D075 Information Technology Management Essentials
primary key
a field in a database table that uniquely identifies a record in a table
dropbox
a file hosting service that provides cloud storage, file synchronization, business cloud, and client-side software
Cloud Service Provider (CSP)
A company that provides cloud computing services.
spyware
A computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent
identity theft
A crime concerning the unlawful practice of assuming another individual's identity.
network administrator
A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization's needs.
intranet
A private version of the Internet that works the same way, but it is confined within an organization.
Disk Management
An OS is responsible for reading and writing data and information to a disk, typically a hard drive, solid-state drive (SSD), or main memory
proxy server
Any communications in or out of an intranet pass through a special security computer called ____________ as a precaution to protect from any external threats.
process
any task a computer performs
clients
Computers, such as users' personal computers, that use any of the services provided by servers.
physical cable system
Connects networks together
strong password
Contains a specific amount of characters with mixed cases and often requires letters and numbers
data
Facts and statistics collected together for reference or analysis (can be used for trend analysis, projections of sales revenue, other applications of viewing and massaging the data)
end user
The person or group who will use the hardware, software, networks, and databases in their performance of their daily work
disk storage
Non-volatile, secondary storage that is recorded to a physical device like a hard drive or optical disk with a read/write apparatus.
Chief Information Officer (CIO)
Oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives. normally reports to the chief operations officer or chief executive officer
IT manager
Oversees staff, communicate with upper management, understands both sides, hires and fires.
Chief Technology Officer (CTO)
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT
Hacker/Hacktivist
Someone who attempts to invade or disable a computer's security measures and then to steal the computer resources at their leisure.
twisted pair
Specialized wire that cancels out electromagnetic interference from other electronic devices and increases reliability.
slack
a cloud-based set of collaboration tools and services
thread
The first post to a discussion board is typically a comment that starts a _____________.
topology
The mapping of a physical network and logical interconnections between nodes
Chief Information Security Officer (CISO)
The title of the person who manages security for the organization's information systems and information.
data analysis
applying statistics and logic techniques to define, illustrate, and evaluate data
project management software
a collaborative tool that provides a road map for organizing and managing resources to schedule a project from start to finish
operating software (platform)
a collection of computer programs that work together to manage hardware and software to ensure that they are working properly
Reverse Phishing/Keylogging
When a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard.
Wi-Fi
Wi-Fi on the mobile device provides the same connectivity to the internet over wireless connection that a PC receives when connected to a network
network interface controller (NIC)
a card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers
network hub
a central location of the computer network that serves as a traffic cop for network connection and communication
Firewalls
a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet
search engine optimization (SEO)
a component of search engine marketing. organic results and not paid advertisements
optical disk
a computer disk that uses optical storage techniques and technology to read and write data
Metropolitan Area Network (MAN)
a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city
Campus Area Network (CAN)
a computer network that connects two or more LANs that are located on a campus, like a university, an organization's national headquarters, or even an industrial complex
Local Area Network (LAN)
a computer network that is relatively small, typically in a single building, but sometimes as small as a single room
server
a computer or computer program that manages access to a centralized resource or service in a network.
phishing
a criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details by masquerading as a legitimate business organization, typically in a legitimate-looking email
copyright
a definitive right given to the owner of an original work. (drawing, painting, novel, song, poem, computer program)
FERPA - Family Educational Rights and Privacy Act
a federal law that protects the rights of students' educational records. Information about grades, attendance, disciplinary records, report cards, transcripts, and so forth cannot be given to anyone not specifically listed on a FERPA form that is signed when a student enters a school
HIPAA - Health Insurance Portability and Accountability Act
a federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPPA form is signed each time you visit a new doctor so they can understand who they can share that information with
foreign key
a field in a database table that provides a link between two tables in a relational database
spreadsheets
a file that consists of rows and columns of data that can be manipulated and analyzed for business purposes
Gantt chart
a graphical map that Microsoft Project outputs. looks similar to a road map to keep a project on time and on track
cache
a hardware or software component that stores data so that future requests for that data can be served faster
Passphrase
a memorable strong password
point of failure (POF)
a part of a system that, if it fails, will stop the entire system from working
System Development Life Cycle (SDLC)
a process for creating and altering computer applications through step-by-step approach that includes planning, system analysis, design, implication, and system maintenance
Trojan horses
a program that often seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system.
basic research
a review of the subject and what has been completed in the world of business to determine whether any of it has a commercial application for the business
default-allow firewall rule
a rule that all traffic is allowed unless is has been specifically blocked
passwords
a secret word or combination of keyboard characters typed in by a user to authenticate one's identity for joining a computer network
Unified Modeling Language (UML)
a set of graphical notation techniques to create computer models and application
Transmission Control Protocol/Internet Protocol (TCP/IP)
a set of protocols used to connect a network to the internet (most common network protocol)
network protocol
a set of rules a network must follow/ a convention or standard that controls or allows communication and data transfer between two computers
social networking
a social networking site allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands
protocol
a standard language that devices connected to a network use to communicate and transfer data
solid-state drive
a storage device that typically uses flash memory to store data, instructions, and information
file allocation table (FAT)
a table of contents that directs the read/write arm of the hard drive to the location where data exists and accesses the data upon the user's request
RAM
a type of memory that allows data to be accessed in any other without physical movement of the silicone media (primary storage)
data management processes
acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business
discussion board
allows a virtual community of users to post electronica messages to a web page
online application software
allows for two or more users to access the same browser-based spreadsheet, word processor, or presentation software and share its data and information
Sarbanes-Oxley Act of 2002
an accounting industry act passed by the federal government to oversee the accounting practices of a business and industry. In addition, it bans company loans to executives and job protection to whistleblowers
database management system software (DBMS)
an application software that is used to create a collection of related files that consist of records of data separated by fields that can be queried to produce populations of information
word processing software
an application software used to create, compose, edit, format, and print documents (Microsoft Word, Adobe Acrobat)
denial-of-service attack
an attempt to make a computer or any of its resources unavailable to its intended users
click fraud
an internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee
business analytics
attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage
predictive analytics
attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations between one thing and any other things that pertain to it
bookmarking sites
bookmarking sites allow a user to save locations or items from the internet and organize them for future reference
decision analytics
builds on predictive analytics to make decisions about future industries and marketplaces. looks at an organization's internal data, analyzes external conditions like supply abundance, and then endorses the best course of actions
bluetooth network
built into mobile phones so they can communicate with other devices within approximately 30 feet. The network communicates by sending and receiving radio waves communicating with the bluetooth adapter in the device
Database Administrator (DBA)
categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business
knowledge management systems (KMS)
collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer
network
communication links that allow the computer systems to communicate with each other no matter the distance/location (routers, switches)
computer viruses/ metamorphic viruses
computer files that reproduce by making copies of themselves within a computer's memory or storage network
servers
computer networks are made up of central computers or hubs
Wide Area Network (WAN)
computer networks that encompass a wide geographical are and connect LANs, CANs, and MANs together
peer-to-peer network (P2P)
computer networks that generally connect computers directly to one another without the use of a server
application software
computer software created to allow the user to perform a specific job or task (will not work without system software)
computer security
concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system
file sharing systems
consists of either public or private access to corporate data located on a network
Database Management System (DBMS)
data are stored in computer files called tables, and tables are connected to other tables with related information
semi-structured data
data that can be converted into structured data, but not without a lot of work
big data
data that is collected from all over the internet, including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources
IT architects
design parts of computer applications like screen interfaces, middleware, and programming infrastructure that comply with the head applications developer's design principles
patents
established to encourage innovation and technological advances and protect the rights of the inventor. Patents protect new products, upgrades to existing products, and some functional aspects of computer software, such as a new algorithm for computation
node
every device connected to a network
data mapping
extra notes about the definition of a field, its data, and its use
ETL
extract, transform, and load: tools that are used to standardize data across systems and allow the data to be queried
unsecured computer
extremely easy to breach, especially by a seasoned hacker
spamming/ junk mail
the abuse of an email system to arbitrarily send millions of unsolicited bulk messages. These messages range from advertising and chain letters, to criminal schemes.
