IT Concepts Flashcards
4 Functions of a Computer System
Input –> Process –> Output –> (Storage)
Client-to-Server
Implementation
(examples)
Servers on one side of the network running authentication to facilitate millions of users logging in and permitting access to specific resources based on parameters such as username, password, and system identifiers. Common across organizations.
Peer-to-Peer
Implementation
(examples)
Access to resources is provided without the assistance of a server. File transfer protocol is an example of peer-to-peer implementation. Common in small businesses and homes.
Types of Network Topology
Physical & Logical
2 Common Types of Networks
Local area networks (LANs) and wide area networks (WANs).
2 Types of Network Designs
Client-to-Server and Peer-to-Peer
Data & Information
Management
The IT function that focuses on the efficient storage and dissemination of organization data and information to support its effective use with an eye on disaster recovery and business continuity to mitigate the high costs of losing data.
Systems Integration
The setting up and configuring the new products and programs to align with the specific organizational needs and to integrate with other systems already in use.
Software Development
Identifying and implementing systems that help the organization perform tasks more efficiently or provide novel services.
Business Analysis
Organizations analyze their processes, then assess current and anticipated needs for gaps that technology can fill.
Security
Systems in place to identify threats and prevent incidents that compromise the organization’s data or disrupt the business.
User Support
IT provides support to users by first analyzing the needs and issues, then identifying and implementing solutions so users can stay productive with minimal technical interruption.
Website Classifications
Intranet / Internet / Extranet
Business Intelligence
Systems and personnel supporting data analytics use the organization’s data to examine its past performance, identify the reasons behind past and current issues, and forecast future performance.
Project Management
The maintenance of an organization’s IT infrastructure to assure continuous functionality and implement improvements or technology changes within the general organizational IT strategy.
Outsourcing Services
When smaller organizations employ third-party, specialized IT consulting services.
5 Most Common
Computing Disciplines
Computer Engineering Computer Science Software Engineering Information Systems Information Technology
Computer Engineering
(CE)
A discipline that focuses on the design of hardware systems and the software that makes them work.
Computer Science
(CS)
A discipline that addresses the design and implementation of software with an emphasis on developing effective ways to solve computing problems and creating new ways to use computers.
Software Engineering
(SE)
A discipline that focuses on the development and maintenance of reliable and efficient software systems.
Information Systems
(IS)
A discipline that focuses on integrating IT solutions meant to meet organizational business goals.
Information Technology
(IT)
A Discipline that focuses more on the technology supporting information systems in an organization rather than the information residing on the systems or being communicated with them.
Data Science
Finding patterns/clusters in information; providing insight where one would not know to look.
3 (Core)
Cloud-Based Systems
IaaS / PaaS / SaaS
Volatile vs. Nonvolatile
Volatile memory is lost when the power is cut (RAM), while nonvolatile memory remains (ROM).
System Speed (Clock Speed)
2 Primary Measurements
Megahertz (MHz)
Gigahertz (GHz)
Computer Storage is commonly measured in ____?
MB / GB / TB
4 Computer Categorizations
Supercomputer
Mainframe Computer
Workstation Computer
Microcomputer
Ring Topology
Every device/node is connected to exactly two other nodes one on either side of it in closed loop fashion. All messages travel though the ring either in a clockwise direction or anti-clockwise direction.
Star Topology
Every device is connected to a central device such as a switch. Star topology requires more cable as compared to other topologies but it’s more robust as a failure in one cable will only disconnect the specific connected computer via that cable to the central device.
Mesh Topology
Nodes are connected to each other in a redundant fashion with multiple connections. There are two types of mesh topologies, Partial and Full.
Methods of Process Communication
Client/Server Model
Peer-to-Peer (P2P)
Distributed Systems
Client/Server Model
The client/server model is a popular models used wherein the basic roles played by the processes are categorized as either a client, making requests, or a server, satisfying client requests.
Peer-to-Peer (P2P)
Processers both request AND provide service to each other.
such as instant messaging and interactive games
Types of Distributed Systems
Cluster / Grid / Cloud
4 Common Bandwidth Speeds
CAT1 - 1 Mbps
CAT2 - 4 Mbps
CAT3 - 10 Mbps
CAT5e - 1 Gbps
3 Tiers of ISPs
Tier 1 - International WANs
Tier 2 - Regional WANs
Tier 3 - End Systems or “Hosts” (Local service providers)
Common Types of Malware
Viruses / Worms / Spyware / Phishing
Types of Software
System Software
&
Application Software
Data Types
Integers
Floating Point Numbers
Characters
Character Strings
Boolean Values
8 Types of Databases
Flat-File Database
Hierarchical Database
Relational Database
Object Oriented Database
NoSQL Database
Cloud Database
Data Lake
Distributed Database
IT Governance
The system of processes that ensures the effective and efficient use of IT to enable an organization to achieve its business goals and to add value to key stakeholders in an organization.
Types of System Maintenance
Corrective
Adaptive
Perfective
Preventive
Pareto Principle
The theory that 80% of errors come from 20% of the system, meaning most errors can be identified by testing carefully selected groups of samples.
Ten Commandments
of Computer Ethics
1 - Harm no one.
2 - Don’t interfere with another’s work.
3 - Don’t snoop through files.
4 - Do not hack to steal.
5 - Do not bear false witness.
6 - Do not pirate copies.
7 - Don’t use others’ resources without compensation.
8 - Do not appropriate ideas.
9 - Consider social consequences of your programming.
10 - Always use computers with consideration and respect for other humans.
Asimov’s
3 Laws of Robotics.
1 - A robot must not harm, or ignore preventable harm to a human.
2 - A robot must obey human orders without disregard to rule 1.
3 - A robot must protect its own existence without disregard to rules 1 and 2.