptible Power Supplies (UPS):‬
‭-‬ ‭Secure Disposal (Shredding):‬

‭ atabase- Certainly! Let’s explore some essential terms related to databases in‬
D
‭information technology:‬

‭1.‬ ‭Database‬‭:‬
‭○‬ ‭A‬‭database‬‭is a structured collection of data that‬‭is organized and‬
‭stored electronically using a‬‭database management‬‭system (DBMS)‬‭.‬
‭Common DBMSs include Microsoft Access, MySQL, and Microsoft SQL‬
‭Server.‬
‭○‬ ‭Data within databases is organized into‬‭tables‬‭, allowing‬‭for easy‬
‭access, management, and updates.‬
‭2.‬ ‭Tables‬‭:‬
‭○‬ ‭A‬‭table‬‭represents a set of related data. It consists‬‭of‬‭columns‬‭(also‬
‭called‬‭fields‬‭) and‬‭rows‬‭(also called‬‭records‬‭).‬
‭○‬ ‭Each column in a table corresponds to a specific piece of information,‬
‭while each row contains a combination of column values representing‬
‭a single record.‬
‭3.‬ ‭Data Fields‬‭:‬
‭○‬ ‭A‬‭data field‬‭is a single piece of information tracked‬‭in a database. Each‬
‭field can define the characteristics of its data, such as being a string‬
‭value, numeric value, date, or time value.‬
‭4.‬ ‭Relationships‬‭:‬
‭○‬ ‭In a‬‭relational database‬‭, tables relate to one another‬‭using‬
‭relationships‬‭based on common fields.‬
‭○‬ ‭Common types of relationships:‬
‭■‬ ‭One to Many‬‭: For every record in Table A, there are‬‭multiple‬
‭records in Table B. For example, the Customers table may have‬
‭many orders in the Orders table.‬
‭■‬ ‭Many to Many‬‭: Both Table A and Table B have multiple‬‭records‬
‭related to each other. A third table (a‬‭Join Table‬‭)‬‭holds unique‬
v‭ alues connecting them. For instance, the ProductsOrders table‬
‭joins Orders and Products.‬
‭ ‬ ‭One to One‬‭: The rarest type of relationship, used for security and‬

‭organization.‬‭It avoids empty fields that apply only‬‭to some‬
‭records in a table‬‭1‬‭2‭.‬ ‬
‭5.‬ ‭Reports‬‭:‬
‭○‬ ‭A‬‭report‬‭is a formatted collection of information‬‭organized to provide‬
‭printed data on a specific subject. Reports summarize and present‬
‭data from one or more tables.‬

‭Database administrator-‬‭A database administrator‬‭(DBA) is a professional who manages,‬


‭ aintains, and secures data within one or more data systems. Their role involves ensuring that‬
m
‭databases remain efficient, operational, and secure. Here are some key aspects of a DBA’s‬
‭responsibilities:‬

‭Programming errors-‬‭Programming errors‬‭are inevitable, but they provide opportunities for‬


‭learning and improvement. Let’s explore some common types of programming errors:‬

‭1.‬ ‭Syntax Errors:‬


‭○‬ ‭Similar to grammatical mistakes in human language.‬
‭○‬ ‭Examples:‬
‭■‬ ‭Missing or mismatched parentheses, brackets, or quotes.‬
‭■‬ ‭Forgetting semicolons or colons to terminate statements.‬
‭■‬ ‭Incorrect indentation (significant in languages like Python).‬
‭■‬ ‭Misspelling keywords or identifiers.‬
‭2.‬ ‭Logic Errors:‬
‭○‬ ‭Code runs but produces unexpected results.‬
‭○‬ ‭Example:‬
‭■‬ ‭Writing code to return the oldest user instead of the newest.‬
‭3.‬ ‭Compilation Errors:‬
‭○‬ ‭Occur during compilation (conversion from high-level language to lower-level‬
‭code).‬
‭○‬ ‭Example:‬
‭■‬ ‭Missing a closing parenthesis in a print statement.‬
‭ .‬
1 ‭ /‬
C
‭2.‬ ‭A/‬
‭3.‬ ‭B/‬
‭4.‬ ‭C’‬
‭5.‬ ‭A’‬
‭ .‬ ‭B/‬
6
‭7.‬ ‭C/‬
‭8.‬ ‭D/‬
‭9.‬ ‭C/‬
‭10.‬‭C’‬
‭11.‬‭A/‬
‭12.‬‭B’‬
‭13.‬‭B’‬
‭14.‬‭B’‬
‭15.‬‭D’‬
‭16.‬‭C’‬
‭17.‬‭A/‬
‭18.‬‭A’‬
‭19.‬‭D’‬
‭20.‬‭A/‬
‭21.‬‭C/‬
‭22.‬‭A/‬
‭23.‬‭A’‬
‭24.‬‭B/‬
‭25.‬‭C’‬
‭26.‬‭D’‬
‭27.‬‭D’‬
‭28.‬‭C’‬
‭29.‬‭A’‬
‭30.‬‭C’‬
‭31.‬‭D/‬
‭32.‬‭A’‬
‭33.‬‭A/‬
‭34.‬‭C’‬
‭35.‬‭D’‬
‭36.‬‭C’‬
‭37.‬‭C/‬
‭38.‬‭C’‬
‭39.‬‭C’‬
‭40.‬‭B/‬
‭41.‬‭D’‬
‭42.‬‭C’‬
‭43.‬‭A’‬
‭44.‬‭D’‬
‭45.‬‭A’‬
‭46.‬‭A’‬
‭47.‬‭C’‬
‭ 8.‬‭D’‬
4
‭49.‬‭D/‬
‭50.‬‭B’‬
‭51.‬‭C’‬
‭52.‬‭C/‬
‭53.‬‭D’‬
‭54.‬‭B’‬
‭55.‬‭B/‬
‭56.‬‭C/‬
‭57.‬‭C’‬
‭58.‬‭D’‬
‭59.‬‭A’‬
‭60.‬‭B’‬

You might also like