GPS
global positioning systems are designed to receive signals from an app on a phone and geostationary satellites so that a precise location can be determined. This is done by receiving multiple signals from the satellites and analyzing the data to determine the phone's coordinates on Earth
tables
hold the data for the database. consists of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information
text analytics (text mining)
hunts through unstructured text data to look for useful patterns such as whether their customers on Facebook or Instagram are unsatisfied with the organization's products or services
antivirus software
includes computer programs that attempt to identify, prevent and eliminate computer viruses and malware, typically before they reach a computing system or network
risk management
includes the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them
decision support system
information systems that are interactive software-based systems designed to assist decision makers in compiling useful information from business data and business models to make larger business decisions
customer resource management (CRM)
information systems that manage the information on a company's customers, including all interactions with each customer
trade secret
information that is private or not known outside the company and if disclosed would cause harm or loss to the competitors
computer support specialist
install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly
network operating system (NOS)
installed on servers to make sure the computer network runs smoothly and also to support application software like Microsoft Excel
master of data management
known as the methodology or process used to define, organize, and manage all data of an organization that provides a reference for decision-making
on-demand cloud computing (ODC)
less expensive than performing these activities in-house. can reduce employee headcount, reduce capital costs for expensive
minicomputers
less powerful and smaller in physical size than mainframe computers
presentation software
like Microsoft PowerPoint is used to present information in a slideshow format
worms
like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread
data governance
managing the availability, integrity, and security of the data to ensure that the data remain high quality and valid for data analytics
mainframe computer
massive, room-sized computers that process and store enormous amount of bulk data and information
data management and return on investment (ROI)
measures the gain or loss generated by intelligent data management relative to the amount of money invested
media sharing
media sharing websites are very familiar, as they provide a foundation for sharing both video and still images. These websites encourage users to add content to initiate conversations and can also denote the popularity of the uploaded content
microblogging
microblogging supports short written entries, which are posted on what are called "walls" to anyone who has subscribed to the account
transform
normalizing data means that your data are typically organized into the fields and records of a relational database
privacy
the ability of an individual to keep personal information out of public view
file synchronization services
offer a cloud-based service where automated file transfers are made to update files from a sharing directory on each user's networked device
tableau
one of the main tools for data output. produces interactive data visualization products focused on business intelligence
anonymous
one's personal identity is not know
forums and blogs
online forms allow users to correspond with others in a community forum available for all registered users to read. Blog sites are a bit more focused than forums
memory management
operating systems coordinate a computer's memory, which includes cache, random access memory (RAM), registers, and virtual memory
Bus Topology
or linear bus is a network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints
search engine marketing
paid advertisements and organic search results that appear on a search engine results page
Cyber Security
permissions are essential to research and grant a specific access and grant a specific access to files or folders
web developer
prepare, plan, and implement web-based software applications
production
prepares goods and services to be sold in the most efficient and cost effective way
research and development
presents a creative and systematic approach to evolve a business's original idea and devise new ones
Computer programmer (codes)
produce both system and application software by writing lines of programming instructions for a computer to follow
malware
programs specifically intended to penetrate or damage a computer system without the end user's knowledge
Adware (advertising-supported software)
programs that automatically display or download advertising to a computer
Default-Delay firewall rule
the only network connections that are permitted are the ones that have been explicitly allowed
ethernet card
provides the computer with a unique 48-bit address called a MAC (media access control) address. no two ethernet cards have the same address
veracity
quality of data
Communications software
real-time or offline communications are valuable to a business in communicating with both employees and other people and businesses
internet fraud
refers to any fraudulent activity in an online setting. can occur through email systems, message boards, chat rooms, or websites
Longevity of a password
require a network user to change it on a regular basis for security reasons
applied research
research that id focused on developing a commercial product or process to meet customer or industry requirements and needs
structured data
resides in fixed formats. This data is typically well labeled and often with traditional fields and records of common data tables.
