D075 Flashcards
Infrastructure
The underlying foundation or basic framework for an org or project
6 components of IT infrastructure
- Hardware
- Software
- Networks
- Data
- People
- Processes
Hardware
CPU, monitors, keyboards, disk drives
Software
Instructions that tell the computer how to work
3 categories of software
- Application - Excel
- Utility - virus protection
- System - Windows
Networks
Nodes made of of two or more devices like laptops and smartphones
Best practices
Processes that are most effective in achieving the desired outcome
Moore’s Law
Stated that computing power doubles every 18 months
HTML
Hypertext markup language - used to create web pages
HTTP
Hypertext transfer protocol - used to define how messages are formatted and transmitted
Mainframe computers
Huge room sized computer that process and store large amounts of data - cc processors
Midrange computers
“Mini-computers” that are less powerful than mainframe but perform the same functions on a smaller scale
Microcomputers
Desktops, laptops, tablets, and handheld devices
Operating system
programs that read and write data information to a disk hard drive
4 types of memory management
- RAM
- virtual
- cache
- registers
What is a defining characteristic of application software?
It performs a specific task for the user
Which software supports a computer’s basic functions such as scheduling software tasks, executing applications, and controlling peripherals?
Systems software
Which type of memory plays an important role in a computer’s ability to perform multitasking?
Virtual memory
SSD
Solid state drive - main memory
Disk storage
Secondary storage like a hard drive
Optical disk
Computer disk that uses optical storage techniques to read and write data
Nonvolatile data
Data will not disappear when computer is turned off
What are some application softwares?
spreadsheets
word processing
presentation software
database software
Word processor
Application software used to create, compose, and edit documents
Word, google docs
Database management system software (DBMS)
Used to create a set of files that can produce populations of information
Software suite aka application or productivity suite
application programs that share a common graphical user interface to exchange data
3 ways of sharing data with productivity suites
- Copy and paste
- Object embedding
- Object linking
Computer network
Two or more computers connected together to communicate and share resources
Node
Any device connected as part of a net work
Network interface controller (NIC)
Card that is plugged into the motherboard allowing a network cable to interface with other computers
Ethernet card
Provides a computer with a unique 48 bit address called media access control address
MAC - media access control
Transports data to/from NIC and to/from another shared channel
Protocol
Standard language devices use to communicate and transfer data
Network protocol
Set of rules a network must follow
Network hub
Central location of the computer network
Transmission Control Protocol / internet protocol
protocols used to connect networks to the Internet
Network operating system - NOS
Software that resides on the networks server and controls an entire network
Topology
The mapping of a networking interconnection between nodes
Bus topology
Linear bus – each node is connected to a common node that has two endpoints
Star topology
Most common topology where the star shape created by network notes radiate around a central node
Ring topology
Each notice connected to two other computers
6 types of computer networks
- Local area network (LAN)
- Campus area network (CAN)
- Metro area network (MAN)
- Wide area network (WAN)
- Peer-to-peer network (P2P)
- Internet
Types of business system threats
- Spamming
- Worms
- Adware
- Trojan horses
- Spyware
- Virus
- Denial of service
- Key logging
Tracking cookie
Copy of a webpage and a small text file (cookie) that the user is typically unaware of
LAN - local area network
Relatively small computer network typically in a single building
CAN - campus area network
Computer network that connects two or more LANs that are located on campus
MAN - metro area network
Computer Network that can mix two or more LAN/CANs together within the boundaries of a town or city
WAN - wide area network
Computer networks that encompass a wide geographical area connect LAN, CAN, and MANs together
P2P - peer to peer networks
Computer networks that connect directly to one another without the use of the server
5 network security considerations
- Passwords
- Web browsing
- Email and IM
- Permissions
- Firewall
Firewall
Specialize hardware and software that ensures only authorized personnel can access and use an organizations Internet
How does a peripheral device function in a network?
As a resource shared by multiple end users in a network
4 main components of a network
- NIC cards
- TCP/IP protocols
- Cables
- Central hub
Telecom services
Internet providers and phone services
Knowledge management systems (KMS) aka knowledge transfer
Collaborative systems that distribute collective knowledge to users and customers
Point of failure
Part of a system that if it fails, the entire system stops working
Project management
The process of leading the work of a team to achieve goals
Examples of cloud based infrastructure aka cloud-service providers (CSPs)
cloud storage
file synchronization
business cloud
client-side software
Chief Intelligence Officer - CIO
-board level head of IT department
-strategic decision making
-top level infrastructure manager
Chief Security Officer - CSO
In charge of…
-security and corporate assets
-coordinates with COO + HR
Chief Information Security Officer - CISO
-security policies
-involved in data loss and fraud prevention
Chief Technology Officer - CTO
MTC!
-manages engineering
-top IT architect
-collaborates with vendors
IT Manager
software development, design, and application
Network Admin - works with engineers to…
-deploy new networks
-grants user access
Information Security Analyst - ISA
DIP!
Deploys firewalls
Identify security risks
Performs system audits
Database admin
IMPD!
Engages in:
-installation
-migration
-performance
-data backup
Web developer
Develops client and server side logic for web apps
Computer programmer
-sets up equipment
-provides frontline support
Data management (DM)
PAT
practices
architecture
tools
Used to achieve consistent access
Structured query language (SQL)
Developed to make sense of all data so it can eventually become information
Databases
collections of computer files that are storehouses of data
Structure of a database
- Primary key
- Foreign key
- Schema
Primary key
File that uniquely identifies a record in the table
Foreign key
Field that provides a link between two tables
Schema
the overall blueprint of a database
Big data
Data that is collected from all over the internet
4 V’s that define the attributes of big data
- Volume - amount
- Variety - form
- Veracity - quality
- Velocity - speed created
Data mining (data discover)
Examination of huge sets of data to find connections, and hidden relationships
Ex. Oracle data mining application
3 groups of data
- Structured date
- Unstructured data
- Semi - structured data
Structured data
-in fixed formats
-needs to be in a standardized with recognizable patterns
Unstructured data
Unorganized data that cannot easily be read or processed because it is not stored in rows or columns
Semi structured data
Data between structured and unstructured data
Ex. Email and HTML
2 big data tools
- ETL
- Hadoop
ETL big data tool
-standardizes data across systems
-allow it to be queried
Hadoop big data tool
Infrastructure for storing and processing large sets of data across multiple servers
Data management processes
AVS!
1.acquiring data
2.validating the data
3. storing and processing into useful information
“Scrubbing the data”
Transforming data into an accurate, clean, and error free form
3 steps for collecting data
- Determine the purpose for obtaining
- Develop business related questions
- Determine tools to acquire
Master data management (MDM)
Methodology used to define, organize, and manage the data of an organization
Data governance
Managing …
Managing the availability, integrity, and security of data to ensure it remains high-quality
Key benefits of data management
PBDF!
-Predictive analytics
-business intelligence
-data analysis
-finding patterns
Data analytics
reviewing raw data using qualitative and quantitative methods
Predictive analysis
Uses new and historical data to forecast activity, behavior, and trends
What form of analytics refers to looking for patterns, trends, and relationships between data so organizations can try to determine connections and outliers?
Data mining
Text analytics
searches through unstructured text data to look for useful patterns
Business intelligence
software and devices that turn data into information
3 forms of business analytics
- Descriptive analytics
- Predictive analytics
- Decision analytics
Descriptive analytics
past data that is grouped into significant pieces to reveal trends
Predictive analytics
Attempts to reveal future data trends
Decision analytics
Builds on predictive analysis to make decisions
7 challenges of data analytics and process management
LAMBDAS
- Lack of skills
- Amount of data
- Multiple sources
- Budgets for data management tools
- Determining what is/is not meaningful
- Accessibility
- Security and privacy
Qualitative ROI
Addresses the intangible values of data loss or a decrease in operating efficiencies
Ex. If upgraded firewall protection is not purchased, what would be the cost to recover from being hacked
3 levels of data security
- Data level
- System level
- User level
5 essential spreadsheet functions
- SUM
- AVERAGE
- MIN
- MAX
- COUNT
Boolean logic
Asks the question “is something true or false?”
Conditional functions
Allows performance of calculations where the cell references are used
5 core business depts
- Accounting
- Production
- Research and development
- Marketing
- HR
Intranet
a private corporate network for sharing information, collaboration tools, and services
3 types of research and development
- Basic
- Applied
- Development
Basic research
Exploration of new ideas that may or may not actually be implemented
Applied research
Methodology based research and heavily uses IT to determine possibilities
Development research
Where research findings are used in the production of products
Transaction processing systems (TPS)
Type of system that … C/M/S/R
type of system that collects, modifies, stores, and retrieves transactions
Customer relationship management systems (CRM)
Information systems that manage the information on customers
3 uses of CRMs to a business
- captures and structures data so reports can be pulled
- increase understanding of customer habits and preferences
- manage relationships
Decision support systems (DSS)
Interactive software systems that compile information from data and business models
3 elements for accurate decision making
- Business intelligence
- Data analytics
- Data management capabilities
Geographic information systems
Framework for gathering and ….
Framework for gathering, and analyzing data locations and organizes into visuals
5 IT innovation tools in business
- Data housing and management
- Improved communications
- Customer relationship management
- Product development
- Cost effective processes
Cloud web hosting (CWH)
Employs clustered servers providing ….
Employs clustered servers providing virtual resources to meet the demands of a website
Computer aided design/manufacturing (CAD/CAM)
software used to design and manufacture product prototypes and end products
2 areas of using IT for cost effectiveness
- Completing transactions faster with more accuracy
- Automation
Copyright
Definitive right given to the owner of original work
Trademarks
Words or designs that identify a source of product
Patents
Protects new products, upgrades, and some functional aspects of computer software
Trade secret
Information that is private or not known outside of the company, and if disclosed would cause harm our loss to the business
3 government regulations of IT
- FERPA
- HIPAA
- SOX
Radio frequency identification (RFID)
Small tags used to identify products and transmit info through radio waves
Internet of Things (IoT)
Use of the Internet to make connections to fully automate processes - connects through WiFi
2 IoT impacts on business
- opportunities for new businesses to innovate through automation
- Existing businesses can improve
IoT Applications
HEMTG!
