Intro to I.T. FBLA

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/217

flashcard set

Earn XP

Description and Tags

Fbla intro to it

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

218 Terms

1
New cards

Open System Interconnection (OSI)

a networking framework to implement protocols in seven layers

2
New cards

Physical Layer

The first layer of the model. It conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.

3
New cards

Data Link Layer

The second layer. Data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

4
New cards

Network Layer

The third layer. It provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

5
New cards

Transport Layer

The fourth layer. It provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

6
New cards

Session Layer

The fifth layer. It establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

7
New cards

Presentation Layer

The sixth layer. It provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

8
New cards

Application Layer

The seven layer. It supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

9
New cards

Network Topology

It refers to layout of a network. How different nodes in a network are connected to each other and how they communicate is determined by the network's topology.

10
New cards

Network

A group of two or more computer systems linked together. There are many types of computer networks, including the following:

11
New cards

Topology

The shape of a local-area network (LAN) or other communications system.

12
New cards

Node

In networks, a processing location. Can be a computer or some other device, such as a printer. Each has a unique network address, sometimes called a Data Link Control (DLC) address or Media Access Control (MAC) address.

13
New cards

Physical Topology

The physical layout of devices on a network.

14
New cards

Mesh Topology

A topology where devices are connected with many redundant interconnections between network nodes.

15
New cards

Star Topology

A topology where devices are connected to a central computer, called a hub. Nodes communicate across the network by passing data through the hub.

16
New cards

Bus Topology

A topology where a central cable -- the main wire -- that connects all devices on a local-area network (LAN). It is also called the backbone. This is often used to describe the main network connections composing the Internet. Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology.

17
New cards

Ring Topology

A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it.

18
New cards

Tree Topology

This is a "hybrid" topology that combines characteristics of linear bus and star topologies. In a tree network, groups of star-configured networks are connected to a linear bus backbone cable.

19
New cards

Full Mesh Topology

A mesh topology occurs when every node has a circuit connecting it to every other node in a network. Full mesh is very expensive to implement but yields the greatest amount of redundancy, so in the event that one of those nodes fails, network traffic can be directed to any of the other nodes. Full mesh is usually reserved for backbone networks.

20
New cards

An Algorithm

A formula or procedure that is simple for solving a problem with clear stopping point.

21
New cards

Windows SIM

Windows System Image Manager used for managing several disk images in a group

22
New cards

PCMCIA

A networking device

23
New cards

Application Software

A program that is designed to perform a specific task.

24
New cards

Assembly Language

Length in code in assembly and machine are the same and uses words.

25
New cards

Batch driven data warehouse

Prepare the data in advance, and then when the computer system is not busy, the information can be processed all in one batch. Payroll and credit card bills are examples.

26
New cards

Binary numbering system

1s and 0s

27
New cards

Compiled and interpreted languages are written in ?

Binary code

28
New cards

Broadcast devices

hubs, switches, routers, WAPs

29
New cards

Certificate Authority

Both the authentication proof and the encryption information.

30
New cards

Circuit Switched

Path exist during the entire conversation, communication in either direction can occur simultaneously.

31
New cards

Cloud Computing

As a Service, Platform or Software

32
New cards

Compiler

Translates the entire program, creating an executable, which can be run at a later time.

33
New cards

Confidential Risk

Information that an organization will keep secret, such as patent-able information and business plans. The government classified tags such as confidential, secret and top secret.

34
New cards

The Controller - MCV

Facilitates communication between the model and the view.

35
New cards

Database Admin

Designs DBMS

36
New cards

Database Admin Roles

Integration, security for remote access, procedures associated with DBMS

37
New cards

Database Management System Manufacturers

Microsoft Access, SQL, and its variations (MySQL, Microsoft SQL, PostgreSQL, etc..

38
New cards

Database Organization

Records (rows) are called tuplets. All records of the relation share the same attributes. Attributes are characteristics which are used to describe a record, and are the column headings. A field contains the data of an attribute for a record within a relation.

39
New cards

Database Projection

A query return of ALL records for the relation, but only selected attributes and fields.

40
New cards

Database Query

A search of data in relation to selected parameters

41
New cards

Database Record

The horizontal row

42
New cards

Database record functionality terms

Record, Query, projection, update or modify , insert, delete and join

43
New cards

Data Marts

The means by which users obtain data or information out of the warehouse.

44
New cards

Data tier

In software architecture n-tier or multi-tier development -- this tier is where data are stored, retrieved and updated from database tables. The data can scale more easily.

45
New cards

Data warehouse

Uses an ETL (Extract, Transform, Load) Process

46
New cards

DIKW

Data, Information, Knowledge and Wisdom

47
New cards

DQL

Data Query Language

48
New cards

Event Driven Data Warehouse

Processing uses business events, such as submitting an order to a vendor. receiving goods, or creating new employee records to trigger messages to send by middleware between software modules that are completely independent of one another.

