Foundations of ITM Flashcards

1
Q

refers to the comprehensive set of tools, systems, and processes that manage, store, process, and communicate information in electronic form

A

Information Technology (IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the collection of physical and virtual resources that support and enable the functioning of IT systems

A

Information technology infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

provides the necessary foundation for IT systems to operate, ensuring their stability, reliability, and scalability

A

IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an individual part or element of an information technology (IT) system or infrastructure

A

IT component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

work together to support the delivery of IT services and enable the functioning of an organization’s technology environment

A

IT component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

broadly categorized into hardware, software, and networking elements

A

IT components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the application of technical expertise, processes, and resources to create, manage, and deliver value to customers or end-users within an organization

A

IT Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

include, but are not limited to, data storage and backup, cloud services, cybersecurity, and IT consulting

A

IT Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to the delivery of computing resources, services, and applications over the internet rather than hosting them on-premises within an organization’s own IT infrastructure

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a collection of hardware, software, data, people, and procedures that work together to process, store, and distribute information to support decision-making, coordination, control, analysis, and visualization in an organization

A

Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

six components of IT infrastructure

A
  1. hardware
  2. software
  3. networks
  4. data
  5. people
  6. processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

physical and tangible parts of a computer

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the “brains” of the computer and executes instructions required by the software

A

central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a main circuit board

A

motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A popular interface for connecting high-definition displays, such as monitors and TVs, to computers

A

HDMI (High-Definition Multimedia Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Older video interfaces used to connect monitors and projectors to computers.

A

VGA (Video Graphics Array) and DVI (Digital Visual Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A high-performance video and audio interface used to connect monitors and other displays to computers

A

DisplayPort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A wired networking interface used to connect computers to local area networks (LANs) and the internet.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ports for connecting audio devices, such as speakers, microphones, and headphones, to computers

A

Audio jacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A wireless technology used to connect peripherals, such as keyboards, mice, headphones, and speakers, without the need for cables

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A wireless networking technology that allows computers to connect to the internet or local networks without the need for Ethernet cables.

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a set of computer instructions that tell the computer how to work and perform tasks.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 categories of software

A
  1. application
  2. utility
  3. system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

software an end user chooses to use that accomplishes a specific task for the user (e.g., Microsoft Excel and Adobe Photoshop)

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
software that **performs a particular function in the background** and requires little to no interaction with the user but is essential to the functioning of the computer (e.g., printer drivers and virus protection)
Utility
26
software that **supports a computer's basic functions**, such as scheduling tasks, executing applications, and controlling peripherals (e.g., Microsoft Windows, macOS, and Linux)
System
27
A computer network consists of **two or more devices**
network nodes
28
allow employees to **access** resources and **work remotely** from different locations
Networks
29
**facilitate centralized management of IT resources**, making it easier to monitor, maintain, and troubleshoot systems and devices
Networks
30
enable organizations to **implement centralized backup and disaster recovery** solutions, ensuring data protection and continuity in case of system failures or other issues
Networks
31
often considered as the **backbone of the IT infrastructure**
Networks
32
**raw**, unprocessed facts, figures, and **information** collected and stored in various formats
data
33
very **valuable asset** that a company can **acquire**
Data
34
an organized collection of structured **data** that is **stored** and managed in a way that allows for efficient access, retrieval, modification, and manipulation
Database
35
**smaller**, focused **data storage** solutions catering to specific business units, departments, or functions, containing a subset of data from a larger data warehouse
data marts
36
**centralized storage systems** for raw, unprocessed, or semi-structured data, capable of handling various file formats and types of data, often used for big data analytics, machine learning, and AI applications
Data lakes
37
**large**, centralized **repositories** for storing, managing, and analyzing vast amounts of structured and semi-structured data from various sources across an organization
data warehouses
38
**centralized** data storage and integration platforms that connect and consolidate data **from multiple sources**, focusing on data integration, data sharing, and data governance, ensuring data consistency and quality
data hubs
39
refers to the **people who design,** develop, maintain, and use **software and hardware systems** and the methodologies, processes, and practices that they follow | IT Professional
peopleware
40
who **install** and repair **computers** | IT Professional
hardware tech
41
who **install software** and assist users in using the software | IT Professional
software tech
42
**design**, install, and monitor the **network** to ensure it is running at maximum efficiency | IT Professional
network technicians and administrators
43
who design, create, and **monitor databases** so they can store and retrieve data crucial to the business processes | IT Professional
database administrators
44
who **oversee** the **IT department,** **manage** IT resources, and are responsible for setting IT policies and strategies within an organization | IT Professional
IT managers and directors
45
who **design**, develop, and maintain **software applications or systems**, working with programming languages, frameworks, and tools to create custom solutions for businesses or end users | IT Professional
software developers and engineers
46
who focus on **protecting** an organization's data, networks, and systems **from cyber threats** | IT Professional
IT security professionals
47
who are responsible for **overseeing IT projects** from inception to completion, ensuring that projects are delivered on time and within budget | IT Professional
IT project managers
48
who **analyze business users' needs** and find ways for IT to make processes more efficient or write specifications for programmers to write code | IT Professional
systems analysts
49
**People** also include those who **use** the **hardware, software, networks, and databases** in their daily work. | IT Professional
end users
50
the **execution** of software, data manipulation, and communication between **different components** **within** the IT infrastructure
processes
51
An online store **facilitates web purchases** that electronically process the order, credit card authorization, and payment | Type of Process
Order processing
52
The DMV **issues and updates drivers' licenses** | Type of process
License management
53
A **bank** accepts **deposits** and enables customer **withdrawals** of funds from a web portal, ATM, or teller | Type of Process
Banking transactions
54
A **patient record** is automatically **updated** based on user input to the patient's chart in a secure database management system
Healthcare record update
55
A process is used to manage **customer interactions**, tracking communication, sales, and support history to improve customer satisfaction and retention
Customer relationship management (CRM)
56
A process is used to **track the performance and availability of a network**, proactively detecting and resolving issues to ensure smooth business operations | Type of Process
Network monitoring
57
A process is used for **recruiting, onboarding, evaluating, and managing employees**, ensuring compliance with labor laws and maintaining a productive workforce.
Human resources management
58
**Security** measures that are made up of a combination of hardware and software that **make intranets secure**
firewalls
59
means it has been written by a company and it meets the needs of the business **right out of the box**
Off-the-shelf software
60
the **knowledge** that enables a person to **understand** something
Competency
61
a **management process**, technique, or method that is **most effective** at arriving at a desired outcome or a better outcome than any other process, technique, or method
best practice
62
computing power doubles every 18 month
Moore's law
63
What hardware component performs most of the calculations for a computer?
Central processing unit (CPU)
64
the major **markup language** used to **create webpages**
Hypertext Markup Language (HTML)
65
protocol used to **define how messages are formatted** and transmitted on the internet
Hypertext Transfer Protocol (HTTP)
66
a **tiny computer** part that helps other parts of the **computer talk to each other**
chipset
67
are **massive, room-sized computers** that process and store enormous amounts of bulk data and information
Mainframe Computers
68
require a **huge amount of physical space and have special requirements** like specialized air-conditioning units and fire protection systems
mainframes
69
are **less powerful and smaller in physical size** than mainframe computers and perform many of the same things but on a smaller scale
Midrange Computers
70
are **smaller** than mainframes and midrange computers and are so common that they are **most common**ly referred to simply as computers and sometimes just referred to as boxes
Microcomputers
71
**least powerful computers** in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.
Microcomputers
72
made to **reside on a desk** and is not portable
desktop computer
73
has the same basic components as a desktop and is **designed specifically for portability**
laptop
74
**compact but far less powerful** than desktops or laptops
Handheld Computers
75
a collection of computer **programs** that work together to **manage hardware and software** to ensure that they are working properly
An operating system (OS), often called a platform
76
the **storing and organizing files in the memory** of a computer
file management
77
a digital resource that **stores data, information, or instructions** that can be accessed by a computer program
computer file
78
refers to the **physical components** in a computer system that **store digital data and information temporarily or permanently** | Type of memory
Computer memory
79
**computer's short-term working memory** that the CPU accesses directly
RAM, or Random Access Memory
80
a **section of a hard disk** that ***mimics* a computer's RAM**
Virtual memory
81
plays an important role in the operating system by **allowing end users to run more applications than the system has** physical RAM to support
Virtual memory
82
**faster** than the RAM but has **minimal storage capacity**
Cache memory
83
are the **smallest** and **fastest** type of **memory**
Registers
84
a **solid-state storage device **that uses** integrated circuit assemblies** as memory to store data persistently
solid-state drive (SSD)
85
refers to nonvolatile, **secondary storage on a physical device** like a hard drive
Disk storage
86
a computer disk that **uses optical storage techniques** and technology to read and write data
optical disk
87
is a **software application** designed to organize, analyze, and manipulate data **using rows and columns of cells**
Spreadsheets
88
an **application** software used to **create, compose, edit, format, and print** documents
word processor
89
is used to present information in a **slideshow format**
Presentation Software
90
is used to create a **collection of related files** called tables that consist of records (rows) of data separated by fields (columns) that can be **queried to produce populations of information**
Database software, or database management system software (DBMS)
91
a type of **database** that **organizes data into one or more tables**, each with a unique key identifying each row
relational database
92
**collection** of business computer **application** programs of associated functionality that **share a common graphical user interface (GUI)** and have the capacity to exchange data across the programs smoothly
Software suites
93
where users can **pay a monthly or annual fee** to access the software
Subscription-based services
94
allow users to purchase and **download software directly to their devices**
App stores
95
can be accessed through a web browser **without the need for installation or licensing**
Cloud-based software
96
free to use and can be downloaded from the internet **without the need for purchase or licensing**
Open-source software
97
allows a user to **select an entire area from one application and a part of another**
Object embedding
98
Which type of memory is crucial to a computer's ability to perform multitasking effectively?
Virtual
99
Which type of computer category does a smartphone belong to?
Handheld computer
100
Which category of computer does a business laptop belong to?
Microcomputer
101
Which type of software is responsible for managing computer hardware, running applications, and controlling peripherals?
Systems software
102
encompasses technologies, practices, and processes designed to **protect networks** and their devices, programs, and data **from theft, damage, or unauthorized access**
cybersecurity
103
defined as **two or more computers connected together** to communicate and share resources
computer network
104
Each device **connected to a network**
node
105
connected to a central computer
server
106
**network made up of computers** like desktops, laptops, and portable devices
clients
107
a **card** that is plugged into a slot on the motherboard inside of the computer and **allows a network cable to be plugged in** so it can interface or communicate with other computers
network interface controller (NIC) card
108
**provides** the computer with a unique 48-bit address called a **MAC** (media access control) **address**
Ethernet card
109
responsible for the **transmission of data packets to and from the network interface card**, and to and from another remotely shared channel
MAC (media access control) address
110
a standard **language** that devices connected to a network **use to communicate and transfer data**
protocol
111
second basic network component
protocol
112
The third component that all networks have in common
physical cable system
113
the first component of all network
Network Interface Controller
114
The most used network cable
Ethernet cable
115
is the **fourth component** of a computer network
network hub
116
most common hub
Ethernet hub
117
is a device that acts as a **central connection point** for devices on a **network**
network hub
118
what replaced ethernet hubs
switches
119
**direct data to specific devices on the network** rather than sending it to all devices like a hub does, which helps to reduce collisions and improve network performance.
switches
120
a **set of protocols** used to **connect a network** to the internet
Transmission Control Protocol/Internet Protocol (TCP/IP)
121
is **software** that resides on a **network** server and controls an entire network
Network operating system (NOS)
122
responsible for **controlling network** traffic, administering packets, managing files, administering certain functions like backup, and maintaining network security
network operating system (NOS)
123
allows several **processes to occur simultaneously**
multiprocessing
124
responsible for smooth **network operations**, network performance, and implementation of new nodes or even new networks | IT Professional
network administrator
125
refers to the physical and logical layout of a computer network, including the connections between nodes (devices) | Type of Topology
network topology
126
a network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints
bus topology or linear bus
127
named for the star shape created by nodes that radiate around a central node in a spoke-like fashion | Type of Topology
star topology
128
ring shape created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other
ring topology
129
each node is connected to every other node in the network
mesh topology
130
a computer network that is relatively small, typically in a single building but sometimes as small as a single room
local area network (LAN)
131
a **computer network** that connects two or more LANs that are located on a **physical campus**, like an organization's national headquarters, or even an industrial complex
campus area network (CAN)
132
a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city
metropolitan area network (MAN)
133
are computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together
Wide area networks (WAN)
134
are computer networks that generally **connect computers directly to one another** without using a server
Peer-to-Peer Networks (P2P)
135
a **cloud storage service** that **utilizes P2P networking** to provide faster and more reliable file synchronization across devices
dropbox
136
a GPS navigation app that provides real-time traffic updates and routing information using a P2P network of drivers who share data on road conditions
Waze
137
world's largest network and connects thousands of other networks together including LANs, CANs, MANs, WANs, and P2P.
internet
138
is the practice of **protecting computer networks** and the information they contain **from unauthorized access**, theft, or damage
Network Security
139
secret word or combination of keyboard characters typed in by a user to authenticate one's identity for joining a computer network
passwords
140
is a security process that requires more than one way to prove you are who you say you are before you can access a computer or online account
Multi-Factor Authentication (MFA)
141
restrict or grant access to specific files and folders on a computer network to a user or group of users
permissions
142
can be described as a combination of specialized hardware and software that **ensures** that **only authorized personnel** can access and use an organization's network
firewall
143
refers to the protection of a computer system from physical damage, theft, or unauthorized access, whether from an external attacker or an internal user
computer security
144
includes the recognition, consequences, and **assessment of risk** to a computer's assets and developing strategies to manage and protect them
risk management
145
typically someone who attempts to invade, or disable, a computer's security measures to steal the computer resources
hacker
146
is extremely easy to breach, especially by a seasoned hacker
unsecured computer
147
Computer files that **infect** IT systems and reproduce like a biological virus by making copies of themselves within a host, such as a computer's memory or storage or on a network
computer virus
148
A program that uses networks to travel by **sending copies of themselves** to other parts of the network **without a user's knowledge** or intervention | malware
worms
149
A type of malware that encrypts a user’s files or **locks** their computer, making data **inaccessible**. The attacker then demands a **ransom** payment in exchange for the decryption key or unlocking the system
ransomware
150
A **set** of software **tools** that provide an attacker with **stealthy and persistent access** to a compromised system by hiding their presence and activities from users and security software
rootkits
151
A **collection of compromised** computers, known as "**bots**" or "zombies," remotely controlled by an attacker for various malicious activities
botnets
152
A program that **misleads users of its true intent**. When executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system
trojan horses
153
A program that is installed **covertly** on a computer to capture or take control of the system without the user's knowledge or consent
spyware
154
A program that automatically displays or downloads **advertising** to a computer
adware
155
A program that uses an electronic email system to arbitrarily **send millions of unsolicited** bulk **messages** to various users and accounts
spamming
156
A program that can make a computer or any of its resources **unavailable to its intended users**
Denial-of-Service (DoS)
157
A program that simply **records every keystroke** made at the workstation's keyboard
keylogging
158
computer programs that attempt to identify, prevent, and **eliminate** computer **viruses** and malware, typically before they reach a computing system or network
antivirus software
159
broad term that refers to any **fraudulent** activity in an **online** setting
internet fraud
160
an internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to **collect a per-click fee**
click fraud
161
involve **buyers** (typically in another country) who approach merchants **via spam** and ask whether they can pay for shipping with a **credit card**
Purchase Scams
162
Cybercriminals **steal personal data**, such as Social Security numbers, addresses, or credit card details, to impersonate someone and carry out fraudulent activities in the victim's name
Identity Theft
163
On online **auction** platforms, **fraudsters** may list items for sale and either not deliver them after receiving payment or deliver counterfeit, damaged, or significantly different items than advertised
Auction Fraud
164
Scammers **pretend** to be **tech** support **agents** to convince victims that their computers have problems
Tech Support Scams
165
**Fraudsters** advertise non-existent or misleading job opportunities that supposedly allow individuals to **work from home**
Work-from-home Scams
166
criminal activity involving using social engineering techniques and attempts to gain private information deceptively, like usernames, PIN numbers, passwords, and credit card details, by masquerading as a legitimate business organization, typically in a **legitimate-looking email**
Phishing
167
can be defined simply enough as the ability of an individual to keep personal information out of public view
privacy
168
can pose privacy risks, as these **networks** can be monitored or **intercepted by hackers**
Public Wi-Fi Networks
169
are a list of stored or cached websites on a user's computer that is essentially an account of where and what a user's web browser has visited on the web
History files
170
a criminal in an office or a public place will simply **glance over the victim's shoulder** and watch the person dial a phone number, or type in a password on a laptop, or use a credit card number
Shoulder Surfing
171
How does a peripheral device function in a network?
As a **shared resource** utilized by multiple end users
172
Two or more **computers** **connected to share resources** and communicate
computer network
173
How does creating an office network simplify the maintenance of employee workstations?
Client computers’ software **updates** can be done at once **from the server**.
174
Which component is essential for each client computer in the office to connect to the new network?
A network interface card
175
Which network type is appropriate for a business with 25 employees working at a single location?
Local area network (LAN)
176
Which network component is specifically designed to **prevent unauthorized access** when the business handles sensitive data and requires high network security?
Firewall
177
Which type of computer runs a network operating system (NOS)?
server
178
Which type of software is designed to easily generate **Gantt charts**?
Project management software
179
Which term describes **physical** aspects of a **computer**?
hardware
180
Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts?
Database software
181
What is the purpose of a firewall?
Prevent unauthorized access
182
Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business?
End-users
183
A large company is investing in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server?
Computer System Administrator
184
A small business has a single network that allows every employee to connect through a central server when they are in the company’s main office. Which type of network is the business using?
Local area network (LAN)
185
What **term** refers to the study, design, development, implementation, support, and management of **computer-based information systems**?
Information Technology
186
An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. Which type of fraud does this email represent?
Phishing