Section 2 Flashcards

1
Q

Systems

A

A system is a collection of elements that interact to achieve a common goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User Support

A

IT provides support to users by first analyzing the needs and issues, then identifying and implementing solutions so users can stay productive with minimal technical interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data and Information Management

A

IT professionals build systems to enable storage, retrieval, analysis, and use of organization data and information with an eye on disaster recovery and business continuity to mitigate the high costs of losing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Networks

A

rely on hardware and software to connect computer systems and data repositories, no matter the distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Systems Integration - role

A

engage in complex activities to ensure the new product integrates with the organization’s infrastructure ecosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Analysis

A

involves the investigation, assessment, and planning for new or replacement systems. It helps organizations analyze their processes, assess current and anticipated needs, and identify gaps that technology can fill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security

A

Unauthorized access could result in data loss or modifications, exposure of data to competitors, or disruptions in availability that affect the normal course of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the differences between intranet, internet, and extranet

A

internet - resources available for the public
intranet - Resources only available for users or systems of a specific organization
extranet - resources available within an organization, but it also makes that information available to other specific organizations or users, such as contracted, third-party consultants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business Intelligence

A

data about the organization, customers, or industry. used to support their decision-making process and discover opportunities to better serve their customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Project Management - role

A

the maintenance of an organization’s IT infrastructure includes various projects to ensure continuous functionality and implement improvements or technology changes within the general organizational IT strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Outsourcing Services

A

consultants are frequently brought in for technical support for smaller organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 most commonly recognized computing disciplines?

A

computer engineering, computer science, software engineering, information systems, and information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer Engineering - role

A

focuses on the design of hardware systems and the software that makes them work. In addition to writing drivers for peripheral devices, such as keyboards and printers, computer engineering addresses the development of solutions that use computers embedded in other devices like alarm systems, refrigerators, and self-driving cars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer Science - role

A

addresses the design and implementation of software with an emphasis on developing effective ways to solve computing problems and creating new ways to use computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Engineering - role

A

focuses on the development and maintenance of reliable and efficient software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Systems - role

A

to integrate IT solutions meant to meet organizational business goals. This computing discipline addresses systems that generate, process, and distribute information and support organizational communication and collaboration, their design, and their implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Information Technology - role

A

focuses more on the technology supporting information systems in an organization rather than the information residing on the systems or being communicated with them. In this sense, IT responds to the practical needs of the organization, including reliable and secure solutions that are appropriately maintained, updated, and replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

System Administrator - role

A

is responsible for providing technical support for hardware and software issues end users encounter, such as log-in issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Administrator - role

A

is responsible for designing, planning, setting up, and maintaining an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Database Administrator - role

A

is responsible for installing and configuring databases. This position also fixes database errors and creates user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Security Administrator - role

A

is responsible for installing, administering, and troubleshooting network security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Web Administrator - role

A

is responsible for troubleshooting error messages employees encounter when attempting to access their organization’s website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud Architect - role

A

responsible for overseeing a company’s cloud computing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network Architect - role

A

responsible for designing networks and monitoring traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Automation Architect - role
responsible for modernizing business processes and developing reasons or rationales for or against a process being automated.
26
Cybersecurity Architect - role
responsible for designing, building, testing, and implementing security systems within an organization’s information technology network
27
Machine Learning Engineer - role
responsible for allowing an organization to take full control of its data.
28
Software Engineer - role
design and develop software that makes hardware and software systems work, including operating systems, database systems, and embedded systems
29
Network Engineer - role
set up, configure, maintain, and upgrade systems where data resides and that support the exchange of information, including communication systems and networks.
30
Cloud Engineer - role
use their technical and analytical skills to help companies identify opportunities for migrating a part or all of their infrastructure to the cloud, supporting the more efficient use of resources and improving IT operations.
31
Technical Support - role
supports, monitors, and maintains workplace technology and responds to user requests for help.
32
System Analyst - role
investigate business problems and create information systems to provide solutions
33
Data Analyst - role
use statistical and other quantitative methods to gain insights that support the organization’s decision-making.
34
Security Analyst - role
responsible for monitoring an organization's network for security breaches.
35
Cybersecurity Specialist - role
work with organizations to keep their information systems secure and ensure integrity, confidentiality, and availability of data.
36
Technical Consultant - role
provide technical expertise by developing and implementing IT systems for external clients
37
Project Managers - role
organizes people, time, and other resources to make sure projects meet requirements and are completed on time and within budget.
38
Web Developer - role
builds and maintains websites and their infrastructure.
39
Software Tester - role
responsible for creating, documenting, and executing manually created test plans and procedures relating to system anomalies.
40
Technical Sales - role
identify and help clients adopt IT services or technologies.
41
What is Information in the data pyramid?
a collection of processed data from a variety of sources.
42
what is data in the data pyramid?
raw facts or observations that have not been processed
43
what is knowledge in the data pyramind?
a dynamic combination of experience, values, contextual information, expert insight, and grounded intuition that provides an environment and framework for evaluating and incorporating new experiences and information.
44
what is wisdom in the data pyramid?
knowing the right thing to do
45
Connectedness Wisdom
“the path to connected understanding” when interpreting data. It is that human element leveraging an intelligent technology component when attempting to make fact-based decisions.
46
What is the difference between data and information?
data is just raw numbers and words waiting to be converted into meaningful information
47
Big data
the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix
48
Data Hygiene
the processes of ensuring the cleanliness of data (i.e., that the data is relatively error-free).
49
What can cause "dirty" data
duplicate records, incomplete or outdated data, and mistakes introduced as data
50
Data scrubbing
the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.
51
Duplicate data
Two or more identical records
52
Conflicting data
The same records with differing attributes
53
Incomplete data
Missing attributes
54
Invalid data
Attributes not conforming to standardization
55
Unsynchronized data
Data not appropriately shared between two systems
56
Quality data
data that is precise, valid, reliable, timely, and complete.
57
What makes data valid?
when it meets the requirements of the data collection process.
58
Input-process-output (IPO) and Input-process-output-storage (IPOS) model
The system divides the work into three categories: (1) a requirement from the environment or input, (2) a computation based on the requirement or process, and (3) a provision for the environment or output. In addition, it uses storage for the input and output elements, as well as for keeping the results of the calculations during the processing.
59
Client-to-server network design
An example of a client-server implementation are servers on one side of the network running authentication to facilitate millions of users logging in and permitting access to specific resources based on parameters such as username, password, and system identifiers.
60
Peer-to-peer network design
In a peer-to-peer network, all devices tend to support the same functions. Access to resources is provided without the assistance of a server.
61
What type of network design is the BitTorrent protocol for?
its a peer-to-peer file sharing protocol
62
Physical topology
the actual layout of how systems are placed in the network
63
Logical topology
indicates how the data actually flows and is important when considering things like load balancing, network backups, and replication of data
64
What are the most common network topology layouts?
bus, star, ring, and mesh