information security analyst
responsible for protecting all sensitive information within an organization
computer systems administrator
responsible for setting up larger computer assets like network servers and maintaining them for smooth, error-free operation
media access control (MAC)
responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel
purchase scam
scammers use a fake credit card when ordering online and then after the package is shipped they cancel the card and the company loses the money for the order
radio frequency identification (RFID)
small tags used to label products for identification and have the product's information transmitted through radio waves
microcomputers
smaller than mainframes and midrange computers and are so common that they are most commonly referred to as computers and sometimes referred as boxes
social news
social news sites allow a user to post links and other information regarding any topic, usually controlled by a forum
social reviews
social review sites are designed to provide members with information about locations and experiences. Businesses monitor these social review sites to ensure that their products and services are meeting the needs of the customers, and they will respond quickly if negative reviews are posted
network operating system
software that controls an entire network managing files, administering certain functions like backup, and maintaining network security
system software
software that runs in the background and requires very little or no user intervention
variety
sometimes it is structured and sometimes it is unstructured, data is valuable/ not valuable, form of data
scrubbing the data
sorting through structured, unstructured, and semistructured data to normalize them into a data warehouse and arrive at a structure to make sure they are usable
velocity
speed the data is created
file management
storing and organizing files in the memory of a computer
business intelligence
strategies and technologies used by enterprises for the data analysis of business information
Function-specific software
tailored to either an industry or a certain group of people trained in a specific technical area, or it is designed to be part of a business's offering to its customers
value-added
the added value of a product or service over the cost of products and services used to produce it from the previous stage of production
volume
the amount of data that we collect from all the different sources that we've collected over time
processes
the applications that a business uses in its daily operations
cellular network
the cellular network is usually the network over which phone calls are made. This connection is between the cell phone and the towers that support the antennas for the chosen cellular network. The "bars" shown on your phone indicate the strength of the cellular network for making and receiving calls
computer systems analyst
the conduit between IT and the rest of the organization
extract
the data are often extracted from customer relationship management (CRM) or enterprise resource planning (ERP) systems
load
the data is transferred into the data warehouse or data mart
data mining
the examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships
development research
the findings of the research are utilized for the production of products, including the results of the simulations run using IT to develop material requirements and methodologies of production
structured query language (SQL)
the most widely used standard computer language for relational databases, as it allows a programmer to manipulate and query data
schema
the organization or layout of a database that defines the tables, fields and constraints, keys, and integrity of the database. it is the reference or blueprint of the database
Computer Hardware
the physical equipment used for input, processing, and output activities in an information system (desktop, handheld devices, mainframe, motherboard, CPU chip, RAM memory)
software
the programs and other operating information used by a computer (operating system, application software, database software, presentation software)
Ring Topology
the ring shaped created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other
Star Topology
the star shaped created by network nodes that radiate around a central node in a spoke-like fashion
Graphical User Interface (GUI)
the visual system of a computer screen designs that allow a user to interact with an electronic device
internet
the world's largest network and connects thousands of other networks together including LANs, CANs, MANs, and WANs. the interconnection of public, private, commercial, industrial, and governmental networks
topic analytics
tries to catalog phrases of an organization's customer feedback into relevant topics
computer network
two or more computers connected together to communicate and share resources (computer files, folders, software, and peripheral hardware like printers, scanners, and webcams)
unstructured data
unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional data tables
port
used to contain and delay structural fire from spreading to contiguous buildings
hadoop
uses a distributed file system that allows files to be stored on multiple services. allows for one query to be issued that searches through multiple servers
databases
well-thought-out collections of computers files, the most important of which are called tables
multitasking
when a computer runs more than one process at a time
data mining
when experts extract useful data and information from recorded data, like a cookie
peer-to-peer
when two computers that are networked together share files between themselves
tracking cookies
when you return to the same website you gave your information to and it remembers you
trademark
words, designs, and so forth that identify a source of a product