Introduction to IT - D322
What are the parts of a URL ?
(Protocol/Domain Name/Resource ID)
Module 7: The History of the Computer.
1st Generation of Computers Vacuum tubes, relay switches, the need to program in machine language 2nd Generation of Computers Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers 3rd Generation of Computers Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals 4th Generation of Computers Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use
What is a Program vs. a Script?
A "program" in general, is a sequence of instructions written so that a computer can perform certain task. A "script" is code written in a scripting language. A scripting language is nothing but a type of programming language in which we can write code to control another software application.
What is a Network?
A collection of computers and resources connected by various media so that they can communicate with each other.
What is the purpose of a Data Warehouse?
A data warehouse is a central repository of information that can be analyzed to make more informed decisions. Data flows into a data warehouse from transactional systems, relational databases, and other sources, typically on a regular cadence.
What is a Full Backup vs. an Incremental Backup?
A full backup is a total copy of your organization's entire data assets, which backs up all of your files into a single version. An incremental backup covers all files that have changed since the last backup was made, regardless of backup type.
What is addressed during the development of the BCP?
A good BCP should detail what your staff needs to do in the event of a disaster, what communication methods are required, and the timeframe in which critical IT services need to be available.
What is a Patent vs. a Copyright?
A patent gives the INVENTOR of the new product the right to produce and sell it A copyright is a LICENSE that means you have the right to sell and copy your own work
Why use Protocols?
A protocol creates a structure that makes it safe to ask challenging questions of each other; it also ensures that there is some equity and parity in terms of how each person's issue is attended to.
What is a Router vs. a Switch?
A router's main objective is to establish a connection between various networks in a simultaneous manner. Also, it works on the network layer. A switch's main objective is to establish a simultaneous connection among various devices. It basically functions on the data link layer.
What is the purpose of offsite storage?
A secure location for storing backup media
What is the purpose of SELECT, FROM, WHERE (SQL keywords)?
A select query helps you retrieve only the data that you want, and also helps you combine data from several data sources. The WHERE clause is used to constrain which rows to retrieve . FROM The keyword is used to indicate the table from which the data is selected or deleted.
What is a Wireless Access Point (WAP)?
A switch that allows devices to connect wireless
What is the difference between a threat and a vulnerability?
A threat and a vulnerability are not one and the same. A threat is a person or event that has the potential for impacting a valuable resource in a negative manner. A vulnerability is that quality of a resource or its environment that allows the threat to be realized. An armed bank robber is an example of a threat.
Define scope creep.
Adding to the scope of the project; can impact the allocation of resources.
What is an Algorithm?
Algorithms A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process
What are Virtual Machines?
Allows access to multiple machines without having to purchase multiple computers. Also allows user to run software for a computer that normally would not be able to run that software.
What is the purpose of the BIOS?
BIOS stands for Basic Input Output System;Typically stored in ROM chip on the motherboard.Is software not hardware, ("basic" operating system that runs when the computer is first turned on).Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk.Can't choose the amount or contents.
What is Peer-to-Peer (P2P) networking?
In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data.
Why use Resource IDs in URLs?
Indicates the name of the file you are accessing, or the location of the document on the server
What is Shell vs. Kernel vs. Device Drivers?
Kernel Core components of the OS that is loaded when the computer is first booted. Device Drivers Provide specific interfaces between the OS running a computer and hardware devices. Shell An interface for the user, often personalized for that given user, that provides access to the kernel.
Discuss the concept of mobile computing.
Mobile Computing is a technical field that covers the design, development and evaluation of mobile applications using appropriate solutions that meet user requirements. This includes learning the technology that is used to perform a wide variety of tasks on devices that are portable.
Identify the MVC model and its parts.
Model-View-Controller (MVC) A development technique used in the implementation of user interfaces The Model Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application The View The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model The Controller The part of an application that interacts with the user and passes the user requests to the model
What are the four parts of a computer?
Motherboard, cpu, Hard Drives and RAM
What is N-Tier Software Architecture (presentation vs. logic vs. data)?
N-tier Development Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects Presentation Tier Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures Logic Tier Tier that sits between the user interface and the data. Data Tier Tier where data is stored, retrieved and updated from database tables
What is OLTP vs. OLAP?
OLTP and OLAP: The two terms look similar but refer to different kinds of systems. Online transaction processing (OLTP) captures, stores, and processes data from transactions in real time. Online analytical processing (OLAP) uses complex queries to analyze aggregated historical data from OLTP systems.
