IT Vocabulary & Definitions Flashcards
Internet
Resources available for public use.
Middleware
Components that allow the hardware and software to communicate with each other, enabling data to move between computer system components.
Software
A collection of instructions that enable a user to interact with a computer to perform tasks. (Internet browsers, text editing tools, and spreadsheets…)
Hardware
Electronic and mechanical parts of a computer system. Components that are tangible such as keyboard, mouse, monitor, CPU…
Paging System
A built-in mechanism available with most operating systems that permit data to be moved from RAM to the hard drive when the amount of memory in use exceeds the memory available on the computer system.
Networks
Systems of hardware and software components that connect two or more devices for the purpose of sharing data and information.
Client-to-Server
Implementation
(examples)
Servers on one side of the network running authentication to facilitate millions of users logging in and permitting access to specific resources based on parameters such as username, password, and system identifiers. Common across organizations.
Peer-to-Peer
Implementation
(examples)
Access to resources is provided without the assistance of a server. File transfer protocol is an example of peer-to-peer implementation. Common in small businesses and homes.
Physical Topology
Indicates the actual layout of how systems are placed in the network.
Logical Topology
Indicates how the data actually flow and is extremely important when considering things like load balancing normal traffic, network backups, and replication of data.
Protocols
Languages supporting data exchange between computers.
Systems
A system is a collection of elements that interact to achieve a common goal.
User Support
IT provides support to users by first analyzing the needs and issues, then identifying and implementing solutions so users can stay productive with minimal technical interruption.
Networks
Communication supported between the elements of an IT system. They are put in place to enable the exchange of data between organizational servers and to give employees access to resources.
Intranet
Resources only available for users or systems of a specific organization are on the intranet like proprietary information and sensitive employee information.
Extranet
Makes resources available within an organization, but it also makes that information available to other specific organizations or users, such as contracted, third-party consultants.
Internet
Resources available for the public are on the internet, including commercial sites (e-commerce), blogs, social media, news, etc.
Business Intelligence
Systems and personnel supporting data analytics use the organization’s data to examine its past performance, identify the reasons behind past and current issues, and forecast future performance.
Project Management
The maintenance of an organization’s IT infrastructure to assure continuous functionality and implement improvements or technology changes within the general organizational IT strategy.
Outsourcing Services
When smaller organizations employ third-party, specialized IT consulting services.
Computing
Any activity that uses a computer to manage, process, or share information.
Data
Raw facts or observations not useful until it has been processed and is presented in a usable form.
Information
A collection of processed data from a variety of sources. (data in context)
Knowledge
A dynamic combination of experience, values, and contextual information.(information with meaning)
Wisdom
The application of the knowledge framework to evaluate and incorporate new experiences and information.
Data Science
Finding patterns/clusters in information; providing insight where one would not know to look.
Big Data
Smart information derived from completing the data pyramid process. (flipped pyramid)
Information Systems
Collections of data and information used to support decision-making in organizations.
Data Architecture
Infrastructure used to manage data in an organization.
Data Hygiene
The processes of ensuring that the data is relatively error-free.
Dirty data can be caused by things such as duplicate records, incomplete or outdated data, and mistakes introduced as data is entered, stored, and managed.
Data Scrubbing
(aka Data Cleansing)
The process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.
Liveware
(People)
The most important element of a computer system.
System programmers write code to implement the working of the system. End users (users) operate the system for different purposes.
Parallel Processing
The ability to process multiple programs simultaneously.
Quantum Computing
The study of a non-classical model of computation.
Nanotechnology
A technology based on the ability to build structures to complex, atomic specifications by means of mechanosynthesis, or reaction outcomes determined by the use of mechanical constraints.
Ephemeral
Short-lived. As in random access memory once the power is cut off.
Volatile vs. Nonvolatile
Volatile memory is lost when the power is cut (RAM), while nonvolatile memory remains (ROM).
System Clock
A pulse of electricity sent out at regular intervals. One instruction gets processed per pulse. The more pulses sent out by the system clock, the faster the computer.
Secondary Storage
Devices that store data and instructions while they are not being used; the saved content remains on the secondary storage unit even when the computer is powered down.
(floppy and hard drives, flash drives, magnetic tape, and optical discs, such as CDs and DVDs.)
Bits
(BI)nary Digi(TS)
How storage capacity is measured. It takes 8 bits to equal a byte, which amounts to a single letter.
Supercomputer
A system of thousands of interconnected processors particularly useful in weather forecasting, scientific simulations, and nuclear energy research.
Mainframe Computer
Designed to support hundreds or thousands of users simultaneously supporting multiple programs at the same time, making them useful to big organizations.
Workstation Computer
A single-user computer designed for technical or scientific applications such as graphics, music, and engineering design. It has a faster microprocessor, a large amount of RAM, and high-speed graphics cards.
Microcomputer
A general-purpose computer for individual use.
desktops, laptops, and handheld or mobile devices.
Networking
Sharing information and resources through linked computer systems.
