Introduction to IT - C182 WGU, Introduction to IT - C182 WGU, WGU C182 Introduction to IT
What is OLAP?
*Online Analytical Processing* - describes the *functionality for spectral manipulation and analysis of huge volumes of complex data*
A proxy server is used in an organization to
A proxy server is used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.
Print Server
Monitors print jobs
Why did hardware become ubiquitous?
Because of the reduction in size, increase in capability, and reduction in prices most everyone was able to have a computer.
Server
Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network
CIA
Confidentiality Integrity Availability
CIA
Confidentiality, Integrity, Availability
How is data used?
Data can be organized, manipulated, filtered, sorted and used for computation.
Define data in relation to DIKW Hierarchy.
Data is the input directly received by the human or computer.
Data Validation
Ensuring that users enter the correct data type
Octal
Every value is represented with some combination of 8 digits (0 - 7)
When did the fourth generation of computers occur?
From early 1970's through today.
Language Translator Programs
Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer
What led to computer users learning computers with little or no training?
GUI (Graphical User Interface) operating systems.
What are the 3 primary roles of peripherals?
Input Output Storage
What is one problem regarding patenting software?
It is difficult for patent officials to determine whether a specific form of software is an actual invention or would be obvious to someone of ordinary skill in the field.
FTP Server
Like a web server in that it hosts files and allows clients to access those files.
The ___ model is one application where the various design logic (input, business and interface) are logically separated. This differs from the n-tier development model where each tier is a separate application.
MVC
What are typical N-tier development projects broken down into?
Presentation Tier Logic Tier Data Tier
Information
Processed data.
Difference between IT Professional and IT Specialist
Professional: Expected to understand theory, hardware/software components, and programming techniques; need less math than a computer scientist. Specialist: Have greater privileges with respect to the computer systems - have access to many resources; must become aware of the impacts that computers, and IT in general, have on society (jack of all trades).
Structured Programming
Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements
Implementation
Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users.
Multi-tier development
Separation of different aspect of a system, rather than have one program perform all aspects of a system.
4th Generation of Computers
Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use
What is horizontal software?
Software that can be used across all divisions within an organization. Productivity software is sometimes referred to as horizontal software.
OLTP
Online Transaction Processing
Boolean/Logical
True/False
Freeware
Usually software that has become obsolete; is free
Data tier
Where data are stored, retrieved, and updated from database tables. Also resides on the organization's servers and usually on a separate database server.
What are the two components of the domain name and what does it do?
The Host Name Top-Level Domain Name
IPOS
The Input-Procession-Output-Storage Cycle
Data mirroring
The OS writes data (and changes to data) to multiple hard drives at the same time.
Natasha prints out the quarterly report of sales figures. Which step of the N-tier development would this be?
The Presentation tier. This is where the user interacts with the computer and the icons needed to print a document.
Slicing
creates a subset of the data by reducing the data from multiple dimensions to one dimension.
Private
is information that could be a threat if disclosed to others such as social security and credit card numbers, or health and education information. This information is often protected from disclosure by federal legislation.
Rolling up
is similar to drilling up in that it summarizes data, but in doing so, it collapses the data from multiple items (possible over more than one dimension) into a single value.
IP Addresses
The address used to communicate on the internet, also called a URL (universal resource locator). IP address consists of four numbers, where each number is between 0 and 255. (ex: cnn.com is 157.166.226.26) IP addresses are between 4 and 32 bits in size
Software as a Service (SaaS)
delivers applications over the cloud using a pay-per-use revenue model. IE, you are leasing the software. Ex: Office 365
What is included in the OS kernel?
The components that handle process management, resource management, and memory management. Without these, you wouldn't be able to start a new program or have that program run efficiently.
Local Computer
The computer that the user is using; physically present with
User
Those who use a computer.
Domain Name Parts
Top level domain (TLD) name and Host name
Skills and duties of IT Personnel
- Troubleshooting problem solving - Knowledge of operating systems - System level programming - System security - Use, install and replace hardware
The Internet of Things (IoT)
refers to the myriad types of devices that can and will be connected to the Internet in the next few years.
