IT Vocabulary & Definitions Flashcards

1
Q

Internet

A

Resources available for public use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Middleware

A

Components that allow the hardware and software to communicate with each other, enabling data to move between computer system components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software

A

A collection of instructions that enable a user to interact with a computer to perform tasks. (Internet browsers, text editing tools, and spreadsheets…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware

A

Electronic and mechanical parts of a computer system. Components that are tangible such as keyboard, mouse, monitor, CPU…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Paging System

A

A built-in mechanism available with most operating systems that permit data to be moved from RAM to the hard drive when the amount of memory in use exceeds the memory available on the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Networks

A

Systems of hardware and software components that connect two or more devices for the purpose of sharing data and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Client-to-Server
Implementation

(examples)

A

Servers on one side of the network running authentication to facilitate millions of users logging in and permitting access to specific resources based on parameters such as username, password, and system identifiers. Common across organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Peer-to-Peer
Implementation

(examples)

A

Access to resources is provided without the assistance of a server. File transfer protocol is an example of peer-to-peer implementation. Common in small businesses and homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Topology

A

Indicates the actual layout of how systems are placed in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Topology

A

Indicates how the data actually flow and is extremely important when considering things like load balancing normal traffic, network backups, and replication of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protocols

A

Languages supporting data exchange between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Systems

A

A system is a collection of elements that interact to achieve a common goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User Support

A

IT provides support to users by first analyzing the needs and issues, then identifying and implementing solutions so users can stay productive with minimal technical interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Networks

A

Communication supported between the elements of an IT system. They are put in place to enable the exchange of data between organizational servers and to give employees access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intranet

A

Resources only available for users or systems of a specific organization are on the intranet like proprietary information and sensitive employee information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Extranet

A

Makes resources available within an organization, but it also makes that information available to other specific organizations or users, such as contracted, third-party consultants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Internet

A

Resources available for the public are on the internet, including commercial sites (e-commerce), blogs, social media, news, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Business Intelligence

A

Systems and personnel supporting data analytics use the organization’s data to examine its past performance, identify the reasons behind past and current issues, and forecast future performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Project Management

A

The maintenance of an organization’s IT infrastructure to assure continuous functionality and implement improvements or technology changes within the general organizational IT strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Outsourcing Services

A

When smaller organizations employ third-party, specialized IT consulting services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Computing

A

Any activity that uses a computer to manage, process, or share information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data

A

Raw facts or observations not useful until it has been processed and is presented in a usable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Information

A

A collection of processed data from a variety of sources. (data in context)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Knowledge

A

A dynamic combination of experience, values, and contextual information.(information with meaning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Wisdom

A

The application of the knowledge framework to evaluate and incorporate new experiences and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data Science

A

Finding patterns/clusters in information; providing insight where one would not know to look.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Big Data

A

Smart information derived from completing the data pyramid process. (flipped pyramid)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Information Systems

A

Collections of data and information used to support decision-making in organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Data Architecture

A

Infrastructure used to manage data in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Data Hygiene

A

The processes of ensuring that the data is relatively error-free.

Dirty data can be caused by things such as duplicate records, incomplete or outdated data, and mistakes introduced as data is entered, stored, and managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Data Scrubbing

A

(aka Data Cleansing)

The process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Liveware

A

(People)

The most important element of a computer system.

System programmers write code to implement the working of the system. End users (users) operate the system for different purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Parallel Processing

A

The ability to process multiple programs simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Quantum Computing

A

The study of a non-classical model of computation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Nanotechnology

A

A technology based on the ability to build structures to complex, atomic specifications by means of mechanosynthesis, or reaction outcomes determined by the use of mechanical constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Ephemeral

A

Short-lived. As in random access memory once the power is cut off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Volatile vs. Nonvolatile

A

Volatile memory is lost when the power is cut (RAM), while nonvolatile memory remains (ROM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

System Clock

A

A pulse of electricity sent out at regular intervals. One instruction gets processed per pulse. The more pulses sent out by the system clock, the faster the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Secondary Storage

A

Devices that store data and instructions while they are not being used; the saved content remains on the secondary storage unit even when the computer is powered down.

(floppy and hard drives, flash drives, magnetic tape, and optical discs, such as CDs and DVDs.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Bits

A

(BI)nary Digi(TS)

How storage capacity is measured. It takes 8 bits to equal a byte, which amounts to a single letter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Supercomputer

A

A system of thousands of interconnected processors particularly useful in weather forecasting, scientific simulations, and nuclear energy research.

42
Q

Mainframe Computer

A

Designed to support hundreds or thousands of users simultaneously supporting multiple programs at the same time, making them useful to big organizations.

43
Q

Workstation Computer

A

A single-user computer designed for technical or scientific applications such as graphics, music, and engineering design. It has a faster microprocessor, a large amount of RAM, and high-speed graphics cards.

44
Q

Microcomputer

A

A general-purpose computer for individual use.

desktops, laptops, and handheld or mobile devices.

45
Q

Networking

A

Sharing information and resources through linked computer systems.

46
Q

Client/Server Model

A

The client/server model is a popular models used wherein the basic roles played by the processes are categorized as either a client, making requests, or a server, satisfying client requests.

47
Q

Peer-to-Peer (P2P)

A

Processers both request AND provide service to each other.

such as instant messaging and interactive games

48
Q

Distributed Systems

A

The systems execute software as processes on more than one computer.

49
Q

Cluster Computing

A

A distributed system that uses many independent computers to provide computation or services comparable to those of a larger machine.

50
Q

Grid Computing

A

A distributed system that is more loosely coupled than clusters but still works together as a system to complete large tasks.

51
Q

Cloud Computing

A

A distributed system that provides large pools of shared computers that can be allocated to clients as needed.

52
Q

Networking Hardware

A

Electronic devices that are required for communication and interaction between devices on a computer network.

53
Q

Transmission Media

A

Both wired and wireless networks require network media to transfer data.

(twisted pair cables, copper coaxial cable, and optical fiber cables)

54
Q

Twisted Pair Cables

A

The most widely used type of transmission media. Two common types of twisted pair cables are unshielded twisted pair (UTP) and shielded twisted pair (STP).

55
Q

Network Bandwidth

A

Measured in megabits per second (Mbps) and gigabits (Gbps) per second.

56
Q

Malware

A

(MALicious SoftWARE)

Any software intentionally designed to cause damage to a computer, server, client, or computer network.

57
Q

Virus

A

A software program that infects a computer by inserting itself into programs that already reside in the machine.

58
Q

Worm

A

An autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network.

59
Q

Spyware

A

A reconnaissance program that resides on a computer, collecting information about the computer’s activities and reporting back to the spyware’s instigator.

60
Q

Phishing

A

A reconnaissance technique used by individuals to obtain private information by simply asking for it.

61
Q

Firewall

A

Program that blocks outgoing messages with certain destination addresses or block incoming messages from untrustworthy sources.

62
Q

Proxy Server

A

A software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server.

63
Q

System Software

A

General-purpose software that is used to operate computer hardware. It provides a platform to run application software.

(Operating Systems)

64
Q

Application Software

A

Application software is specific-purpose software used to perform a specific task.

(Office programs, games…)

65
Q

Operating System

A

(OS)

Controls the overall operation of a computer.

66
Q

Utility Software

A

Extends the capabilities of an operating system and helps customize the operating system’s function.

(Zip files, Movie Player, Network Connections)

67
Q

Kernel

A

The internal part of an operating system that contains the operating system components that perform the basic functions required by the computer installation.

(File Manager)

68
Q

Compiler

A

Translates source code into machine language; checks source code for errors before translating it into object code.

69
Q

Interpreter

A

Translate and execute source code one line at a time. If the interpreter finds an error, the process is terminated at the statement containing the error and displays an error message.

70
Q

Algorithm

A

A step-by-step formula outlining how to execute a task.

71
Q

Database Systems

A

Integrate the information stored and maintained by an organization.

72
Q

Database Research

A

The act of analyzing and converting data into information that can be used in decision-making.

73
Q

Integers

A

 4
 34
 394850

74
Q

Floating Point Numbers

A

 9.5
 45.5
 1.7

75
Q

Characters

A

 F
 !
 #

76
Q

Character Strings

A

 abc
 def456
 3erf78!@

77
Q

Boolean Values

A

 True

 false

78
Q

Flat-File Database

A

Stores data in a plain text file. Each line of the text file holds one record. Fields are separated by delimiters like spaces or commas.

79
Q

Hierarchical Database

A

Data is organized in a tree structure, much like an organizational chart. There is one parent for each record, with optional nodes, forming sub-trees called segments.

80
Q

Relational Database

A

Collections of database tables with interrelated fields.

81
Q

Union Operation

A

Combines distinct fields from multiple tables that have the same set of attributes and data types.

82
Q

Product Operation

A

Creates a result table that includes all of the attributes from the two tables; each row of the second table is added to each row of the first table.

83
Q

Join Operation

A

Combines two tables, but records are only appended when a matching criterion is met.

84
Q

Object Oriented Database

A

A collection of objects, each with two components: data and instructions.

85
Q

Data Lake

A

A system of data stored in raw format. It is usually a single store of all enterprise data as well as information derived from data during reporting, transactions, or other activities.

86
Q

Project Initiation

A

Broadly defines the project. It usually begins with a business case, followed by a feasibility study.

87
Q

Project Planning

A

Developing a road map that everyone follows starting with setting the project goals.

88
Q

Project Execution

A

Project deliverables are developed and completed. A kickoff meeting usually marks the start of this phase.

89
Q

Project Closure

A

The project is declared complete and the project team is dissolved. Project managers complete the final project documentation, including financial reports.

90
Q

Corrective Maintenance

A

Removes errors to ensure functionality of the system.

91
Q

Adaptive Maintenance

A

Performed when organizational changes affect system requirements, such as changes in the organizational procedures, forms, or system controls and security needs.

92
Q

Perfective Maintenance

A

Performed when new components are introduced, or existing components are improved, to enhance overall system performance.

93
Q

Preventive Maintenance

A

Changes made to increase the life span of systems and could include restructuring, optimizing code, or updating documentation that impacts the scalability, stability, and maintainability of the system.

94
Q

Pareto Principle

A

The theory that 80% of errors come from 20% of the system, meaning most errors can be identified by testing carefully selected groups of samples.

95
Q

Basis Path Testing

A

A standardized set of test data that ensures each instruction in the software is executed at least once.

96
Q

Prototyping

A

Building and evaluating basic versions of a proposed system.

97
Q

Hot Storage

A

Allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe.

98
Q

Cold Storage

A

Offers less frequent access and is maintained on minimal equipment that is considered lower performance.

99
Q

Information Privacy

A

The right to control how your personal information is collected, used, and exchanged.

100
Q

Confidentiality

A

A set of rules that limits access to data/information.

101
Q

Integrity

A

When the data/information is both trustworthy and accurate.

102
Q

Availability

A

he ability to provide reliable access to the data/information for authorized individuals.