Foundations of ITM Flashcards
refers to the comprehensive set of tools, systems, and processes that manage, store, process, and communicate information in electronic form
Information Technology (IT)
is the collection of physical and virtual resources that support and enable the functioning of IT systems
Information technology infrastructure
provides the necessary foundation for IT systems to operate, ensuring their stability, reliability, and scalability
IT infrastructure
an individual part or element of an information technology (IT) system or infrastructure
IT component
work together to support the delivery of IT services and enable the functioning of an organization’s technology environment
IT component
broadly categorized into hardware, software, and networking elements
IT components
the application of technical expertise, processes, and resources to create, manage, and deliver value to customers or end-users within an organization
IT Service
include, but are not limited to, data storage and backup, cloud services, cybersecurity, and IT consulting
IT Service
refers to the delivery of computing resources, services, and applications over the internet rather than hosting them on-premises within an organization’s own IT infrastructure
Cloud Computing
a collection of hardware, software, data, people, and procedures that work together to process, store, and distribute information to support decision-making, coordination, control, analysis, and visualization in an organization
Information Systems
six components of IT infrastructure
- hardware
- software
- networks
- data
- people
- processes
physical and tangible parts of a computer
Hardware
the “brains” of the computer and executes instructions required by the software
central processing unit (CPU)
a main circuit board
motherboard
A popular interface for connecting high-definition displays, such as monitors and TVs, to computers
HDMI (High-Definition Multimedia Interface)
Older video interfaces used to connect monitors and projectors to computers.
VGA (Video Graphics Array) and DVI (Digital Visual Interface)
A high-performance video and audio interface used to connect monitors and other displays to computers
DisplayPort
A wired networking interface used to connect computers to local area networks (LANs) and the internet.
Ethernet
Ports for connecting audio devices, such as speakers, microphones, and headphones, to computers
Audio jacks
A wireless technology used to connect peripherals, such as keyboards, mice, headphones, and speakers, without the need for cables
Bluetooth
A wireless networking technology that allows computers to connect to the internet or local networks without the need for Ethernet cables.
Wi-Fi
a set of computer instructions that tell the computer how to work and perform tasks.
Software
3 categories of software
- application
- utility
- system
software an end user chooses to use that accomplishes a specific task for the user (e.g., Microsoft Excel and Adobe Photoshop)
Application
software that performs a particular function in the background and requires little to no interaction with the user but is essential to the functioning of the computer (e.g., printer drivers and virus protection)
Utility
software that supports a computer’s basic functions, such as scheduling tasks, executing applications, and controlling peripherals (e.g., Microsoft Windows, macOS, and Linux)
System
A computer network consists of two or more devices
network nodes
allow employees to access resources and work remotely from different locations
Networks
facilitate centralized management of IT resources, making it easier to monitor, maintain, and troubleshoot systems and devices
Networks
enable organizations to implement centralized backup and disaster recovery solutions, ensuring data protection and continuity in case of system failures or other issues
Networks
often considered as the backbone of the IT infrastructure
Networks
raw, unprocessed facts, figures, and information collected and stored in various formats
data
very valuable asset that a company can acquire
Data
an organized collection of structured data that is stored and managed in a way that allows for efficient access, retrieval, modification, and manipulation
Database
smaller, focused data storage solutions catering to specific business units, departments, or functions, containing a subset of data from a larger data warehouse
data marts
centralized storage systems for raw, unprocessed, or semi-structured data, capable of handling various file formats and types of data, often used for big data analytics, machine learning, and AI applications
Data lakes
large, centralized repositories for storing, managing, and analyzing vast amounts of structured and semi-structured data from various sources across an organization
data warehouses
centralized data storage and integration platforms that connect and consolidate data from multiple sources, focusing on data integration, data sharing, and data governance, ensuring data consistency and quality
data hubs
refers to the people who design, develop, maintain, and use software and hardware systems and the methodologies, processes, and practices that they follow
IT Professional
peopleware
who install and repair computers
IT Professional
hardware tech
who install software and assist users in using the software
IT Professional
software tech
design, install, and monitor the network to ensure it is running at maximum efficiency
IT Professional
network technicians and administrators
who design, create, and monitor databases so they can store and retrieve data crucial to the business processes
IT Professional
database administrators
who oversee the IT department, manage IT resources, and are responsible for setting IT policies and strategies within an organization
IT Professional
IT managers and directors
who design, develop, and maintain software applications or systems, working with programming languages, frameworks, and tools to create custom solutions for businesses or end users
IT Professional
software developers and engineers
who focus on protecting an organization’s data, networks, and systems from cyber threats
IT Professional
IT security professionals
who are responsible for overseeing IT projects from inception to completion, ensuring that projects are delivered on time and within budget
IT Professional
IT project managers
who analyze business users’ needs and find ways for IT to make processes more efficient or write specifications for programmers to write code
IT Professional
systems analysts
People also include those who use the hardware, software, networks, and databases in their daily work.