Data Mart
the means by which users obtain data or information out of the data warehouse.
Computer Network Advantages
1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication
What are the detractors of a star network topology
1. Does require a dedicated device (switch, hub or server), making it more expensive than the bus topology. 2. If the hub is lost, all devices lose connectivity.
Strategic Risk Analysis
1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats
Primary Key
A field int he relations that contains a unique value
A file server is
A file server is in essence a computer with a large hard disk storing files that any or many users of the network may wish to access. The more complex file servers are used to not only store data files but also to store software to be run over the network.
Algorithms
A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process
Mesh Network topology
A fully connected network. Requires that every device have a point-to-point connection with every other device.
System Deployment
1. System Conversion 2. Final Documentation 3. End User Training
Hierarchical Databases
A hierarchical database format organizes data using a tree-like or organizational chart type structure. The main data points can have multiple sub-data points associated with them referred to as a parent-child model; however, the sub-data points can only have one main data point, i.e. the child can only have one parent.
What is a Join (database query)
A join withdraws information from multiple relations and joins them together to obtain multiple records from multiple relations.
A language translator is
A language translator is a program that takes one program, written in a high-level language, as input, and creates a machine language program as output. These high-level languages are also called programming languages, which are a vocabulary and set of rules for instructing a computer to perform certain tasks.
Packet Switched Network
A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic
What is a Graphical User Interface (GUI)
A method of human-computer interaction characterized by a graphical display, a mouse to move a pointer around the screen, and the ability to perform actions by pointing at objects on the screen and clicking a mouse button.
What do today's computers typically provide for storage size?
32 bits (4 bytes) and 64 bits (8 bytes).
What is a MAC address?
48 bit address used to identify networking cards and appliances
Define computer system (system for short).
A collection of components that work together to meet the needs of the user. These components are typically categorized as either hardware or software. In addition, networks and users are often considered to be part of a computer system.
Computer System
A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.
Network
A collection of computers and resources connected by various media so that they can communicate with each other.
What is a network?
A collection of computers and resources connected by various media so they can communicate with each other
What is an information system?
A collection of data and information used to support management of an organization. The technical components and human resources that enable the assembly, storage, and processing of data.
Information Systems
A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.
What is the world wide web
A collection of files, linked together by hyperlinks. These files are stored on servers, and these servers are among the various computers connected to the internet.
Data Warehouse
A collection of organized databases
Data Warehouse
A collection of organized databases.
Protocol Stack
A collection of protocols. TCP/IP is an example.
Network Hub
A device that connects multiple computers together. When there are multiple computers connected to a hub, a message received by the hub is forwarded to all ports on the hub. A destination address attached to the message indicates which computer the message is intended for, but it does not prevent other computers from picking up the message. A hub broadcasts the transmission, as it sends the data to every device on the network.
Router
A device that connects multiple networks together. Typically used in specific locations in a network so that messages can be routed to other networks. A router contains programmable routing tables and includes at least one input that comes from another network, differentiating itself from a switch and hub.
What is a projection (databases)
A type of query that returns all of the records from the relation, but only select attributes or fields. Ex: project the relation from a table to provide just the first and last names.
What is MySQL
A very popular, open source databases server. MySQL is actually an umbrella name for a number of different database products: - MySQL Community (database server) - Proxy server for a MySQL database - Cluster server for high-speed transactional database interaction - A tool to support a GUI construction.
Binary
A way of representing information using only two options. (0,1)
Queries can be used to do all of the following except: A. Determine whether data in relations is accurate B. Delete records of given characteristics C. Retrieve data from relations with specific characteristics D. Modify multiple records based on a given set of criteria
A. Determine whether data in relations is accurate. A query can only conduct searches for specific characteristics.
Character Representation
ASCII and Unicode
What are some System Administrator duties?
Account management: creating new user accounts and deleting obsolete user accounts. Password management: making sure that all users have passwords that agree with the security policy. File protection management: making sure that files are appropriately protected (for instance, making sure that important documents are not writable by the outside world) and performing timely backups of the file system Installing and configuring new hardware and troubleshooting hardware including the network. Installing and configuring new software including updating new operating system (OS) patches, and troubleshooting software. Providing documentation, support, and training for computer users. Performing system-level programming as necessary (usually through scripting languages rather than writing large-scale applications or systems software). Security: installing and maintaining a firewall, examining log files to see if there are any odd patterns of attempted logins, and examining suspicious processes that perhaps should not be running.
Proxy Server
Acts as a giant cache of web pages that anyone in the organization has recently retrieved
SQL Injection
An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database
E-mail Server
An e-mail server provides e-mail service. Its job is to accept e-mail requests from clients, send messages out to other e-mail servers, receive e-mails from other servers, and alert the user that e-mail has arrived.
Network administrators
Are responsible for the installation and maintenance of hardware and software that make up a computer network. Network administrators may also be required to secure the network; this task may be accomplished in conjunction with other IT personnel such as system administrators.
How have users progressed with technology?
As computers got simpler to use, and the advent of personal computers and GUI operating systems, users could learn to use computers with little to no training.
64-bit processor
A microprocessor with registers, address bus, and a data bus that hold 64 bits of data, in contrast to 32-bit processors that hold 32 bits of data
Network Switch
A more functional connection than a hub. It records and recognizes the local network addresses (MAC addresses) of all computers connected to the switch. A message is only passed along to the computer that matches the destination address. While a switch can be used to broadcast to all computers in a network, its purpose is to only send transmissions to a specific, intended computer.
Relational Database
A relational database is the most common structure for databases. A relational database has multiple tables (relations) with interrelated fields. When you perform a query in a relational database, data can be pulled from any number of relations that may be contained in multiple databases. Relational databases can also create new tables out of requested information in a query.
A projection is
A projection is another form of query that returns all of the records from the relation, but only select attributes or fields. Note: I've been a database programmer 20+ years and I've never heard of anyone refer to a projection query in the workplace. I'm sure this is technically correct, but the vast majority of queries you will perform in the real world will be "projection" queries since you will request specific fields instead of every field in most cases.
Projection
A query that returns all of the records from the relation, but only select attributes or fields
The Model (MVC)
A representation of an object or event in MVC. The model can take on different forms depending on the complexity of the application. Ex: In e-commerce, the model could be of a company's product. The product model could interact with the database containing information about "Products," (vender information, price information, quantity information, etc.) The model is used to retrieve information about the product, to add new Product information, or to update Product information.
Both coaxial cable and twisted wire transmit information using using _________ ______voltage (e.g. 10BASET uses +2.5V or -2.5V), whereas fiber optic cable uses _______ _________.
electromagnetic waves light pulses
Authenticity
ensures that the data, information, or resource is genuine. This allows a valid transaction to take place (whether in person or over the Internet). Authenticity is most commonly implemented by security certificates or other form of digital signature.
In the case of a ______ ________, the server's role is to send files over the network at the request of clients.
file server
Non-repudiation
is a legal obligation to follow through on a contract between two parties. In e-commerce, this would mean that the customer is obligated to pay for the transaction and the business is obligated to perform the service or provide the object purchased.
Computer support specialist
is somewhat of an umbrella term. Certainly, some of the roles of the support specialist could be a responsibility of a system administrator. The support specialist primarily operates as a trainer and troubleshooter. Training tasks may include the production of material such as technical manuals, documentation, and training scripts.
Project management
is the application of knowledge, skills and techniques to execute projects effectively and efficiently.
Dicing
is the same as slicing except that the result can be in multiple dimensions, but still obtaining a subset of the data.
WHERE
is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.
SELECT
is used to inform the DBMS what fields or attributes are of interest
FROM
is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.
In networks we define computers as being _______ or ________.
local remote
A ____ server functions by: one submits e-mail to the server to be sent to another e-mail server. The two e-mail servers communicate with each other, and once the e-mail is received at its destination, the recipient server informs the recipient user that new e-mail has arrived.
Drilling up and down
merely shifts the view of the data. Drilling down provides more detail and drilling up provides summarized data.
