Introduction to IT - D322 Flashcards

1
Q

Information Technology

A

The technology used in creating, maintaining, and making information accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT Professional Roles

A

Administration and Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System Administrator

A

Maintains all aspects of the system including hardware, software, and programming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Administrator

A

In charge of all aspects of the computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Database Administrator

A

Focuses on the design, development, and support of database management systems (DBMSs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Administrator

A

Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web Administrator

A

Installs, configures, maintains, secures, and troubleshoots web severs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Support IT Professionals

A

Help desk and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information

A

Processed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DIKW Hierarchy

A

Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data in DIKW

A

The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information in DIKW

A

Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Knowledge in DIKW

A

Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wisdom in DIKW

A

Provides a social setting to knowledge; an understanding of the “why”. Can only come by having both knowledge and experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information Systems

A

A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Characteristics of Quality Data

A

Relevance - the data being used must apply directly to the decision being made

Timely - data must be efficient and must be provided in a timely manner

Thorough - the data must be complete

Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible.

Reliable - data should reflect stable and consistent data collection processes across collections points and over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPOS

A

The Input-Procession-Output-Storage Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Input

A

Raw data is entered by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Processing

A

Raw data is organized or structured for usefulness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Output

A

Information is output so user can see results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Storage

A

Processed information is stored for permanent record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computer System

A

A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hardware

A

Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Software

A

Computer programs that tell the computer what to do–how to execute commands and process information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Network

A

A collection of computers and resources connected by various media so that they can communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

User

A

Those who use a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Software Categories

A

Systems Software and Applications Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Evolution of Users

A

First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Protocol

A

Rules provided by which networks communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Protocol Stack

A

A collection of protocols. TCP/IP is an example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Components of a Computer

A

CPU, Memory and Storage, Peripheral Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CPU

A

Executes programs’ instructions and commands various components in the computer. Referred to as the “chip”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Memory

A

Stores the programs being executed and the data they are using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

I/O Subsystem

A

All peripheral devices where long term storage devices are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Bus

A

Permits information to move between each component; electrical channels that enable communication among the electronic components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

System Unit

A

Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Internal Components of the System Unit

A

Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Parts of the CPU

A

Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU

Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

System Clock

A

Controls the speed at which instructions are processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

RAM

A

Stands for Random Access Memory.

It temporarily stores data before it is processed and sent to your screen or printer.

It is volatile (means data or information stored disappears when the computer is turned off or loses power).

You can choose the amount of RAM your computer has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Types of RAM

A

Dynamic RAM (DRAM) - typically called main memory

Static RAM (SRAM) - cache memory and registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

BIOS ROM

A

BIOS stands for Basic Input Output System; ROM stands for Read Only Memory.

Typically stored in ROM chip on the motherboard.

Is software not hardware, (“basic” operating system that runs when the computer is first turned on).

Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk.

Can’t choose the amount or contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

1st Generation of Computers

A

Vacuum tubes, relay switches, the need to program in machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

2nd Generation of Computers

A

Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

3rd Generation of Computers

A

Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

4th Generation of Computers

A

Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Moore’s Law

A

Doubling of transistor count roughly every 18 - 24 months (exponential increase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Evolution of Storage

A

Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Machine/Low-level Language

A

Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Assembly Language

A

Easier than machine but still required detailed, precise low level instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Language Translator Programs

A

Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Compiler

A

Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Structured Programming

A

Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Object Oriented Programming

A

Characterized by the creation of windowed operating systems, easier real-world object modeling in programming code, and the application of inheritance in program code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Interpreted Code

A

A type of programming language for which most of its implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Shell Scripting

A

Small programs that place Linux commands or DOS batch files into a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Local Computer

A

The computer that the user is using; physically present with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Remote Computer

A

A computer being accessed over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Network Hub

A

Connects computers to each other with no real understanding of what is being transferred; used for private networks with local computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Network Switch

A

Like a hub, but this will only send data that is intended for a specific computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Router

A

Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Wireless Access Point

A

Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Circuit Switched Network

A

Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission; like calling someone on the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Packet Switched Network

A

A message’s pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Workstations

A

Creates and maintains client network connections to remote servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Virtual Machine (VM)

A

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Server

A

Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Client-server Network

A

Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

File Server

A

Sends files over the network at the request of clients.