IT Professional
end users
the execution of software, data manipulation, and communication between different components within the IT infrastructure
processes
An online store facilitates web purchases that electronically process the order, credit card authorization, and payment
Type of Process
Order processing
The DMV issues and updates drivers’ licenses
Type of process
License management
A bank accepts deposits and enables customer withdrawals of funds from a web portal, ATM, or teller
Type of Process
Banking transactions
A patient record is automatically updated based on user input to the patient’s chart in a secure database management system
Healthcare record update
A process is used to manage customer interactions, tracking communication, sales, and support history to improve customer satisfaction and retention
Customer relationship management (CRM)
A process is used to track the performance and availability of a network, proactively detecting and resolving issues to ensure smooth business operations
Type of Process
Network monitoring
A process is used for recruiting, onboarding, evaluating, and managing employees, ensuring compliance with labor laws and maintaining a productive workforce.
Human resources management
Security measures that are made up of a combination of hardware and software that make intranets secure
firewalls
means it has been written by a company and it meets the needs of the business right out of the box
Off-the-shelf software
the knowledge that enables a person to understand something
Competency
a management process, technique, or method that is most effective at arriving at a desired outcome or a better outcome than any other process, technique, or method
best practice
computing power doubles every 18 month
Moore’s law
What hardware component performs most of the calculations for a computer?
Central processing unit (CPU)
the major markup language used to create webpages
Hypertext Markup Language (HTML)
protocol used to define how messages are formatted and transmitted on the internet
Hypertext Transfer Protocol (HTTP)
a tiny computer part that helps other parts of the computer talk to each other
chipset
are massive, room-sized computers that process and store enormous amounts of bulk data and information
Mainframe Computers
require a huge amount of physical space and have special requirements like specialized air-conditioning units and fire protection systems
mainframes
are less powerful and smaller in physical size than mainframe computers and perform many of the same things but on a smaller scale
Midrange Computers
are smaller than mainframes and midrange computers and are so common that they are most commonly referred to simply as computers and sometimes just referred to as boxes
Microcomputers
least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.
Microcomputers
made to reside on a desk and is not portable
desktop computer
has the same basic components as a desktop and is designed specifically for portability
laptop
compact but far less powerful than desktops or laptops
Handheld Computers
a collection of computer programs that work together to manage hardware and software to ensure that they are working properly
An operating system (OS), often called a platform
the storing and organizing files in the memory of a computer
file management
a digital resource that stores data, information, or instructions that can be accessed by a computer program
computer file
refers to the physical components in a computer system that store digital data and information temporarily or permanently
Type of memory
Computer memory
computer’s short-term working memory that the CPU accesses directly
RAM, or Random Access Memory
a section of a hard disk that mimics a computer’s RAM
Virtual memory
plays an important role in the operating system by allowing end users to run more applications than the system has physical RAM to support
Virtual memory
faster than the RAM but has minimal storage capacity
Cache memory
are the smallest and fastest type of memory
Registers
a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently
solid-state drive (SSD)
refers to nonvolatile, secondary storage on a physical device like a hard drive
Disk storage
a computer disk that uses optical storage techniques and technology to read and write data
optical disk
is a software application designed to organize, analyze, and manipulate data using rows and columns of cells
Spreadsheets
an application software used to create, compose, edit, format, and print documents
word processor
is used to present information in a slideshow format
Presentation Software
is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information
Database software, or database management system software (DBMS)
a type of database that organizes data into one or more tables, each with a unique key identifying each row
relational database
collection of business computer application programs of associated functionality that share a common graphical user interface (GUI) and have the capacity to exchange data across the programs smoothly
Software suites
where users can pay a monthly or annual fee to access the software
Subscription-based services
allow users to purchase and download software directly to their devices
App stores
can be accessed through a web browser without the need for installation or licensing
Cloud-based software
free to use and can be downloaded from the internet without the need for purchase or licensing
Open-source software
allows a user to select an entire area from one application and a part of another
Object embedding
Which type of memory is crucial to a computer’s ability to perform multitasking effectively?