In a ____ network, every device is connected directly to every other device in the network.
mesh
What type of data is the following: - 4 - 4.2
Number integer: a whole number floating-point: a number with a decimal point (numeric data)
Floating-point
Number with a decimal point
Cloud Computing
Offers, as a service, the ability to offload computation and storage from your local computer
Relation
Often presented as a table
N-tier Development
Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects
Direct Conversion
Old system is turned off and the new system is turned on at a specific data and time
Project Closing
Once all deliverables have been met, a project is considered closed. In reality, though, organizations often build in a testing phase to gather data about aspects of a project that may need to be fine-tuned in the future.
Difference between information and data
Once data from sender is *verified and validated* by receiver, then it is considered information. Information can also be considered as processed, or interpreted, data: raw data is the input and information is the output of some process.
Flat File Database
One large single table; used if the amount of data that is being recorded is fairly minimal
Denial of Service (DOS)
One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business
OLAP
Online Analytical Processing. In OLAP data are processed through a suite of analysis software tools. You might think of OLAP as sitting on top of the data warehouse so that the user can retrieve data from the data warehouse and analyze the data without having to separate the database management system (DBMS) operations from the more advanced analysis operations. OLAP operations include slicing, dicing, drilling down (or up), rolling-up, and pivoting the data.
What is OLDP?
Online Data Processing - operates with data in real time, aka a "live" database. Used by systems that require data to be processed immediately in real-time. Ex: booking an airline ticket, playing World of Warcraft
ODBC
Open Database Connectivity
What is the most popular web server used today?
Open source Apache server. Aside from servicing requests, Apache can execute scripts to generate dynamic pages, use security mechanisms to ensure that requests are not forms of attacks, log requests so that analysts can find trends in the public's browser behavior of the website, and many other tasks.
Describe knowledge of OS's (IT Skill)
Operating system installation, application software installation, user account creation, system monitoring. Examples: versions of Windows, Mac OS, Linux, Unix, etc.
By the mid 1960's the resident monitor was being called an __________ ___________, a program that allowed a user to operate a computer.
Operating system.
Bus
Permits information to move between each component; electrical channels that enable communication among the electronic components
What are the levels that computer networks can be viewed at?
Physical - connections or physical media over which communication is possible (such as copper cables or other physical objects that can be held) Logical - network topology (how the network is laid out or organized) Software - protocols and programs that allow the computers to communicate.
Hardware
Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.
Cold Site
Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have
Hot Site
Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.
What are daemons?
Pieces of software in the operating system that run in the background all of the time. They wait for an event to arise before they take action. Other pieces of the operating system are executed based on a scheduler.
Security Education
Users learn how to protect their passwords and other security measures
Hexadecimal
Uses a base 16
Buffer Overflow
Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code
PaaS
Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.
Decimal
Uses base 10 to represent numbers (0 - 9)
Binary
Uses base 2 system (0 and 1)
Event-driven Processing
Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another
Alpha Testing
occurs where the system will be used. For example, software may be tested by a client or by a specific department within an organization. During alpha testing, system developers often assist end users as they interact with the new system. It is common for simulated data to be used to prevent any damage to a user's actual data.
6 steps in SDLC
Preliminary investigation Analysis Logical design Physical design Implementation Maintenance
Common Steps in SDLC
Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance
Operating Systems
Primary task is to allow a computer user to easily access the hardware and software of a computer system
Administrator Ethics
Privacy, Ownership, Control, Accuracy, Security
Project Initiation
Problem definition, resource allocation, risk assessment
Describe storage in relation to IPOS cycle.
Processed information is stored for permanent record.
Storage
Processed information is stored for permanent record.
Batch Processing
Processing large amounts of data all in one batch when the computer system is not busy
Describe computer families.
Produced during the third generation, computers in a given family were able to run the same programs without having to alter their program code.
Utility Programs
Programs that allow the user to monitor and improve system performance.
System software
Programs that make up the operating system. Usually directly supports the computer system itself.
Authentication
Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)
The rows in a database are called ________.