- healthcare
- education
- manufacturing
- transportation
- government
7 types of social media
- Social networking
- Social news
- Social reviews
- Bookmarking websites
- Blogs/forums
- Media sharing
- Microblogging
How can a business best determine the (ROI) of advertising on social media?
By calculating ROI based on the cost per advertisement
9 steps of application development
- Establish and outline
- Conduct research
- Create a mock-up
- Develop graphical interface
- Build the structure
- Program the code
- Launch
- Extend the reach
- Revise and update
7 types of mobile apps
- Ebooks
- Entertainment/games
- Lifestyle
- News
- Productivity
- Social and business networking
- Utilities
Electronic computing tools
Provides data and information exchange software and techniques to facilitate decisions
Management tools
Collaborative software and techniques
Project management software
Provides a road map for organizing and managing activities, resources, and timeline of a project
What is the goal of KMS?
To capture the organizations knowledge and then to improve access to the knowledge
2 types of knowledge stored in a KMS
- Explicit knowledge - policies and procedures
- Tacit knowledge - knowledge gained from personal experience
Information repository
Collection of related information stored on company’s servers or within the cloud
What is the major function of a computer operating system?
Computer resource management
What are the basic components that are required for a local network to function?
Ethernet cards
Ethernet cables
Common protocol
Hub
Which type of device is an Ethernet card?
Network interface controller
What is the purpose of a MAC address?
To uniquely identify a computer on a network
What is the purpose of a Universal Serial Bus (USB) on a laptop or desktop computer?
It allows the computer to connect to peripheral devices
How does a Gantt chart facilitate project management?
It identifies and sequences the tasks of a project
When using extract, transform, and load (ETL) what is done during the transform step?
The data is normalized and structured
What is the key characteristic difference between datamart and a data warehouse?
Datamart is smaller, and more specialized in its focus than a data warehouse
What is the velocity of big data?
The speed of data produced in a given time
What is it called when an organization implements infinite security procedures to protect the hardware, network, and software from intrusion?
System level security
Which term is used to refer to data that come from many difference sources in various structures?
Disparate data
What is scrubbed data?
Data that has been validated for accuracy
Which level of management gets the most detailed reports directly from the transaction processing system?
Supervisors
What is the primary source of data used by DSS?
Transaction processing system (TPS)
What is a key capability of a decision support system?
It compiles data from many systems to assist in decision making
Which strategy can be used to help a companies webpage appear on the first page of search results in a browser?
Search engine optimization
Which technology enables people without computer programming skills to design in publish their own websites?
Browser based web development tools
What action will give graphic designers the initial copyright protection of marketing images?
Creating the marketing images
What is an example of an Internet of Things (IoT) device?
A lightbulb that can be turned on and off by a smartphone
Where does IoT data collection begin?
The edge
Which type of technology can be used to monitor every product in a warehouse to enable real time inventory, tracking and updates?
Operations management system
What is the greatest risk created by incorporating IoT systems?
Increased security risk
What is the final step in the deployment and use of an app?
Maintain an upgrade the app based on use and user feedback
Which approach facilitates live communication when a business has employees that are in different locations and telecommute for work?
Real time communication
Which kind of system should be created to help a Company organize, create, and distribute the collective experience expertise of employees?
Knowledge management system
Which file format is suitable to use when sharing a legal contract that requires a digital signature?
What is a key way that social media marketing has simplified the calculation of return on investment in marketing?
By allowing companies to track which sales can be connected directly to a specific advertisement
What is the main reason marketing return on investment is easier to measure with social media marketing them a traditional marketing?
User behavior can be tracked and social media
What hardware component performs most of the calculations for a computer?
CPU
Systems software
Collection of computer programs that manage hardware and software
Operating systems function
Coordinate a computers memory
Disk management
Responsible for reading and writing data and information to a disk, typically a hard drive
Which type of memory plays a role in computers ability to perform multitasking?
Virtual memory
Peripheral hardware
Input, output, and storage devices that connect directly to a a computer but does not contribute to any primary function - mouse, printer, webcam etc
What does the term “clients” refer to?
Computers, laptops, or smartphones on a network
Physical cable system
Connects networks together
Twisted pair
Specialized wire that cancels out electromagnetic interference from other devices
Gannt Chart
Bar chart that illustrates a project schedule
RAM
short term fast memory
Virtual memory
running more apps than RAM can hold
Cache memory
minimal storage capacity
Registers
built into COU and hold instructions that are currently being used
Network operating system function
controlling network traffic
managing files
maintaining network security
back up
Microcomputer vs. minicomputer
Micro: admin tasks and word processing
Mini: managing databases and graphics
Examples of semi structured data
Email and HTML
Unstructured data examples
Video/audio
satellite imagery
weather sensor data
Project management examples
Microsoft project and smartsheets
Data level security
protecting actual data
System level security
protecting hardware where data resides
User level security
protecting passwords
Examples of electronic computing tools
texting
discussion boards
online chatting