IT Concepts Flashcards

1
Q

4 Functions of a Computer System

A

Input –> Process –> Output –> (Storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client-to-Server
Implementation

(examples)

A

Servers on one side of the network running authentication to facilitate millions of users logging in and permitting access to specific resources based on parameters such as username, password, and system identifiers. Common across organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Peer-to-Peer
Implementation

(examples)

A

Access to resources is provided without the assistance of a server. File transfer protocol is an example of peer-to-peer implementation. Common in small businesses and homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Network Topology

A

Physical & Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 Common Types of Networks

A

Local area networks (LANs) and wide area networks (WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 Types of Network Designs

A

Client-to-Server and Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data & Information

Management

A

The IT function that focuses on the efficient storage and dissemination of organization data and information to support its effective use with an eye on disaster recovery and business continuity to mitigate the high costs of losing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Systems Integration

A

The setting up and configuring the new products and programs to align with the specific organizational needs and to integrate with other systems already in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software Development

A

Identifying and implementing systems that help the organization perform tasks more efficiently or provide novel services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Analysis

A

Organizations analyze their processes, then assess current and anticipated needs for gaps that technology can fill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security

A

Systems in place to identify threats and prevent incidents that compromise the organization’s data or disrupt the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User Support

A

IT provides support to users by first analyzing the needs and issues, then identifying and implementing solutions so users can stay productive with minimal technical interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Website Classifications

A

Intranet / Internet / Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business Intelligence

A

Systems and personnel supporting data analytics use the organization’s data to examine its past performance, identify the reasons behind past and current issues, and forecast future performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Project Management

A

The maintenance of an organization’s IT infrastructure to assure continuous functionality and implement improvements or technology changes within the general organizational IT strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outsourcing Services

A

When smaller organizations employ third-party, specialized IT consulting services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

5 Most Common

Computing Disciplines

A
Computer Engineering
Computer Science
Software Engineering
Information Systems
Information Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Computer Engineering

A

(CE)

A discipline that focuses on the design of hardware systems and the software that makes them work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Computer Science

A

(CS)

A discipline that addresses the design and implementation of software with an emphasis on developing effective ways to solve computing problems and creating new ways to use computers.

20
Q

Software Engineering

A

(SE)

A discipline that focuses on the development and maintenance of reliable and efficient software systems.

21
Q

Information Systems

A

(IS)

A discipline that focuses on integrating IT solutions meant to meet organizational business goals.

22
Q

Information Technology

A

(IT)

A Discipline that focuses more on the technology supporting information systems in an organization rather than the information residing on the systems or being communicated with them.

23
Q

Data Science

A

Finding patterns/clusters in information; providing insight where one would not know to look.

24
Q

3 (Core)

Cloud-Based Systems

A

IaaS / PaaS / SaaS

25
Q

Volatile vs. Nonvolatile

A

Volatile memory is lost when the power is cut (RAM), while nonvolatile memory remains (ROM).

26
Q

System Speed (Clock Speed)

2 Primary Measurements

A

Megahertz (MHz)

Gigahertz (GHz)

27
Q

Computer Storage is commonly measured in ____?

A

MB / GB / TB

28
Q

4 Computer Categorizations

A

Supercomputer

Mainframe Computer

Workstation Computer

Microcomputer

29
Q

Ring Topology

A

Every device/node is connected to exactly two other nodes one on either side of it in closed loop fashion. All messages travel though the ring either in a clockwise direction or anti-clockwise direction.

30
Q

Star Topology

A

Every device is connected to a central device such as a switch. Star topology requires more cable as compared to other topologies but it’s more robust as a failure in one cable will only disconnect the specific connected computer via that cable to the central device.

31
Q

Mesh Topology

A

Nodes are connected to each other in a redundant fashion with multiple connections. There are two types of mesh topologies, Partial and Full.

32
Q

Methods of Process Communication

A

Client/Server Model

Peer-to-Peer (P2P)

Distributed Systems

33
Q

Client/Server Model

A

The client/server model is a popular models used wherein the basic roles played by the processes are categorized as either a client, making requests, or a server, satisfying client requests.

34
Q

Peer-to-Peer (P2P)

A

Processers both request AND provide service to each other.

such as instant messaging and interactive games

35
Q

Types of Distributed Systems

A

Cluster / Grid / Cloud

36
Q

4 Common Bandwidth Speeds

A

CAT1 - 1 Mbps

CAT2 - 4 Mbps

CAT3 - 10 Mbps

CAT5e - 1 Gbps

37
Q

3 Tiers of ISPs

A

Tier 1 - International WANs

Tier 2 - Regional WANs

Tier 3 - End Systems or “Hosts” (Local service providers)

38
Q

Common Types of Malware

A

Viruses / Worms / Spyware / Phishing

39
Q

Types of Software

A

System Software

&

Application Software

40
Q

Data Types

A

Integers

Floating Point Numbers

Characters

Character Strings

Boolean Values

41
Q

8 Types of Databases

A

Flat-File Database

Hierarchical Database

Relational Database

Object Oriented Database

NoSQL Database

Cloud Database

Data Lake

Distributed Database

42
Q

IT Governance

A

The system of processes that ensures the effective and efficient use of IT to enable an organization to achieve its business goals and to add value to key stakeholders in an organization.

43
Q

Types of System Maintenance

A

Corrective

Adaptive

Perfective

Preventive

44
Q

Pareto Principle

A

The theory that 80% of errors come from 20% of the system, meaning most errors can be identified by testing carefully selected groups of samples.

45
Q

Ten Commandments

of Computer Ethics

A

1 - Harm no one.

2 - Don’t interfere with another’s work.

3 - Don’t snoop through files.

4 - Do not hack to steal.

5 - Do not bear false witness.

6 - Do not pirate copies.

7 - Don’t use others’ resources without compensation.

8 - Do not appropriate ideas.

9 - Consider social consequences of your programming.

10 - Always use computers with consideration and respect for other humans.

46
Q

Asimov’s

3 Laws of Robotics.

A

1 - A robot must not harm, or ignore preventable harm to a human.

2 - A robot must obey human orders without disregard to rule 1.

3 - A robot must protect its own existence without disregard to rules 1 and 2.