Why use Packet Switching?
Packet switching is used to optimize the use of the channel capacity available in digital telecommunication networks, such as computer networks, and minimize the transmission latency (the time it takes for data to pass across the network), and to increase robustness of communication.
What is the purpose of a Packet?
Packets are the basic units of communication over a TCP/IP network. Devices on a TCP/IP network divide data into small pieces, allowing the network to accommodate various bandwidths, to allow for multiple routes to a destination, and to retransmit the pieces of data which are interrupted or lost
Describe System conversions: direct, parallel, pilot, or phased.
Parallel Conversion-Old and new systems are used simultaneously. Direct Cut over Conversion-New system is implemented and old system is replaced completely. Pilot Approach-Supports phased approach that gradually implement system across all users Phase-In Method-Working version of system implemented in one part of organization based on feedback, it is installed throughout the organization all alone or stage by stage.
Define project initiation, risk and business impact analysis, risk mitigation, and control.
Project Initiation Problem definition, resource allocation, risk assessment A risk assessment is a process to identify potential hazards and analyze what could happen if a hazard occurs. A business impact analysis (BIA) predicts the consequences of disruption of a business function and process and gathers information needed to develop recovery strategies. that control actions are specific actions to reduce a risk event's probability of happening. Whereas defining a mitigation action reduces the impact of a Risk Event.
Describe the characteristics of a project and identify its phases.
Project Initiation Problem definition, resource allocation, risk assessment Project Planning Organize activities, time estimation, cost estimation Project Executing and Controlling Reports Variance reports, Status reports, Resource Allocation reports Scope Creep Adding to the scope of the project; can impact the allocation of resources. Unnecessary Requirements Requirements that are not actually needed but are "nice to have"
What is the purpose of a hard drive?
Provide Permanent storage that is used to hold data and programs
What are the types of Servers: Proxy vs. Web vs. Database vs. FTP vs. File vs. Email Servers?
Proxy Server Acts as a giant cache of web pages that anyone in the organization has recently retrieved; can be used to block access to certain web pages Web Server Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet. Database Server Responds to queries by pulling from the database.Typically only to local clients.
What is the difference between private vs. confidential vs. sensitive, and public?
Public - available through public sources; includes names and addresses Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses Private - information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential - information that an organization will keep secret; includes patentable information and business plans
What are the types of Memory (RAM/ROM) - volatile vs. nonvolatile?
RAM, which stands for random access memory, and ROM, which stands for read-only memory, are both present in your computer. RAM is volatile memory that temporarily stores the files you are working on. ROM is non-volatile memory that permanently stores instructions for your computer. Volatile memory is the type of memory in which data is lost as it is powered-off. Non-volatile memory is the type of memory in which data remains stored even if it is powered-off.
Describe the four common network topologies: bus, star, mesh, and ring (Know pros/cons of each.)
Bus Network Devices connected along a single cable. Size of network is restricted. Star Network Each device is connected to a central devices such as a hub or switch. Ring Network Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached. Mesh Network Every device is connected directly to every other device in the network.
What is the purpose of BI (business intelligence), and what is a BI system?
Business intelligence (BI) refers to the procedural and technical infrastructure that collects, stores, and analyzes the data produced by a company's activities. BI is a broad term that encompasses data mining, process analysis, performance benchmarking, and descriptive analytics.
Identify the ingredients of a computer system.
CPU, Memory and Storage, Peripheral Devices
Why use a Server?
Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network
What is CIA and why is it important?
Confidentiality, Integrity, and Availability (CIA) of data and services The CIA framework serves to outline the goals and objectives of the security program and helps organizations defend against threats
What is Packet vs. Router Switching?
Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic
What is Client/Server technology?
Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers
What are Image Backups vs. Backup Media?
Create a copy of everything that is on a hard drive Image-based backup provides faster recovery times that protect the organization from the costs and consequences of downtime and data loss; they allow IT administrators to recover individual files or entire servers (including applications and operating systems) to new or dissimilar hardware, including bare metal.
Why use a Domain Name Server?
DNS translates domain names to IP addresses so
Explain the concepts of data backup.
Data backup is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action. Data is the lifeblood of modern organizations, and losing data can cause massive damage and disrupt business operations.
What are Data Packets? Why are they important?
Data packets are units of information collected into one set for transmission through the Internet. Any bit of data that needs to be sent from one system to another must first be broken into smaller pieces to ease communication. Upon reaching the endpoint, these pieces get reassembled to become readable. Packets are used for efficient and reliable transmission of data. Instead of transferring a huge file as a single data block, sending it in smaller packets improves transmission rates. Packets also enable multiple computers to share the same connection.
What is Information Systems vs. Information Technology?
The difference between information systems and information technology is that information system incorporates the technology, people, and processes involved with information. Information technology is the design and implementation of information, or data, within the information system.
What is the purpose of a motherboard?
The main circuit board of a computer; it holds and allows communication between many electronic system components, such as the CPU and memory, and provides connectors for other peripherals.
What is the purpose of Expansion Slots vs. Motherboard Components?
The purpose of adding an expansion card or board to a computer's motherboard is to add or expand some sort of functionality to the computer that it did not have before. Expansion cards are a way to upgrade a computer. The motherboard provides basic functionality but the expansion card offers additional or enhanced ports.
Why use IP Addresses?
The purpose of an IP address is to handle the connection between devices that send and receive information across a network.
What is the purpose of the analysis phase of the SDLC? a. Determine end-user requirements. b. Develop logical modules-steps needed to meet the end-user requirement.
The purpose of the Requirements Analysis Phase is to transform the needs and high-level requirements specified in earlier phases into unambiguous (measurable and testable), traceable, complete, consistent, and stakeholder-approved requirements.
What is the purpose of the preliminary investigation phase of the SDLC? a. Discover problem/opportunity.
The purpose of the preliminary investigation is to determine whether the problem or deficiency in the current system really exists. The project team may reexamine some of the feasibility aspects of the project. At this point, the purpose is to make a "go" or "no-go" decision.
What is Hardware vs. Software?
When it comes to computers, the hardware is the physical and tangible part, like the monitor, keyboard, and speakers. Software is the programs and operating systems that need to be installed.
What is a Hot site vs. a Cold site (Off-site storage)?
While a hot site is a copy of a data center with all of your hardware and software running concurrently with your primary site, a cold site is stripped down -- no server hardware, no software, nothing.
What is the purpose of I/O Subsystems?
The I/O (Input/output) subsystem of a computer provides communication between the central system and the outside environment. It handles all the input- output operations of the computer system. Peripheral Devices. Input or output devices that are connected to computer are called peripheral devices.
Explain the concept of data mirroring.
The OS writes data (and changes to data) to multiple hard drives at the same time.
What is the purpose of the Waterfall in SDLC?
The Waterfall framework was designed to enable a structured and deliberate process for developing high quality information systems within project scope.
Explain key components of BCP.
The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.
What are End-Users?
the person who actually uses a particular product.
What is Binary vs. Octal vs. Hexadecimal?
Decimal Uses base 10 to represent numbers (0 - 9) Binary Uses base 2 system (0 and 1) Byte 8 bits; a single character of text in a computer Octal Every value is represented with some combination of 8 digits (0 - 7) Hexadecimal Uses a base 16
Why use Domain Names?
Domain Names are used for different purposes, including application-specific naming, addressing, and in various networking contexts to establish: - Simple identification of hostnames and hosts. Hostnames appear as an element in Uniform Resource Locators (URLs) for Internet resources, such as web sites.
What is Extract, Transform, Load (ETL)?
ETL, which stands for extract, transform and load, is a data integration process that combines data from multiple data sources into a single, consistent data store that is loaded into a data warehouse or other target system. Extraction: data from various source systems is extracted which can be in various formats like relational databases, No SQL, XML, and flat files into the staging area. It is important to extract the data from various source systems and store it into the staging area first and not directly into the data warehouse because the extracted data is in various formats and can be corrupted also. Transformation: a set of rules or functions are applied on the extracted data to convert it into a single standard format. It may involve following processes/tasks: Filtering - loading only certain attributes into the data warehouse. Cleaning - filling up the NULL values with some default values, mapping . Joining - joining multiple attributes into one. Splitting - splitting a single attribute into multiple attributes. Sorting - sorting tuples on the basis of some attribute (generally key-attribute). Loading: the transformed data is finally loaded into the data warehouse. Sometimes the data is updated by loading into the data warehouse very frequently and sometimes it is done after longer but regular intervals. The rate and period of loading solely depends on the requirements and varies from system to system.
What is the purpose of a CPU?
Executes programs' instructions and commands various components in the computer. Referred to as the "chip".
What step follows the inventory of critical activities?
Step 1: Specify Each Activity Step 2: Establish Dependencies (Activity Sequence) Step 3: Draw the Network Diagram Step 4: Estimate Activity Completion Time Step 5: Identify the Critical Path Step 6: Update the Critical Path Diagram to Show Progress
What are Database types (flat files vs. hierarchical vs. relational)?
Flat File Database One large single table; used if the amount of data that is being recorded is fairly minimal Relational Database Has multiple tables (relations) with interrelated fields; most common structure for databases Hierarchical Database Organizes data using a tree like or organizational chart type structure
What is the role/purpose of a Database Administrator?
Focuses on the design, development, and support of database management systems (DBMSs).
What is IPSO - Input, Process, Output, Storage?
Input: Raw data is entered by the user. Processing: Raw data is organized or structured for usefulness. Output: Information is output so user can see results. Storage: Processed information is stored for permanent record.
What is the role/purpose of a Web Administrator?
Installs, configures, maintains, secures, and troubleshoots web severs.
What is a Compiler vs. an Interpreter?
Interpreter translates just one statement of the program at a time into machine code. Compiler scans the entire program and translates the whole of it into machine code at once.
What is a Local vs. a Remote network?
Local files reside on your system, while remote files reside on a file server or at another node with which you communicate using a physical network, for example, Ethernet, token-ring, or phone lines.
What is Machine Language?
Machine/Low-level Language Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time
What is the role/purpose of a System Administrator?
Maintains all aspects of the system including hardware, software, and programming.
What is the purpose of the maintenance phase of the SDLC? a. Monitor for bugs. b. Make corrections.
Maintenance of software can include software upgrades, repairs, and fixes of the software if it breaks.
What is Real-Time vs. Event vs. Batch processing?
Real-time data integration is the idea of processing information the moment it's obtained. In contrast, batch data-based integration involves storing all the data received until a certain amount is collected and then processed as a batch. In batch data upkeep, syncs are run on a schedule to keep a resulting dataset up to date. Event-driven systems maintain a stream of events that occur over time.
What is Batch vs. Online vs. Real-Time processing?
Real-time processing is similar to Online processing in the sense that the computer system automatically updates it's data as changes are made. The difference is that real-time processing often uses sensors rather than human input in order to obtain it's data. Real-time processing is used with control systems.
What are the characteristics of quality data?
Relevance - the data being used must apply directly to the decision being made Timely - data must be efficient and must be provided in a timely manner Thorough - the data must be complete Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible. Reliable - data should reflect stable and consistent data collection processes across collections points and over time
Why do organizations use resource allocation reports?
Resource Allocation Allocation reports will enable you to filter resources by skills and capacity so you can not only see who is available now but also when certain skills will be available in the future for better planning and fewer delays.
Review SQL wildcard characters such as *, %. Review SQL relational operators such as > (greater than), < (less than).
SQL Wildcard Characters A wildcard character is used to substitute one or more characters in a string. Wildcard characters are used with the LIKE operator. The LIKE operator is used in a WHERE clause to search for a specified pattern in a column. Wildcard Characters in MS Access * Represents zero or more characters bl* finds bl, black, blue, and blob ? Represents a single character h?t finds hot, hat, and hit [] Represents any single character within the brackets h[oa]t finds hot and hat, but not hit ! Represents any character not in the brackets h[!oa]t finds hit, but not hot and hat - Represents any single character within the specified range c[a-b]t finds cat and cbt # Represents any single numeric character 2#5 finds 205, 215, 225, 235, 245, 255, 265, 275, 285, and 295 Wildcard Characters in SQL Server Symbol Description Example % Represents zero or more characters bl% finds bl, black, blue, and blob _ Represents a single character h_t finds hot, hat, and hit [] Represents any single character within the brackets h[oa]t finds hot and hat, but not hit ^ Represents any character not in the brackets h[^oa]t finds hit, but not hot and hat - Represents any single character within the specified range c[a-b]t finds cat and cbt SQL Compound Operators Operator Description += Add equals -= Subtract equals *= Multiply equals /= Divide equals %= Modulo equals &= Bitwise AND equals ^-= Bitwise exclusive equals |*= Bitwise OR equals
What is SQL Injection vs. Buffer Overflow attacks?
