Unit 2: Foundations of ITM Flashcards

1
Q

Best Practice

A

A management process, technique, or method that is most effective at arriving at a desired outcome or a better outcome than any other process, technique, or method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bus Topology

A

A network topology sometimes called a linear bus, where each of a network’s nodes are connected to a common linear backbone that has two endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Campus Area Network (CAN)

A

A computer network that connects two or more LANs that are located on a campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chief Information Security Officer (CISO)

A

The CISO is generally focused on the security of an organization’s data and information, making sure it is backed up, deciding who gets to see it and who does not, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chief Security Officer (CSO)

A

A CSO is in charge of such things as the physical security and safety of employees, facilities, and corporate assets and may have a law enforcement background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Chief Technology Officers (CTO)

A

The CTO runs the organization’s IT engineering group and serves as the company’s top technology architect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Click Fraud

A

An internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer Network

A

Two or more computers connected together to communicate and share resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybersecurity

A

The convergence of technologies, sound practice, and processes designed to protect networks and their devices, programs, and data from attack or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Database Administrators (DBAs)

A

DBAs categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disk Storage

A

Nonvolatile, secondary storage on a physical device like a hard drive or optical disk with a read/write apparatus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethernet Card

A

Provides the computer with a unique 48-bit address called a MAC (media access control) address. No two Ethernet cards have the same address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall

A

Specialized hardware and software that ensures that only authorized personnel can access and use an organization’s intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gantt Chart

A

A type of bar chart that illustrates a project schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Graphical User Interface (GUI)

A

The visual system of computer screen designs that allow a user to interact with an electronic device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hypertext Markup Language (HTML)

A

The major markup language used to create web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hypertext Transfer Protocol (HTTP)

A

Protocol used to define how messages are formatted and transmitted on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IT Managers

A

IT managers are in charge of software application development teams that develop, design, program, and test software applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Security Analysts (ISA)

A

ISAs are responsible for protecting all sensitive information within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Infrastructure

A

The underlying foundation or basic framework for an organization or project.

21
Q

Internet Fraud

A

Refers to any fraudulent activity in an online setting. Internet fraud can occur through email systems, message boards, chat rooms, or websites.

22
Q

Knowledge Management Systems (KMS)

A

Collaborative systems that organize, create, and distribute an organization’s collective knowledge to its employees, which is called knowledge transfer.

23
Q

Local Area Network (LAN)

A

A computer network that is relatively small, typically in a single building, but sometimes as small as a single room.

24
Q

MAC (Media Access Control) Address

A

A MAC is responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel.

25
Q

Mainframe Computers

A

Massive, room-sized computers that process and store enormous amounts of bulk data and information.

26
Q

Metropolitan Area Network (MAN)

A

A computer network that connects two or more LANs or CANs together within the boundaries of a town or city.

27
Q

Microcomputers

A

The least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

28
Q

Midrange Computers

A

Less powerful and smaller in physical size than mainframe computers, they do many of the same things but on a smaller scale.

29
Q

Network Administrator

A

The person(s) responsible for smooth network operations, network performance, and implementation of new nodes or even new networks.

30
Q

Network Hub

A

A central location of the computer network that serves as a traffic cop for network connection and communication.

31
Q

Network Interface Controller

A

A card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers.

32
Q

Network Operating System (NOS)

A

Software that controls an entire network.

33
Q

Network Protocol

A

A set of rules a network must follow.

34
Q

Node

A

Any device that is connected as part of a computer network, including computers, hubs, printers, and switches.

35
Q

Optical Disk

A

A computer disk that uses optical storage techniques and technology to read and write data.

36
Q

Peer-to-peer Networks (P2P)

A

Computer networks that connect computers directly to one another without the use of a server.

37
Q

Phishing

A

A criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details by masquerading as a legitimate business organization, typically in a legitimate-looking email.

38
Q

Point of Failure

A

A part of a system that, if it fails, will stop the entire system from working.

39
Q

Process

A

Any task a computer performs.

40
Q

Protocol

A

A standard language that devices connected to a network use to communicate and transfer data.

41
Q

Ring Topology

A

The ring shape created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other.

42
Q

Software Suite

A

A collection of business computer application programs of associated functionality that share a common graphical user interface and have the capacity to smoothly exchange data across the programs.

43
Q

Solid-state Drive (SSD)

A

A solid-state storage device that uses integrated circuit assemblies as memory to store data persistently, typically using flash memory.

44
Q

Star Topology

A

The star shape created by network nodes that radiate around a central node in a spoke-like fashion.

45
Q

Tables

A

Holds the data for a database. Consists of records and fields that can be queried.

46
Q

Topology

A

The mapping of a physical network and logical interconnections between nodes.

47
Q

Transmission Control Protocol/Internet Protocol (TCP/IP)

A

A set of protocols used to connect a network to the internet.

48
Q

Wide Area Networks (WAN)

A

Computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together.

49
Q

Word Processor

A

An application software used to create, compose, edit, format, and print documents.