All Deck Flashcards
What is the system unit?
The main part of a computer housing essential hardware components (CPU, memory, and storage) responsible for processing and storing data.
What does the system unit not include?
External devices like the monitor, keyboard, or mouse.
What is user support in IT systems?
Provides support to enable employees to complete their tasks.
What does data and information management involve?
Efficient storage and dissemination of organization data with a focus on disaster recovery and business continuity.
What is the role of networks in IT systems?
Supports communication between elements of an IT system using hardware and software.
What is systems integration?
Combining various systems to work seamlessly to support organizational functions like human resources or project tracking.
What do software systems do?
Implement algorithms, perform calculations, manipulate files, and automate repetitive or dangerous tasks.
Examples of software system tasks?
Sending emails, editing text, controlling a robotic arm.
What are the risks of unauthorized data access?
Data loss, exposure to competitors, and disruptions in availability.
What is an intranet?
Resources available for the public.
What is an internet (internal)?
Resources available only for specific users or systems within an organization.
What is an extranet?
Internal resources available to other specific organizations or users, like third-party consultants.
What does computer engineering (CE) focus on?
Designing hardware systems and the software that makes them function, including embedded systems.
What does computer science (CS) focus on?
Design and implementation of software, including robotics, AI, and problem-solving algorithms.
What does software engineering (SE) focus on?
Creating and maintaining reliable and efficient software systems.
What does information systems (IE) focus on?
Integrating IT solutions to meet organizational business goals.
What does information technology (IT) emphasize?
The technology that supports information systems, not the information itself.
What does an IT administrator do?
Sets policies for IT.
What does an IT architect do?
Sets strategy and usage for technology.
What does an IT engineer do?
Implements IT architect plans.
What does a help desk professional do?
Troubleshoots IT problems, supporting users like those using Apple or Google.
What does a DevOps professional do?
Admins, programmers, and engineers work together to fix IT issues.
What does a system administrator do?
Provides technical support for hardware/software issues.
What does a network administrator do?
Designs, sets up, and maintains an organization’s network.
What does a database administrator do?
Installs and configures databases.
What does a security administrator do?
Installs, administers, and troubleshoots network security.
What does a web administrator do?
Troubleshoots error messages on a website.
What does a cloud architect do?
Oversees cloud computing systems.
What does a network architect do?
Designs networks and monitors traffic.
What does an automation architect do?
Modernizes business processes and evaluates automation potential.
What does a cybersecurity architect do?
Designs, builds, tests, and implements security systems.
What does a machine learning engineer do?
Enables organizations to take full control of their data.
What does a software engineer do?
Designs and develops software for systems, including operating and embedded systems.
What does a network engineer do?
Sets up, maintains, and upgrades systems supporting data exchange.
What does a cloud engineer do?
Identifies cloud migration opportunities to enhance IT operations.
What does technical support do?
Supports, monitors, and maintains workplace technology.
What does a help desk technician do?
Provides first-line support to customers in person or over the phone.
What does a project manager do?
Organizes resources to ensure projects are completed on time and within budget.
What does a web developer do?
Builds and maintains websites and their infrastructure.
What does a software tester do?
Creates and executes test plans for system anomalies.
What does technical sales do?
Identifies and helps clients adopt IT services or technologies.
What does a data analyst do?
Uses statistical methods to gain insights that support decision-making.
What does a systems analyst do?
Investigates business problems and creates information systems solutions.
What does a security analyst do?
Monitors a network for security breaches.
What does a cybersecurity specialist do?
Secures information systems and ensures data integrity, confidentiality, and availability.
What is the data pyramid?
Data: raw values, Information: understanding relations, Knowledge: understanding patterns, Wisdom: applied knowledge.
What is Infrastructure as a Service (IaaS)?
Provides virtualized computing resources like virtual server space and network connections.
What is Platform as a Service (PaaS)?
Offers a platform for developing and managing web applications, with reduced infrastructure needs.
What is Software as a Service (SaaS)?
Delivers software via subscriptions with online access. Examples: Gmail, Google Docs.
What is big data?
A large collection of data that cannot be processed by traditional tools, used by companies like Amazon and Netflix.
What are information systems?
Data collections used to support decision-making, often involving technology.
What is data quality and its importance?
Data is valuable for decision-making; poor-quality data leads to financial losses.
What are types of bad data?