Virtual
Which type of computer category does a smartphone belong to?
Handheld computer
Which category of computer does a business laptop belong to?
Microcomputer
Which type of software is responsible for managing computer hardware, running applications, and controlling peripherals?
Systems software
encompasses technologies, practices, and processes designed to protect networks and their devices, programs, and data from theft, damage, or unauthorized access
cybersecurity
defined as two or more computers connected together to communicate and share resources
computer network
Each device connected to a network
node
connected to a central computer
server
network made up of computers like desktops, laptops, and portable devices
clients
a card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers
network interface controller (NIC) card
provides the computer with a unique 48-bit address called a MAC (media access control) address
Ethernet card
responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel
MAC (media access control) address
a standard language that devices connected to a network use to communicate and transfer data
protocol
second basic network component
protocol
The third component that all networks have in common
physical cable system
the first component of all network
Network Interface Controller
The most used network cable
Ethernet cable
is the fourth component of a computer network
network hub
most common hub
Ethernet hub
is a device that acts as a central connection point for devices on a network
network hub
what replaced ethernet hubs
switches
direct data to specific devices on the network rather than sending it to all devices like a hub does, which helps to reduce collisions and improve network performance.
switches
a set of protocols used to connect a network to the internet
Transmission Control Protocol/Internet Protocol (TCP/IP)
is software that resides on a network server and controls an entire network
Network operating system (NOS)
responsible for controlling network traffic, administering packets, managing files, administering certain functions like backup, and maintaining network security
network operating system (NOS)
allows several processes to occur simultaneously
multiprocessing
responsible for smooth network operations, network performance, and implementation of new nodes or even new networks
IT Professional
network administrator
refers to the physical and logical layout of a computer network, including the connections between nodes (devices)
Type of Topology
network topology
a network topology where each of a network’s nodes is connected to a common linear backbone that has two endpoints
bus topology or linear bus
named for the star shape created by nodes that radiate around a central node in a spoke-like fashion
Type of Topology
star topology
ring shape created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other
ring topology
each node is connected to every other node in the network
mesh topology
a computer network that is relatively small, typically in a single building but sometimes as small as a single room
local area network (LAN)
a computer network that connects two or more LANs that are located on a physical campus, like an organization’s national headquarters, or even an industrial complex
campus area network (CAN)
a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city
metropolitan area network (MAN)
are computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together
Wide area networks (WAN)
are computer networks that generally connect computers directly to one another without using a server
Peer-to-Peer Networks (P2P)
a cloud storage service that utilizes P2P networking to provide faster and more reliable file synchronization across devices
dropbox
a GPS navigation app that provides real-time traffic updates and routing information using a P2P network of drivers who share data on road conditions
Waze
world’s largest network and connects thousands of other networks together including LANs, CANs, MANs, WANs, and P2P.
