FBLA Introduction to Information Technology

0.0(0)
studied byStudied by 4 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/217

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:17 PM on 1/1/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

218 Terms

1
New cards

Open System Interconnection (OSI)

a networking framework to implement protocols in seven layers

2
New cards

Physical Layer

The first layer of the model. It conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.

3
New cards

Data Link Layer

The second layer. Data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

4
New cards

Network Layer

The third layer. It provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

5
New cards

Transport Layer

The fourth layer. It provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

6
New cards

Session Layer

The fifth layer. It establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

7
New cards

Presentation Layer

The sixth layer. It provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

8
New cards

Application Layer

The seven layer. It supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

9
New cards

Network Topology

It refers to layout of a network. How different nodes in a network are connected to each other and how they communicate is determined by the network's topology.

10
New cards

Network

A group of two or more computer systems linked together. There are many types of computer networks, including the following:

11
New cards

Topology

The shape of a local-area network (LAN) or other communications system.

12
New cards

Node

In networks, a processing location. A node can be a computer or some other device, such as a printer. Every node has a unique network address, sometimes called a Data Link Control (DLC) address or Media Access Control (MAC) address.

13
New cards

Physical Topology

The physical layout of devices on a network. Every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other.

14
New cards

Logical Topology

Every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other.

15
New cards

Mesh Topology

A topology where devices are connected with many redundant interconnections between network nodes. In a true mesh topology every node has a connection to every other node in the network.

<p>A topology where devices are connected with many redundant interconnections between network nodes. In a true mesh topology every node has a connection to every other node in the network.</p>
16
New cards

Star Topology

A topology where devices are connected to a central computer, called a hub. Nodes communicate across the network by passing data through the hub.
Main Advantage: In a star network, one malfunctioning node doesn't affect the rest of the network.
Main Disadvantage: If the central computer fails, the entire network becomes unusable

<p>A topology where devices are connected to a central computer, called a hub. Nodes communicate across the network by passing data through the hub.<br>Main Advantage: In a star network, one malfunctioning node doesn't affect the rest of the network.<br>Main Disadvantage: If the central computer fails, the entire network becomes unusable</p>
17
New cards

Bus Topology

A topology where a central cable -- the main wire -- that connects all devices on a local-area network (LAN). It is also called the backbone. This is often used to describe the main network connections composing the Internet. Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology.
Main Advantage: It's easy to connect a computer or device and typically it requires less cable than a star topology.
Main Disadvantage: The entire network shuts down if there is a break in the main wire and it can be difficult to identify the problem if the network shuts down.

<p>A topology where a central cable -- the main wire -- that connects all devices on a local-area network (LAN). It is also called the backbone. This is often used to describe the main network connections composing the Internet. Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology.<br>Main Advantage: It's easy to connect a computer or device and typically it requires less cable than a star topology.<br>Main Disadvantage: The entire network shuts down if there is a break in the main wire and it can be difficult to identify the problem if the network shuts down.</p>
18
New cards

Ring Topology

A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it.
Main Advantage: One main advantage to a ring network is that it can span larger distances than other types of networks, such as bus networks, because each node regenerates messages as they pass through it.

<p>A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it. <br>Main Advantage: One main advantage to a ring network is that it can span larger distances than other types of networks, such as bus networks, because each node regenerates messages as they pass through it.</p>
19
New cards

Tree Topology

This is a "hybrid" topology that combines characteristics of linear bus and star topologies. In a tree network, groups of star-configured networks are connected to a linear bus backbone cable.

Main Advantage: A Tree topology is a good choice for large computer networks as the tree topology "divides" the whole network into parts that are more easily manageable.
Main Disadvantage: The entire network depends on a central hub and a failure of the central hub can cripple the whole network.

20
New cards

Full Mesh Topology

A mesh topology occurs when every node has a circuit connecting it to every other node in a network. Full mesh is very expensive to implement but yields the greatest amount of redundancy, so in the event that one of those nodes fails, network traffic can be directed to any of the other nodes. Full mesh is usually reserved for backbone networks.

