Information Technology Fundamentals Flashcards
711
What is information technology (IT)?
A field that involves the use of computers, software, and networks to manage and process information.
Name the core components of a computer’s hardware.
CPU, RAM, storage devices (HDD/SSD), motherboard, and peripherals (keyboard, mouse, monitor).
What is system software?
Software that manages computer hardware and provides a platform for application software (e.g., operating systems).
Define LAN and WAN.
LAN (Local Area Network) is a network that spans a small geographical area, while WAN (Wide Area Network) covers larger distances.
What does TCP/IP stand for, and why is it important?
Transmission Control Protocol/Internet Protocol; it is the fundamental suite of protocols that governs data communication over the Internet
What is a database management system (DBMS)?
Software that allows users to create, manage, and manipulate databases (e.g., MySQL, Oracle).
What is data normalization in databases?
The process of organizing data to minimize redundancy and improve data integrity
What are the primary goals of information security?
To protect confidentiality, integrity, and availability (CIA) of data.
What is encryption?
The process of converting information into a coded format to prevent unauthorized access.
Name a few emerging technologies affecting IT.
Cloud computing, artificial intelligence, the Internet of Things (IoT), and big data.
What is the primary function of the CPU (Central Processing Unit)?
It acts as the brain of the computer, performing calculations and executing instructions.
What is the difference between volatile and non-volatile memory?
Volatile memory (e.g., RAM) loses its data when power is off, while non-volatile memory (e.g., SSD, HDD) retains data even when powered down
What is the function of an operating system (OS)?
The OS manages hardware resources, provides a user interface, and enables application software to run
Define phishing.
A cyber-attack where attackers impersonate legitimate entities to steal sensitive information, often through deceptive emails or websites.
What does cloud computing allow users to do?
Access and store data and applications over the Internet instead of on local servers or personal computers.