The Role of IT in Business Flashcards

1
Q

What is hardware?

A
  • the physical components of computer and computer-related acccessories
  • includes a wide array of internal computer components as well as external peripheral devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is computer hardware?

A
  • key hardware components within a computer include microprocessors, grphics and sound cards, hard drives, random access memory or RAM, the power supply, and the motherboard which connects most of these critical pieces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are external hardware devices?

A
  • do not need to be integrated into the machine itself
  • computer mice, keyboards, speakers, microphones, disk drives, memory devices, network cards and monitors may be bult in or may be external devices that connect wither wirelessly or directly to a computer through a wired connection
  • printers, scanners and networking equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is infrastructure housing?

A
  • the facilities and safeguards on those facilities that contain hardware, such as data centers or offices, are part of the broader IT infrastructure
  • includes advanced security systems to monitor and control access
  • includes ventiliation and climate control to keep temperatures down to prevent equipment from overheating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a networking device?

A
  • networking hardware enables connectivity and communication between devices on a computer network
  • those devices transmit information, or “packets” between devices in order to communicate with each other
  • packets are pieces of data that contain multiple layers of info including headers, the length or size of the packet, its origin and destination, protocol and various other pieces of info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a modem?

A
  • connects an org’s network to the internet
  • modern modems have replaced traditional ones with digital broadband technology like cable modems, digital subscriber lines, and integrated services digital network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a router?

A
  • manage network traffic by connecting devices to form a network
  • they read the souce and destination fields in info packets to determine the most efficient path through the network for the packet to travel
  • act as a link between modem and the org’s switches
  • if no switches, router will connect directly to a user’s device
  • assigns IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a switch?

A
  • similar to routers in that they connect and divide devices within a computer network
  • a network switch can turn one network jack into several network jacks so multiple devices can share one network connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a gateway?

A
  • a computer or device that acts as an intermediary between different networks
  • transforms data from one protocol into another so that info can flow between networks
  • a protocol is a rule or set of rules that governs the way in which info is transmitted, with one of the most common protocols being that which is used for the internet known as TCP/IP
  • a gateway interprets these differing protocols and converts them into the appropriate format to facilitate network movement, usually between a co’s network and the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a server?

A
  • physical or virtual machines that coordinate the computers, programs and data that are part of the network
  • most business networks use a client/server model in which the client sends a request to the server and it provides a response or executes some action
  • web servers, file servers, print servers, database servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a firewall?

A
  • software applications or hardware devices that protect a person’s or company’s network traffic by filtering it through security protocols with predefined rules
  • intended to prevent unauthorized access into the organization, block malicious programs or code and prevent employees from downloading malicious programs or acessing restricted sites
  • firewalls can be set to only allow trusted sources to transmit across the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 types of firewalls?

A

Circuit-level gateways- controls traffic solely based on the source of origin, the intended destination, the port and other basic info about a session although it does not filter based on the actual content so any data that is requested will be allowed through the firewall unless combined with some other filter

Application- level gateways- proxy firewalls; inspect and filter the contents of the packet based on predefined rules; can be expensive and burdensome to a network due to the amount of processing required to function

Stateful Multilayer inspection firewalls- combines the features of circuit-level and application-level gateways, but also ensures that packets are validated at multiple layers of the communication process through which those packets pass

Next Generation firewalls- provides more advanced protection than stateful multilayer inspection; further protect a network by applying more scrutiny to those packets using more sophisticated techniques such as intrusion detection, user identification, VPN and deep packet inspection

Network Address translation firewalls- converts a group of private IP addresses into a single public IP address prior to communicating with other devices outside of a co’s network; every device that connects to a private or public network is assigned an IP address so it can communicate with other devices and networks using those addresses; by masking the addresses inside a private network, it is more difficult for threats to reach any machine directly, providing an extra layer of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is software?

A
  • the applications, procedures or programs that provide instructions for a computer to execute
  • controlled by a user interacting with the program which gives instructions to the physical computer’s operating system
  • software embedded in hardware that instructs the hardware how to operate is firmware; not updated frequently or at all
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Local Area Network (LAN)?

A
  • provide network access to a limited geographic area such as a home or office
  • controlled by software-defined networking (SDN) applications and uses a private IT infrastructure so that data is transported over private lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Wide Area Network (WAN)?

A
  • provide network access to a larger geographic area such as cities, regions or countries
  • connect other networks such as LANs together to provide broad coverage by also using an SDN
  • the network hardware may be a combination of public and private lines, with configuration being distributed across the various locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Software Defined Wide Area Network (SD-WAN)?

A
  • managed and deloyed on the cloud (internet) using a centralized software application
  • maintaining networking equipment, the lines that connect it, and other expensive infrastructure comonents is minimized with this technology
  • essentially a network running on another network
17
Q

What are edge-enabled devices?

A
  • support the org at the edge or perimeter of a system’s network
  • much of the processing power is happening on local devices spread across geographical locations
  • less reliance on a central source means a faster, more consistent network
18
Q

What is a Virtual Private Network (VPN)?

A
  • encryted private networks that run on a public network like the internet
  • user activity and device IP addresses are hidden, assuming the identity of teh VPN servers
  • 3rd parties can no longer see individual user traffic, which provides a layer of security for orgs
19
Q

What are Mgmt Info Systems (MIS)?

A
  • enable companies to use data as part of their strategic planning process as well as the tactical execution of that strategy
  • has subsystems such as acctg info systems (AIS), decision support systems (DSS) and executive info systems (EIS)
20
Q

Define AIS

A
  • collects, stores and records transactions
  • provides financial reporting
  • primary users: accountatns, managers
21
Q

What are the 3 subsystems of an AIS?

A

Transaction Processing System (TPS)- converts economic events into financial transactions (JEs) and distributes the info to support daily operations and functions. Typically covers 3 main transaction cycles: sales cycle, conversion cycle and expenditure cycle

Financial reporting system (FRS) or GL system (GLS)- aggregates daily financial info from the TPS and other sources for infrequent evnts such as mergers, lawsuit settlements, or natural disasters to enable timely regulatory and financial reporting

Mgmt reporting system (MRS)- provides internal financial info to solve day to day business problems, such as budgeting, variance analysis or cost-volume profit analysis

22
Q

What is a Decision Support System (DSS)?

A
  • provides interactive tools to support day to day decision making
  • may leverage AI or scenario modeling
  • used by all employees
23
Q

What is the Executive Information System (EIS)?

A
  • provides summarized data to executives for strategic decision making
  • used by executives and managers
24
Q

What is an Enterprise Resource Planning (ERP) system?

A
  • comprehensive cross functional system that supports and integrates different departments
  • used by all employees
  • security around access controls for multiple systems is centralized
  • data is stored in a central repository
  • is expensive
25
Q

What is the Customer Relationship Mgmt System (CRM)?

A
  • manages interactions between the organization and its past, current and potential customers
  • used by marketing managers and customers
26
Q

What is the Inventory Management System?

A
  • assists with tracking, procurement and distribution of inventory items
  • track item quantities and rigger reordering when quantities fall below a predetermined level
  • usually connected to a POS system so that each time an item is sold, one unit of that item is removed from the inventory count
  • used by managers and employees handling goods for sale
27
Q

What is a Knowledge Management System (KMS)?

A
  • any IT system that acts as a resource repository or disseminates knowledge for products or service delivery
  • used by all employees and customers
28
Q

What is Supply Chain Management (SCM)?

A
  • unifies supply chain processes begining with suppliers and ending with the customer
  • what, when, where the goods were delivered and how much the goods cost
29
Q

What is Enterprise Performance Management (EPM)?

A
  • mgmt process focus systems to help executives make strategic decisions
  • used by execs and managers
30
Q

What is E-Commerce?

A
  • platforms that facilitate the sale of goods and services via the internet (B2B, B2C, C2B, C2C)
  • removes OH costs, encourages competition, creates new markets and provides a level playing field in terms of the knowledge available to all parties
  • drawbacks: shipping lag times, IT platform malfunction, personal info misuse and a potential lack of human support
31
Q

What is Cloud Computing?

A
  • a cost efficient method to use, maintain and upgrade
  • involves virtual servers that allow users access to applications and services over the internet on a real-time basis rather than housing data on site
  • upfront and maintenance costs are usually much cheaper than a software solution installed in-house