21
New cards

Partial Mesh Topology

A mesh topology where it is less expensive to implement and yields less redundancy than full mesh topology. With partial mesh, some nodes are organized in a full mesh scheme but others are only connected to one or two in the network. Partial mesh topology is commonly found in peripheral networks connected to a full meshed backbone.

22
New cards

An Algorithm

A formula or procedure that is simple for solving a problem with clear stopping point.

23
New cards

Windows SIM

Windows System Image Manager used for managing several disk images in a group

24
New cards

PCMCIA

A networking device

25
New cards

Application Software

A program that is designed to perform a specific task.

26
New cards

Assembly Language

Length in code in assembly and machine are the same and uses words.

27
New cards

Batch driven data warehouse

Prepare the data in advance, and then when the computer system is not busy, the information can be processed all in one batch. Payroll and credit card bills are examples.

28
New cards

Binary numbering system

1s and 0s

29
New cards

Compiled and interpreted languages are written in ?

Binary code

30
New cards

Broadcast devices

hubs, switches, routers, WAPs

31
New cards

Certificate Authority

Both the authentication proof and the encryption information.

32
New cards

Circuit Switched

Path exist during the entire conversation, communication in either direction can occur simultaneously.

33
New cards

Cloud Computing

As a Service, Platform or Software

34
New cards

Compiler

Translates the entire program, creating an executable, which can be run at a later time.

35
New cards

Confidential Risk

Information that an organization will keep secret, such as patent-able information and business plans. The government classified tags such as confidential, secret and top secret.

36
New cards

The Controller - MCV

Facilitates communication between the model and the view.

37
New cards

Database Admin

Designs DBMS

38
New cards

Database Admin Roles

Integration, security for remote access, procedures associated with DBMS

39
New cards

Database Management System Manufacturers

Microsoft Access, SQL, and its variations (MySQL, Microsoft SQL, PostgreSQL, etc..

40
New cards

Database Organization

Records (rows) are called tuplets. All records of the relation share the same attributes. Attributes are characteristics which are used to describe a record, and are the column headings. A field contains the data of an attribute for a record within a relation.

41
New cards

Database Projection

A query return of ALL records for the relation, but only selected attributes and fields.

42
New cards

Database Query

A search of data in relation to selected parameters

43
New cards

Database Record

The horizontal row

44
New cards

Database record functionality terms

Record, Query, projection, update or modify , insert, delete and join

45
New cards

Data Marts

The means by which users obtain data or information out of the warehouse.

<p>The means by which users obtain data or information out of the warehouse.</p>
46
New cards

Data tier

In software architecture n-tier or multi-tier development -- this tier is where data are stored, retrieved and updated from database tables. The data can scale more easily.

47
New cards

Data warehouse

Uses an ETL (Extract, Transform, Load) Process

48
New cards

DIKW

Data, Information, Knowledge and Wisdom

49
New cards

DQL

Data Query Language

50
New cards

Event Driven Data Warehouse

Processing uses business events, such as submitting an order to a vendor. receiving goods, or creating new employee records to trigger messages to send by middleware between software modules that are completely independent of one another.

51
New cards

Extract Data

Comes from various sources. These sources must be identified, understood and tapped

52
New cards

Data Warehouse

A collection of databases

53
New cards

Transform Data

Given the data come from different sources. it is likely that the data are not organized using the same collection attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This includes altering data to relations or objects, recognizing the unique identifiers and selecting the appropriate attributes.

54
New cards

Load Data

Into the storage facility, that is the transformed data must be stored in the data warehouse using the appropriate representation format.

55
New cards

Fields in SQL

Select, From, Where

56
New cards

First Generation

Vacuum tubes, ENIAC, punch cards, connected through cables.

57
New cards

Flat file database

one large single table without the relations between tables that a relational format provides

58
New cards

Unique Identifier or Primary key

For a database to work it must have this.

