00 - Introduction to IT | Cheatsheet Flashcards

Appendix deck with a list of the acroynoms

1
Q

CU

A

Control Unit (CU)
The Control Unit (CU) on a CPU receives information from the software; then, it distributes and directs the data to the relevant hardware components.

Some functions of the CU:
- Determine what/where the next instruction must go for processing
- Send clock signals to all hardware to force synchronous operations
- Send memory taskings if appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

BNS

A

Binary Numbering System
The binary numbering system is built on a base of 2. Every time we reach a power of 2, we add another digit. The decimal system works the same way, just with 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALU

A

Arithmetic and Logic Unit (ALU)
An Arithmetic Logic Unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It is the fundamental building block of the CPU.

Some ALU functions:
- Addition & subtraction
- Determining equality
- AND/OR/XOR/NOR/NOT/NAND logic
gates and more!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Registers

A

Registers
A register is a volatile memory system that provides the CPU with rapid access to information it is immediately using.

Functions of a register:
- Store temporary data for immediate processing by the ALU
- Hold “flag” information if an operation results in overflow or triggers other flags
- Hold the location of the next instruction to be processed by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CPU

A

The CPU
A Central Processing Unit (CPU) is the electronic circuitry that executes instructions based on an input of binary data (0’s and 1’s). The CPU consists of the Control Unit (CU), the Arithmetic and Logic Unit (ALU), and registers (Immediate Access Store).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAM

A

Random Access Memory (RAM)
Random Access Memory, or RAM, is additional high-speed memory that a computer uses to store and access information on a short-term basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Latency

A

Latency Measure
Latency is the amount of delay before that transfer of data begins.

Some common latency numbers:
- Read from solid state drive: 150 microseconds
- Ethernet connection: 10 milliseconds
- 4G connection: 80 milliseconds
- Satellite connection: 900 milliseconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hard Disks

A

Hard Disks
Hard disks, or hard drives, are responsible for the long-term, or secondary storage of data and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Main Computer Functions

A

Main Functions of a Computer
There are four main functions of a computer that make user interaction possible:

Input
Processing
Memory
Output

  • Input is data we give to our computers through interactions
  • Processing is comprised of the translation of input and the instructions given for output
  • Memory is used to store either temporary or permanent information
  • Output is the information that gets returned by the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Throughput

A

Throughput Measure
Throughput is the total amount of data that can be transferred in a given amount of time.

Some common throughput numbers:
- Smartphones: 500MB/Sec
- Desktop drive: 5,000MB/Sec
- RAM: 20,000MB/Sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Mainboard

A

The Mainboard
The mainboard, or motherboard, is a printed circuit board that houses important hardware components via ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ports

A

Ports
A port is a physical outlet used to connect devices to a computer. A computer typically contains multiple ports. This connection allows for communication between the IO device and the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Model

A

OSI Model
The OSI Model is a conceptual, implementation-neutral model that describes networking in seven separate layers, where each layer covers a set of functions and tasks.

This model helps us communicate while we do network troubleshooting and architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Protocols

A

Network Protocols
A network protocol is a set of standards for Internet traffic.

Among them are the big transport protocols:

  1. TCP and UDP
  2. HTTP for web requests
  3. DNS to convert domain names to IP addresses
  4. IMAP/POP3 for email
  5. SSH
  6. FTP
  7. SMB for access to specific resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP/IP Model

A

The TCP/IP Model is an implementation-specific networking model that revolves around the TCP protocol and IP addressing which anchor the Internet as we know it.

Its layers include:

The Network Layer
The Internet Layer
The Transport Layer
The Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Layers

A

The OSI layers include: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  1. The Physical layer includes physical technologies
  2. The Data Link layer includes data framing and local MAC addressing
  3. The Network layer includes connecting to the larger web and IP addressing
  4. The Transport layer includes protocols that make sure reliable delivery happens
  5. The Session layer authenticates and maintains communication over a period of time
  6. The Presentation layer en/decrypts and translates data into presentable form
  7. The Application layer includes all the applications we interact with that render data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network

A

Network
A network is two or more computers or devices that are linked in order to share information.

Networking refers to a large set of standards and protocols that organize and regulate the sharing of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Categories

A

Three broad categories of networks include:

Local Area Network (LAN), a smaller-sized network that connects multiple devices in a small area

Campus Area Network (CAN), a larger network that connects multiple computers and devices over a slightly larger area

Wide Area Network (WAN), the largest-sized network that connects multiple computers, over a geographically large area

The Internet is technically a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Internet

A

The Internet
The internet refers to the actual network of connected computing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The World Wide Web

A

The World Wide Web
The world wide web is a collection of interlinked websites and other web resources that use the internet to share data.

www.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Client-Server Model

A

The Client-Server Model
The client-server model describes how the flow of data is transferred on the internet.

20
Q

Web 2.0 Applications

A

Web 2.0 applications provide a dynamic user experience by:

  1. Responding to user input without having to reload the page
  2. Emphasizing user-generated content and social sharing.

This was made possible through technical advances such as JQuery and web frameworks.

21
Q

Mobile Internet Traffic

A

Mobile Internet Traffic
Mobile internet traffic accounts for more than half of all internet traffic and has caused web development practices to provide a good user experience regardless of device type.

22
Q

Responsive Web Design

A

Responsive Web Design
Responsive web design allows the presentation of websites to adjust based on the size of the window in which they are displayed.

22
Q

Mobile Application Connection

A

Mobile Application Connection
Mobile applications are not a part of the world wide web although most of them are connected to the internet.

23
Q

TCP/IP

A

TCP/IP
Transmission Control Protocol and Internet Protocol (TCP/IP) are standards for data transfer which allow networks all over the globe to communicate with each other.

24
Q

The Operating System

A

The Operating System
The operating system (OS) is system software that manages the basic functionalities of a computer and is responsible for tasks such as process management, memory management, file system management, IO management, networking, security, and providing a user interface.

25
Q

Filesystem

A

Filesystem
The filesystem is the data structure used by the operating system to store and retrieve data.

26
Q

Filesystem File

A

Filesystem File
A file is a unit of storage used to describe a self-contained piece of data and can have a variety of possible formats based on what that file contains.

26
Q

Filesystem Directory

A

Filesystem Directory
A directory is a data structure that contains references to files and other directories. They are typically organized in a hierarchical tree structure called a directory tree.

27
Q

Working Directory

A

Working Directory
A working directory, also called a current directory, is the directory associated with the execution of a process.

27
Q

File Attributes

A

File Attributes
File attributes are a collection of metadata that determine how files behave, such as if they are hidden or compressed.

28
Q

File Permissions

A

File Permissions
File permissions determine which users and groups can read, write, and execute the file.

29
Q

File Control Block

A

File Control Block
A file control block contains the metadata for a file, such as permissions and access times.

30
Q

Pseudocode

A

Pseudocode
Pseudocode is a description of an algorithm using everyday wording, but molded to appear similar to a simplified programming language.

EXAMPLE
define password
create a pass_length variable and set it to 0
create a contains_number variable and set it to False
if the entire password hasn’t been searched:
iterate to the next character of the password
increment the pass_length variable
if the current character of the password contains number:
set contains_number to True
if pass_length is greater than 8 and if contain_number is equal to True:
valid password
otherwise:
invalid password

30
Q

Flowchart Shapes

A

Flowchart Shapes
In code-based flowcharts, common ANSI shapes are:

  1. ovals for terminals
  2. arrows for flowlines
  3. rhomboids for inputs and outputs
  4. rhombuses for decisions
  5. rectangles for processes.
31
Q

File and Directory Operations

A

File and Directory Operations
Both files and directories can be created, opened, read, written, deleted, closed, linked, unlinked, listed and truncated. It is possible to move across directories as well as find files within directories.

EXAMPLE
/ Create a file named lunch
touch lunch

// Write a list of foods to the lunch file
echo “burger, salad, and sandwich” > lunch

// Read the file
cat lunch

// Delete the file
rm lunch

// Make a directory named dinner
mkdir dinner

// List the files in the dinner directory
ls dinner

// Delete the directory
rm -r dinner

32
Q

Filesystem Layers

A

Filesystem Layers
The filesystem has multiple layers of abstraction:

  1. The application programs
  2. Logical file system
  3. File-organization module
  4. Basic file system
  5. IO control
  6. Devices.
33
Q

Column Constraints

A

Column Constraints
Column constraints are the rules applied to the values of individual columns:

  1. PRIMARY KEY constraint can be used to uniquely identify the row.
  2. UNIQUE columns have a different value for every row.
  3. NOT NULL columns must have a value.
  4. DEFAULT assigns a default value for the column when no value is specified.

There can be only one PRIMARY KEY column per table and multiple UNIQUE columns.

EXAMPLE
CREATE TABLE student (
id INTEGER PRIMARY KEY,
name TEXT UNIQUE,
grade INTEGER NOT NULL,
age INTEGER DEFAULT 10
);

34
Q

CREATE TABLE Statement

A

CREATE TABLE Statement
The CREATE TABLE statement creates a new table in a database. It allows one to specify the name of the table and the name of each column in the table.

EXAMPLE
CREATE TABLE table_name (
column1 datatype,
column2 datatype,
column3 datatype
);

35
Q

INSERT Statement

A

INSERT Statement
The INSERT INTO statement is used to add a new record (row) to a table.

It has two forms as shown:

  1. Insert into columns in order.
  2. Insert into columns by name.

EXAMPLE
– Insert into columns in order:
INSERT INTO table_name
VALUES (value1, value2);

– Insert into columns by name:
INSERT INTO table_name (column1, column2)
VALUES (value1, value2);

36
Q

DELETE Statement

A

DELETE Statement
The DELETE statement is used to delete records (rows) in a table. The WHERE clause specifies which record or records that should be deleted. If the WHERE clause is omitted, all records will be deleted.

EXAMPLE

DELETE FROM table_name
WHERE some_column = some_value;

37
Q

ALTER TABLE Statement

A

ALTER TABLE Statement
The ALTER TABLE statement is used to modify the columns of an existing table. When combined with the ADD COLUMN clause, it is used to add a new column.

EXAMPLE
ALTER TABLE table_name
ADD column_name datatype;

38
Q

CIA Triad: Confidentiality

A

CIA Triad: Confidentiality
In Cybersecurity, Confidentiality is the pillar of the CIA triad which refers to the principle that only those who should have access to information can access it.

38
Q

UPDATE Statement

A

UPDATE Statement
The UPDATE statement is used to edit records (rows) in a table. It includes a SET clause that indicates the column to edit and a WHERE clause for specifying the record(s).

EXAMPLE

UPDATE table_name
SET column1 = value1, column2 = value2
WHERE some_column = some_value;

39
Q

CIA Triad: Integrity

A

CIA Triad: Integrity
In Cybersecurity, Integrity is the pillar of the CIA triad which refers to the principle that data is what we expect it to be.

In other words, data should not be able to be edited by unauthorized parties.

40
Q

CIA Triad: Availability

A

CIA Triad: Availability
In Cybersecurity, Availability is the pillar of the CIA triad which refers to the principle that data is reliably available.

41
Q

Threat Intelligence

A

Threat Intelligence
In Cybersecurity, threat intelligence is the continuous gathering of knowledge of possible attacks.

42
Q

Risk management

A

Risk management
Cyber risk management is an ongoing process of identifying, analyzing, and remediating your organization’s cybersecurity threats.

Some of the key components include:

  1. Development of policies and procedures
  2. Identification of emerging risks
  3. Testing of the overall security posture
  4. Documentation of vendor risk management.
43
Q
A
43
Q

Security Principle: CIA Triad

A

Security Principle: CIA Triad
One of the most important security principles is the CIA triad, which stands for Confidentiality, Availability, and Integrity.