Information Technology {Ans: The technology used in creating, maintaining, and making information accessible.}Server {Ans: Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network}Information in DIKW {Ans: Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.}Defense in Depth {Ans: Protecting every layer that surrounds data}Cold Site {Ans: Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have}Encryption {Ans: Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information}Drilling up and down {Ans: Shifts the view of the data; down provides more detail, up provides summarized data}SaaS {Ans: Software as a Service. Can access and use software through the Internet.}Interpreted Language {Ans: Takes the most recently entered instruction, translates it into machine language, and executes it; must be translated manually each time.}BIOS ROM {Ans: BIOS stands for Basic Input Output