1/46
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Why should business professionals know about hardware/soft- ware?
Understanding hardware/software enables effective decision-making for technology investments and upgrades
Knowledge of hardware/software helps professionals troubleshoot issues and improve productivity.
It enables business professionals to communicate effectively with IT teams and vendors.
How do business professionals learn about hardware/software? (way 1)
Attending workshops, seminars, or training sessions offered by technology vendors
How do business professionals learn about hardware/software? (way 2)
Taking online courses or certifications in specific hardware/software products.
How do business professionals learn about hardware/software? (way 3)
Collaborating with IT teams and seeking guidance from experienced colleague
How do business professionals learn about hardware/software? (way 4)
Staying updated through technology-related publications and websites
Different Virtualization Methods
1. Server Virtualization 2. Desktop Virtualization
3. PC Virtualization
Server virtualization
a server computer hosts one or more other server computers
Desktop Virtualization
a server hosts many versions of desktop operating systems
PC Virtualization
a personal computer hosts several different operating systems
What is the cloud?
The cloud refers to a network of remote servers hosted on the internet, storing and managing data and applications.
Where is the cloud?
The cloud is accessible via the internet, and data is stored in data centers located worldwide.
Advantages of using the cloud
Cost-effectiveness, as it reduces the need for physical infrastructure.- Scalability, allowing businesses to easily adjust their computing resources as needed.- Accessibility, enabling remote access to data and applications from anywhere.
Disadvantages of using the cloud
- Dependency on internet connectivity.- Concerns over data security and privacy.- Potential vendor lock-in if switching cloud providers is challenging.
(3 instances) Use the cloud when:
Scalability and flexibility are essential.- Accessing data and applications remotely is critical.- Cost savings are a priority for IT infrastructure.
(2 instances) Avoid using the cloud when::
Regulatory or compliance re- strictions prevent data from leaving physical locations.
- Critical applications require low-latency and high-speed connections not feasible over the internet.
What is an ISP?
An ISP is a company that provides access to the internet to individuals and organizations.
Purpose of ISP?
The purpose of an ISP is to offer internet connectivity, email services, domain hosting, and web hosting to end-users.
Local Area Network (LAN)
A network that covers a small geographical area, typically within a building or campus.
Wide Area Network (WAN)::
A network that connects multiple LANs over long distances.
Metropolitan Area Network (MAN)
A network that covers a larger geograph- ical area than a LAN but smaller than a WAN, usually within a city or town.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A suite of com- munication protocols used to connect devices over the internet and private networks.
What is IP addressing used for?
IP addressing is used to uniquely identify devices connected to a network.
What is the next evolution of IP addressing?
The next evolution of IP addressing is IPv6 (Internet Protocol version 6)
Why is the next evolution of IP addressing?
which provides a significantly larger address space to accommodate the increasing number of internet-connected devices.
3 primary activities of Business Intelligence
Data collection and storage - Data analysis and reporting- Data visualization
3 Common uses of Business Intelligence
Identifying trends and patterns in large datasets.- Making data-driven decisions in marketing, sales, and operations.- Predictive analytics for forecasting future trends.
What and why is Data visualization?
Data visualization is the representation of information and data in visual formats, such as charts, graphs, and maps, to facilitate better understanding and analysis.
Data Warehouse
A centralized repository that stores integrated data from multiple sources for business analysis and reporting
Data Mart
A subset of a data warehouse, focusing on a specific business area or department for more targeted analysis.
RFM Analysis
RFM stands for Recency, Frequency, and Monetary Value and is a method used to segment customers based on their buying behavior.
Market Basket Analysis
Market Basket Analysis examines the associations between products frequently purchased together to improve cross-selling and prod- uct placement strategies.
What is data mining?
Data mining is the process of discovering patterns, trends, or valuable information from large datasets.
Types of data mining
Types of data mining include clustering, classification, regression, and association rule mining.
Problems associated with the granularity of data
Granularity refers to the level of detail in data. Too fine-grained data can lead to privacy issues, while too coarse-grained data might not provide valuable insights.
4 Functions provided by the Information Systems (IS) department:
In- stalling, maintaining, and upgrading hardware/software.
- Ensuring network security and data protection.- Providing technical support to end-users.- Developing and managing databases and information systems.
4 IS-related job roles/positions:
Systems Administrator- Network Administrator- Database Administrator- IT Support Specialist
Outsourcing
Contracting a third-party company to handle specific IT functions or tasks.
Offshoring
Moving IT operations or services to a foreign country
Advantages of outsourcing:
- Cost savings- Access to specialized skills- Focus on core business functions
Disadvantages of outsourcing
- Loss of control over the outsourced processes- Potential security and privacy concerns- Communication and cultural challenges with offshore teams
Rights of the Employee related to IT
Privacy and confidentiality of personal data, access to company-provided IT resources for work-related purposes
Responsibilities of the Employee related to IT
Compliance with company IT policies, protection of company data and resources, reporting security incidents.
Social Engineering:
A form of hacking that relies on psychological manipula- tion of people to gain unauthorized access to systems or sensitive information.
Bit Rot
The degradation of data stored on digital media over time due to storage instability, causing data loss.
Vint Cerf
A co-developer of the TCP/IP protocols and one of the "fathers of the internet."
Primary Key
a field that uniquely identifies a record in a table
Foreign Key
A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables