IT becker quick notes Flashcards

1
Q

Components of IT?

A
  1. Hardware
  2. Software
  3. Data
  4. People
  5. Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Components of BIS

A
  1. TPS-Transaction Processing System
  2. Knowledge Systems and Office Systems
  3. MIS-Management Information Systems
  4. DPS-Decision Support System
  5. EIS- Executive Information System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Order of Events for Data Processing

A
  1. Collect
  2. Process
  3. Store
  4. Transform
  5. Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting trail order includes what?

A
  1. Source document
  2. Journal
  3. Ledger
  4. Trial Balance
  5. F/S Reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 Critical IT Resources include

A
  1. Application
  2. People
  3. Information
  4. Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Digital Certificates?

A

Another form of data security. An electronic document, created and digitally signed by a trusted party, which certifies the identity of the owners of a particular public key. Contains that party’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public Key Infrastructure?

A

refers to the system and processes used to issue and manage asymmetric keys and digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4 Types of risks

A
  1. Strategic Risk
  2. Operating Risk
  3. Financial Risk
  4. Information Risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strategic Risk defined

A

Risk of choosing inappropriate technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operating Risk defined

A

Doing the right things the wrong way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Financial Risk defined

A

Having financial resources lost, wasted, or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Risk defined

A

Risk of loss of data integrity, incomplete transactions, or hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Steps in Disaster Recovery

A
  1. Assess the risks
  2. Identify mission-critical applications and data
  3. develop a Plan
  4. Determine the Responsibilities of the personnel involved
  5. Test the disaster recovery plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RAM?

A

stores data TEMPORARILY while it is being processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ROM?

A

Used to PERMANENTLY store data needed to power the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RAID?

A

Redundant Array of Independent Disks= disk storage, combines multiple inexpensive disk drives into an array of disk drives to obtain performance, capacity and reliability that exceed that of a single large disk drive.

17
Q

RAID 0

A

Non redundant, large code

18
Q

RAID 1

A

Writes all data to 2 disks original and redundant disks

19
Q

RAID4-6

A

Writes to 1 disk and parity bit to a second disk

20
Q

RAID 10

A

Combination of RAID 0 and RAID 1

21
Q

SQL consists of

A
  1. DDL- Data definition language
  2. DML- Data Manipulation Language
  3. DCL- Data Control Lanaguage