49
New cards

Extract Data

Comes from various sources. These sources must be identified, understood and tapped

50
New cards

Data Warehouse

A collection of databases

51
New cards

Transform Data

Given the data come from different sources. it is likely that the data are not organized using the same collection attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This includes altering data to relations or objects, recognizing the unique identifiers and selecting the appropriate attributes.

52
New cards

Load Data

Into the storage facility, that is the transformed data must be stored in the data warehouse using the appropriate representation format.

53
New cards

Fields in SQL

Select, From, Where

54
New cards

First Generation

Vacuum tubes, ENIAC, punch cards, connected through cables.

55
New cards

Flat file database

one large single table without the relations between tables that a relational format provides

56
New cards

Unique Identifier or Primary key

For a database to work it must have this.

57
New cards

Fourth Generation

1974 IBM single chip processor, microprocessor/ microcomputer. Miniaturization still in this generation today.

58
New cards

Freeware or public domain

Has become obsolete or company no longer provides support

59
New cards

GANTT technique

Illustrated project schedule

60
New cards

Initiation Phase

In project management; problem definition, resource allocation and Risk assessment takes place in this phase.

61
New cards

Planning Phase

In project management; Objectives and activities, organize activities, time estimation and cost estimation takes place in this phase.

62
New cards

Executing and controlling phase

In project management; Variance reports, status reports and resource allocation takes place in this phase.

63
New cards

Closing phase

In project management; once all deliverables have been met, a project is consider to have reached this phase.

64
New cards

Gateway

An inter-networking system or device capable of joining together two networks that use different base protocols.

65
New cards

Hierarchical database

format organizes data using a tree-like or organization chart type structure. Main data points can have multiple sub-data points associated with them referred to as parent child model.

66
New cards

Information

To conclude from evidence or by reasoning. Ways to process data so it becomes information.

67
New cards

Interpreter

Takes the most recently entered instruction, translates it into machine language and executes it.

68
New cards

IT

The hardware, software and people

69
New cards

IT Manager

Oversees staff, communicate with upper management, understands both sides, hires and fires.

70
New cards

IT Support

Manager, Training, help desk

71
New cards

Java Database Connectivity (JDBC)

For applications written in Java, Oracle has developed this driver. This driver is orientated toward interactions with relational databases. Anyone developing in Java can use this driver in conjunction with ODBC (via a bridge) to have an application interact with any database.

72
New cards

Join

Withdraws information from multiple relations or field values

73
New cards

Kernel

Contains the core components of the operating system. Its loaded when the computer is first booted. This includes components that handle process management, resource management and memory management. It sits between the hardware and software.

74
New cards

Knowledge

Information that has been put to use.

75
New cards

Language translators

Not portable

76
New cards

Language translators

Assemblers, compilers and interpreters

77
New cards

Linux/Unix

For this operating systems the users prefer to use the command line.

78
New cards

Logic tier

In software architecture sits between the user and the data. This is where the system performs its logic processing, it resides on the server where the processing occurs.

79
New cards

MCV

Model-Control-View

80
New cards

Mitigation techniques

Firewall, anti-viral, anti-malware software

81
New cards

The model

In software architecture this layer can take different forms depending on the complexity of the application. In certain instances its an actual object that is an actual implementation of the application. This is used to retrieve information about the product. It is in this layer that the business logic is designed.

82
New cards

The Controller

In software architecture this layer is part of an application that interacts with the user and passes along the user requests to the model layer. It is in this layer that the input logic is designed.

83
New cards

The View

In software architecture this layer is the part of the application that represents the user interface. This is used to capture the input from the user to be passed via the controller to the model. It is in this layer of the application that the user interface logic is designed.

84
New cards

High level languages

Basic, C, C++ and java

85
New cards

Network Admin

Network engineer or network architects

86
New cards

Network admin roles

Design, edit configuration files, write shell scripts and install software and updates

87
New cards

Online Analytical Processing

OLAP

88
New cards

OLAP(Online analytical processing)

Data are processed through a suite of analysis software tools.

89
New cards

Online data processing

It deals with data in real time. its a "live" database

90
New cards

os types

workstation, mobile and server

91
New cards

PERT

Program evaluation and review technique

92
New cards

Private risk

A threat if disclosed to others such as social security and credit card numbers or health and educational information.

93
New cards

Project characteristics

Initiation, planning, executing and controlling and closing

94
New cards

Project

Temporary, unique and ends

95
New cards

Project management

brings a unique focus shaped by the goals, resources and schedule of each project

96
New cards

Public key encryption

uses two keys, a public, and a private

97
New cards

Public risk

Public information might include names and addresses

98
New cards

Relational database

multiple tables with interrelated fields

99
New cards

Relevance

Data collection from a specific client history

100
New cards

Reliable

Stable and consistent collection process across points over time.