internet
is the practice of protecting computer networks and the information they contain from unauthorized access, theft, or damage
Network Security
secret word or combination of keyboard characters typed in by a user to authenticate one’s identity for joining a computer network
passwords
is a security process that requires more than one way to prove you are who you say you are before you can access a computer or online account
Multi-Factor Authentication (MFA)
restrict or grant access to specific files and folders on a computer network to a user or group of users
permissions
can be described as a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization’s network
firewall
refers to the protection of a computer system from physical damage, theft, or unauthorized access, whether from an external attacker or an internal user
computer security
includes the recognition, consequences, and assessment of risk to a computer’s assets and developing strategies to manage and protect them
risk management
typically someone who attempts to invade, or disable, a computer’s security measures to steal the computer resources
hacker
is extremely easy to breach, especially by a seasoned hacker
unsecured computer
Computer files that infect IT systems and reproduce like a biological virus by making copies of themselves within a host, such as a computer’s memory or storage or on a network
computer virus
A program that uses networks to travel by sending copies of themselves to other parts of the network without a user’s knowledge or intervention
malware
worms
A type of malware that encrypts a user’s files or locks their computer, making data inaccessible. The attacker then demands a ransom payment in exchange for the decryption key or unlocking the system
ransomware
A set of software tools that provide an attacker with stealthy and persistent access to a compromised system by hiding their presence and activities from users and security software
rootkits
A collection of compromised computers, known as “bots” or “zombies,” remotely controlled by an attacker for various malicious activities
botnets
A program that misleads users of its true intent. When executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system
trojan horses
A program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent
spyware
A program that automatically displays or downloads advertising to a computer
adware
A program that uses an electronic email system to arbitrarily send millions of unsolicited bulk messages to various users and accounts
spamming
A program that can make a computer or any of its resources unavailable to its intended users
Denial-of-Service (DoS)
A program that simply records every keystroke made at the workstation’s keyboard
keylogging
computer programs that attempt to identify, prevent, and eliminate computer viruses and malware, typically before they reach a computing system or network
antivirus software
broad term that refers to any fraudulent activity in an online setting
internet fraud
an internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee
click fraud
involve buyers (typically in another country) who approach merchants via spam and ask whether they can pay for shipping with a credit card
Purchase Scams
Cybercriminals steal personal data, such as Social Security numbers, addresses, or credit card details, to impersonate someone and carry out fraudulent activities in the victim’s name
Identity Theft
On online auction platforms, fraudsters may list items for sale and either not deliver them after receiving payment or deliver counterfeit, damaged, or significantly different items than advertised
Auction Fraud
Scammers pretend to be tech support agents to convince victims that their computers have problems
Tech Support Scams
Fraudsters advertise non-existent or misleading job opportunities that supposedly allow individuals to work from home
Work-from-home Scams
criminal activity involving using social engineering techniques and attempts to gain private information deceptively, like usernames, PIN numbers, passwords, and credit card details, by masquerading as a legitimate business organization, typically in a legitimate-looking email
Phishing
can be defined simply enough as the ability of an individual to keep personal information out of public view
privacy
can pose privacy risks, as these networks can be monitored or intercepted by hackers
Public Wi-Fi Networks
are a list of stored or cached websites on a user’s computer that is essentially an account of where and what a user’s web browser has visited on the web
History files
a criminal in an office or a public place will simply glance over the victim’s shoulder and watch the person dial a phone number, or type in a password on a laptop, or use a credit card number
Shoulder Surfing
How does a peripheral device function in a network?
As a shared resource utilized by multiple end users
Two or more computers connected to share resources and communicate
computer network
How does creating an office network simplify the maintenance of employee workstations?
Client computers’ software updates can be done at once from the server.
Which component is essential for each client computer in the office to connect to the new network?
A network interface card
Which network type is appropriate for a business with 25 employees working at a single location?
Local area network (LAN)
Which network component is specifically designed to prevent unauthorized access when the business handles sensitive data and requires high network security?
Firewall
Which type of computer runs a network operating system (NOS)?
server
Which type of software is designed to easily generate Gantt charts?
Project management software
Which term describes physical aspects of a computer?
hardware
Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts?
Database software
What is the purpose of a firewall?
Prevent unauthorized access
Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business?
End-users
A large company is investing in new IT systems, including a new server.
Which IT professional should be tasked with setting up and maintaining the server?
Computer System Administrator
A small business has a single network that allows every employee to connect through a central server when they are in the company’s main office.
Which type of network is the business using?
Local area network (LAN)
What term refers to the study, design, development, implementation, support, and management of computer-based information systems?
Information Technology
An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password.
Which type of fraud does this email represent?
Phishing