Responds over LAN, within one location/site.

Support both application software and data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Web Server

A

Stores data files (web pages) and programs (scripts).

Responds from anywhere on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Database Server

A

Responds to queries by pulling from the database.

Typically only to local clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Print Server

A

Monitors print jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Mail Server

A

Two email servers communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

FTP Server

A

Like web server or file server in that requests are for files and responses are the files; data delivered between client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Point-to-Point Network

A

Link between two resources; links two routers without any host or network in between

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Bus Network

A

Devices connected along a single cable.

Size of network is restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Star Network

A

Each device is connected to a central devices such as a hub or switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Ring Network

A

Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Mesh Network

A

Every device is connected directly to every other device in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Domain Name Server (DNS)

A

Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Parts of URL (Uniform Resource Locator)

A

Protocol, Domain name, Resource/Filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Domain Name

A

Identifies the server on which the web page can be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Domain Name Parts

A

Top level domain (TLD) name and Host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Host Name

A

Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

TLD(Top Level Domain) Name

A

Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Resource/Filename ID

A

Indicates the name of the file you are accessing, or the location of the document on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Confidentiality

A

Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Integrity

A

Requires that data is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Availability

A

Requires that information is available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Data Integrity Efforts

A

1st - Must include a component that ensures the accuracy of the collected data

2nd - Must be entered into the system accurately

3rd - Data modification must be tracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Strategic Risk Analysis

A
  1. Identify the organization’s information assets
  2. Identify vulnerabilities of each asset
  3. Determine threats
  4. Prioritizing risks
  5. Develop and enact policies that will reduce threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Information Security Classifications

A

Public - available through public sources; includes names and addresses

Sensitive - not considered a threat to a person’s privacy if others learn of it; include email addresses

Private - information that could be a threat if disclosed to others; includes social security and credit card numbers

Confidential - information that an organization will keep secret; includes patentable information and business plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Defense in Depth

A

Protecting every layer that surrounds data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Phishing

A

Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

SQL Injection

A

An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company’s website; web server might pass the command onto the database which then allows potentially anything to be done to the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Buffer Overflow

A

Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Hacking

A

When an individual obtains unauthorized access to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

White Hat Hacker

A

Informs companies of potential problems with software so companies can fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Black Hat Hacker

A

Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Grey Hat Hacker

A

Engage in both white and black hat types of hacking activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Packet Sniffing

A

Allows you to obtain anything being sent over a network if the data being transmitted isn’t encrypted

104
Q

Virus

A

Software that attaches itself to another legitimate software application

105
Q

Worms

A

Self contained programs that do not need other programs to propagate across computers and computer networks

106
Q

Trojan Horse

A

Type of virus that completely replaces an existing application and takes the name of the taken over file

107
Q

Denial of Service (DOS)

A

One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business

108
Q

Firewalls

A

Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked

109
Q

Anti-virus Software

A

Attempts to identify if a file contains a virus or some form of malware

110
Q

Redundancy

A

Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline

111
Q

Encryption

A

Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information

112
Q

Symmetric Key Encryption

A

Uses the same key for performing the encryption and decryption

113
Q

Public Key Encryption

A

Uses two keys, a public and private key for performing encryption and decryption

114
Q

Security Education

A

Users learn how to protect their passwords and other security measures

115
Q

Authentication

A

Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)

116
Q

Role-based Access Control

A

Ensures that the user gains access only to the resources that the user should be able to access