Client/Server Model
The client/server model is a popular models used wherein the basic roles played by the processes are categorized as either a client, making requests, or a server, satisfying client requests.
Peer-to-Peer (P2P)
Processers both request AND provide service to each other.
such as instant messaging and interactive games
Distributed Systems
The systems execute software as processes on more than one computer.
Cluster Computing
A distributed system that uses many independent computers to provide computation or services comparable to those of a larger machine.
Grid Computing
A distributed system that is more loosely coupled than clusters but still works together as a system to complete large tasks.
Cloud Computing
A distributed system that provides large pools of shared computers that can be allocated to clients as needed.
Networking Hardware
Electronic devices that are required for communication and interaction between devices on a computer network.
Transmission Media
Both wired and wireless networks require network media to transfer data.
(twisted pair cables, copper coaxial cable, and optical fiber cables)
Twisted Pair Cables
The most widely used type of transmission media. Two common types of twisted pair cables are unshielded twisted pair (UTP) and shielded twisted pair (STP).
Network Bandwidth
Measured in megabits per second (Mbps) and gigabits (Gbps) per second.
Malware
(MALicious SoftWARE)
Any software intentionally designed to cause damage to a computer, server, client, or computer network.
Virus
A software program that infects a computer by inserting itself into programs that already reside in the machine.
Worm
An autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network.
Spyware
A reconnaissance program that resides on a computer, collecting information about the computer’s activities and reporting back to the spyware’s instigator.
Phishing
A reconnaissance technique used by individuals to obtain private information by simply asking for it.
Firewall
Program that blocks outgoing messages with certain destination addresses or block incoming messages from untrustworthy sources.
Proxy Server
A software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server.
System Software
General-purpose software that is used to operate computer hardware. It provides a platform to run application software.
(Operating Systems)
Application Software
Application software is specific-purpose software used to perform a specific task.
(Office programs, games…)
Operating System
(OS)
Controls the overall operation of a computer.
Utility Software
Extends the capabilities of an operating system and helps customize the operating system’s function.
(Zip files, Movie Player, Network Connections)
Kernel
The internal part of an operating system that contains the operating system components that perform the basic functions required by the computer installation.
(File Manager)
Compiler
Translates source code into machine language; checks source code for errors before translating it into object code.
Interpreter
Translate and execute source code one line at a time. If the interpreter finds an error, the process is terminated at the statement containing the error and displays an error message.
Algorithm
A step-by-step formula outlining how to execute a task.
Database Systems
Integrate the information stored and maintained by an organization.
Database Research
The act of analyzing and converting data into information that can be used in decision-making.
Integers
4
34
394850
Floating Point Numbers
9.5
45.5
1.7
Characters
F
!
#
Character Strings
abc
def456
3erf78!@
Boolean Values
True
false
Flat-File Database
Stores data in a plain text file. Each line of the text file holds one record. Fields are separated by delimiters like spaces or commas.
Hierarchical Database
Data is organized in a tree structure, much like an organizational chart. There is one parent for each record, with optional nodes, forming sub-trees called segments.
Relational Database
Collections of database tables with interrelated fields.
Union Operation
Combines distinct fields from multiple tables that have the same set of attributes and data types.
Product Operation
Creates a result table that includes all of the attributes from the two tables; each row of the second table is added to each row of the first table.
Join Operation
Combines two tables, but records are only appended when a matching criterion is met.
Object Oriented Database
A collection of objects, each with two components: data and instructions.
Data Lake
A system of data stored in raw format. It is usually a single store of all enterprise data as well as information derived from data during reporting, transactions, or other activities.
Project Initiation
Broadly defines the project. It usually begins with a business case, followed by a feasibility study.
Project Planning
Developing a road map that everyone follows starting with setting the project goals.
Project Execution
Project deliverables are developed and completed. A kickoff meeting usually marks the start of this phase.
Project Closure
The project is declared complete and the project team is dissolved. Project managers complete the final project documentation, including financial reports.
Corrective Maintenance
Removes errors to ensure functionality of the system.
Adaptive Maintenance
Performed when organizational changes affect system requirements, such as changes in the organizational procedures, forms, or system controls and security needs.
Perfective Maintenance
Performed when new components are introduced, or existing components are improved, to enhance overall system performance.
Preventive Maintenance
Changes made to increase the life span of systems and could include restructuring, optimizing code, or updating documentation that impacts the scalability, stability, and maintainability of the system.
Pareto Principle
The theory that 80% of errors come from 20% of the system, meaning most errors can be identified by testing carefully selected groups of samples.
Basis Path Testing
A standardized set of test data that ensures each instruction in the software is executed at least once.
Prototyping
Building and evaluating basic versions of a proposed system.
Hot Storage
Allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe.
Cold Storage
Offers less frequent access and is maintained on minimal equipment that is considered lower performance.
Information Privacy
The right to control how your personal information is collected, used, and exchanged.
Confidentiality
A set of rules that limits access to data/information.
Integrity
When the data/information is both trustworthy and accurate.
Availability
he ability to provide reliable access to the data/information for authorized individuals.