ITSS EXAM 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Why should business professionals know about hardware/soft- ware?

Understanding hardware/software enables effective decision-making for technology investments and upgrades

Knowledge of hardware/software helps professionals troubleshoot issues and improve productivity.

It enables business professionals to communicate effectively with IT teams and vendors.

2
New cards

How do business professionals learn about hardware/software? (way 1)

Attending workshops, seminars, or training sessions offered by technology vendors

3
New cards

How do business professionals learn about hardware/software? (way 2)

Taking online courses or certifications in specific hardware/software products.

4
New cards

How do business professionals learn about hardware/software? (way 3)

Collaborating with IT teams and seeking guidance from experienced colleague

5
New cards

How do business professionals learn about hardware/software? (way 4)

Staying updated through technology-related publications and websites

6
New cards

Different Virtualization Methods

1. Server Virtualization 2. Desktop Virtualization

3. PC Virtualization

7
New cards

Server virtualization

a server computer hosts one or more other server computers

8
New cards

Desktop Virtualization

a server hosts many versions of desktop operating systems

9
New cards

PC Virtualization

a personal computer hosts several different operating systems

10
New cards

What is the cloud?

The cloud refers to a network of remote servers hosted on the internet, storing and managing data and applications.

11
New cards

Where is the cloud?

The cloud is accessible via the internet, and data is stored in data centers located worldwide.

12
New cards

Advantages of using the cloud

Cost-effectiveness, as it reduces the need for physical infrastructure.- Scalability, allowing businesses to easily adjust their computing resources as needed.- Accessibility, enabling remote access to data and applications from anywhere.

13
New cards

Disadvantages of using the cloud

- Dependency on internet connectivity.- Concerns over data security and privacy.- Potential vendor lock-in if switching cloud providers is challenging.

14
New cards

(3 instances) Use the cloud when:

Scalability and flexibility are essential.- Accessing data and applications remotely is critical.- Cost savings are a priority for IT infrastructure.

15
New cards

(2 instances) Avoid using the cloud when::

Regulatory or compliance re- strictions prevent data from leaving physical locations.

- Critical applications require low-latency and high-speed connections not feasible over the internet.

16
New cards

What is an ISP?

An ISP is a company that provides access to the internet to individuals and organizations.

17
New cards

Purpose of ISP?

The purpose of an ISP is to offer internet connectivity, email services, domain hosting, and web hosting to end-users.

18
New cards

Local Area Network (LAN)

A network that covers a small geographical area, typically within a building or campus.

19
New cards

Wide Area Network (WAN)::

A network that connects multiple LANs over long distances.

20
New cards

Metropolitan Area Network (MAN)

A network that covers a larger geograph- ical area than a LAN but smaller than a WAN, usually within a city or town.

21
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol)

A suite of com- munication protocols used to connect devices over the internet and private networks.

22
New cards

What is IP addressing used for?

IP addressing is used to uniquely identify devices connected to a network.

23
New cards

What is the next evolution of IP addressing?

The next evolution of IP addressing is IPv6 (Internet Protocol version 6)

24
New cards

Why is the next evolution of IP addressing?

which provides a significantly larger address space to accommodate the increasing number of internet-connected devices.

25
New cards

3 primary activities of Business Intelligence

Data collection and storage - Data analysis and reporting- Data visualization

26
New cards

3 Common uses of Business Intelligence

Identifying trends and patterns in large datasets.- Making data-driven decisions in marketing, sales, and operations.- Predictive analytics for forecasting future trends.

27
New cards

What and why is Data visualization?

Data visualization is the representation of information and data in visual formats, such as charts, graphs, and maps, to facilitate better understanding and analysis.

28
New cards

Data Warehouse

A centralized repository that stores integrated data from multiple sources for business analysis and reporting

29
New cards

Data Mart

A subset of a data warehouse, focusing on a specific business area or department for more targeted analysis.

30
New cards

RFM Analysis

RFM stands for Recency, Frequency, and Monetary Value and is a method used to segment customers based on their buying behavior.

31
New cards

Market Basket Analysis

Market Basket Analysis examines the associations between products frequently purchased together to improve cross-selling and prod- uct placement strategies.

32
New cards

What is data mining?

Data mining is the process of discovering patterns, trends, or valuable information from large datasets.

33
New cards

Types of data mining

Types of data mining include clustering, classification, regression, and association rule mining.

34
New cards

Problems associated with the granularity of data

Granularity refers to the level of detail in data. Too fine-grained data can lead to privacy issues, while too coarse-grained data might not provide valuable insights.

35
New cards

4 Functions provided by the Information Systems (IS) department:

In- stalling, maintaining, and upgrading hardware/software.

- Ensuring network security and data protection.- Providing technical support to end-users.- Developing and managing databases and information systems.

36
New cards

4 IS-related job roles/positions:

Systems Administrator- Network Administrator- Database Administrator- IT Support Specialist

37
New cards

Outsourcing

Contracting a third-party company to handle specific IT functions or tasks.

38
New cards

Offshoring

Moving IT operations or services to a foreign country

39
New cards

Advantages of outsourcing:

- Cost savings- Access to specialized skills- Focus on core business functions

40
New cards

Disadvantages of outsourcing

- Loss of control over the outsourced processes- Potential security and privacy concerns- Communication and cultural challenges with offshore teams

41
New cards

Rights of the Employee related to IT

Privacy and confidentiality of personal data, access to company-provided IT resources for work-related purposes

42
New cards

Responsibilities of the Employee related to IT

Compliance with company IT policies, protection of company data and resources, reporting security incidents.

43
New cards

Social Engineering:

A form of hacking that relies on psychological manipula- tion of people to gain unauthorized access to systems or sensitive information.

44
New cards

Bit Rot

The degradation of data stored on digital media over time due to storage instability, causing data loss.

45
New cards

Vint Cerf

A co-developer of the TCP/IP protocols and one of the "fathers of the internet."

46
New cards

Primary Key

a field that uniquely identifies a record in a table

47
New cards

Foreign Key

A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables