WGU D322 - Introduction to IT

5.0(1)
studied byStudied by 38 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/254

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

255 Terms

1
New cards
Information Technology
The technology used in creating, maintaining, and making information accessible.
2
New cards
IT Professional Roles
Administration and Support
3
New cards
System Administrator
Maintains all aspects of the system including hardware, software, and programming.
4
New cards
Network Administrator
In charge of all aspects of the computer network
5
New cards
Database Administrator
Focuses on the design, development, and support of database management systems (DBMSs).
6
New cards
Security Administrator
Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.
7
New cards
Web Administrator
Installs, configures, maintains, secures, and troubleshoots web severs.
8
New cards
Support IT Professionals
Help desk and training.
9
New cards
Information
Processed data.
10
New cards
DIKW Hierarchy
Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom)
11
New cards
Data in DIKW
The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.
12
New cards
Information in DIKW
Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.
13
New cards
Knowledge in DIKW
Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.
14
New cards
Wisdom in DIKW
Provides a social setting to knowledge; an understanding of the "why". Can only come by having both knowledge and experience.
15
New cards
Information Systems
A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.
16
New cards
Characteristics of Quality Data
Relevance - the data being used must apply directly to the decision being made

Timely - data must be efficient and must be provided in a timely manner

Thorough - the data must be complete

Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible.

Reliable - data should reflect stable and consistent data collection processes across collections points and over time
17
New cards
IPOS
The Input-Procession-Output-Storage Cycle
18
New cards
Input
Raw data is entered by the user.
19
New cards
Processing
Raw data is organized or structured for usefulness.
20
New cards
Output
Information is output so user can see results.
21
New cards
Storage
Processed information is stored for permanent record.
22
New cards
Computer System
A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.
23
New cards
Hardware
Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.
24
New cards
Software
Computer programs that tell the computer what to do--how to execute commands and process information
25
New cards
Network
A collection of computers and resources connected by various media so that they can communicate with each other.
26
New cards
User
Those who use a computer.
27
New cards
Software Categories
Systems Software and Applications Software
28
New cards
Evolution of Users
First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.
29
New cards
Protocol
Rules provided by which networks communicate with each other.
30
New cards
TCP/IP
Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.
31
New cards
Protocol Stack
A collection of protocols. TCP/IP is an example.
32
New cards
Components of a Computer
CPU, Memory and Storage, Peripheral Devices
33
New cards
CPU
Executes programs' instructions and commands various components in the computer. Referred to as the "chip".
34
New cards
Memory
Stores the programs being executed and the data they are using.
35
New cards
I/O Subsystem
All peripheral devices where long term storage devices are used.
36
New cards
Bus
Permits information to move between each component; electrical channels that enable communication among the electronic components
37
New cards
System Unit
Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.
38
New cards
Internal Components of the System Unit
Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards
39
New cards
Parts of the CPU
Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU

Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen
40
New cards
System Clock
Controls the speed at which instructions are processed.
41
New cards
RAM
Stands for Random Access Memory.

It temporarily stores data before it is processed and sent to your screen or printer.

It is volatile (means data or information stored disappears when the computer is turned off or loses power).

You can choose the amount of RAM your computer has.
42
New cards
Types of RAM
Dynamic RAM (DRAM) - typically called main memory

Static RAM (SRAM) - cache memory and registers
43
New cards
BIOS ROM
BIOS stands for Basic Input Output System; ROM stands for Read Only Memory.

Typically stored in ROM chip on the motherboard.

Is software not hardware, ("basic" operating system that runs when the computer is first turned on).

Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk.

