D075 Flashcards

1
Q

Infrastructure

A

The underlying foundation or basic framework for an org or project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6 components of IT infrastructure

A
  1. Hardware
  2. Software
  3. Networks
  4. Data
  5. People
  6. Processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware

A

CPU, monitors, keyboards, disk drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software

A

Instructions that tell the computer how to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 categories of software

A
  1. Application - Excel
  2. Utility - virus protection
  3. System - Windows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Networks

A

Nodes made of of two or more devices like laptops and smartphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best practices

A

Processes that are most effective in achieving the desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Moore’s Law

A

Stated that computing power doubles every 18 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTML

A

Hypertext markup language - used to create web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP

A

Hypertext transfer protocol - used to define how messages are formatted and transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mainframe computers

A

Huge room sized computer that process and store large amounts of data - cc processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Midrange computers

A

“Mini-computers” that are less powerful than mainframe but perform the same functions on a smaller scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microcomputers

A

Desktops, laptops, tablets, and handheld devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating system

A

programs that read and write data information to a disk hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 types of memory management

A
  1. RAM
  2. virtual
  3. cache
  4. registers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a defining characteristic of application software?

A

It performs a specific task for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which software supports a computer’s basic functions such as scheduling software tasks, executing applications, and controlling peripherals?

A

Systems software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of memory plays an important role in a computer’s ability to perform multitasking?

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SSD

A

Solid state drive - main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disk storage

A

Secondary storage like a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Optical disk

A

Computer disk that uses optical storage techniques to read and write data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Nonvolatile data

A

Data will not disappear when computer is turned off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some application softwares?

A

spreadsheets
word processing
presentation software
database software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Word processor

A

Application software used to create, compose, and edit documents

Word, google docs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Database management system software (DBMS)

A

Used to create a set of files that can produce populations of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Software suite aka application or productivity suite

A

application programs that share a common graphical user interface to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

3 ways of sharing data with productivity suites

A
  1. Copy and paste
  2. Object embedding
  3. Object linking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Computer network

A

Two or more computers connected together to communicate and share resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Node

A

Any device connected as part of a net work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network interface controller (NIC)

A

Card that is plugged into the motherboard allowing a network cable to interface with other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ethernet card

A

Provides a computer with a unique 48 bit address called media access control address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

MAC - media access control

A

Transports data to/from NIC and to/from another shared channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Protocol

A

Standard language devices use to communicate and transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Network protocol

A

Set of rules a network must follow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Network hub

A

Central location of the computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Transmission Control Protocol / internet protocol

A

protocols used to connect networks to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Network operating system - NOS

A

Software that resides on the networks server and controls an entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Topology

A

The mapping of a networking interconnection between nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Bus topology

A

Linear bus – each node is connected to a common node that has two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Star topology

A

Most common topology where the star shape created by network notes radiate around a central node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Ring topology

A

Each notice connected to two other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

6 types of computer networks

A
  1. Local area network (LAN)
  2. Campus area network (CAN)
  3. Metro area network (MAN)
  4. Wide area network (WAN)
  5. Peer-to-peer network (P2P)
  6. Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Types of business system threats

A
  1. Spamming
  2. Worms
  3. Adware
  4. Trojan horses
  5. Spyware
  6. Virus
  7. Denial of service
  8. Key logging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Tracking cookie

A

Copy of a webpage and a small text file (cookie) that the user is typically unaware of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

LAN - local area network

A

Relatively small computer network typically in a single building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

CAN - campus area network

A

Computer network that connects two or more LANs that are located on campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

MAN - metro area network

A

Computer Network that can mix two or more LAN/CANs together within the boundaries of a town or city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

WAN - wide area network

A

Computer networks that encompass a wide geographical area connect LAN, CAN, and MANs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

P2P - peer to peer networks

A

Computer networks that connect directly to one another without the use of the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

5 network security considerations

A
  1. Passwords
  2. Web browsing
  3. Email and IM
  4. Permissions
  5. Firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Firewall

A

Specialize hardware and software that ensures only authorized personnel can access and use an organizations Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How does a peripheral device function in a network?

