WGU C182 Introduction to IT

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/229

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

230 Terms

1
New cards

Information Technology

The technology used in creating, maintaining, and making information accessible.

2
New cards

IT Professional Roles

Administration and Support

3
New cards

System Administrator

Maintains all aspects of the system including hardware, software, and programming.

4
New cards

Network Administrator

In charge of all aspects of the computer network

5
New cards

Database Administrator

Focuses on the design, development, and support of database management systems (DBMSs).

6
New cards

Security Administrator

Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.

7
New cards

Web Administrator

Installs, configures, maintains, secures, and troubleshoots web severs.

8
New cards

Support IT Professionals

Help desk and training.

9
New cards

Information

Processed data.

10
New cards

DIKW Hierarchy

Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)

11
New cards

Data in DIKW

The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.

12
New cards

Information in DIKW

Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.

13
New cards

Knowledge in DIKW

Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.

14
New cards

Wisdom in DIKW

Provides a social setting to knowledge; an understanding of the "why". Can only come by having both knowledge and experience.

15
New cards

Information Systems

A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.

16
New cards

Characteristics of Quality Data

Relevance - the data being used must apply directly to the decision being made

Timely - data must be efficient and must be provided in a timely manner

Thorough - the data must be complete

Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible.

Reliable - data should reflect stable and consistent data collection processes across collections points and over time

17
New cards

IPOS

The Input-Procession-Output-Storage Cycle

18
New cards

Input

Raw data is entered by the user.

19
New cards

Processing

Raw data is organized or structured for usefulness.

20
New cards

Output

Information is output so user can see results.

21
New cards

Storage

Processed information is stored for permanent record.

22
New cards

Computer System

A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.

23
New cards

Hardware

Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.

24
New cards

Software

Computer programs that tell the computer what to do--how to execute commands and process information

25
New cards

Network

A collection of computers and resources connected by various media so that they can communicate with each other.

26
New cards

User

Those who use a computer.

27
New cards

Software Categories

Systems Software and Applications Software

28
New cards

Evolution of Users

First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.

29
New cards

Protocol

Rules provided by which networks communicate with each other.

30
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.

31
New cards

Protocol Stack

A collection of protocols. TCP/IP is an example.

32
New cards

Components of a Computer

CPU, Memory and Storage, Peripheral Devices

33
New cards

CPU

Executes programs' instructions and commands various components in the computer. Referred to as the "chip".

34
New cards

Memory

Stores the programs being executed and the data they are using.

35
New cards

I/O Subsystem

All peripheral devices where long term storage devices are used.

36
New cards

Bus

Permits information to move between each component; electrical channels that enable communication among the electronic components

37
New cards

System Unit

Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.

38
New cards

Internal Components of the System Unit

Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards

39
New cards

Parts of the CPU

Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU

Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen

40
New cards

System Clock

Controls the speed at which instructions are processed.

41
New cards

RAM

Stands for Random Access Memory.

It temporarily stores data before it is processed and sent to your screen or printer.

It is volatile (means data or information stored disappears when the computer is turned off or loses power).

You can choose the amount of RAM your computer has.

42
New cards

Types of RAM

Dynamic RAM (DRAM) - typically called main memory

Static RAM (SRAM) - cache memory and registers

43
New cards

BIOS ROM

BIOS stands for Basic Input Output System; ROM stands for Read Only Memory.

Typically stored in ROM chip on the motherboard.

Is software not hardware, ("basic" operating system that runs when the computer is first turned on).

Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk.

Can't choose the amount or contents.

44
New cards

1st Generation of Computers

Vacuum tubes, relay switches, the need to program in machine language

45
New cards

2nd Generation of Computers

Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers

46
New cards

3rd Generation of Computers

Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals

47
New cards

4th Generation of Computers

Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use

48
New cards

Moore's Law

Doubling of transistor count roughly every 18 - 24 months (exponential increase); observation, not physical law

49
New cards

Evolution of Storage

Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage

50
New cards

Machine/Low-level Language

Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time

51
New cards

Assembly Language

Easier than machine but still required detailed, precise low level instructions

52
New cards

Language Translator Programs

Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer

53
New cards

Complier

Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient

54
New cards

Structured Programming

Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements

55
New cards

Object Oriented Programming

Initially introduced in Smalltalk in 1970's and early 80's

56
New cards

Interpreted Code

Runs inside a special environment; is better for testing

57
New cards

Shell Scripting

Small programs that place Linux commands or DOS batch files into a file

58
New cards

Local Computer

The computer that the user is using; physically present with

59
New cards

Remote Computer

A computer being accessed over the network

60
New cards

Network Hub

Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network

61
New cards

Network Switch

More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it

62
New cards

Router

Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses

63
New cards

Wireless Access Point

Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable

64
New cards

Circuit Switched Network

Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission

65
New cards

Packet Switched Network

A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic

66
New cards

Workstations

Creates and maintains client network connections to remote servers

67
New cards

Virtual Machine (VM)

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.

68
New cards

Server

Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network

69
New cards

Client-server Network

Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers

70
New cards

File Server

Sends files over the network at the request of clients.

Responds over LAN, within one location/site.

Support both application software and data files.

71
New cards

Web Server

Stores data files (web pages) and programs (scripts).

Responds from anywhere on the Internet.

72
New cards

Database Server

Responds to queries by pulling from the database.

Typically only to local clients.

73
New cards

Print Server

Monitors print jobs

74
New cards

Mail Server

Two email servers communicate with each other

75
New cards

FTP Server

Like web server or file server in that requests are for files and responses are the files

76
New cards

Point-to-Point Network

Link between two resources.

Simplest for of a network.

Limits how devices can communicate with each other

77
New cards

Bus Network

Devices connected along a single cable.

Size of network is restricted.

78
New cards

Star Network

Each device is connected to a central devices such as a hub or switch.

79
New cards

Ring Network

Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.

80
New cards

Mesh Network

Every device is connected directly to every other device in the network.

81
New cards

Domain Name Server (DNS)

Used to translate from an IP alias to an IP address

82
New cards

Parts of URL (Uniform Resource Locator)

Protocol, Domain name, Resource/Filename

83
New cards

Domain Name

Identifies the server on which the web page can be found

84
New cards

Domain Name Parts

Top level domain (TLD) name and Host name

85
New cards

Host Name

Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored

86
New cards

TLD(Top Level Domain) Name

Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page

87
New cards

Resource/Filename ID

Indicates the name of the file you are accessing, or the location of the document on the server

88
New cards

CIA

Confidentiality, Integrity, Availability

89
New cards

Confidentiality

Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users

90
New cards

Integrity

Requires that data is correct

91
New cards

Availability

Requires that information is available when needed

92
New cards

Data Integrity Efforts

1st - Must include a component that ensures the accuracy of the collected data

2nd - Must be entered into the system accurately

3rd - Data modification must be tracked

93
New cards

Strategic Risk Analysis

1. Identify the organization's information assets

2. Identify vulnerabilities of each asset

3. Determine threats

4. Prioritizing risks

5. Develop and enact policies that will reduce threats

94
New cards

Information Security Classifications

Public - available through public sources; includes names and addresses

Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses

Private - information that could be a threat if disclosed to others; includes social security and credit card numbers

Confidential - information that an organization will keep secret; includes patentable information and business plans

95
New cards

Defense in Depth

Protecting every layer that surrounds data

96
New cards

Phishing

Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information

97
New cards

SQL Injection

An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database

98
New cards

Buffer Overflow

Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code

99
New cards

Hacking

When an individual obtains unauthorized access to a host

100
New cards

White Hat Hacker

Informs companies of potential problems with software so companies can fix