D075 Flashcards

(192 cards)

1
Q

Infrastructure

A

The underlying foundation or basic framework for an org or project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6 components of IT infrastructure

A
  1. Hardware
  2. Software
  3. Networks
  4. Data
  5. People
  6. Processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware

A

CPU, monitors, keyboards, disk drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software

A

Instructions that tell the computer how to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 categories of software

A
  1. Application - Excel
  2. Utility - virus protection
  3. System - Windows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Networks

A

Nodes made of of two or more devices like laptops and smartphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best practices

A

Processes that are most effective in achieving the desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Moore’s Law

A

Stated that computing power doubles every 18 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTML

A

Hypertext markup language - used to create web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP

A

Hypertext transfer protocol - used to define how messages are formatted and transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mainframe computers

A

Huge room sized computer that process and store large amounts of data - cc processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Midrange computers

A

“Mini-computers” that are less powerful than mainframe but perform the same functions on a smaller scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microcomputers

A

Desktops, laptops, tablets, and handheld devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating system

A

programs that read and write data information to a disk hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 types of memory management

A
  1. RAM
  2. virtual
  3. cache
  4. registers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a defining characteristic of application software?

A

It performs a specific task for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which software supports a computer’s basic functions such as scheduling software tasks, executing applications, and controlling peripherals?

A

Systems software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of memory plays an important role in a computer’s ability to perform multitasking?

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SSD

A

Solid state drive - main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disk storage

A

Secondary storage like a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Optical disk

A

Computer disk that uses optical storage techniques to read and write data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Nonvolatile data

A

Data will not disappear when computer is turned off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some application softwares?

A

spreadsheets
word processing
presentation software
database software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Word processor

A

Application software used to create, compose, and edit documents

Word, google docs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Database management system software (DBMS)
Used to create a set of files that can produce populations of information
26
Software suite aka application or productivity suite
application programs that share a common graphical user interface to exchange data
27
3 ways of sharing data with productivity suites
1. Copy and paste 2. Object embedding 3. Object linking
28
Computer network
Two or more computers connected together to communicate and share resources
29
Node
Any device connected as part of a net work
30
Network interface controller (NIC)
Card that is plugged into the motherboard allowing a network cable to interface with other computers
31
Ethernet card
Provides a computer with a unique 48 bit address called media access control address
32
MAC - media access control
Transports data to/from NIC and to/from another shared channel
33
Protocol
Standard language devices use to communicate and transfer data
34
Network protocol
Set of rules a network must follow
35
Network hub
Central location of the computer network
36
Transmission Control Protocol / internet protocol
protocols used to connect networks to the Internet
37
Network operating system - NOS
Software that resides on the networks server and controls an entire network
38
Topology
The mapping of a networking interconnection between nodes
39
Bus topology
Linear bus – each node is connected to a common node that has two endpoints
40
Star topology
Most common topology where the star shape created by network notes radiate around a central node
41
Ring topology
Each notice connected to two other computers
42
6 types of computer networks
1. Local area network (LAN) 2. Campus area network (CAN) 3. Metro area network (MAN) 4. Wide area network (WAN) 5. Peer-to-peer network (P2P) 6. Internet
43
Types of business system threats
1. Spamming 2. Worms 3. Adware 4. Trojan horses 5. Spyware 6. Virus 7. Denial of service 8. Key logging
44
Tracking cookie
Copy of a webpage and a small text file (cookie) that the user is typically unaware of
45
LAN - local area network
Relatively small computer network typically in a single building
46
CAN - campus area network
Computer network that connects two or more LANs that are located on campus
47
MAN - metro area network
Computer Network that can mix two or more LAN/CANs together within the boundaries of a town or city
48
WAN - wide area network
Computer networks that encompass a wide geographical area connect LAN, CAN, and MANs together
49
P2P - peer to peer networks
Computer networks that connect directly to one another without the use of the server
50
5 network security considerations
1. Passwords 2. Web browsing 3. Email and IM 4. Permissions 5. Firewall
51
Firewall
Specialize hardware and software that ensures only authorized personnel can access and use an organizations Internet
52
How does a peripheral device function in a network?
As a resource shared by multiple end users in a network
53
4 main components of a network
1. NIC cards 2. TCP/IP protocols 3. Cables 4. Central hub
54
Telecom services
Internet providers and phone services
55
Knowledge management systems (KMS) aka knowledge transfer
Collaborative systems that distribute collective knowledge to users and customers
56
Point of failure
Part of a system that if it fails, the entire system stops working
57
Project management
The process of leading the work of a team to achieve goals
58
Examples of cloud based infrastructure aka cloud-service providers (CSPs)
cloud storage file synchronization business cloud client-side software
59
Chief Intelligence Officer - CIO
-board level head of IT department -strategic decision making -top level infrastructure manager
60
Chief Security Officer - CSO In charge of…
-security and corporate assets -coordinates with COO + HR
61
Chief Information Security Officer - CISO
-security policies -involved in data loss and fraud prevention
62
Chief Technology Officer - CTO MTC!
-manages engineering -top IT architect -collaborates with vendors
63
IT Manager
software development, design, and application
64
Network Admin - works with engineers to…
-deploy new networks -grants user access
65
Information Security Analyst - ISA DIP!
Deploys firewalls Identify security risks Performs system audits
66
Database admin IMPD!
Engages in: -installation -migration -performance -data backup
67
Web developer
Develops client and server side logic for web apps
68
Computer programmer
-sets up equipment -provides frontline support
69
Data management (DM) PAT
practices architecture tools Used to achieve consistent access
70
Structured query language (SQL)
Developed to make sense of all data so it can eventually become information
71
Databases
collections of computer files that are storehouses of data
72
Structure of a database
1. Primary key 2. Foreign key 3. Schema
73
Primary key
File that uniquely identifies a record in the table
74
Foreign key
Field that provides a link between two tables
75
Schema
the overall blueprint of a database
76
Big data
Data that is collected from all over the internet
77
4 V’s that define the attributes of big data
1. Volume - amount 2. Variety - form 3. Veracity - quality 4. Velocity - speed created
78
Data mining (data discover)
Examination of huge sets of data to find connections, and hidden relationships Ex. Oracle data mining application
79
3 groups of data
1. Structured date 2. Unstructured data 3. Semi - structured data
80
Structured data
-in fixed formats -needs to be in a standardized with recognizable patterns
81
Unstructured data
Unorganized data that cannot easily be read or processed because it is not stored in rows or columns
82
Semi structured data
Data between structured and unstructured data Ex. Email and HTML
83
2 big data tools
1. ETL 2. Hadoop
84
ETL big data tool
-standardizes data across systems -allow it to be queried
85
Hadoop big data tool
Infrastructure for storing and processing large sets of data across multiple servers
86
Data management processes AVS!
1.acquiring data 2.validating the data 3. storing and processing into useful information
87
“Scrubbing the data”
Transforming data into an accurate, clean, and error free form
88
3 steps for collecting data
1. Determine the purpose for obtaining 2. Develop business related questions 3. Determine tools to acquire
89
Master data management (MDM)
Methodology used to define, organize, and manage the data of an organization
90
Data governance Managing …
Managing the availability, integrity, and security of data to ensure it remains high-quality
91
Key benefits of data management PBDF!
-Predictive analytics -business intelligence -data analysis -finding patterns
92
Data analytics
reviewing raw data using qualitative and quantitative methods
93
Predictive analysis
Uses new and historical data to forecast activity, behavior, and trends
94
What form of analytics refers to looking for patterns, trends, and relationships between data so organizations can try to determine connections and outliers?
Data mining
95
Text analytics
searches through unstructured text data to look for useful patterns
96
Business intelligence
software and devices that turn data into information
97
3 forms of business analytics
1. Descriptive analytics 2. Predictive analytics 3. Decision analytics
98
Descriptive analytics
past data that is grouped into significant pieces to reveal trends
99
Predictive analytics
Attempts to reveal future data trends
100
Decision analytics
Builds on predictive analysis to make decisions
101
7 challenges of data analytics and process management LAMBDAS
1. Lack of skills 2. Amount of data 3. Multiple sources 4. Budgets for data management tools 5. Determining what is/is not meaningful 6. Accessibility 7. Security and privacy
102
Qualitative ROI
Addresses the intangible values of data loss or a decrease in operating efficiencies Ex. If upgraded firewall protection is not purchased, what would be the cost to recover from being hacked
103
3 levels of data security
1. Data level 2. System level 3. User level
104
5 essential spreadsheet functions
1. SUM 2. AVERAGE 3. MIN 4. MAX 5. COUNT
105
Boolean logic
Asks the question “is something true or false?”
106
Conditional functions
Allows performance of calculations where the cell references are used
107
5 core business depts
1. Accounting 2. Production 3. Research and development 4. Marketing 5. HR
108
Intranet
a private corporate network for sharing information, collaboration tools, and services
109
3 types of research and development
1. Basic 2. Applied 3. Development
110
Basic research
Exploration of new ideas that may or may not actually be implemented
111
Applied research
Methodology based research and heavily uses IT to determine possibilities
112
Development research
Where research findings are used in the production of products
113
Transaction processing systems (TPS) Type of system that … C/M/S/R
type of system that collects, modifies, stores, and retrieves transactions
114
Customer relationship management systems (CRM)
Information systems that manage the information on customers
115
3 uses of CRMs to a business
1. captures and structures data so reports can be pulled 2. increase understanding of customer habits and preferences 3. manage relationships
116
Decision support systems (DSS)
Interactive software systems that compile information from data and business models
117
3 elements for accurate decision making
1. Business intelligence 2. Data analytics 3. Data management capabilities
118
Geographic information systems Framework for gathering and ….
Framework for gathering, and analyzing data locations and organizes into visuals
119
5 IT innovation tools in business
1. Data housing and management 2. Improved communications 3. Customer relationship management 4. Product development 5. Cost effective processes
120
Cloud web hosting (CWH) Employs clustered servers providing ….
Employs clustered servers providing virtual resources to meet the demands of a website
121
Computer aided design/manufacturing (CAD/CAM)
software used to design and manufacture product prototypes and end products
122
2 areas of using IT for cost effectiveness
1. Completing transactions faster with more accuracy 2. Automation
123
Copyright
Definitive right given to the owner of original work
124
Trademarks
Words or designs that identify a source of product
125
Patents
Protects new products, upgrades, and some functional aspects of computer software
126
Trade secret
Information that is private or not known outside of the company, and if disclosed would cause harm our loss to the business
127
3 government regulations of IT
1. FERPA 2. HIPAA 3. SOX
128
Radio frequency identification (RFID)
Small tags used to identify products and transmit info through radio waves
129
Internet of Things (IoT)
Use of the Internet to make connections to fully automate processes - connects through WiFi
130
2 IoT impacts on business
1. opportunities for new businesses to innovate through automation 2. Existing businesses can improve
131
IoT Applications HEMTG!
- healthcare - education - manufacturing - transportation - government
132
7 types of social media
1. Social networking 2. Social news 3. Social reviews 4. Bookmarking websites 5. Blogs/forums 6. Media sharing 7. Microblogging
133
How can a business best determine the (ROI) of advertising on social media?
By calculating ROI based on the cost per advertisement
134
9 steps of application development
1. Establish and outline 2. Conduct research 3. Create a mock-up 4. Develop graphical interface 5. Build the structure 6. Program the code 7. Launch 8. Extend the reach 9. Revise and update
135
7 types of mobile apps
1. Ebooks 2. Entertainment/games 3. Lifestyle 4. News 5. Productivity 6. Social and business networking 7. Utilities
136
Electronic computing tools