A

As a resource shared by multiple end users in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

4 main components of a network

A
  1. NIC cards
  2. TCP/IP protocols
  3. Cables
  4. Central hub
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Telecom services

A

Internet providers and phone services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Knowledge management systems (KMS) aka knowledge transfer

A

Collaborative systems that distribute collective knowledge to users and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Point of failure

A

Part of a system that if it fails, the entire system stops working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Project management

A

The process of leading the work of a team to achieve goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Examples of cloud based infrastructure aka cloud-service providers (CSPs)

A

cloud storage
file synchronization
business cloud
client-side software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Chief Intelligence Officer - CIO

A

-board level head of IT department
-strategic decision making
-top level infrastructure manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Chief Security Officer - CSO

In charge of…

A

-security and corporate assets
-coordinates with COO + HR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Chief Information Security Officer - CISO

A

-security policies
-involved in data loss and fraud prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Chief Technology Officer - CTO

MTC!

A

-manages engineering
-top IT architect
-collaborates with vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

IT Manager

A

software development, design, and application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Network Admin - works with engineers to…

A

-deploy new networks
-grants user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Information Security Analyst - ISA

DIP!

A

Deploys firewalls
Identify security risks
Performs system audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Database admin

IMPD!

A

Engages in:
-installation
-migration
-performance
-data backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Web developer

A

Develops client and server side logic for web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Computer programmer

A

-sets up equipment
-provides frontline support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Data management (DM)

PAT

A

practices
architecture
tools

Used to achieve consistent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Structured query language (SQL)

A

Developed to make sense of all data so it can eventually become information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Databases

A

collections of computer files that are storehouses of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Structure of a database

A
  1. Primary key
  2. Foreign key
  3. Schema
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Primary key

A

File that uniquely identifies a record in the table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Foreign key

A

Field that provides a link between two tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Schema

A

the overall blueprint of a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Big data

A

Data that is collected from all over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

4 V’s that define the attributes of big data

A
  1. Volume - amount
  2. Variety - form
  3. Veracity - quality
  4. Velocity - speed created
78
Q

Data mining (data discover)

A

Examination of huge sets of data to find connections, and hidden relationships

Ex. Oracle data mining application

79
Q

3 groups of data

A
  1. Structured date
  2. Unstructured data
  3. Semi - structured data
80
Q

Structured data

A

-in fixed formats
-needs to be in a standardized with recognizable patterns

81
Q

Unstructured data

A

Unorganized data that cannot easily be read or processed because it is not stored in rows or columns

82
Q

Semi structured data

A

Data between structured and unstructured data

Ex. Email and HTML

83
Q

2 big data tools

A
  1. ETL
  2. Hadoop
84
Q

ETL big data tool

A

-standardizes data across systems
-allow it to be queried

85
Q

Hadoop big data tool

A

Infrastructure for storing and processing large sets of data across multiple servers

86
Q

Data management processes

AVS!

A

1.acquiring data
2.validating the data
3. storing and processing into useful information

87
Q

“Scrubbing the data”

A

Transforming data into an accurate, clean, and error free form

88
Q

3 steps for collecting data

A
  1. Determine the purpose for obtaining
  2. Develop business related questions
  3. Determine tools to acquire
89
Q

Master data management (MDM)

A

Methodology used to define, organize, and manage the data of an organization

90
Q

Data governance

Managing …

A

Managing the availability, integrity, and security of data to ensure it remains high-quality

91
Q

Key benefits of data management

PBDF!

A

-Predictive analytics
-business intelligence
-data analysis
-finding patterns

92
Q

Data analytics

A

reviewing raw data using qualitative and quantitative methods

93
Q

Predictive analysis

A

Uses new and historical data to forecast activity, behavior, and trends

94
Q

What form of analytics refers to looking for patterns, trends, and relationships between data so organizations can try to determine connections and outliers?

A

Data mining

95
Q

Text analytics

A

searches through unstructured text data to look for useful patterns

96
Q

Business intelligence

A

software and devices that turn data into information

97
Q

3 forms of business analytics

A
  1. Descriptive analytics
  2. Predictive analytics
  3. Decision analytics
98
Q

Descriptive analytics

A

past data that is grouped into significant pieces to reveal trends

99
Q

Predictive analytics

A

Attempts to reveal future data trends

100
Q

Decision analytics

A

Builds on predictive analysis to make decisions

101
Q

7 challenges of data analytics and process management

LAMBDAS

A
  1. Lack of skills
  2. Amount of data
  3. Multiple sources
  4. Budgets for data management tools
  5. Determining what is/is not meaningful
  6. Accessibility
  7. Security and privacy
102
Q

Qualitative ROI

A

Addresses the intangible values of data loss or a decrease in operating efficiencies

Ex. If upgraded firewall protection is not purchased, what would be the cost to recover from being hacked

103
Q

3 levels of data security

A
  1. Data level
  2. System level
  3. User level
104
Q

5 essential spreadsheet functions

A
  1. SUM
  2. AVERAGE
  3. MIN
  4. MAX
  5. COUNT
105
Q

Boolean logic

A

Asks the question “is something true or false?”

106
Q

Conditional functions

A

Allows performance of calculations where the cell references are used

107
Q

5 core business depts

A
  1. Accounting
  2. Production
  3. Research and development
  4. Marketing
  5. HR
108
Q

Intranet

A

a private corporate network for sharing information, collaboration tools, and services

109
Q

3 types of research and development

A
  1. Basic
  2. Applied
  3. Development
110
Q

Basic research

A

Exploration of new ideas that may or may not actually be implemented

111
Q

Applied research

A

Methodology based research and heavily uses IT to determine possibilities

112
Q

Development research

A

Where research findings are used in the production of products

113
Q

Transaction processing systems (TPS)

Type of system that … C/M/S/R

A

type of system that collects, modifies, stores, and retrieves transactions

114
Q

Customer relationship management systems (CRM)

A

Information systems that manage the information on customers

115
Q

3 uses of CRMs to a business

A
  1. captures and structures data so reports can be pulled
  2. increase understanding of customer habits and preferences
  3. manage relationships
116
Q

Decision support systems (DSS)

A

Interactive software systems that compile information from data and business models

117
Q

3 elements for accurate decision making

A
  1. Business intelligence
  2. Data analytics
  3. Data management capabilities
118
Q

Geographic information systems

Framework for gathering and ….

A

Framework for gathering, and analyzing data locations and organizes into visuals

119
Q

5 IT innovation tools in business

A
  1. Data housing and management
  2. Improved communications
  3. Customer relationship management
  4. Product development
  5. Cost effective processes
120
Q

Cloud web hosting (CWH)

Employs clustered servers providing ….

A

Employs clustered servers providing virtual resources to meet the demands of a website

121
Q

Computer aided design/manufacturing (CAD/CAM)

A

software used to design and manufacture product prototypes and end products

122
Q

2 areas of using IT for cost effectiveness

A
  1. Completing transactions faster with more accuracy
  2. Automation
123
Q

Copyright

A

Definitive right given to the owner of original work

124
Q

Trademarks

A

Words or designs that identify a source of product

125
Q

Patents

A

Protects new products, upgrades, and some functional aspects of computer software

126
Q

Trade secret

A

Information that is private or not known outside of the company, and if disclosed would cause harm our loss to the business

127
Q

3 government regulations of IT

A
  1. FERPA
  2. HIPAA
  3. SOX
128
Q

Radio frequency identification (RFID)

A

Small tags used to identify products and transmit info through radio waves

129
Q

Internet of Things (IoT)

A

Use of the Internet to make connections to fully automate processes - connects through WiFi

130
Q

2 IoT impacts on business

A
  1. opportunities for new businesses to innovate through automation
  2. Existing businesses can improve
131
Q

IoT Applications

HEMTG!

A
  • healthcare
  • education
  • manufacturing
  • transportation
  • government
132
Q

7 types of social media

A
  1. Social networking
  2. Social news
  3. Social reviews
  4. Bookmarking websites
  5. Blogs/forums
  6. Media sharing
  7. Microblogging
133
Q

How can a business best determine the (ROI) of advertising on social media?

A

By calculating ROI based on the cost per advertisement

134
Q

9 steps of application development

A
  1. Establish and outline
  2. Conduct research
  3. Create a mock-up
  4. Develop graphical interface
  5. Build the structure
  6. Program the code
  7. Launch
  8. Extend the reach
  9. Revise and update
135
Q

7 types of mobile apps

A
  1. Ebooks
  2. Entertainment/games
  3. Lifestyle
  4. News
  5. Productivity
  6. Social and business networking
  7. Utilities
136
Q

Electronic computing tools

A

Provides data and information exchange software and techniques to facilitate decisions

137
Q

Management tools

A

Collaborative software and techniques

138
Q

Project management software

A

Provides a road map for organizing and managing activities, resources, and timeline of a project

139
Q

What is the goal of KMS?

A

To capture the organizations knowledge and then to improve access to the knowledge

140
Q

2 types of knowledge stored in a KMS

A
  1. Explicit knowledge - policies and procedures
  2. Tacit knowledge - knowledge gained from personal experience
141
Q

Information repository

A

Collection of related information stored on company’s servers or within the cloud

142
Q

What is the major function of a computer operating system?

A

Computer resource management

143
Q

What are the basic components that are required for a local network to function?

A

Ethernet cards
Ethernet cables
Common protocol
Hub

144
Q

Which type of device is an Ethernet card?

A

Network interface controller

145
Q

What is the purpose of a MAC address?

A

To uniquely identify a computer on a network

146
Q

What is the purpose of a Universal Serial Bus (USB) on a laptop or desktop computer?

A

It allows the computer to connect to peripheral devices

147
Q

How does a Gantt chart facilitate project management?

A

It identifies and sequences the tasks of a project

148
Q

When using extract, transform, and load (ETL) what is done during the transform step?

A

The data is normalized and structured

149
Q

What is the key characteristic difference between datamart and a data warehouse?

A

Datamart is smaller, and more specialized in its focus than a data warehouse

150
Q

What is the velocity of big data?

A

The speed of data produced in a given time

151
Q

What is it called when an organization implements infinite security procedures to protect the hardware, network, and software from intrusion?

A

System level security

152
Q

Which term is used to refer to data that come from many difference sources in various structures?

A

Disparate data

153
Q

What is scrubbed data?

A

Data that has been validated for accuracy

154
Q

Which level of management gets the most detailed reports directly from the transaction processing system?

A

Supervisors

155
Q

What is the primary source of data used by DSS?

A

Transaction processing system (TPS)

156
Q

What is a key capability of a decision support system?

A

It compiles data from many systems to assist in decision making

157
Q

Which strategy can be used to help a companies webpage appear on the first page of search results in a browser?

A

Search engine optimization

158
Q

Which technology enables people without computer programming skills to design in publish their own websites?

A

Browser based web development tools

159
Q

What action will give graphic designers the initial copyright protection of marketing images?

A

Creating the marketing images

160
Q

What is an example of an Internet of Things (IoT) device?

A

A lightbulb that can be turned on and off by a smartphone

161
Q

Where does IoT data collection begin?

A

The edge

162
Q

Which type of technology can be used to monitor every product in a warehouse to enable real time inventory, tracking and updates?

A

Operations management system

163
Q

What is the greatest risk created by incorporating IoT systems?

A

Increased security risk

164
Q

What is the final step in the deployment and use of an app?

A

Maintain an upgrade the app based on use and user feedback

165
Q

Which approach facilitates live communication when a business has employees that are in different locations and telecommute for work?

A

Real time communication

166
Q

Which kind of system should be created to help a Company organize, create, and distribute the collective experience expertise of employees?

A

Knowledge management system

167
Q

Which file format is suitable to use when sharing a legal contract that requires a digital signature?

A

PDF

168
Q

What is a key way that social media marketing has simplified the calculation of return on investment in marketing?

A

By allowing companies to track which sales can be connected directly to a specific advertisement

169
Q

What is the main reason marketing return on investment is easier to measure with social media marketing them a traditional marketing?

A

User behavior can be tracked and social media

170
Q

What hardware component performs most of the calculations for a computer?

A

CPU

171
Q

Systems software

A

Collection of computer programs that manage hardware and software

172
Q

Operating systems function

A

Coordinate a computers memory

173
Q

Disk management

A

Responsible for reading and writing data and information to a disk, typically a hard drive

174
Q

Which type of memory plays a role in computers ability to perform multitasking?

A

Virtual memory

175
Q

Peripheral hardware

A

Input, output, and storage devices that connect directly to a a computer but does not contribute to any primary function - mouse, printer, webcam etc

176
Q

What does the term “clients” refer to?

A

Computers, laptops, or smartphones on a network

177
Q

Physical cable system

A

Connects networks together

178
Q

Twisted pair

A

Specialized wire that cancels out electromagnetic interference from other devices

179
Q

Gannt Chart

A

Bar chart that illustrates a project schedule

180
Q

RAM

A

short term fast memory

181
Q

Virtual memory

A

running more apps than RAM can hold

182
Q

Cache memory

A

minimal storage capacity

183
Q

Registers

A

built into COU and hold instructions that are currently being used

184
Q

Network operating system function

A

controlling network traffic
managing files
maintaining network security
back up

185
Q

Microcomputer vs. minicomputer

A

Micro: admin tasks and word processing
Mini: managing databases and graphics

186
Q

Examples of semi structured data

A

Email and HTML

187
Q

Unstructured data examples

A

Video/audio
satellite imagery
weather sensor data

188
Q

Project management examples

A

Microsoft project and smartsheets

189
Q

Data level security

A

protecting actual data

190
Q

System level security

A

protecting hardware where data resides

191
Q

User level security

A

protecting passwords

192
Q

Examples of electronic computing tools

A

texting
discussion boards
online chatting