117
Q

Computer Network Advantages

A
  1. Cost savings benefits
  2. Increased efficiency and productivity
  3. Increased facilitation of communication
118
Q

Application Software

A

Consists of programs that end users run to accomplish tasks

119
Q

System Software

A

Consists of programs that make up the OS; software that directly supports the computer system itself

120
Q

Server Software

A

Works with hardware to provide a network service

121
Q

Local Applications

A

Software that is stored on an individual computer

122
Q

Intranet

A

A LAN that uses the Internet Protocol

123
Q

Cloud Computing

A

Offers, as a service, the ability to offload computation and storage from your local computer

124
Q

Operating Systems

A

Primary task is to allow a computer user to easily access the hardware and software of a computer system

125
Q

Kernel

A

Core components of the OS that is loaded when the computer is first booted.

126
Q

Device Drivers

A

Provide specific interfaces between the OS running a computer and hardware devices.

127
Q

Shell

A

An interface for the user, often personalized for that given user, that provides access to the kernel.

128
Q

Services

A

OS programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.

129
Q

Utility Programs

A

Programs that allow the user to monitor and improve system performance.

130
Q

Proxy Server

A

Acts as a giant cache of web pages that anyone in the organization has recently retrieved; can be used to block access to certain web pages

131
Q

Proprietary Software

A

Software purchased from a vendor; also known as commercial

132
Q

Shareware

A

Provides a trial version of the software.

133
Q

Freeware

A

Usually software that has become obsolete; is free

134
Q

Public Domain

A

Software that has been moved into the public domain; can be used however you feel

135
Q

Open Source

A

Created in the Open Source Community and made freely available as source code

136
Q

Copyrights

A

Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author’s life plus 70 years; protects against duplication.

137
Q

Patents

A

Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date

138
Q

End User License Agreement (EULA)

A

Gives the purchaser the right to use the software

139
Q

Decimal

A

Uses base 10 to represent numbers (0 - 9)

140
Q

Binary

A

Uses base 2 system (0 and 1)

141
Q

Byte

A

8 bits; a single character of text in a computer

142
Q

Octal

A

Every value is represented with some combination of 8 digits (0 - 7)

143
Q

Hexadecimal

A

Uses a base 16

144
Q

Character Representation

A

ASCII and Unicode

145
Q

Language Translators

A

A program that takes one program, written in a high level language, and creates a machine language program as output

146
Q

Compiled Language

A

Translates the entire program using a compiler, creating an executable program which can be run at a later time; the program can then be run as many times as one likes, without having to re-translate each time.

147
Q

Interpreted Language

A

Takes the most recently entered instruction, translates it into machine language, and executes it; must be translated manually each time.

148
Q

Script

A

A computer language with a series of commands within a file that is capable of being executed without being compiled.

149
Q

Algorithms

A

A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process

150
Q

Multi-tier Development

A

Separation of different aspect of a system

151
Q

N-tier Development

A

Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects

152
Q

Presentation Tier

A

Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures

153
Q

Logic Tier

A

Tier that sits between the user interface and the data.

154
Q

Data Tier

A

Tier where data is stored, retrieved and updated from database tables

155
Q

Model-View-Controller (MVC)

A

A development technique used in the implementation of user interfaces

156
Q

The Model

A

Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application

157
Q

The View

A

The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model

158
Q

The Controller

A

The part of an application that interacts with the user and passes the user requests to the model

159
Q

Data Validation

A

Ensuring that users enter the correct data type

160
Q

String Data

A

Alphanumeric or text character

161
Q

Floating-point

A

Number with a decimal point

162
Q

Boolean/Logical

A

True/False; applying AND/OR when searching for data.

