IT Systems Implementation, Database Design, and Network Fundamentals

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/129

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:53 PM on 4/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

130 Terms

1
New cards

System Implementation Strategies

Methods for switching from an old system to a new one: parallel, direct cutover, pilot, phased.

2
New cards

Parallel Implementation

Old and new systems run at the same time; safest but most expensive.

3
New cards

Direct Cutover Implementation

Old system stops and new system starts immediately; fastest but riskiest.

4
New cards

Pilot Implementation

New system is rolled out to one department or location first.

5
New cards

Phased Implementation

New system is introduced in stages or modules.

6
New cards

Degrees of Organizational Change

Levels of business transformation: automation, rationalization, BPR, paradigm shift.

7
New cards

Automation

Using technology to speed up existing processes without changing them.

8
New cards

Rationalization

Streamlining processes to remove inefficiencies.

9
New cards

Business Process Reengineering

Radical redesign of business processes from scratch.

10
New cards

Paradigm Shift

Complete change in business model or strategy.

11
New cards

Entity

A thing you store data about in a database (e.g., Student, Course).

12
New cards

Attribute

A property or characteristic of an entity (e.g., Name, GPA).

13
New cards

Primary Key

A field that uniquely identifies a record in a table.

14
New cards

Foreign Key

A primary key from another table used to create relationships.

15
New cards

1:1 Relationship

One record in A matches one record in B; usually merged into one table.

16
New cards

1:N Relationship

One record in A relates to many in B; foreign key goes on the many side.

17
New cards

M:N Relationship

Many records in A relate to many in B; requires an intersection table.

18
New cards

Intersection Table

A table created to resolve an M:N relationship; contains foreign keys from both tables.

19
New cards

Normalization

Process of organizing data to reduce redundancy and improve integrity.

20
New cards

First Normal Form

Remove repeating groups; each field holds one value.

21
New cards

Second Normal Form

Remove fields dependent on only part of a composite key.

22
New cards

Third Normal Form

Remove fields dependent on other non-key fields.

23
New cards

Query

A question you ask a database to return specific records.

24
New cards

Select Query

Retrieves data that matches criteria.

25
New cards

Crosstab Query

Summarizes data in rows and columns.

26
New cards

Make Table Query

Creates a new table from query results.

27
New cards

Update Query

Changes data in existing records based on criteria.

28
New cards

Append Query

Adds records to an existing table.

29
New cards

Delete Query

Removes records that match criteria.

30
New cards

Wildcard *

Represents many characters or none in a query.

31
New cards

Wildcard ?

Represents a single character in a query.

32
New cards

Like Operator

Used for pattern matching in queries.

33
New cards

Between Operator

Used to specify a range of values.

34
New cards

Null

Indicates a missing value.

35
New cards

Not Null

Indicates a value is present.

36
New cards

IIF Function

Conditional expression: IIF(condition, value_if_true, value_if_false).

37
New cards

Concatenation

Combining fields or text using the & operator.

38
New cards

Unmatched Query

Finds records in one table with no matching record in another.

39
New cards

Parameterized Query

Prompts the user for input each time the query runs.

40
New cards

Network Interface Card

Hardware that connects a computer to a network.

41
New cards

Hub

Sends data to all devices on a network; outdated.

42
New cards

Switch

Sends data only to the intended device; faster and more secure.

43
New cards

Router

Connects networks and routes data between them.

44
New cards

Twisted Pair Cable

Common Ethernet cable; inexpensive and flexible.

45
New cards

Coaxial Cable

Shielded cable used in cable TV and older networks.

46
New cards

Fiber Optic Cable

Uses light to transmit data; fastest and most secure.

47
New cards

LAN

Local Area Network; covers a small area like a building.

48
New cards

MAN

Metropolitan Area Network; covers a city.

49
New cards

WAN

Wide Area Network; covers large geographic areas.

50
New cards

IP Address

Numerical label assigned to devices on a network.

51
New cards

DNS

System that translates domain names into IP addresses.

52
New cards

Protocol

Rules for communication between devices (e.g., TCP/IP).

53
New cards

Ethics

Principles guiding behavior toward others.

54
New cards

Intellectual Property

Creative work protected by copyright or licensing.

55
New cards

Copyright

Legal protection for expressions of ideas.

56
New cards

Fair Use Doctrine

Allows limited use of copyrighted material for teaching or new work.

57
New cards

Pirated Software

Unauthorized use or distribution of software.

58
New cards

Counterfeit Software

Fake software sold as legitimate.

59
New cards

Data Breach

Unauthorized access to sensitive information.

60
New cards

Threat Actor

Person or group responsible for a cyberattack.

61
New cards

Phishing

Fraudulent attempt to obtain information by pretending to be a trusted source.

62
New cards

Spear Phishing

Targeted phishing attack aimed at a specific person.

63
New cards

Social Engineering

Manipulating people into revealing information or performing actions.

64
New cards

Password Best Practices

Use MFA, long passphrases, unique passwords, and password managers.

65
New cards

CIA Triad

Confidentiality, Integrity, Availability.

66
New cards

Confidentiality

Ensuring only authorized users access information.

67
New cards

Integrity

Ensuring information is accurate and unaltered.

68
New cards

Availability

Ensuring information is accessible when needed.

69
New cards

Virus

Malicious software that attaches to files and spreads when executed.

70
New cards

Worm

Self-spreading malware that moves across networks.

71
New cards

Trojan Horse

Malicious software hidden inside legitimate software.

72
New cards

Spyware

Software that secretly tracks user activity.

73
New cards

Keylogger

Records keystrokes and mouse clicks.

74
New cards

Ransomware

Malware that encrypts files and demands payment.

75
New cards

DDoS Attack

Flooding a system with traffic to crash or slow it.

76
New cards

Authentication

Verifying identity using passwords, MFA, or biometrics.

77
New cards

Authorization

Determining what a user is allowed to access.

78
New cards

Firewall

Hardware or software that filters network traffic.

79
New cards

Intrusion Detection System

Monitors network for suspicious activity.

80
New cards

Encryption

Scrambling data so only authorized users can read it.

81
New cards

Plaintext

Readable, unencrypted data.

82
New cards

Ciphertext

Encrypted, unreadable data.

83
New cards

Cipher

Method used to encrypt or decrypt data.

84
New cards

Key

Secret value used in encryption and decryption.

85
New cards

Public Key Encryption

Uses a public key to encrypt and a private key to decrypt.

86
New cards

Backup

Copy of data used to restore information after loss.

87
New cards

Full Backup

Copies all data.

88
New cards

Incremental Backup

Copies only data changed since the last backup.

89
New cards

Salesforce Object

Table that stores data in Salesforce.

90
New cards

List View

Filtered view of records; similar to a query.

91
New cards

Page Layout

Controls how fields appear on a record page.

92
New cards

Report

Summarizes and presents data.

93
New cards

Dashboard

Visual display of multiple reports.

94
New cards

Flow Builder

Salesforce automation tool for advanced logic.

95
New cards

SDLC

Systems Development Life Cycle; structured method for building systems.

96
New cards

Systems Analysis

Gathering and documenting business requirements.

97
New cards

Systems Design

Creating the technical blueprint for a system.

98
New cards

Programming

Writing code and building system components.

99
New cards

Testing

Ensuring the system works correctly.

100
New cards

Maintenance

Supporting and updating the system after implementation.