59
New cards

Fourth Generation

1974 IBM single chip processor, microprocessor/ microcomputer. Miniaturization still in this generation today.

60
New cards

Freeware or public domain

Has become obsolete or company no longer provides support

61
New cards

GANTT technique

Illustrated project schedule

62
New cards

Initiation Phase

In project management; problem definition, resource allocation and Risk assessment takes place in this phase.

63
New cards

Planning Phase

In project management; Objectives and activities, organize activities, time estimation and cost estimation takes place in this phase.

64
New cards

Executing and controlling phase

In project management; Variance reports, status reports and resource allocation takes place in this phase.

65
New cards

Closing phase

In project management; once all deliverables have been met, a project is consider to have reached this phase.

66
New cards

Gateway

An inter-networking system or device capable of joining together two networks that use different base protocols.

67
New cards

Hierarchical database

format organizes data using a tree-like or organization chart type structure. Main data points can have multiple sub-data points associated with them referred to as parent child model.

68
New cards

Information

To conclude from evidence or by reasoning. Ways to process data so it becomes information.

69
New cards

Interpreter

Takes the most recently entered instruction, translates it into machine language and executes it.

70
New cards

IT

The hardware, software and people

71
New cards

IT Manager

Oversees staff, communicate with upper management, understands both sides, hires and fires.

72
New cards

IT Support

Manager, Training, help desk

73
New cards

Java Database Connectivity (JDBC)

For applications written in Java, Oracle has developed this driver. This driver is orientated toward interactions with relational databases. Anyone developing in Java can use this driver in conjunction with ODBC (via a bridge) to have an application interact with any database.

74
New cards

Join

Withdraws information from multiple relations or field values

75
New cards

Kernel

Contains the core components of the operating system. Its loaded when the computer is first booted. This includes components that handle process management, resource management and memory management. It sits between the hardware and software.

76
New cards

Knowledge

Information that has been put to use.

77
New cards

Language translators

Not portable

78
New cards

Language translators

Assemblers, compilers and interpreters

79
New cards

Linux/Unix

For this operating systems the users prefer to use the command line.

80
New cards

Logic tier

In software architecture sits between the user and the data. This is where the system performs its logic processing, it resides on the server where the processing occurs.

81
New cards

MCV

Model-Control-View

82
New cards

Mitigation techniques

Firewall, anti-viral, anti-malware software

83
New cards

The model

In software architecture this layer can take different forms depending on the complexity of the application. In certain instances its an actual object that is an actual implementation of the application. This is used to retrieve information about the product. It is in this layer that the business logic is designed.

84
New cards

The Controller

In software architecture this layer is part of an application that interacts with the user and passes along the user requests to the model layer. It is in this layer that the input logic is designed.

85
New cards

The View

In software architecture this layer is the part of the application that represents the user interface. This is used to capture the input from the user to be passed via the controller to the model. It is in this layer of the application that the user interface logic is designed.

86
New cards

High level languages

Basic, C, C++ and java

87
New cards

Network Admin

Network engineer or network architects

88
New cards

Network admin roles

Design, edit configuration files, write shell scripts and install software and updates

89
New cards

Online Analytical Processing

OLAP

90
New cards

OLAP(Online analytical processing)

Data are processed through a suite of analysis software tools.

91
New cards

Online data processing

It deals with data in real time. its a "live" database

92
New cards

os types

workstation, mobile and server

93
New cards

PERT

Program evaluation and review technique

94
New cards

Private risk

A threat if disclosed to others such as social security and credit card numbers or health and educational information.

95
New cards

Project characteristics

Initiation, planning, executing and controlling and closing

96
New cards

Project

Temporary, unique and ends

97
New cards

Project management

brings a unique focus shaped by the goals, resources and schedule of each project

98
New cards

Public key encryption

uses two keys, a public, and a private

99
New cards

Public risk

Public information might include names and addresses

100
New cards

Quality data

Relevance, timely, accurate and reliable