SQL injection is a hacking method used to attack SQL databases, whereas buffer overflows can exist in many different types of applications. SQL injection and buffer overflows are similar exploits in that they're both usually delivered via a user input field.
What is a Software License vs. a Proprietary Software License?
Shareware Provides a trial version of the software. Proprietary Software Software purchased from a vendor; also known as commercial Freeware Usually software that has become obsolete; is free Public Domain Software that has been moved into the public domain; can be used however you feel
What are Social Engineering and Phishing attacks?
Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. phishing is Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information
What are Malware and DOS attacks?
Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. DOS One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business
What is a Trojan Horse vs. Spyware?
Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application
What is the purpose of RAM?
Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power). You can choose the amount of RAM your computer has.
Which administrator role/purpose is responsible for administering hardware within your work environment?
Systems administrators are also responsible for upgrading system components and installing and troubleshooting hardware and software. Also known as Sysadmins, Systems Administrators are also responsible for developing system security policies and procedures.
How does connectivity occur over the Internet or network?
TCP/IP (Transmission Control Protocol / Internet Protocol).
What is the Organization of data (database - table - record - field)?
Table is like a file where we can store similar or related data .However Unlikely a file the data stored in table is in the forms of vertical columns and horizontal rows. The term "fields" refers to columns, or vertical categories of data. The term "records" refers to rows, or horizontal groupings of unique field data .
What is Telnet and SSH (secure shell)?
Telnet is the standard TCP/IP protocol for virtual terminal service. It enables you to establish a connection to a remote system in such a manner that it appears as a local system. SSH or Secure Shell is a program to log into another computer over a network to execute commands in a remote machine.
What two factors of interest are determined after critical activities have been identified?
There are two ways you can now identify the critical path. You can eyeball your network diagram and simply identify the longest path throughout the network -- the longest sequence of activities on the path. Be sure to look for the longest path in terms of longest duration in days, not the path with the most boxes or nodes. You can also identify critical activities with the Forward Pass/Backward Pass technique, identifying the earliest start and finish times, and the latest start and finish times for each activity. If you have multiple critical paths, you will run into network sensitivity. A project schedule is considered sensitive if the critical path is likely to change once the project begins. The more critical paths in a project, the higher the probability of a change in schedule.
What is a DNS (Domain Name Server)?
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network.
What is the purpose of the logical design phase of the SDLC? What is the purpose of the implementation phase of the SDLC?
a. Develop flow chart, data flow diagrams.
When one user is accessing some data and others are shut out of accessing that data, this is a problem for?
availability
Why do organizations use variance reports?
variance reports are used to analyze the difference between budgets and actual performance. The variance report is also called, "budget variance" or simply "variance," depending on the financial outcomes you're comparing. "Variance" is the difference between the budgeted/baseline goal and the actual reality.
What is an Email vs. Web vs. Database Server?
web: Stores data files (web pages) and programs (scripts).Responds from anywhere on the Internet. data: Responds to queries by pulling from the database.Typically only to local clients. email: Two email servers communicate with each other
Identify four phases of a project.
initiation, planning, execution, and closure.
What is the role/purpose of a Network Administrator?
responsibility of working with routers and switches In charge of all aspects of the computer network
What is Data vs. Information?
data is basically a collection of unorganized characters that do not convey meaning. Information is data that is given context and meaning. Ex. Numbers are GPA. GPA coupled with name gives meaning.
What are Data Types (boolean, integer, string, date/time)?
integer: Integer values are written as a sequence of digits, possibly prefixed by a + or - sign. The integer values that can be specified range from -2147483648 to 2147483647. If used where a decimal value was expected, the integer values are automatically converted to decimal values. Date/time: A date and time format depending on the locale on your computer. Dates from January 1, 1583 and forward are supported. boolean: True and false. Booleans are used to represent true and false values returned by comparison operators and logical functions. string: String values are surrounded by double quotes or single quotes. Escaping is performed by entering the delimiter symbol twice in a row (i.e., '' or ""). A string value can contain any sequence of UNICODE characters.
Why is buffer overflow a problem? a. Interject malicious code - security concern.
malformed inputs or failure to allocate enough space for the buffer
Why do organizations use status reports?
objectives of status reports are to: Help the project management team keep track of costs, tasks and timelines. Compare the budget and time forecasts with the actual costs and task duration. Improve communications across the organization.