Provides data and information exchange software and techniques to facilitate decisions
137
Management tools
Collaborative software and techniques
138
Project management software
Provides a road map for organizing and managing activities, resources, and timeline of a project
139
What is the goal of KMS?
To capture the organizations knowledge and then to improve access to the knowledge
140
2 types of knowledge stored in a KMS
1. Explicit knowledge - policies and procedures 2. Tacit knowledge - knowledge gained from personal experience
141
Information repository
Collection of related information stored on company’s servers or within the cloud
142
What is the major function of a computer operating system?
Computer resource management
143
What are the basic components that are required for a local network to function?
Ethernet cards Ethernet cables Common protocol Hub
144
Which type of device is an Ethernet card?
Network interface controller
145
What is the purpose of a MAC address?
To uniquely identify a computer on a network
146
What is the purpose of a Universal Serial Bus (USB) on a laptop or desktop computer?
It allows the computer to connect to peripheral devices
147
How does a Gantt chart facilitate project management?
It identifies and sequences the tasks of a project
148
When using extract, transform, and load (ETL) what is done during the transform step?
The data is normalized and structured
149
What is the key characteristic difference between datamart and a data warehouse?
Datamart is smaller, and more specialized in its focus than a data warehouse
150
What is the velocity of big data?
The speed of data produced in a given time
151
What is it called when an organization implements infinite security procedures to protect the hardware, network, and software from intrusion?
System level security
152
Which term is used to refer to data that come from many difference sources in various structures?
Disparate data
153
What is scrubbed data?
Data that has been validated for accuracy
154
Which level of management gets the most detailed reports directly from the transaction processing system?
Supervisors
155
What is the primary source of data used by DSS?
Transaction processing system (TPS)
156
What is a key capability of a decision support system?
It compiles data from many systems to assist in decision making
157
Which strategy can be used to help a companies webpage appear on the first page of search results in a browser?
Search engine optimization
158
Which technology enables people without computer programming skills to design in publish their own websites?
Browser based web development tools
159
What action will give graphic designers the initial copyright protection of marketing images?
Creating the marketing images
160
What is an example of an Internet of Things (IoT) device?
A lightbulb that can be turned on and off by a smartphone
161
Where does IoT data collection begin?
The edge
162
Which type of technology can be used to monitor every product in a warehouse to enable real time inventory, tracking and updates?
Operations management system
163
What is the greatest risk created by incorporating IoT systems?
Increased security risk
164
What is the final step in the deployment and use of an app?
Maintain an upgrade the app based on use and user feedback
165
Which approach facilitates live communication when a business has employees that are in different locations and telecommute for work?
Real time communication
166
Which kind of system should be created to help a Company organize, create, and distribute the collective experience expertise of employees?
Knowledge management system
167
Which file format is suitable to use when sharing a legal contract that requires a digital signature?
PDF
168
What is a key way that social media marketing has simplified the calculation of return on investment in marketing?
By allowing companies to track which sales can be connected directly to a specific advertisement
169
What is the main reason marketing return on investment is easier to measure with social media marketing them a traditional marketing?
User behavior can be tracked and social media
170
What hardware component performs most of the calculations for a computer?
CPU
171
Systems software
Collection of computer programs that manage hardware and software
172
Operating systems function
Coordinate a computers memory
173
Disk management
Responsible for reading and writing data and information to a disk, typically a hard drive
174
Which type of memory plays a role in computers ability to perform multitasking?
Virtual memory
175
Peripheral hardware
Input, output, and storage devices that connect directly to a a computer but does not contribute to any primary function - mouse, printer, webcam etc
176
What does the term “clients” refer to?
Computers, laptops, or smartphones on a network
177
Physical cable system
Connects networks together
178
Twisted pair
Specialized wire that cancels out electromagnetic interference from other devices
179
Gannt Chart
Bar chart that illustrates a project schedule
180
RAM
short term fast memory
181
Virtual memory
running more apps than RAM can hold
182
Cache memory
minimal storage capacity
183
Registers
built into COU and hold instructions that are currently being used
184
Network operating system function
controlling network traffic managing files maintaining network security back up
185
Microcomputer vs. minicomputer
Micro: admin tasks and word processing Mini: managing databases and graphics
186
Examples of semi structured data
Email and HTML
187
Unstructured data examples
Video/audio satellite imagery weather sensor data
188
Project management examples
Microsoft project and smartsheets
189
Data level security
protecting actual data
190
System level security
protecting hardware where data resides
191
User level security
protecting passwords
192
Examples of electronic computing tools
texting discussion boards online chatting