Intro to IT - WGU Section 2 Starter Set

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Information Technology

is the technology used to create, maintain, and make information available. IT manages and supports the technologies needed to develop, maintain, and use computer hardware and software, along with network connectivity and performance. Further, IT is responsible for the storage, processing, and distribution of information

2
New cards

System

is a collection of elements that interact to achieve a common goal. IT as a system includes the hardware, the software, the networking elements (maintained by IT professionals), and the people who use them.

3
New cards

Purpose of IT department

-User support-enable employees

-Data and information management-build systems to enable storage, retrieval, analysis, and use of organization data and information with an eye on disaster recovery and business continuity to mitigate the high costs of losing data.

-Networks support communication between the elements of an IT system

-Systems Integration -Vendors provide IT equipment, software, and services. The deployment of those systems in an organization often requires setting up and configuring the product to align with the specific organizational needs and to integrate with other systems already in use.

4
New cards

Core Components of IT Software

-Software Development-Software systems implement various algorithms that transform data from one form into another, perform calculations, manipulate files, or complete other tasks that may be repetitive, time-consuming, or dangerous to an employee. A few examples of tasks software systems perform include controlling the movements of industrial robotic arms, sending emails, and editing text.

-Business Analysis-Organizations benefit from improving and optimizing their operations. With the rapid changes in the IT field, organizations must constantly investigate, assess, and plan for new or replacement systems provided by vendors or developed internally. Organizations analyze their processes, then assess current and anticipated needs for gaps that technology can fill.

-Security-Business decisions often rely on sensitive data that should only be handled by specific parties. Unauthorized access could result in data loss or modifications, exposure of data to competitors, or disruptions in availability that affect the normal course of the business.

5
New cards

Websites can generally be classified as

Internet, Intranet, extranet

6
New cards

internet

Resources available for the public are on the internet, including commercial sites (e-commerce), blogs, social media, and news.

7
New cards

Intranet

Resources only available for users or systems of a specific organization are on the intranet. Things like proprietary information and sensitive employee information are examples of what is typically placed on an organization's intranet. Using an intranet for this kind of data helps protect sensitive information while still facilitating widespread communication through the organization.

8
New cards

Extranet

An extranet makes resources available within an organization, but it also makes that information available to other specific organizations or users, such as contracted, third-party consultants.

9
New cards

Business Intelligence

Organizations gather data to support their decision-making process and discover opportunities to better serve their customers, optimize their processes, and maintain or gain a competitive advantage in an industry. Systems and personnel supporting data analytics use the organization's data to examine its past performance, identify the reasons behind past and current issues, and forecast future performance.

10
New cards

Project Management

Organizations need to ensure that projects execute in a manageable fashion, maintain scope, and optimize use of resources.

11
New cards

Outsourcing Services

Smaller organizations cannot always employ a full range of IT professionals to support their systems. Instead, consultants are frequently brought in for technical support. These third-party, specialized IT consulting services form a significant segment of the IT industry.

12
New cards

Computing

is generally understood as any activity that uses a computer to manage, process, or share information.

13
New cards

5 Computing Disciples

computer engineering, computer science, software engineering, information systems, and information technology.

14
New cards

Computer Engineering

Computer engineering (CE) focuses on the design of hardware systems and the software that makes them work. In addition to writing drivers for peripheral devices, such as keyboards and printers, computer engineering addresses the development of solutions that use computers embedded in other devices like alarm systems, refrigerators, and self-driving cars.

15
New cards

Computer Science

Computer science (CS) addresses the design and implementation of software with an emphasis on developing effective ways to solve computing problems and creating new ways to use computers. It encompasses a range of computing-related tasks such as robotics, artificial intelligence, augmented reality, and algorithms designed to solve problems.

16
New cards

Software Engineering

Large software systems are constructed across enterprises to meet business requirements and support business-critical activities. Software engineering (SE) focuses on the development and maintenance of reliable and efficient software systems.

17
New cards

Information Systems

The focus of information systems (IS) is to integrate IT solutions meant to meet organizational business goals. This computing discipline addresses systems that generate, process, and distribute information and support organizational communication and collaboration, their design, and their implementation.

18
New cards

Information Technology

Information technology (IT) focuses more on the technology supporting information systems in an organization rather than the information residing on the systems or being communicated with them. In this sense, IT responds to the practical needs of the organization, including reliable and secure solutions that are appropriately maintained, updated, and replaced.

19
New cards

Job=System Administrator

The system administrator is responsible for providing technical support for hardware and software issues end users encounter, such as log-in issues.

20
New cards

Job=Network Administrator

The network administrator is responsible for designing, planning, setting up, and maintaining an organization's network.

21
New cards

Job=Database Admin

The database administrator is responsible for installing and configuring databases. This position also fixes database errors and creates user accounts.

22
New cards

Job=Security Admin

The security administrator is responsible for installing, administering, and troubleshooting network security issues.

23
New cards

Job=Web Admin

The web administrator is responsible for troubleshooting error messages employees encounter when attempting to access their organization's website. The web administrator is also responsible for tracking, compiling, and analyzing website usage data.

24
New cards

Cloud Architect

The cloud architect is responsible for overseeing a company's cloud computing systems.

25
New cards

Network Architect

The network architect is responsible for designing networks and monitoring traffic. This position is responsible for installing routers and modems and upgrading hardware and software that are essential for the network to function properly.

26
New cards

Automation Architect

automation architect is responsible for modernizing business processes and developing reasons or rationales for or against a process being automated.

27
New cards

Cyber Security Architect

responsible for designing, building, testing, and implementing security systems within an organization's information technology network. An individual within this position requires a thorough understanding of an organization's IT systems to anticipate possible network security breaches.

28
New cards

Machine Learning Engineer

is responsible for allowing an organization to take full control of its data. Application developers and computer programmers with data analytical skills can transition to become machine learning engineers.

29
New cards

Software Engineer

design and develop software that makes hardware and software systems work, including operating systems, database systems, and embedded systems.

30
New cards

Network Engineer

network engineers set up, configure, maintain, and upgrade systems where data resides and that support the exchange of information, including communication systems and networks. Network engineers ensure that the security of data and information is appropriate and that companies have processes and procedures in place to enable business operations to continue in the event of a disaster.

31
New cards

Cloud Engineer

use their technical and analytical skills to help companies identify opportunities for migrating a part or all of their infrastructure to the cloud, supporting the more efficient use of resources and improving IT operations.

32
New cards

Technical Support Analyst

maintains workplace technology and responds to user requests for help. Titles for technical support in an organization include helpdesk specialist and IT support specialist.

33
New cards

System Analyst

investigate business problems and create information systems to provide solutions. These jobs require both business and technical knowledge and rely on effective communication to understand clients' requirements.

34
New cards

Data Analyst

gather data from customers and internal operations to identify opportunities to improve business operations. Data analysts use statistical and other quantitative methods to gain insights that support the organization's decision-making.

35
New cards

Security Analyst

responsible for monitoring an organization's network for security breaches.

36
New cards

Cyber Security Specialist

work with organizations to keep their information systems secure and ensure integrity, confidentiality, and availability of data. They determine which users require access to what information, and then plan, coordinate, and implement information security solutions.

37
New cards

technical consulatant

provide technical expertise by developing and implementing IT systems for external clients

38
New cards

Project Manager

organizes people, time, and other resources to make sure projects meet requirements and are completed on time and within budget.

39
New cards

Which statement describes the role of a network administrator?

-Network administrators are responsible for maintaining websites.

-Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.

-Network administrators are accountable for the installation and maintenance of the resources on a network.

-Network administrators have a long list of essential responsibilities but mostly focus on the design, development, and support of database management systems.

correct

Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.

40
New cards

Which statement about the systems analyst role is accurate?

- The role includes choosing appropriate network hardware.

-The role includes securing an organization's network.

-The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements.

-The role includes planning the allocation of network addresses across an organization.

The systems analyst role requires both business and technical knowledge, relying on effective communication to understand clients' requirements.

41
New cards

Which statement describes the role of a systems administrator?

-Systems administrators are responsible for monitoring an organization's network for security breaches.

-Systems administrators are responsible for creating, documenting, and executing manually created test plans and procedures relating to system anomalies.

-Systems administrators are responsible for designing and developing software that makes hardware and software systems work.

-Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

42
New cards

Which role is responsible for maintaining websites?

Data analyst

Network engineer

Cloud architect

Web administrator

WebAdmin

43
New cards

Which task describes the role of a database administrator?

- Working with organizations to keep their information systems secure and ensuring integrity, confidentiality, and availability of data

- Creating, documenting, executing, and manually creating test plans and procedures relating to system anomalies

- Integrating data from legacy systems to newer systems and playing a role in application design and development

-Organizing people, time, and other resources to make sure projects meet requirements and are completed on time and within budget

Integrating data from legacy systems to newer systems and playing a role in application design and development

44
New cards

What is another title for a web administrator?Choose 2 answers.

Web developer

Cybersecurity specialist

Web server administrator

Webmaster

Web Master/Web Developer

45
New cards

Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs).

True

False

False

46
New cards

What is the primary duty of a computer support specialist?

-The computer support specialist is mainly responsible for allowing an organization to take full control of its data.

- The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients.

-The computer support specialist primarily operates as a trainer and troubleshooter.

- The computer support specialist primarily identifies and helps clients adopt IT services or technologies.

The computer support specialist primarily operates as a trainer and troubleshooter.

47
New cards

Which of the following describes a computer support specialist's responsibilities?Choose 3 answers.

Working the help desk

Training help-desk personnel

Overseeing help-desk personnel

Using statistical and other quantitative methods to gain insights that support the organization's decision-making

Working the help desk

Training help-desk personnel

Overseeing help-desk personnel

48
New cards

Information Systems

collections of data and information used to support decision-making in organizations.

49
New cards

Quality Data Attributes

Quality data is typically defined as data that is precise, valid, reliable, timely, and complete.

50
New cards

Types of Bad Data

Duplicate data:Two or more identical records

Conflicting data:The same records with differing attributes

Incomplete data:Missing attributesInvalid dataAttributes not conforming to standardization

Unsynchronized data:Data not appropriately shared between two systems

51
New cards

Types of Input/output

Input-mouse, keyboard, Mircophone

Output-Monitor, speakers, printer

52
New cards

Hardware

is the set of computer system components that one can touch. Those are the electronic and mechanical parts the system requires to operate. Motherboards, graphics cards, central processing units (CPUs), and power supply are some of the most prominent hardware components in a general-purpose computer system. This includes items such as smartphones, tablets, laptops, and desktop computers.

53
New cards

Software

Without hardware, there would be no way of running the essential software that makes computers run. Software programs run on your computer and provide instructions telling the computer what to do.

54
New cards

Physical Topology

Network devices are connected to a central hub.

55
New cards

Logical Topology

Networks may implement various types of topologies. The most common network topology layouts are bus, star, ring, and mesh.