CNIT 182 Chapter 12 Tilley Textbook

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

What are the main forms of user support?

User training and help desks (technical support)

2
New cards

What is the goal of user training?

To show users how the system helps them perform their jobs.

3
New cards

What is a help desk (service desk)?

A centralized IT resource providing assistance, guidance, and support to users.

4
New cards

What are the three main objectives of a help desk?

1. Teach effective system use
2. Answer technical or operational questions
3. Improve user productivity.

5
New cards

What are some typical help desk tasks?

Troubleshooting, password issues, showing users how to run reports, data recovery, hardware setup.

6
New cards

What are the pros and cons of outsourcing IT support?

Pros: Cost reduction, focus on development
Cons: Lower service quality, customer dissatisfaction if poorly managed.

7
New cards

What are the four types of maintenance?

Corrective, Adaptive, Perfective, Preventive

8
New cards

Define Corrective Maintenance.

Fixes errors in an operational system.

9
New cards

Define Adaptive Maintenance.

Adds new features or enhancements to meet business changes.

10
New cards

Define Perfective Maintenance.

Improves efficiency, reliability, or maintainability.

11
New cards

Define Preventive Maintenance.

Prevents future problems through proactive measures.

12
New cards

What is a “patch”?

Temporary software fix allowing operations to resume.

13
New cards

What is the purpose of a maintenance log?

To track problems, fixes, and trends for better support management.

14
New cards

What is software reengineering?

Analyzing and improving existing software for better performance and quality.

15
New cards

What are the key goals of maintenance management?

Effective management, quality assurance, and cost control.

16
New cards

Who are the members of a maintenance team?

System administrator, systems analysts, and programmers.

17
New cards

What is configuration management (CM)?

A process to control and document system changes and versions.

18
New cards

What is version control?

Tracking and managing system releases to ensure stability and rollback capability.

19
New cards

What is a maintenance release?

A collection of updates bundled into a new version (e.g., v1.1, v2.0).

20
New cards

What is a baseline?

A reference point measuring system features or performance at a specific time.

21
New cards

What is fault management?

Detecting, logging, diagnosing, and correcting system problems.

22
New cards

What is benchmark testing?

Using standard tests to evaluate system performance.

23
New cards

What are key performance metrics?

Response time, bandwidth, throughput, turnaround time.

24
New cards

What is response time?

Time between user request and system response.

25
New cards

Define bandwidth and throughput.

Bandwidth = potential data capacity; Throughput = actual data transfer rate.

26
New cards

What is capacity planning?

Forecasting future system requirements based on current usage and growth.

27
New cards

Define confidentiality.

Protecting data from unauthorized disclosure.

28
New cards

Define integrity.

Preventing unauthorized data modification or deletion.

29
New cards

Define availability.

Ensuring authorized users have reliable access to information.

30
New cards

What are the three main risk management tasks?

Risk identification, risk assessment, and risk control.

31
New cards

Give examples of system threats.

Extortion, natural disasters, software attacks, technical obsolescence, theft, vandalism.

32
New cards

What is the purpose of backup and recovery?

To protect data and restore operations after data loss or disaster.

33
New cards

Name common backup types.

Full, incremental, and differential backups.

34
New cards

What is disaster recovery planning?

Preparing for and minimizing downtime after system failure.

35
New cards

What are signs that a system has reached the end of its life?

High maintenance cost, poor performance, obsolete technology, incompatible with new systems, declining support.

36
New cards

What are future challenges for IT professionals?

Increased cybersecurity threats, managing cloud systems, automation, and evolving regulations.