D075 Information Technology Management Essentials

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

primary key

a field in a database table that uniquely identifies a record in a table

dropbox

a file hosting service that provides cloud storage, file synchronization, business cloud, and client-side software

Cloud Service Provider (CSP)

A company that provides cloud computing services.

spyware

A computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent

identity theft

A crime concerning the unlawful practice of assuming another individual's identity.

network administrator

A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization's needs.

intranet

A private version of the Internet that works the same way, but it is confined within an organization.

Disk Management

An OS is responsible for reading and writing data and information to a disk, typically a hard drive, solid-state drive (SSD), or main memory

proxy server

Any communications in or out of an intranet pass through a special security computer called ____________ as a precaution to protect from any external threats.

process

any task a computer performs

clients

Computers, such as users' personal computers, that use any of the services provided by servers.

physical cable system

Connects networks together

strong password

Contains a specific amount of characters with mixed cases and often requires letters and numbers

data

Facts and statistics collected together for reference or analysis (can be used for trend analysis, projections of sales revenue, other applications of viewing and massaging the data)

end user

The person or group who will use the hardware, software, networks, and databases in their performance of their daily work

disk storage

Non-volatile, secondary storage that is recorded to a physical device like a hard drive or optical disk with a read/write apparatus.

Chief Information Officer (CIO)

Oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives. normally reports to the chief operations officer or chief executive officer

IT manager

Oversees staff, communicate with upper management, understands both sides, hires and fires.

Chief Technology Officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT

Hacker/Hacktivist

Someone who attempts to invade or disable a computer's security measures and then to steal the computer resources at their leisure.

twisted pair

Specialized wire that cancels out electromagnetic interference from other electronic devices and increases reliability.

slack

a cloud-based set of collaboration tools and services

thread

The first post to a discussion board is typically a comment that starts a _____________.

topology

The mapping of a physical network and logical interconnections between nodes

Chief Information Security Officer (CISO)

The title of the person who manages security for the organization's information systems and information.

data analysis

applying statistics and logic techniques to define, illustrate, and evaluate data

project management software

a collaborative tool that provides a road map for organizing and managing resources to schedule a project from start to finish

operating software (platform)

a collection of computer programs that work together to manage hardware and software to ensure that they are working properly

Reverse Phishing/Keylogging

When a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard.

Wi-Fi

Wi-Fi on the mobile device provides the same connectivity to the internet over wireless connection that a PC receives when connected to a network

network interface controller (NIC)

a card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers

network hub

a central location of the computer network that serves as a traffic cop for network connection and communication

Firewalls

a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet

search engine optimization (SEO)

a component of search engine marketing. organic results and not paid advertisements

optical disk

a computer disk that uses optical storage techniques and technology to read and write data

Metropolitan Area Network (MAN)

a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city

Campus Area Network (CAN)

a computer network that connects two or more LANs that are located on a campus, like a university, an organization's national headquarters, or even an industrial complex

Local Area Network (LAN)

a computer network that is relatively small, typically in a single building, but sometimes as small as a single room

server

a computer or computer program that manages access to a centralized resource or service in a network.

phishing

a criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details by masquerading as a legitimate business organization, typically in a legitimate-looking email

copyright

a definitive right given to the owner of an original work. (drawing, painting, novel, song, poem, computer program)

FERPA - Family Educational Rights and Privacy Act

a federal law that protects the rights of students' educational records. Information about grades, attendance, disciplinary records, report cards, transcripts, and so forth cannot be given to anyone not specifically listed on a FERPA form that is signed when a student enters a school

HIPAA - Health Insurance Portability and Accountability Act

a federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPPA form is signed each time you visit a new doctor so they can understand who they can share that information with

foreign key

a field in a database table that provides a link between two tables in a relational database

spreadsheets

a file that consists of rows and columns of data that can be manipulated and analyzed for business purposes

Gantt chart

a graphical map that Microsoft Project outputs. looks similar to a road map to keep a project on time and on track

cache

a hardware or software component that stores data so that future requests for that data can be served faster

Passphrase

a memorable strong password

point of failure (POF)

a part of a system that, if it fails, will stop the entire system from working

System Development Life Cycle (SDLC)

a process for creating and altering computer applications through step-by-step approach that includes planning, system analysis, design, implication, and system maintenance

Trojan horses

a program that often seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system.

basic research

a review of the subject and what has been completed in the world of business to determine whether any of it has a commercial application for the business

default-allow firewall rule

a rule that all traffic is allowed unless is has been specifically blocked

passwords

a secret word or combination of keyboard characters typed in by a user to authenticate one's identity for joining a computer network

Unified Modeling Language (UML)

a set of graphical notation techniques to create computer models and application

Transmission Control Protocol/Internet Protocol (TCP/IP)

a set of protocols used to connect a network to the internet (most common network protocol)

network protocol

a set of rules a network must follow/ a convention or standard that controls or allows communication and data transfer between two computers

social networking

a social networking site allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands

protocol

a standard language that devices connected to a network use to communicate and transfer data

solid-state drive

a storage device that typically uses flash memory to store data, instructions, and information

file allocation table (FAT)

a table of contents that directs the read/write arm of the hard drive to the location where data exists and accesses the data upon the user's request

RAM

a type of memory that allows data to be accessed in any other without physical movement of the silicone media (primary storage)

data management processes

acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business

discussion board

allows a virtual community of users to post electronica messages to a web page

online application software

allows for two or more users to access the same browser-based spreadsheet, word processor, or presentation software and share its data and information

Sarbanes-Oxley Act of 2002

an accounting industry act passed by the federal government to oversee the accounting practices of a business and industry. In addition, it bans company loans to executives and job protection to whistleblowers

database management system software (DBMS)

an application software that is used to create a collection of related files that consist of records of data separated by fields that can be queried to produce populations of information

word processing software

an application software used to create, compose, edit, format, and print documents (Microsoft Word, Adobe Acrobat)

denial-of-service attack

an attempt to make a computer or any of its resources unavailable to its intended users

click fraud

an internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee

business analytics

attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage

predictive analytics

attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations between one thing and any other things that pertain to it

bookmarking sites

bookmarking sites allow a user to save locations or items from the internet and organize them for future reference

decision analytics

builds on predictive analytics to make decisions about future industries and marketplaces. looks at an organization's internal data, analyzes external conditions like supply abundance, and then endorses the best course of actions

bluetooth network

built into mobile phones so they can communicate with other devices within approximately 30 feet. The network communicates by sending and receiving radio waves communicating with the bluetooth adapter in the device

Database Administrator (DBA)

categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business

knowledge management systems (KMS)

collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer

network

communication links that allow the computer systems to communicate with each other no matter the distance/location (routers, switches)

computer viruses/ metamorphic viruses

computer files that reproduce by making copies of themselves within a computer's memory or storage network

servers

computer networks are made up of central computers or hubs

Wide Area Network (WAN)

computer networks that encompass a wide geographical are and connect LANs, CANs, and MANs together

peer-to-peer network (P2P)

computer networks that generally connect computers directly to one another without the use of a server

application software

computer software created to allow the user to perform a specific job or task (will not work without system software)

computer security

concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system

file sharing systems

consists of either public or private access to corporate data located on a network

Database Management System (DBMS)

data are stored in computer files called tables, and tables are connected to other tables with related information

semi-structured data

data that can be converted into structured data, but not without a lot of work

big data

data that is collected from all over the internet, including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources

IT architects

design parts of computer applications like screen interfaces, middleware, and programming infrastructure that comply with the head applications developer's design principles

patents

established to encourage innovation and technological advances and protect the rights of the inventor. Patents protect new products, upgrades to existing products, and some functional aspects of computer software, such as a new algorithm for computation

node

every device connected to a network

data mapping

extra notes about the definition of a field, its data, and its use

ETL

extract, transform, and load: tools that are used to standardize data across systems and allow the data to be queried

unsecured computer

extremely easy to breach, especially by a seasoned hacker

spamming/ junk mail

the abuse of an email system to arbitrarily send millions of unsolicited bulk messages. These messages range from advertising and chain letters, to criminal schemes.

GPS

global positioning systems are designed to receive signals from an app on a phone and geostationary satellites so that a precise location can be determined. This is done by receiving multiple signals from the satellites and analyzing the data to determine the phone's coordinates on Earth

tables

hold the data for the database. consists of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information

text analytics (text mining)

hunts through unstructured text data to look for useful patterns such as whether their customers on Facebook or Instagram are unsatisfied with the organization's products or services

antivirus software

includes computer programs that attempt to identify, prevent and eliminate computer viruses and malware, typically before they reach a computing system or network

risk management

includes the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them

decision support system

information systems that are interactive software-based systems designed to assist decision makers in compiling useful information from business data and business models to make larger business decisions

customer resource management (CRM)

information systems that manage the information on a company's customers, including all interactions with each customer

trade secret

information that is private or not known outside the company and if disclosed would cause harm or loss to the competitors

computer support specialist

install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly

network operating system (NOS)

installed on servers to make sure the computer network runs smoothly and also to support application software like Microsoft Excel

master of data management

known as the methodology or process used to define, organize, and manage all data of an organization that provides a reference for decision-making

on-demand cloud computing (ODC)

less expensive than performing these activities in-house. can reduce employee headcount, reduce capital costs for expensive

minicomputers

less powerful and smaller in physical size than mainframe computers

presentation software

like Microsoft PowerPoint is used to present information in a slideshow format

worms

like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread

data governance

managing the availability, integrity, and security of the data to ensure that the data remain high quality and valid for data analytics

mainframe computer

massive, room-sized computers that process and store enormous amount of bulk data and information

data management and return on investment (ROI)

measures the gain or loss generated by intelligent data management relative to the amount of money invested

media sharing

media sharing websites are very familiar, as they provide a foundation for sharing both video and still images. These websites encourage users to add content to initiate conversations and can also denote the popularity of the uploaded content

microblogging

microblogging supports short written entries, which are posted on what are called "walls" to anyone who has subscribed to the account

transform

normalizing data means that your data are typically organized into the fields and records of a relational database

privacy

the ability of an individual to keep personal information out of public view

file synchronization services

offer a cloud-based service where automated file transfers are made to update files from a sharing directory on each user's networked device

tableau

one of the main tools for data output. produces interactive data visualization products focused on business intelligence

anonymous

one's personal identity is not know

forums and blogs

online forms allow users to correspond with others in a community forum available for all registered users to read. Blog sites are a bit more focused than forums

memory management

operating systems coordinate a computer's memory, which includes cache, random access memory (RAM), registers, and virtual memory

Bus Topology

or linear bus is a network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints

search engine marketing

paid advertisements and organic search results that appear on a search engine results page

Cyber Security

permissions are essential to research and grant a specific access and grant a specific access to files or folders

web developer

prepare, plan, and implement web-based software applications

production

prepares goods and services to be sold in the most efficient and cost effective way

research and development

presents a creative and systematic approach to evolve a business's original idea and devise new ones

Computer programmer (codes)

produce both system and application software by writing lines of programming instructions for a computer to follow

malware

programs specifically intended to penetrate or damage a computer system without the end user's knowledge

Adware (advertising-supported software)

programs that automatically display or download advertising to a computer

Default-Delay firewall rule

the only network connections that are permitted are the ones that have been explicitly allowed

ethernet card

provides the computer with a unique 48-bit address called a MAC (media access control) address. no two ethernet cards have the same address

veracity

quality of data

Communications software

real-time or offline communications are valuable to a business in communicating with both employees and other people and businesses

internet fraud

refers to any fraudulent activity in an online setting. can occur through email systems, message boards, chat rooms, or websites

Longevity of a password

require a network user to change it on a regular basis for security reasons

applied research

research that id focused on developing a commercial product or process to meet customer or industry requirements and needs

structured data

resides in fixed formats. This data is typically well labeled and often with traditional fields and records of common data tables.

information security analyst

responsible for protecting all sensitive information within an organization

computer systems administrator

responsible for setting up larger computer assets like network servers and maintaining them for smooth, error-free operation

media access control (MAC)

responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel

purchase scam

scammers use a fake credit card when ordering online and then after the package is shipped they cancel the card and the company loses the money for the order

radio frequency identification (RFID)

small tags used to label products for identification and have the product's information transmitted through radio waves

microcomputers

smaller than mainframes and midrange computers and are so common that they are most commonly referred to as computers and sometimes referred as boxes

social news

social news sites allow a user to post links and other information regarding any topic, usually controlled by a forum

social reviews

social review sites are designed to provide members with information about locations and experiences. Businesses monitor these social review sites to ensure that their products and services are meeting the needs of the customers, and they will respond quickly if negative reviews are posted

network operating system

software that controls an entire network managing files, administering certain functions like backup, and maintaining network security

system software

software that runs in the background and requires very little or no user intervention

variety

sometimes it is structured and sometimes it is unstructured, data is valuable/ not valuable, form of data

scrubbing the data

sorting through structured, unstructured, and semistructured data to normalize them into a data warehouse and arrive at a structure to make sure they are usable

velocity

speed the data is created

file management

storing and organizing files in the memory of a computer

business intelligence

strategies and technologies used by enterprises for the data analysis of business information

Function-specific software

tailored to either an industry or a certain group of people trained in a specific technical area, or it is designed to be part of a business's offering to its customers

value-added

the added value of a product or service over the cost of products and services used to produce it from the previous stage of production

volume

the amount of data that we collect from all the different sources that we've collected over time

processes

the applications that a business uses in its daily operations

cellular network

the cellular network is usually the network over which phone calls are made. This connection is between the cell phone and the towers that support the antennas for the chosen cellular network. The "bars" shown on your phone indicate the strength of the cellular network for making and receiving calls

computer systems analyst

the conduit between IT and the rest of the organization

extract

the data are often extracted from customer relationship management (CRM) or enterprise resource planning (ERP) systems

load

the data is transferred into the data warehouse or data mart

data mining

the examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships

development research

the findings of the research are utilized for the production of products, including the results of the simulations run using IT to develop material requirements and methodologies of production

structured query language (SQL)

the most widely used standard computer language for relational databases, as it allows a programmer to manipulate and query data

schema

the organization or layout of a database that defines the tables, fields and constraints, keys, and integrity of the database. it is the reference or blueprint of the database

Computer Hardware

the physical equipment used for input, processing, and output activities in an information system (desktop, handheld devices, mainframe, motherboard, CPU chip, RAM memory)

software

the programs and other operating information used by a computer (operating system, application software, database software, presentation software)

Ring Topology

the ring shaped created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other

Star Topology

the star shaped created by network nodes that radiate around a central node in a spoke-like fashion

Graphical User Interface (GUI)

the visual system of a computer screen designs that allow a user to interact with an electronic device

internet

the world's largest network and connects thousands of other networks together including LANs, CANs, MANs, and WANs. the interconnection of public, private, commercial, industrial, and governmental networks

topic analytics

tries to catalog phrases of an organization's customer feedback into relevant topics

computer network

two or more computers connected together to communicate and share resources (computer files, folders, software, and peripheral hardware like printers, scanners, and webcams)

unstructured data

unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional data tables

port

used to contain and delay structural fire from spreading to contiguous buildings

hadoop

uses a distributed file system that allows files to be stored on multiple services. allows for one query to be issued that searches through multiple servers

databases

well-thought-out collections of computers files, the most important of which are called tables

multitasking

when a computer runs more than one process at a time

data mining

when experts extract useful data and information from recorded data, like a cookie

peer-to-peer

when two computers that are networked together share files between themselves

tracking cookies

when you return to the same website you gave your information to and it remembers you

trademark

words, designs, and so forth that identify a source of a product


Ensembles d'études connexes

Becoming a master student Chapter 6

View Set

Reproductive System Study Module

View Set

Federal Tax considerations for Life and Annuities

View Set

Rational Equations Assignment Answers

View Set

Chapter 27: Antitrust Law (quiz 97.5/100)

View Set