Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Intro to IT

TermDefinition
Administration An administrator is in charge of some portion of the IT infrastructure.
Network administrator oversees all aspects of the computer network. their duties include physically laying down cable, making connections, and working with the network hardware (for instance, routers and switches).
Database administrator focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas
Security administrator install, configure, and administer appropriate firewall security to protect the organization's systems and to work proactively against such intrusions.
Web administrator aka a webmaster, is responsible for maintaining web storages, which differs from the development of web storage. Specifically, the webmaster must install, configure, maintain,
Define Information Technology: I is a term used to describe several aspects: the task of gathering data and processing it into information, the ability to disseminate information using technology, the technology itself that permits these tasks, and the collection of people who are in c
Information technology describes the technology infrastructure that may support information systems, although Information Technology could also support many other types of systems (e.g., telecommunications systems). Information Technology includes hardware, software, networks,
A computer performs four operations, which four are they? Input Processing Output Storage (Input-Processing-Output-Storage cycle, typically referred to as IPOS)
CPU The ___ is the device that not only executes your programs’ instructions, but also commands the various components in the computer.
Memory ____ stores the program(s) being executed and the data that each program is using.
What is I/O and name some devices connected to it. The I/O subsystem includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape).
The system unit The system unit is a core feature of notebooks, tablets, smartphones, and other types of computers; therefore, it comes in a variety of shapes and sizes. The system unit contains various components that enable the PC system to run programs and complete ot
Name some short-term and long-term storage. Dynamic RAM (DRAM) which is typically called main memory. Static RAM (SRAM), which is cache memory and registers. Read only memory (ROM), which retains its contents indefinitely. BIOS - Basic Input Output System.
Hard drive store data even when the computer is turned off.
Peripheral devices components that are located outside the system unit yet are connected physically or wirelessly to it.
Hardware The physical components of the computer
Software The programs and other operating information used by the computer
Network A collection of computers and resources connected by various media so they can communicate with each other
Users The people who use the computer system
Generations of Machines: 1st generation - vacuum tubes 2nd generation – transistors 3rd generation – integrated circuits 4th generation - microprocessors
Machine language The lowest-level programming languages understood by computers, representing instructions in binary (0s and 1s)
Assembly language specified instructions using words
High level language is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer.
Compiler .requires that the components of the software all be defined before compilation can begin to run all at once. Examples are C, C++, C#.
Interpreted language runs inside of a special environment called the interpreter, the interpreter converts that command to machine language and executes it line by line. Example are Perl and Python.
Computer network collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Bandwidth transfer rate permissible over the media, described as some number of bits per second (bps).
Network hub device that connects multiple computers together
Network switch more functional connection than a hub, its purpose is to only send transmissions to a specific, intended
Router device that connects multiple networks together
Wireless access point connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable
Radio waves provide access to networks over long distances
IP address a series of numbers that indicates a specific internet location
Server computer that takes requests and responds with the requested information.
Network Types Bus Network: devices are connected along a single cable. Mesh Network: every device is connected directly to every other device in the network. Ring Network: each device is connected directly to its neighbors and messages are fowarded from device to de
Star networks have... a single machine serving as a central point to which all others are connected.
Confidentiality equires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.
Integrity requires that data are correct.
Availability requires that information is available when needed
Strategic risk analysis security policies are translated into mechanisms which support information security. We will focus on the risk management process
Social engineering threat that targets users.
Phishing is the process of targeting a specific individual, usually via email, under the guise of a reputable or trustworthy entity to reveal private or personal details such as usernames or password
Hacking is when an individual obtains unauthorized access to a host
Malware "malicious" software
Spyware is often downloaded unknown to the user when accessing web storages.
Denial of service (DOS) attack In the DOS attack, one or more attackers attempts to flood a server with so many incoming messages that the server is unable to handle legitimate business
Firewalls prevent certain types of messages from coming into or out of the network and anti-viral software seeks out malware
Antivirus software attempts to identify if a file contains a virus or, more generally, some form of malware.
Information security attempts to ensure the confidentiality, integrity, and availability of information when it is stored,
Encryption is the idea of obfuscating the information that resides on a computer or is sent over a network so that if it is intercepted the hacker will be unable to use the information. Encryption uses a mathematical algorithm for converting the plain-text informati
Symmetric key encryption uses the same key for performing the encryption and decryption.
Public-key encryption uses two keys, a public and private key.
Software is the term we use for the systems and programs that are developed, as a result of programming and scripting efforts by individuals, to perform a business function.
Application software consists of programs that end users run to accomplish tasks
System software consists of programs that make up the operating system
Server software works with hardware to provide a network service
Cloud computing combines several different technologies: distributed computing, computer networks, and storage area networks. The idea is to offer, as a service, the ability to offload computation and storage from your local computer to the cloud
Operating system (OS) is a program. Its primary task is to allow a computer user to easily access the hardware and software of a computer system. Beyond this, we might say that an OS is required to maintain the computer’s environment. (Windows 7/8/10, Linux,and Mac OS X., Andr
Kernel The core components of the operating system
Device drivers provide specific interfaces between the OS running a computer and hardware
Shell an interface for the user, often personalized for that given user
System utilities programs that allow the user to monitor and improve system performance.
GUI allows a user to control the computer by using the mouse and pointing and clicking at objects on the screen (icons, menus, buttons, etc.).
Web server The role of a web server is to respond to HTTP requests
Proxy server used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.
Database server permits database access across a network
Proprietary software is purchased from a vendor
Shareware usually provides you a trial version of the software
Freeware is usually software that has become obsolete because a newer software has replaced it, or is software that the original producer (whether an individual or a company) no longer wishes to maintain and provide support for
Public Domain software on the other hand, is software that has been moved into the public domain.
Open source software This software was created in the Open Source Community and made freely available as source code
Algorithm is a formula or procedure for solving a problem
Flat file database is used if the amount of data that is being recorded is fairly minimal. It is one large single table without the relations between tables that a relational format provides
Relational database is the most common structure for databases. A relational database has multiple tables (relations)
Hierarchical database format organizes data using a tree-like or organizational chart type structure.
Business Intelligence is knowledge
Business Intelligence system helps to capture the knowledge contained in various information systems within the company for making strategic decisions
Structured Query Language (SQL) is a standard query language that is used to communicate in many DBMSs. In general, this thing uses the following format for interacting with the data contained within a database: SELECT fields FROM tables WHERE fields from tables match criteria.
The DIKW hierarchy describes the transition of date to wisdom. WISDOM KNOWLEDGE INFORMATION DATA
Types of Data Integers ∙ 4 ∙ 34 ∙ 394850 Floating Point Numbers ∙ 9.5 ∙ 45.5 ∙ 1.7 Floating Point Numbers ∙ 9.5 ∙ 45.5 ∙ 1.7 Characters ∙ F ∙ ! ∙ Character Strings ∙ abc ∙ def456 ∙ 3erf78!@ Boolean Values ∙ True ∙ false
Quality data relevant, timely, thorough, accurate and reliability
IT department helping an organization achieve its strategic goals. supports the day-to-day technology needs of an organization. More broadly, an IT department is charged with helping an organization achieve its strategic goals.
Goals translate the organization’s philosophy into specific, measurable outcomes the organization plans to achieve.
Business continuity relates to information technology systems, as well as all other business processes, including marketing, manufacturing, finance, accounting, human resources, management, and so on. Key components of the process are developing a plan and testing the plan.
A hot storage is a physical location where an organization can move its operations. A hot storage includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data. Hot storages allow for the quickest return to business
A cold storage is also a physical location, but unlike a hot storage, it is not equipped with hardware, servers, and the full range of items a hot storage has. A cold storage is more like a shell that can be used for operations should the need arise. It is less costly t
Bluetooth is a standard that enables devices to exchange data using wireless technology
The Internet of Things refers to the myriad types of devices that can and will be connected to the Internet in the next few years.
Big data means integrating these vast amounts of data, whether the data is generated internally or externally and finding ways to investigate the relationships that can be discerned from the data.
Software as a Service (SaaS) businesses can access and use software through the Internet. Companies in many industries now use Google Docs and other programs that use SaaS
Platform as a Service (PaaS) is to be able to develop and deliver applications quickly and reliably.
Infrastructure as a Service (IaaS) all the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.
Ethics a code of moral conduct or a set of principles that govern behavior.
The 10 Commandments of Computer Ethics (1-4) Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s computer files. Thou shalt not use a computer to steal.
The 10 Commandments of Computer Ethics (5-7) Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people’s computer resources without authorization or proper compensation.
The 10 Commandments of Computer Ethics (8-9) Thou shalt not appropriate other people’s intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
The 10 Commandments of Computer Ethics (10) Thou shalt always use computers in ways that ensure consideration and respect for fellow humans.
Know these: The Family Educational Rights and Privacy Act of 1974 (FERPA) Electronic Communication Privacy Act of 1986 Computer Matching and Privacy Protection Act of 1988 Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Know these: Digital Signature and Electronic Authentication Law of 1998 (SEAL) The AITP code of ethics ( Systems Audit and Control Association (ISACA)
Created by: 288524363744455
Popular Engineering sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards