Browse Definitions :
Quiz

Answer Key: Major IT players: How'd they start out?

 

Answer Key: Major IT players: How'd they start out?

 

1. Steve Case, co-founder of America Online, started his first business when he was a teenager. What was it?
 b. mail order company
Case Enterprises sold gardening seeds and greeting cards by mail.




















































































































































































2. Larry Ellison, co-founder of Oracle, once crafted a large-scale database for:
 b. CIA
In 1977, Ellison co-founded Software Development Labs. Ellison and his partners won a two-year contract to build a relational database management system for the CIA. The project's code name? Oracle.
























































































































































































3. Steve Jobs, co-founder of Apple Computer, was known in his earlier days as a:
 b. phreak
Phone phreaks built devices capable of mimicking all of the tone frequencies used by operators.





















































































































































































4.  a. David Packard











































































































































































5.  a. recorded automobile traffic flow on a highway


























































































































































































































































6.  c. ham radio





















































































































































7.  b. math teacher














































































































































8.  a. expert hacker













































































































































9.  b. chemistry and medicine







































































































10.  c. Xerox

This was last updated in June 2008
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close