1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Hardware
Physical, tangible components of a computer system, including internal parts like CPU and RAM, and external devices like monitors and printers.
Software
Instructions or programs that control hardware actions; includes system software like operating systems and application software like word processors.
Peripheral
External device connected to a computer to provide input (keyboard, mouse) or output (monitor, printer) functionality.
Network
A collection of interconnected devices that communicate and share resources; includes LANs for small areas and WANs like the Internet.
Two roles of networked computers
Computers often serve as clients requesting services or as servers providing data, resources, or services to other machines.
Human resources
People involved in designing, building, managing, and maintaining IT systems, such as developers, IT support staff, and project managers.
Client
A device that requests and uses services provided by a server over a network, such as browsing websites or accessing files.
Server
A device or program that provides resources, services, or data to other computers, usually over a network connection.
Email server
Specialized server that manages the sending, receiving, and storing of emails, ensuring secure and efficient communication.
DNS server
Server that translates easy-to-remember domain names into numerical IP addresses necessary for locating internet services.
Router
Device that directs data packets across networks, ensuring data gets from one network (like a LAN) to another efficiently.
Switch
Network device that connects multiple devices within a LAN, using MAC addresses to forward data only to the intended recipient.
Firewall
Hardware or software system that controls incoming and outgoing network traffic, protecting systems from unauthorized access.
Usability
The ease with which users can effectively interact with a system to achieve their goals; includes factors like efficiency, satisfaction, and error rate.
Digital divide
The gap between those who have access to modern information technology and those who do not, often along socioeconomic lines.
Software bias
Inherent bias within algorithms that reflect societal prejudices, often leading to unfair or discriminatory outcomes.
Direct observation
Technique where stakeholders are watched using a system in their environment, providing real-world insights into user behaviors and challenges.
Interview method
Stakeholders are questioned one-on-one or in groups to gather detailed information about their needs, preferences, and pain points.
Survey method
Structured questionnaire distributed to many users to quickly gather a wide range of feedback, though responses may be less detailed.
Focus group
Small group of stakeholders providing feedback through discussion, often revealing collective opinions and deep insights into requirements.
System flow chart
Diagram showing the sequence of processes and decisions in a system, helping developers and stakeholders visualize the operation.
Data flow diagram
Visual tool that maps how data moves through a system, showing inputs, outputs, storage, and processes to aid in design.
Structure chart
A hierarchical representation of a system's modules, showing how components interact and how tasks are divided among them.
Organizational capability review
Assessment of an organization's current technological and resource strengths to ensure new systems fit practical limits.
Literature search
Reviewing academic and technical sources to gather background information, trends, and best practices for system development.
Internal stakeholders
Individuals within the organization such as developers, project managers, and IT support who directly influence system design.
External stakeholders
Users, regulators, vendors, and the public who are affected by the system but are not part of the developing organization.
Prototype
Early version of a system used to visualize and test ideas with stakeholders, improving design before full-scale development begins.
Benefit of prototyping
Allows early testing of ideas and collection of user feedback before large investments are made in full-scale development.
Iteration
Repeating design and development steps that helps refine systems, incorporate feedback, correct errors, and improve quality over time.
Benefit of iteration
Continuous improvements based on testing and feedback help systems meet changing needs and reduce the chance of catastrophic failure.
Advantage of direct observation
Provides unbiased, real-time information about how systems are truly used, often revealing problems users are unaware of.
Disadvantage of direct observation
Users may change their behavior when they know they are being observed, leading to inaccurate or non-representative data.
Advantage of surveys
Quick and cost-effective way to gather large amounts of data from many users, providing a broad overview of opinions and needs.
Disadvantage of surveys
Responses may be shallow or misinterpreted due to poorly phrased questions; hard to follow up for clarification.
Advantage of interviews
Allow for detailed exploration of needs; interviewers can adapt questions on the spot to explore complex or sensitive topics.
Disadvantage of interviews
Time-consuming and potentially biased; requires skilled interviewers to avoid leading questions or misinterpretation.
Advantage of focus groups
Enables gathering a variety of user opinions at once, encouraging discussion that reveals common problems and innovative solutions.
Disadvantage of focus groups
Group dynamics can lead to dominant voices overshadowing quieter participants, potentially skewing results.
System administrator
Responsible for managing and maintaining IT systems, including user accounts, security, and system performance.
Importance of end-user involvement
Involving users ensures systems match real needs, increasing satisfaction, productivity, and adoption rates after launch.
Consequences of not involving users
Systems may be inefficient, rejected by users, or require costly redesigns after release due to unmet or misunderstood needs.
Privacy concerns
Collection and storage of user data can expose personal information to breaches, misuse, or surveillance, risking user trust.
Intellectual property concerns
Easy duplication of digital media challenges copyright enforcement and can discourage innovation without proper protections.
Reason to check competing products
Identifying strengths and weaknesses of competitors helps guide innovation and ensures systems remain competitive and relevant.
Accessibility improvement example
Features like text-to-speech, screen magnifiers, and voice control tools make systems usable for people with disabilities.
Risk with new IT systems
New technologies can introduce security vulnerabilities, data leaks, or incompatibility with older infrastructure if not managed carefully.
Importance of firewall for business
Protects sensitive business data by blocking malicious traffic, thereby safeguarding customer information and intellectual property.
Effect of misinformation
Spreading false or misleading information can lead to poor public decision-making and damage the credibility of reliable sources.
Risk of technology dependence
Systems outages or cyberattacks can cripple critical services like banking, healthcare, and communication if redundancies are absent.
Education impact of digital divide
Students without access to computers or internet services are at a significant disadvantage in learning opportunities and career preparation.
DNS server behavior on unknown domain
When a domain is unknown, the DNS server queries higher-level servers to find the correct IP address and route the request.
Reason for examining current systems
Highlights strengths to retain and weaknesses to improve, informing better and more cost-effective system designs.
Function of database server
Manages data storage, retrieval, and manipulation so multiple users can efficiently access structured information like records or inventories.
Ethical consideration when collecting data
Ensuring data is gathered transparently, stored securely, and used only with informed consent to respect user rights and comply with laws.
Environmental consequence of IT systems
Energy use and electronic waste from devices and data centers contribute significantly to pollution and resource depletion.