Records. They describe the item of interest, which could be people, objects or concepts (ex: a customer, an automobile, or a college course). Formally known as tuples. Ex: *Student ID* *First Name* *Last Name* 11151631 George Duke 10857134 Mike Keneally *19756311* *Ian* *Underwood*
Big Data
Refers to data sets that are so large and complex that they will require more advanced database management/processing tools.
The Internet of Things (IoT)
Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.
Protocol: https://
Reflects the set of rules by which the resource is transmitted. Web pages use HyperText Transfer Protocol (HTTP). When the content being transferred requires encryption (ex: financial transactions), a secure protocol to the server is used (https://)
What is the typical organizing principle of a database?
Relation. A relation is where data about a single entity, like customers, inventory, and sales are stored. Ex: a relation might consist of student records. For each student, there is a first name, a last name, a student ID, a major, a minor (optional), and a GPA.
Characteristics of Quality Data
Relevance - the data being used must apply directly to the decision being made Timely - data must be efficient and must be provided in a timely manner Thorough - the data must be complete Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible. Reliable - data should reflect stable and consistent data collection processes across collections points and over time
List the characteristics of quality data? (hint: RTTAR)
Relevance, Timely, Thorough, Accurate, Reliable.
Data Qualities
Reliable Accurate Thorough Timely Relevant
Boolean/logical data
Represents data fields that have only two possible answers: yes/no or true/false. Just like the binary digital system used by the computer, these data types have two states: 0 or 1
Unnecessary Requirements
Requirements that are not actually needed but are "nice to have"
Circuit Switched Network
Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission
Confidentiality
Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users
Integrity
Requires that data is correct
Availability
Requires that information is available when needed
In the early 1960's the operating system was called a ________ _______.
Resident monitor.It would always be resident in memory, available to be called upon by any user. It was known as a monitor because it would monitor user requests. The requests were largely limited to running a program, specifying the location of the input (which tape drive or disk drive, which file(s)), and the destination of the output (printer, disk file, tape file, etc.).
Database Server
Responds to queries by pulling from the database. Typically only to local clients.
What are benefits to ring topology?
Rings are cheap, like bus networks, as there is no dedicated resource that serves as a central point.
Difference between Security and Network administrators
Security: securing the network parameter by allowing/denying access to data ports over the network; working with firewalls specifically Network: Physically installing and securing networking devices.
Worms
Self contained programs that do not need other programs to propagate across computers and computer networks
File Server
Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files.
Multi-tier Development
Separation of different aspect of a system
Bus Network Topology
Simplest form next to point-to-point. Every resource is connected to a single cable through T-connections. The network cable carries one message at at time. All devices listen to any communications over the single cable and ignore other messages not intended for them.
What is the major drawback of the Bus Network topology
Since all messages travel along one cable, however, the efficiency degrades as more devices are connected to it.
Logic Tier
Sits between the user interface and the data. Acts as a conduit through which data flows to the user from the database as well as how data input from the user is used to update the underlying records in the database. The logic tier is where the system does its logic processing.
Shell Scripting
Small programs that place Linux commands or DOS batch files into a file
Object-oriented programming (OOP) was first introduced in the language __________ in the 1970's and early 1980's.
Smalltalk
SaaS
Software as a Service. Can access and use software through the Internet.
Open Source
Software created in the Open Source Community and made freely available as source code.
Proprietary Software
Software purchased from a vendor; also known as commercial
Virus
Software that attaches itself to another legitimate software application
Public Domain
Software that has been moved into the public domain. Like freeware, this is software that no one wishes to make money off of or support. Anything found in the public domain can be used however you feel; no one is claiming rights to it.
Public Domain
Software that has been moved into the public domain; can be used however you feel
Local Applications
Software that is stored on an individual computer
What is a database management system?
Software that responds to user queries to create, manipulate, and retrieve records from the database.
In a _________ switched network, a message's pathway is only established as it is sent. When a message is received at one location, if it is not the destination location, then the message is forwarded on to another location. The choice of pathway is based on network availability and amount of message traffic. Most computer networks are _______ switched, with the Internet being the most well-known and commonly cited example.
packet
A _____ means that each computer is roughly equal to every other computer.
peer
We can also classify networks by the role that computers play within the network. