1/54
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information Technology
is the technology used to create, maintain, and make information available. IT manages and supports the technologies needed to develop, maintain, and use computer hardware and software, along with network connectivity and performance. Further, IT is responsible for the storage, processing, and distribution of information
System
is a collection of elements that interact to achieve a common goal. IT as a system includes the hardware, the software, the networking elements (maintained by IT professionals), and the people who use them.
Purpose of IT department
-User support-enable employees
-Data and information management-build systems to enable storage, retrieval, analysis, and use of organization data and information with an eye on disaster recovery and business continuity to mitigate the high costs of losing data.
-Networks support communication between the elements of an IT system
-Systems Integration -Vendors provide IT equipment, software, and services. The deployment of those systems in an organization often requires setting up and configuring the product to align with the specific organizational needs and to integrate with other systems already in use.
Core Components of IT Software
-Software Development-Software systems implement various algorithms that transform data from one form into another, perform calculations, manipulate files, or complete other tasks that may be repetitive, time-consuming, or dangerous to an employee. A few examples of tasks software systems perform include controlling the movements of industrial robotic arms, sending emails, and editing text.
-Business Analysis-Organizations benefit from improving and optimizing their operations. With the rapid changes in the IT field, organizations must constantly investigate, assess, and plan for new or replacement systems provided by vendors or developed internally. Organizations analyze their processes, then assess current and anticipated needs for gaps that technology can fill.
-Security-Business decisions often rely on sensitive data that should only be handled by specific parties. Unauthorized access could result in data loss or modifications, exposure of data to competitors, or disruptions in availability that affect the normal course of the business.
Websites can generally be classified as
Internet, Intranet, extranet
internet
Resources available for the public are on the internet, including commercial sites (e-commerce), blogs, social media, and news.
Intranet
Resources only available for users or systems of a specific organization are on the intranet. Things like proprietary information and sensitive employee information are examples of what is typically placed on an organization's intranet. Using an intranet for this kind of data helps protect sensitive information while still facilitating widespread communication through the organization.
Extranet
An extranet makes resources available within an organization, but it also makes that information available to other specific organizations or users, such as contracted, third-party consultants.
Business Intelligence
Organizations gather data to support their decision-making process and discover opportunities to better serve their customers, optimize their processes, and maintain or gain a competitive advantage in an industry. Systems and personnel supporting data analytics use the organization's data to examine its past performance, identify the reasons behind past and current issues, and forecast future performance.
Project Management
Organizations need to ensure that projects execute in a manageable fashion, maintain scope, and optimize use of resources.
Outsourcing Services
Smaller organizations cannot always employ a full range of IT professionals to support their systems. Instead, consultants are frequently brought in for technical support. These third-party, specialized IT consulting services form a significant segment of the IT industry.
Computing
is generally understood as any activity that uses a computer to manage, process, or share information.
5 Computing Disciples
computer engineering, computer science, software engineering, information systems, and information technology.
Computer Engineering
Computer engineering (CE) focuses on the design of hardware systems and the software that makes them work. In addition to writing drivers for peripheral devices, such as keyboards and printers, computer engineering addresses the development of solutions that use computers embedded in other devices like alarm systems, refrigerators, and self-driving cars.
Computer Science
Computer science (CS) addresses the design and implementation of software with an emphasis on developing effective ways to solve computing problems and creating new ways to use computers. It encompasses a range of computing-related tasks such as robotics, artificial intelligence, augmented reality, and algorithms designed to solve problems.
Software Engineering
Large software systems are constructed across enterprises to meet business requirements and support business-critical activities. Software engineering (SE) focuses on the development and maintenance of reliable and efficient software systems.
Information Systems
The focus of information systems (IS) is to integrate IT solutions meant to meet organizational business goals. This computing discipline addresses systems that generate, process, and distribute information and support organizational communication and collaboration, their design, and their implementation.
Information Technology
Information technology (IT) focuses more on the technology supporting information systems in an organization rather than the information residing on the systems or being communicated with them. In this sense, IT responds to the practical needs of the organization, including reliable and secure solutions that are appropriately maintained, updated, and replaced.
Job=System Administrator
The system administrator is responsible for providing technical support for hardware and software issues end users encounter, such as log-in issues.
Job=Network Administrator
The network administrator is responsible for designing, planning, setting up, and maintaining an organization's network.
Job=Database Admin
The database administrator is responsible for installing and configuring databases. This position also fixes database errors and creates user accounts.
Job=Security Admin
The security administrator is responsible for installing, administering, and troubleshooting network security issues.
Job=Web Admin
The web administrator is responsible for troubleshooting error messages employees encounter when attempting to access their organization's website. The web administrator is also responsible for tracking, compiling, and analyzing website usage data.
Cloud Architect
The cloud architect is responsible for overseeing a company's cloud computing systems.
Network Architect
The network architect is responsible for designing networks and monitoring traffic. This position is responsible for installing routers and modems and upgrading hardware and software that are essential for the network to function properly.
Automation Architect
automation architect is responsible for modernizing business processes and developing reasons or rationales for or against a process being automated.
Cyber Security Architect
responsible for designing, building, testing, and implementing security systems within an organization's information technology network. An individual within this position requires a thorough understanding of an organization's IT systems to anticipate possible network security breaches.
Machine Learning Engineer
is responsible for allowing an organization to take full control of its data. Application developers and computer programmers with data analytical skills can transition to become machine learning engineers.
Software Engineer
design and develop software that makes hardware and software systems work, including operating systems, database systems, and embedded systems.
Network Engineer
network engineers set up, configure, maintain, and upgrade systems where data resides and that support the exchange of information, including communication systems and networks. Network engineers ensure that the security of data and information is appropriate and that companies have processes and procedures in place to enable business operations to continue in the event of a disaster.
Cloud Engineer
use their technical and analytical skills to help companies identify opportunities for migrating a part or all of their infrastructure to the cloud, supporting the more efficient use of resources and improving IT operations.
Technical Support Analyst
maintains workplace technology and responds to user requests for help. Titles for technical support in an organization include helpdesk specialist and IT support specialist.
System Analyst
investigate business problems and create information systems to provide solutions. These jobs require both business and technical knowledge and rely on effective communication to understand clients' requirements.
Data Analyst
gather data from customers and internal operations to identify opportunities to improve business operations. Data analysts use statistical and other quantitative methods to gain insights that support the organization's decision-making.
Security Analyst
responsible for monitoring an organization's network for security breaches.
Cyber Security Specialist
work with organizations to keep their information systems secure and ensure integrity, confidentiality, and availability of data. They determine which users require access to what information, and then plan, coordinate, and implement information security solutions.
technical consulatant
provide technical expertise by developing and implementing IT systems for external clients
Project Manager
organizes people, time, and other resources to make sure projects meet requirements and are completed on time and within budget.
Which statement describes the role of a network administrator?
-Network administrators are responsible for maintaining websites.
-Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.
-Network administrators are accountable for the installation and maintenance of the resources on a network.
-Network administrators have a long list of essential responsibilities but mostly focus on the design, development, and support of database management systems.
correct
Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.
Which statement about the systems analyst role is accurate?
- The role includes choosing appropriate network hardware.
-The role includes securing an organization's network.
-The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements.
-The role includes planning the allocation of network addresses across an organization.
The systems analyst role requires both business and technical knowledge, relying on effective communication to understand clients' requirements.
Which statement describes the role of a systems administrator?
-Systems administrators are responsible for monitoring an organization's network for security breaches.
-Systems administrators are responsible for creating, documenting, and executing manually created test plans and procedures relating to system anomalies.
-Systems administrators are responsible for designing and developing software that makes hardware and software systems work.
-Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
Which role is responsible for maintaining websites?
Data analyst
Network engineer
Cloud architect
Web administrator
WebAdmin
Which task describes the role of a database administrator?
- Working with organizations to keep their information systems secure and ensuring integrity, confidentiality, and availability of data
- Creating, documenting, executing, and manually creating test plans and procedures relating to system anomalies
- Integrating data from legacy systems to newer systems and playing a role in application design and development
-Organizing people, time, and other resources to make sure projects meet requirements and are completed on time and within budget
Integrating data from legacy systems to newer systems and playing a role in application design and development
What is another title for a web administrator?Choose 2 answers.
Web developer
Cybersecurity specialist
Web server administrator
Webmaster
Web Master/Web Developer
Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs).
True
False
False
What is the primary duty of a computer support specialist?
-The computer support specialist is mainly responsible for allowing an organization to take full control of its data.
- The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients.
-The computer support specialist primarily operates as a trainer and troubleshooter.
- The computer support specialist primarily identifies and helps clients adopt IT services or technologies.
The computer support specialist primarily operates as a trainer and troubleshooter.
Which of the following describes a computer support specialist's responsibilities?Choose 3 answers.
Working the help desk
Training help-desk personnel
Overseeing help-desk personnel
Using statistical and other quantitative methods to gain insights that support the organization's decision-making
Working the help desk
Training help-desk personnel
Overseeing help-desk personnel
Information Systems
collections of data and information used to support decision-making in organizations.
Quality Data Attributes
Quality data is typically defined as data that is precise, valid, reliable, timely, and complete.
Types of Bad Data
Duplicate data:Two or more identical records
Conflicting data:The same records with differing attributes
Incomplete data:Missing attributesInvalid dataAttributes not conforming to standardization
Unsynchronized data:Data not appropriately shared between two systems
Types of Input/output
Input-mouse, keyboard, Mircophone
Output-Monitor, speakers, printer
Hardware
is the set of computer system components that one can touch. Those are the electronic and mechanical parts the system requires to operate. Motherboards, graphics cards, central processing units (CPUs), and power supply are some of the most prominent hardware components in a general-purpose computer system. This includes items such as smartphones, tablets, laptops, and desktop computers.
Software
Without hardware, there would be no way of running the essential software that makes computers run. Software programs run on your computer and provide instructions telling the computer what to do.
Physical Topology
Network devices are connected to a central hub.
Logical Topology
Networks may implement various types of topologies. The most common network topology layouts are bus, star, ring, and mesh.