Can't choose the amount or contents.
44
New cards
1st Generation of Computers
Vacuum tubes, relay switches, the need to program in machine language
45
New cards
2nd Generation of Computers
Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers
46
New cards
3rd Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals
47
New cards
4th Generation of Computers
Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use
48
New cards
Moore's Law
Doubling of transistor count roughly every 18 - 24 months (exponential increase)
49
New cards
Evolution of Storage
Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage
50
New cards
Machine/Low-level Language
Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time
51
New cards
Assembly Language
Easier than machine but still required detailed, precise low level instructions
52
New cards
Language Translator Programs
Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer
53
New cards
Compiler
Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient
54
New cards
Structured Programming
Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements
55
New cards
Object Oriented Programming
Characterized by the creation of windowed operating systems, easier real-world object modeling in programming code, and the application of inheritance in program code.
56
New cards
Interpreted Code
A type of programming language for which most of its implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions.
57
New cards
Shell Scripting
Small programs that place Linux commands or DOS batch files into a file
58
New cards
Local Computer
The computer that the user is using; physically present with
59
New cards
Remote Computer
A computer being accessed over the network
60
New cards
Network Hub
Connects computers to each other with no real understanding of what is being transferred; used for private networks with local computers.
61
New cards
Network Switch
Like a hub, but this will only send data that is intended for a specific computer.
62
New cards
Router
Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses
63
New cards
Wireless Access Point
Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable
64
New cards
Circuit Switched Network
Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission; like calling someone on the phone
65
New cards
Packet Switched Network
A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic
66
New cards
Workstations
Creates and maintains client network connections to remote servers
67
New cards
Virtual Machine (VM)
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.
68
New cards
Server
Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network
69
New cards
Client-server Network
Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers
70
New cards
File Server
Sends files over the network at the request of clients.

Responds over LAN, within one location/site.

Support both application software and data files.
71
New cards
Web Server
Stores data files (web pages) and programs (scripts).

Responds from anywhere on the Internet.
72
New cards
Database Server
Responds to queries by pulling from the database.

Typically only to local clients.
73
New cards
Print Server
Monitors print jobs
74
New cards
Mail Server
Two email servers communicate with each other
75
New cards
FTP Server
Like web server or file server in that requests are for files and responses are the files; data delivered between client and server.
76
New cards
Point-to-Point Network
Link between two resources; links two routers without any host or network in between
77
New cards
Bus Network
Devices connected along a single cable.

Size of network is restricted.
78
New cards
Star Network
Each device is connected to a central devices such as a hub or switch.
79
New cards
Ring Network
Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.
80
New cards
Mesh Network
Every device is connected directly to every other device in the network.
81
New cards
Domain Name Server (DNS)
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network.
82
New cards
Parts of URL (Uniform Resource Locator)
Protocol, Domain name, Resource/Filename
83
New cards
Domain Name
Identifies the server on which the web page can be found
84
New cards
Domain Name Parts
Top level domain (TLD) name and Host name
85
New cards
Host Name
Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored
86
New cards
TLD(Top Level Domain) Name
Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page
87
New cards
Resource/Filename ID
Indicates the name of the file you are accessing, or the location of the document on the server
88
New cards
CIA
Confidentiality, Integrity, Availability
89
New cards
Confidentiality
Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users
90
New cards
Integrity
Requires that data is correct
91
New cards
Availability
Requires that information is available when needed
92
New cards
Data Integrity Efforts
1st - Must include a component that ensures the accuracy of the collected data

2nd - Must be entered into the system accurately

3rd - Data modification must be tracked
93
New cards
Strategic Risk Analysis
1. Identify the organization's information assets
2. Identify vulnerabilities of each asset
3. Determine threats
4. Prioritizing risks
5. Develop and enact policies that will reduce threats
94
New cards
Information Security Classifications
Public - available through public sources; includes names and addresses

Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses

Private - information that could be a threat if disclosed to others; includes social security and credit card numbers

Confidential - information that an organization will keep secret; includes patentable information and business plans
95
New cards
Defense in Depth
Protecting every layer that surrounds data
96
New cards
Phishing
Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information
97
New cards
SQL Injection
An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database
98
New cards
Buffer Overflow
Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code
99
New cards
Hacking
When an individual obtains unauthorized access to a host
100
New cards
White Hat Hacker
Informs companies of potential problems with software so companies can fix