163
Q

Flat File Database

A

One large single table; used if the amount of data that is being recorded is fairly minimal

164
Q

Relational Database

A

Has multiple tables (relations) with interrelated fields; most common structure for databases

165
Q

Hierarchical Database

A

Organizes data using a tree like or organizational chart type structure

166
Q

Database Management System (DBMS)

A

Used to create, manipulate, and access the data in a database

167
Q

Relation

A

Often presented as a table; for example: name and phone number

168
Q

Tuples

A

Rows of a relation in a database

169
Q

Attributes

A

Columns of the relation

170
Q

Field

A

Contains the data of an attribute for a record within a relation

171
Q

Query

A

A search of data in the relation or relations that fit specific parameters

172
Q

Projection

A

A query that returns all of the records from the relation, but only select attributes or fields

173
Q

Sort

A

Sorting records based on some field(s) such as ascending order by last name

174
Q

Join

A

Withdraws information from multiple relations and combines them.

175
Q

Primary Key

A

A field in the relations that contains a unique value, such as a license plate, phone number, or Social Security Number.

176
Q

Business Intelligence

A

A specific information system to help an organization reach its strategic goals

177
Q

Data Warehouse

A

A collection of organized databases

178
Q

Database Information Processing (OLAP)

A

Online Analytical Processing; a computer-based technique of analyzing data to look for insights

179
Q

Slicing

A

Creates a subset of the data by reducing the data from multiple dimensions to one dimension

180
Q

Dicing

A

Creates a subset of the data that can still be in multiple dimensions

181
Q

Drilling up and down

A

Shifts the view of the data; down provides more detail, up provides summarized data

182
Q

Rolling up

A

Similar to drilling up but it collapses the data from multiple items into a single value

183
Q

Pivot

A

Rotates data to view the data from a different perspective (being able to compare different sets of facts)

184
Q

Online Data Processing (OLDP)

A

Deals with data in real time

185
Q

Event-driven Processing

A

Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another

186
Q

Batch Processing

A

Processing large amounts of data all in one batch when the computer system is not busy

187
Q

ODBC (Open Database Connectivity)

A

An interface for accessing database management systems that can be ported to other systems by using a driver.

188
Q

Database Interacting Format

A

SELECT fields FROM tables WHERE fields from tables match criteria

189
Q

SELECT

A

Used to inform the DBMS what fields or attributes are of interest

190
Q

FROM

A

Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined

191
Q

WHERE

A

Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query

192
Q

Project phases

A

Initiation, planning, executing and controlling, and closing

193
Q

Project Initiation

A

Problem definition, resource allocation, risk assessment

194
Q

Project Planning

A

Organize activities, time estimation, cost estimation

195
Q

Project Executing and Controlling Reports

A

Variance reports, Status reports, Resource Allocation reports

196
Q

Scope Creep

A

Adding to the scope of the project; can impact the allocation of resources.

197
Q

Unnecessary Requirements

A

Requirements that are not actually needed but are “nice to have”

198
Q

System Development Life Cycle (SDLC)

A

A process for planning, creating, testing, and deploying information systems, including hardware and software

199
Q

Common Steps in SDLC

A

Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance

200
Q

Preliminary investigation

A

Assesses the feasibility of the proposed project and selects a development methodology

201
Q

Analysis

A

Determines the user requirements for the new system and develops logical models of the system

202
Q

Logical design

A

Logical models are revised to ensure that the new system will meet the user requirements identified in the first step

203
Q

Physical design

A

Logical models are converted into physical models

204
Q

Implementation

A

Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users

205
Q

Maintenance

A

Modifications or corrections to the system are made

206
Q

Alpha Testing

A

System developers assist end users as they interact with new system; simulated data is used

207
Q

Beta Testing

A

Performed by the end user without any assistance from the system developers; live data in a real working environment is used.

208
Q

User Acceptance Testing

A

Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user

209
Q

System Deployment

A
  1. System Conversion
  2. Final Documentation
  3. End User Training
210
Q

Direct Conversion

A

Old system is turned off and the new system is turned on at a specific data and time

211
Q

Parallel Conversion

A

There is a period of time in which both systems are operating concurrently

212
Q

Pilot Conversion

A

Involves starting the conversation with a portion of end users

213
Q

Phased Conversion

A

Deploys a subset of the system first, rather than deploying the whole system at once

214
Q

Business Continuity

A

The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.

