History of Information Technology
Hardware/Software
Internet Terms
Challenges in Information Technology
Trivia
100
Data Processing
What is the name for business technology in the 1970's.
100
UNIVAC
What is name of first commercial computer?
100
Wireless NEtworking
What is ability of computer to transport signals through the air?
100
Hackers
What are people who unlawfullly break into computer systems?
100
Infoglut
What is too much information?
200
Information Technology
What is the name given to business technology in the 1990's. It's role became the way of doing business
200
Intranet
What is a companywide network, closed to public access?
200
Viruses
What are programming codes inserted into the programming to cause unexpected events?
200
85%
What percentage of private sector systems does the government need to protect?
300
Data
What is raw, unanalyzed and unorganized facts and figures
300
Firewall
What is software that prevents outsiders form accessing information a user does not want others to see
300
Data Mining
What is discovering relationship among data in a data warehouse?
300
Phishing
What is use of phony websites to ellicit personal information from the user?
300
Shopping Cart Analysis
What is a from of data mining used by internet retailers?
400
Information
What is processed and organized datea used to make managerial decisions.
400
Shareware
What is software that has been copywrited but is distributed to potential customers free of charge
400
Virtualization
What is accessability via networks that allows business to be conducted anywhere at any time?
400
Encrption
What is information sent via a secret code?
400
John Mc Afee
What is the name of inventor of anti virus software who was recently arrested?
500
Information Systems
What is name for business technology in the 1980's
500
Extranet
What is a semi-private network that allows more than one company to access the same information?
500
Cookie
What is a piece of information sent by the Web site over the Internet to your Web browser is expected to save and send back to the server whenever the used returns to the Web site?
500
Cyperterrorism
What is the ability of a hacker to obtain information that threatens national security?
500
HP Envy 6-1010 us Sleekbook 15.6"
What is the brand name of a laptop or what I want for Christmas?
M
e
n
u