Duplicate, conflicting, incomplete, invalid, or unsynchronized data.
Precision (Quality Data Attributes)
Data must be accurate for its intended use; healthcare often requires higher precision.
Validity (Quality Data Attributes)
Data should meet collection criteria; invalid data can mislead decisions.
Reliability (Quality Data Attributes)
Data should be consistent regardless of how or where it’s stored.
Timeliness (Quality Data Attributes)
Data must be current for decision-making; outdated info can cause poor decisions.
Completeness (Quality Data Attributes)
Data should be comprehensive; incomplete data can lead to misinterpretations.
Computer System (Definition)
A system of hardware and software that stores, retrieves, and processes data.
Uses of Computer Systems
Typing, emails, gaming, web browsing, creating docs, storing data, analyzing results.
Presence of Computers
Now embedded in many devices like cameras, elevators, and temperature systems.
IPO Model
Input, Process, Output: Explains how a computer system functions.
IPOS Model
IPO Model plus Storage for holding input, output, and results.
Main Functions of a Computer System
Input, Process, Output, Storage: Performs tasks based on user or environment input.
Network (Definition)
A system connecting two or more devices to share data and info.
LAN (Network Type)
Local Area Network, connects devices in a single location (home or office).
WAN (Network Type)
Wide Area Network, connects devices over large distances, e.g., the internet.
Client-to-Server Network Design
Servers manage access and resources like user authentication.
Peer-to-Peer Network Design
Devices share resources directly without a server, e.g., BitTorrent.
Physical Topology
The actual layout of devices in a network, e.g., star topology.
Logical Topology
How data flows within the network, important for traffic management.
Bus Topology
All devices share a single communication line.
Star Topology
All devices connect to a central hub or router.
Ring Topology
Each device connects to two others, forming a circle.
Mesh Topology
Devices are interconnected for redundancy.
Protocols (Definition)
Languages for data exchange, e.g., TCP/IP used online.
Network Hardware
Devices like routers, access points, and switches that enable communication.
Cable Media
Media like fiber optic and Ethernet used for data transfer.
Abacus
Strings of beads used for calculations, one of the earliest calculating tools.
First Generation Computers (1946–1959)
Used vacuum tubes, large size, high power consumption, prone to malfunction.
First Gen Computers Programming
Relied on machine languages, could run one program at a time.
First Gen Computers Input/Output
Used punched cards for input, printed output.
First Gen Notable Models
ENIAC, EDVAC, UNIVAC, IBM-701, IBM-650.
Second Generation Computers (1959–1965)
Used transistors, smaller, more reliable, and economical than first-gen.
Second Gen Input/Output
Continued using punched cards, with tapes and disks for storage.
Second Gen Programming Languages
Assembly languages and early high-level languages like FORTRAN and COBOL.
Second Gen Notable Models
Honeywell 400, IBM 7094, CDC 1604, CDC 3600, UNIVAC 1108.
Third Generation Computers (1965–1971)
Used integrated circuits (ICs) on silicon chips, reducing size and improving speed.
Third Gen User Interaction
Users interacted via keyboards and monitors, with operating systems enabling multitasking.
Third Gen Notable Models
PDP-8, PDP-11, ICL 2900, IBM 360, IBM 370.
Fourth Generation Computers (1971–Present)
Used microprocessors, significantly reducing size, increasing processing capabilities.
Fourth Gen Notable Chip
Intel 4004 (1971) integrated all components on one chip.
Fourth Gen Home Computers
IBM home computer (1981) and Apple Macintosh (1984) introduced personal computing.
Fourth Gen Operating Systems
Developed MS-DOS, Microsoft Windows, and others.
Fifth Generation Computers (1980s–Present)
Uses ultra-large-scale integration (ULSI) and supports AI development.
Fifth Gen Key Features
Parallel processing, AI, natural language processing, robotics, neural networks.
Quantum Computing
Non-classical computation model, expected to be more efficient than modern computing.
Quantum Computing Power Efficiency
Expected to reduce power consumption by 100 to 1000 times.
Nanotechnology
Involves building structures at the molecular level using nanoscale tools.
Nanotechnology Applications
Medicine, automotive, aerospace, food, and electronics.
Computer Hardware
Physical components of a computer (monitor, keyboard, mouse, etc.).
CPU (Central Processing Unit)
Processes all information from programs, measured in gigahertz (GHz).
RAM (Random Access Memory)
Temporarily stores data for quick access, found in memory slots.
Hard Drive
Stores permanent and temporary data (programs, photos, documents).
HDD
Hard Disk Drive, uses spinning magnetic disks to store data.
SSD
Solid State Drive, uses flash memory chips for faster data access.
GPU (Graphics Processing Unit)
Processes graphic data, crucial for 3D rendering.
Expansion Card
Circuit board inserted to add functionality to a computer.
IPOS Model
Input-Process-Output-Storage model explaining how computers work.
Von Neumann Architecture
Another name for the IPOS model, includes CPU, storage, and peripherals.
ALU (Arithmetic Logic Unit)
Performs operations on data like addition or subtraction.
Control Unit
Coordinates the activities of the CPU.
Registers
Temporary holding areas for data before processing.
MAR (Memory Address Register)
Holds the memory location of data to access.
MDR (Memory Data Register)
Holds data being transferred to/from memory.
AC (Accumulator)
Holds results from the ALU.
PC (Program Counter)
Holds the address of the next instruction to execute.
CIR (Current Instruction Register)
Holds the current instruction being processed.
RAM
Volatile memory that stores data temporarily while the computer is powered on.
ROM
Non-volatile memory that stores essential system instructions.
Input Devices
Devices like keyboards and mice that move data into the computer.
Output Devices
Devices like printers and monitors that move information out of the computer.
Address Bus
Carries the destination address for data processing.
Data Bus
Transfers data between the processor, memory, and I/O devices.
Control Bus
Carries control signals and status signals within the computer system.
System Unit
Houses key components like the motherboard, CPU, RAM, and power supply.
Motherboard
The main circuit board of the computer.
System Clock
Sends electrical pulses to synchronize the operation of computer components.
Expansion Slots
Sockets for installing expansion cards like graphics and network cards.
Ports
Sockets for connecting cables, like USB ports.
Secondary Storage Devices
Store data permanently, e.g., hard drives, flash drives, CDs, DVDs.
Bit
Smallest unit of storage, either 0 or 1.
Byte
Group of eight bits, enough to store a single character.
Input Devices Examples
Keyboard, mouse, barcode reader, stylus.
Output Devices Examples
Monitor, printer, speaker, 3D printer.
Modems
Send information over phone lines or coaxial cables.
Network Cards
Transfer data over network cables.
Bluetooth
Enables wireless communication between devices.
Supercomputers
Fastest computers used for scientific applications like weather forecasting.
Mainframe Computers
Support hundreds or thousands of users at once, ideal for large organizations.
Workstations
Single-user computers designed for technical applications like design.
Microcomputers
General-purpose computers for individual use, like desktops and laptops.
PAN (Personal Area Network)
Short-range communication network, e.g., Bluetooth.
LAN (Local Area Network)
Network within a single building or complex, like a school or office.
WAN (Wide Area Network)
Links systems over large distances, like across countries.
What is a network?
A collection of two or more connected devices that can communicate with each other.
What are the types of transmission media?
Wired: Twisted pair cables, coaxial cables, optical fiber cables. Wireless: Radio waves, microwaves, infrared waves.
What is a twisted pair cable?
Most widely used type of transmission media, available as UTP (unshielded) or STP (shielded) with various categories (e.g., CAT5, CAT6).
What is the maximum segment length of twisted pair cables?
100 meters (328 feet).
What is coaxial cable used for?
Used in computer networks and cable TV; it has bandwidth 80 times that of twisted pair wires.
What are fiber-optic cables?
Cables that transmit data using light, with bandwidth up to 26,000 times that of twisted pair cables.
What is wireless transmission?
Data transmission using electromagnetic waves (e.g., Wi-Fi, Bluetooth, infrared).
What is the role of a repeater?
Extends the range of cabling by amplifying network signals.
What is the role of a bridge in a network?
Connects different types of networks and manages message traffic between them.
What is a switch used for in a network?
Manages LAN traffic, reducing unnecessary broadcasts by sending messages only to the intended device.
What does a router do?
Enables internet connectivity, acting as a gateway for LANs and forwarding data between networks.
What is the role of Tier 1 ISPs?
Backbone of the Internet, with high-speed, high-capacity international WANs.
What is the role of Tier 2 ISPs?
Regional ISPs that work with Tier 1 ISPs to provide communication infrastructure.
What is the role of Tier 3 ISPs?
Provide internet access to homes and businesses, also known as access ISPs.
What is an IP address?
A unique identifier for each device on a network.
What is the difference between IPv4 and IPv6?
IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses for a larger address space.
What is the role of ICANN?
Manages IP address allocation and domain name registration on the Internet.
What does DNS stand for?
Domain Name System: It translates human-readable domain names into numerical IP addresses.
What is a URL?
A unique address for each document on the World Wide Web.
What is HTTP?
Hypertext Transfer Protocol, the foundation of data communication on the World Wide Web.
What does VoIP stand for?
Voice over Internet Protocol, enabling voice communication over the Internet.
What is streaming?
Transporting audio and video data across the Internet in near real-time.
What is the function of HTML?
A markup language for creating web pages and linking documents via hyperlinks.
What is XML?
Extensible Markup Language, used for representing data with an emphasis on its meaning.
What is computer security?
Protection of computer systems from theft, damage, or unauthorized access.
What is encryption?
A method of protecting data by converting it into a secure format that can only be read by authorized users.
What is a firewall?
A system that monitors and controls incoming and outgoing network traffic based on security rules.
What is malware?
Malicious software designed to harm or exploit devices, services, or networks.
What is a denial-of-service (DoS) attack?
An attack that overloads a system with messages, making it unavailable to legitimate users.
What is a brute force attack?
Attempts to guess passwords by trying all possible combinations.
What are best practices for network security?
Use strong passwords, regularly update software, back up data, educate users, implement access controls.
What is the purpose of a firewall?
To filter traffic, blocking untrustworthy sources and preventing unauthorized access.
What is a proxy server?
Acts as an intermediary between a client and a server, providing an additional layer of security.
Network Auditing Software
Monitors network behavior, including traffic origin and volume to enhance overall security.
Antivirus Software
Detects and removes known viruses from the network to prevent malware infections.
Motives for Network Vandalism
Attackers may disrupt systems or gain unauthorized access to information.
Traditional Access Control
Protecting information with passwords, which can be easily compromised during data transfer.
Encryption
Encodes data to keep it confidential, ensuring unreadability to unauthorized users.
Operating Systems (OS)
Software that manages hardware and helps run other programs (e.g., Windows, macOS, Linux).
Application Software
Programs designed for specific tasks, such as Microsoft Word (writing) and Adobe Photoshop (photo editing).
Types of Application Software
Includes productivity software (e.g., Word), database software (e.g., MySQL), graphic design software (e.g., Adobe Illustrator), and accounting software (e.g., QuickBooks).
System Software
Helps run the computer and applications, including operating systems and utility software (e.g., antivirus programs).
Software Hierarchy
Includes application software and system software, which consists of utility software and operating systems.
Mei’s Daily Tech Use
Uses Android OS on her smartphone, OS on her Smart TV, software in her car GPS, and writes Python code on her computer.
What is an Operating System?
Software that manages computer hardware and software resources, allowing users to store, retrieve files, and execute programs.
Main Functions of OS
File management, memory management, process management, and input/output handling.
Types of Operating Systems
Network OS, server OS, mobile OS, and personal computer OS.
Common Personal Computer Operating Systems
Windows (closed source), macOS (closed source), Linux (open source).
Windows
Developed by Microsoft, user-friendly with a graphical interface, widely used.
macOS
Developed by Apple, known for media editing and integrates well with Apple products.
Linux
Open source, customizable, used for desktops and servers.
Common Mobile Operating Systems
Google Android (open-source) and Apple iOS (regulates apps for security).
Utility Software
Enhances the functionality of the operating system, including file compression and multimedia playback.
Kernel
The core part of the operating system that handles basic functions like file management.
User Interface (UI)
How users interact with the operating system.
Command-Line Interfaces (CLI)
Users type text commands using a keyboard.
Graphical User Interfaces (GUI)
Users interact using visual elements like icons with a mouse, keyboard, or touch screen.
Functionality of UI
Acts as a bridge between the user and the operating system; users can choose their preferred interface.
Operating Systems Security
Protect resources from unauthorized access.
User Accounts
Unique accounts with a username, password, and specific privileges (e.g., administrator vs. standard).
Administrator Account
Can make changes to system settings and manage other user accounts.
Log-In Process
OS checks user credentials to determine access level upon logging in.
File Managers
Organize files into directories (folders) in a hierarchical structure.
Directory Paths
Show file location with folder names separated by slashes.
Linux File Structure
Top level: /home; Sublevels: Mei, JobSearch, MyResumes, MyCoverLetters.
Windows File Structure
Top level: C:\Users\Mei; Sublevels: JobSearch, MyResumes, MyCoverLetters.
Key Differences - Windows
Uses backward slashes (), case insensitive, root directory by drive letter (e.g., C:).
Key Differences - Linux
Uses forward slashes (/), case sensitive, root directory is simply /.
Memory Manager
Part of the OS kernel that manages the computer’s main memory.
Paging
Technique creating the illusion of additional memory space by moving programs/data between memories.
Virtual Memory
Additional memory space created in secondary memory through paging.
Device Drivers
Software that allows OS to communicate with hardware devices.
Print Driver
Required to send documents to a printer.
Bluetooth Driver
Needed for Bluetooth audio devices.
Software Categories
Collaboration, productivity, and specialized software improve communication and organization.
Word Processing Software
Create documents like letters and reports (e.g., Microsoft Word, Google Docs).
Spreadsheet Software
Create worksheets for calculations and charts (e.g., Microsoft Excel, Google Sheets).
Database Software
Store/manage data and develop reports (e.g., Microsoft Access, MySQL).
Presentation Software
Create slides for presentations (e.g., Microsoft PowerPoint, Google Slides).
Multimedia Software
Display audio, video, and image content (e.g., VLC Player, Media Player).
Collaboration Software
Enables communication and information sharing among users.
Online Workplace
Run cloud-based services and applications (e.g., Microsoft SharePoint, Google Docs).
Document Storage
Provide file storage via cloud services (e.g., Google Drive, Dropbox).
Video Conferencing Software
Conduct video calls among multiple locations (e.g., WebEx, Adobe Connect).
Instant Messaging Software
Enable real-time text communication (e.g., Google Hangouts, Facebook Messenger).
Email Software
Send and receive email messages (e.g., Gmail, Microsoft Outlook).
What is specialized software?
Software designed for specific professional tasks.
What is an example of computer-aided design software?
AutoCAD
What is the use of graphic design software?
Create and edit drawings and artwork.
What type of software manages patient data?
Medical software (e.g., Kareo, MedClarity)
What does scientific software help manage?
Scientific research processes.
What is the purpose of financial software?
Track and manage financial information.
What type of software provides entertainment?
Gaming software (e.g., World of Warcraft, Candy Crush)
What is the definition of personal information managers?
Software that manages contracts, calendars, tasks, and reminders.
What are the three types of application software?
Bespoke, Off-the-Shelf, Hybrid.
What is bespoke software?
Custom-made for a specific organization.
What is off-the-shelf software?
Provides a general set of features for a broad range of users.
What is hybrid software?
Off-the-shelf software customized for specific organizational needs.
What are local applications?
Stored on individual computers, commonly used on personal machines.
What are cloud applications?
Services delivered through a cloud service provider.
What is proprietary software?
Software that requires purchasing licenses and is not modifiable.
What is open-source software?
Software that allows users to modify the operating system’s kernel.
What is shareware?
Trial versions with limited time/functionality; full access requires purchase.
What is freeware?
Free software protected by EULA and copyright laws.
What is public domain software?
Software available for unrestricted use, with no EULA or copyright protection.
What does copyright protect?
Original works for at least 35 years in the U.S.
What do patents protect in software?
Unique methods or processes, encouraging innovation.
What is programming?
Writing programs as step-by-step instructions for computers.
What do humans need to use to communicate with computers?
High-level programming languages (source code).
What is machine code?
The binary representation of programs (0s and 1s).
What is a compiler?
A tool that translates source code into machine language.
What does a compiler check for?
Errors in the source code before translating it.
How does an interpreter work?
It translates and executes source code line by line.
What happens when an interpreter encounters an error?
Stops execution and displays an error message.
Why is studying compilers and interpreters important?
It improves coding skills and provides insights into the programming process.
What are the benefits of effective data management?
Aligns information systems with business goals and improves efficiency.
What role does a database administrator (DBA) play?
Oversees data maintenance, access management, and data backup.
What is a Database Management System (DBMS)?
A system that converts large volumes of data into a usable format.
What is a relational database?
A database allowing access from various perspectives through internal links.
What is the contrast between relational databases and flat file systems?
Flat file systems are one-dimensional and lead to data duplication.
What does database research involve?
Analyzing and converting raw data into actionable information.
How do database systems support the web?
They process requests and organize data to deliver relevant information.
Overview of Database Applications
Two Major Layers: Application Layer and Database Management Layer.
Application Layer Functionality
Interacts with users and communicates requests to the DBMS.
DBMS Role
Functions as a support system for application software and data management.
Database Structure
A database table consists of records (rows) and fields (columns).
Flat-File Database Definition
Stores data in a plain text file; each line is a single record.
Flat-File Database Structure
Flat structure; cannot contain multiple tables; all data in a single file.
Flat-File Database Operations
Creating, Deleting, Updating records, and Searching.
Hierarchical Database Definition
Data organized in a tree structure resembling an organizational chart.
Hierarchical Database Structure
Each record has one parent and can have multiple children, forming sub-trees.
Relational Database Definition
Consists of tables that can be logically linked, allowing complex data relationships.
Relational Database Key Features
Tables, Records, and Unique Identifiers (primary keys).
Primary Key Definition
A unique identifier for each record in a table, maintaining data integrity.
Foreign Key Definition
A field linking records from one table to another, establishing relationships between tables.
Attributes in Relational Databases
Connect tables meaningfully, reflecting real-world interactions and maintaining data consistency.
Union Operations
Combines results from multiple SELECT statements, including only distinct records.
Join Operations
Retrieves data from two or more tables based on related columns.
Cartesian Join
Pairs every row from one table with every row from another table.
Subquery
A query nested inside another query to provide additional data.
Object-Oriented Databases
Store complex data as objects, reflecting real-world entities.
NoSQL Databases
Handle various data models without a fixed schema, ideal for large datasets.
Cloud Databases
Optimized for cloud environments, allowing dynamic resource allocation.
Data Lakes
Centralized repositories for storing structured and unstructured data in its raw format.
Distributed Databases
Data stored across multiple locations, improving access and management.
Database Administration
Critical functions to ensure databases are secure, available, and scalable.
Database Security
Measures taken to protect databases from unauthorized access and threats.
Database Tuning
Adjustments made to optimize database performance and efficiency.
High Availability
Ensuring database systems are continuously operational and accessible.
Business Continuity
Plans to maintain operations during unexpected disruptions.
Backup and Recovery
Processes to create copies of data and restore it in case of loss or corruption.
Reporting
Generating summaries and analyses from database data for decision-making.
Database Applications
Programs designed to interact with databases for data management and analysis.
Required Skills for DBA
Technical and analytical skills needed for effective database administration.
Overview of IT Departments
IT supports digital enterprises by addressing business challenges in communication, data management, security, CRM, and process improvement.
Roles and Responsibilities in IT
IT departments have various job roles, each with specific responsibilities contributing to organizational functioning.
IT Manager
Oversees the IT department, manages budgets, coordinates projects, and aligns technology with organizational goals.
Systems Administrator
Maintains servers, manages user accounts, and ensures system performance and reliability.
Network Administrator
Manages network infrastructure, ensuring connectivity and addressing issues.
Database Administrator (DBA)
Manages databases, performs backups, ensures data integrity, and optimizes performance.
Help Desk Technician
Provides technical support to users, resolving hardware and software issues.
Software Developer
Designs, develops, and maintains software applications to meet organizational needs.
Information Security Analyst
Protects data from breaches, conducts security assessments, and implements security policies.
Data Analyst
Collects and analyzes data to provide insights for decision-making.
Business Analyst
Analyzes business processes and collaborates with stakeholders to recommend IT solutions.
Communication in IT
Transforms organizational communication via tools like phone, email, video conferencing, and social media.
Data Collection and Management
IT systems facilitate data collection, storage, management, and analysis for decision-making.
Information Security Management
Secures data against breaches, implements security protocols, and ensures regulatory compliance.
Customer Relationship Management (CRM)
Tracks customer interactions and provides insights to enhance service and marketing efforts.
Process Improvement
IT enhances organizational efficiency through automation and process optimization.
Purpose of an IT Department
Manages technology to support business operations, enhance communication, manage data, and ensure security.
Aligning IT Goals with Business Mission
Ensures IT initiatives support organizational direction, improving efficiency and customer service.
IT Departments’ Internal Organization
Composed of various roles like Network Administrator, Systems Administrator, and Cybersecurity Analyst working collaboratively.
Importance of Business Continuity
Ensures operations continue during disruptions, minimizing downtime and protecting reputation.
Buying vs. Building Solutions
Organizations decide between purchasing ready-made solutions or developing custom ones based on needs.
Insourcing vs. Outsourcing
Choosing to use internal staff or external vendors for IT functions, each with its pros and cons.
User Needs and Information Systems Requirements
Understanding user needs, security, accessibility, and design is crucial for effective IT solutions.
Project Management Life Cycle
A framework guiding projects from inception to completion.
Project Initiation
The phase where the project is defined, including creating a business case and project charter.
Feasibility Study
Research conducted to assess if the proposed system meets the needs of the organization.
Scope Statement
A document outlining the objectives and deliverables of the project.
Work Breakdown Structure (WBS)
A breakdown of the project into manageable segments or tasks.
SMART Goals
Specific, Measurable, Achievable, Relevant, Time-bound goals set for the project.
Milestones
Key points in the project timeline, marking the completion of significant tasks or phases.
Communication Plan
A strategy outlining how information will be shared among stakeholders throughout the project.
Risk Management Plan
A plan identifying potential risks and strategies to mitigate them.
Project Execution
The phase where project tasks are performed, including team assignments and progress monitoring.
Kickoff Meeting
An initial meeting to align the project team and stakeholders on objectives and roles.
Final Documentation
Completion of all project-related documents, including performance reports and summaries.
Needs Assessment
An analysis to identify the current system’s inefficiencies and user needs for the new system.
Vendor Evaluation
The process of assessing potential vendors for system compatibility and reliability.
Integration Testing
Testing conducted to ensure the new system works seamlessly with existing infrastructure.
Execution Risks
Challenges that arise during the execution phase, such as resource availability and schedule delays.
Integration Risks
Risks associated with ensuring all project components work together, including compatibility and data migration challenges.
Unknown Risks
Unpredictable risks that may emerge at any time, such as market or regulatory changes.
Monitoring Systems
Tools and processes put in place to track identified risks throughout the project.
Scope Creep
The uncontrolled expansion of project scope, leading to additional tasks and costs.
Budget Risk
Challenges with budget control, including potential cost overruns.
Resistance to Change
Opposition from departments or individuals towards organizational changes.
Resource Risk
Difficulties in securing sufficient resources for the project.
Stakeholder Support Risks
Insufficient support from key stakeholders that can impact project success.
Complex Information Systems
Systems requiring multiple employees and extended time frames; their staffing requirements often change, making projects longer. Off-the-shelf products may not always be feasible.
Lack of Metrics
Information systems lack quantitative data for analysis, unlike other engineering fields.
System Development Life Cycle (SDLC)
A structured approach to system development divided into phases, including traditional (requirements analysis, design, implementation, testing) and cyclical phases (development, use, maintenance).
CASE (Computer-Aided Software Engineering)
The evolution of methodologies that have replaced outdated practices to solve engineering challenges.
Software Development Tools
Tools that assist in project planning, documentation, interface design, and programming.
Integrated Development Environments (IDEs)
Packages combining various tools for software development, like Appery.io, TheAppBuilder, and AppMachine.
Guidelines and Standards
Organizations like ISO, ACM, and IEEE provide standards for system development, ensuring quality and consistency.
Requirements Analysis
The process of determining system services, user interactions, and identifying constraints.
Methods for Gathering Requirements
Gathering input from stakeholders, conducting feasibility studies, and market studies for COTS systems.
Requirements Analysis Process
Involves compiling system needs, negotiating trade-offs, and developing a set of requirements.
System Requirement Specification (SRS)
A written agreement that records system requirements, guides development, and helps resolve disputes.
Design Phase
The stage where a detailed construction plan for the system is created, distinguishing what the system should do from how it will do it.
Implementation and Integration
The phase of system building involving roles like system analysts and programmers, focusing on success factors like training and communication.
System Maintenance
The ongoing process of monitoring and modifying the system as needed, including troubleshooting and user support.
Categories of Software Maintenance
Types of maintenance: corrective (fix errors), adaptive (adjust to changes), perfective (improve performance), preventive (increase lifespan).
Quality Control in System Development
Emphasizes the importance of quality control beyond debugging, incorporating ISO standards and effective documentation practices for better system development.
Modern Testing Approach
A comprehensive approach involving requirements analysis, design validation, and implementation testing to ensure system quality.
Testing Methodologies
Involves thorough testing, targeted error identification (e.g., Pareto Principle, Basis Path Testing), and two primary types: Glass-Box (White-Box) and Black-Box testing.
Stages of Black-Box Testing
Includes alpha testing (by developers), beta testing (by end-users), and user acceptance testing (in an operational setting).
Importance of Documentation
Effective system usage and maintenance depend on thorough documentation, crucial for system development.
User Documentation
Provides guidance on system features, FAQs, and customer support contacts.
System Documentation
Describes the internal configuration of the system for maintenance, including versioned software code.
Key Elements of System Documentation
Indentation conventions, naming conventions for variables, and documentation conventions for adequate program documentation.
Technical Documentation
Covers installation and maintenance, including update procedures and feedback mechanisms for the development team.
Waterfall Model
A linear and sequential approach to development, where each phase must be completed before moving to the next, limiting flexibility and adaptation.
Incremental Model
Builds the system in increments; the first increment is a simplified version of the final product.
Prototyping
Involves creating and evaluating basic versions of a proposed system, providing stakeholders with a clear picture of how the system will function.
Open-Source Development
Allows users to modify software code, fostering community collaboration; examples include Linux and PowerShell Core.
Agile Methodologies
Focus on incremental implementations, adapting to rapidly changing requirements.
Scrum
A prioritized wish list of features where daily meetings assess progress, ending each sprint with a potentially shippable product increment.
Extreme Programming (XP)
Developed by small teams working collaboratively, emphasizing informal requirements analysis, design, and testing cycles.
Benefits of Agile Development
Includes speed, customer satisfaction, employee engagement, and reduced rework.
Role of IT in Disaster Recovery
Ensures organizational activities execute as planned, requiring contingency plans and regular testing.
Uptime Requirements
Defined as the time client data/resources are available on servers, expressed in percentages.
High Availability Solutions
Provide replicas of critical systems for quick deployment during failures.
Disaster Recovery Plans (DRPs)
Strategies for quick recovery from catastrophic events with minimal data loss.
Data Mirroring
Writes copies of data across multiple devices for fast recovery.
Data Backups
Commonly stored on tape drives, cost-effective and transportable.
Off-Site Storage
Essential for recovery, stored in different locations to minimize risk.
Cloud Storage
Enhances recovery, with public providers replicating data across locations.
Criteria for Assessing Off-Site Storage
Accessibility, cost, environment, geographic area, and security.
Hot Storage
Fast access and high performance, using advanced storage equipment; examples include Azure Hot Blobs.
Cold Storage
Less frequent access and lower performance; more cost-effective; examples include tape backups.
Mobile Computing
Use of handheld devices like laptops and smartphones, driven by trends in hardware miniaturization.
The Internet of Things (IoT)
Interconnected devices with unique identifiers for data transfer without human interaction.
Globalization
Growing interdependence of economies and cultures, driven by IT revolution.
Technology and Ethics
Ongoing questions about the societal impact of IT; ethical considerations are essential as technology evolves.
Legal, Ethical, and Regulatory Issues
Rapid evolution of computing leading to regulatory and social changes; existing laws may not address unique computing nature.
Ethics vs. Regulations
Regulations are legal requirements with penalties; ethics guide individual and organizational behavior.
Continuous Ethical Consideration
Computing professionals must assess ethical responsibilities, including security and social impact.
Ethics and Information Technology
Discusses philosophical approaches, including character-based ethics and other ethical theories.
Ten Commandments of Computer Ethics
Guidelines established by the Computer Ethics Institute for ethical computer use.
Asimov’s Three Laws of Robotics
Ethical guidelines for robot behavior proposed by Isaac Asimov; includes preventing harm to humans.
Additional Ethical Principles for Robots
Guidelines ensuring robots are safe and secure, emphasizing human responsibility and identification of legal accountability.
Similarities in Ethical Guidelines
Public welfare focus, honesty and integrity, respect for others, and avoiding harm.
Differences in Ethical Guidelines
Scope of ethics, conflict of interest management, continuous improvement emphasis, and intellectual property respect vary among organizations.