215
Q

Image backups

A

Create a copy of everything that is on a hard drive

216
Q

Full backup

A

Everything on the hard drive is copied each and every time a backup is performed

217
Q

Incremental backup

A

An initial full backup is completed and then subsequent backups only capture the changes since the last backup

218
Q

Data mirroring

A

The OS writes data (and changes to data) to multiple hard drives at the same time.

219
Q

Off-Site Storage

A

A secure location for storing backup media

220
Q

Hot Site

A

Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.

221
Q

Cold Site

A

Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have

222
Q

Site Sharing

A

Having multiple data centers located in disparate regions; typically used by large organizations.

223
Q

The Internet of Things (IoT)

A

Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.

224
Q

Big Data

A

Refers to data sets that are so large and complex that they will require more advanced database management/processing tools.

225
Q

SaaS

A

Software as a Service. Can access and use software through the Internet.

226
Q

PaaS

A

Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.

227
Q

LaaS

A

Logging as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.

228
Q

Ethics

A

A code of moral conduct or a set of principles that govern behavior.

229
Q

Administrator Ethics

A

Privacy, Ownership, Control, Accuracy, Security

230
Q

Transistor

A

A device used to amplify or switch electronic signals and electrical power.

231
Q

Loops

A

Instructions that continually repeat until a certain condition is reached.

232
Q

White Loop

A

Used when we do not know how many a loop needs to be executed beforehand.

233
Q

For Loop

A

Used when we already know how many times a loop needs to be executed.

234
Q

IP Aliasing

A

Associating more than one IP address to a network interface.

235
Q

IP Address

A

A code that identifies each computer using the Internet Protocol to communicate over a network.

236
Q

SQL

A

Programming language for managing data in a database management system.

237
Q

Buffer

A

Physical memory storage used to temporarily store data while being moved from one place to another; can read faster than RAM but cannot store as much.

238
Q

LAN

A

Local Area Network; connects computers within a limited area such as a school or business.

239
Q

Database Driver

A

A program that implements a protocol for connecting to a database,

240
Q

Dumb Terminal

A

A display monitor that has no processing capabilities.

241
Q

ASCII

A

The first character encoding standard; represents English characters as numbers, with each letter assigned a number from 0 to 127.

242
Q

Unicode

A

Defines the internal text coding system in nearly all operating systems; assigns each character a unique number.

243
Q

Motherboard

A

The main circuit board of a computer; it holds and allows communication between many electronic system components, such as the CPU and memory, and provides connectors for other peripherals.

244
Q

Non-Volatile Memory

A

Memory that retains contents when power is turned off, such as ROM; RAM is volatile.

245
Q

Telnet

A

Allows a user to communicate with a remote device; does not use encryption.

246
Q

SSH (Secure Shell)

A

Allows a user to communicate with a remote device; does use encryption.

247
Q

Integer

A

A whole number (non-fraction) that can be positive, negative, or zero, but it cannot have decimal places.

248
Q

ETL

A

Extract Transform, Load; process of extracting data, transforming it for purposes of analysis, and loading it into the final target database.

249
Q

Variance Report

A

Used to identify the difference between the planned outcomes and the actual outcomes.

250
Q

Waterfall Model

A

Used during the system development life cycle (SDLC) to denote the fact that each step should be completed one at a time.

251
Q

HIPAA

A

The safeguard of medical information.

252
Q

FERPA

A

Protects student education records.

253
Q

SEAL

A

The Digital Signature and Electronic Authentication Law (SEAL) of 1998.

254
Q

Brute Force

A

The process of using all possible combinations of letters and numbers to crack a password.

255
Q

Programming languages used for automation

A

TCL and Python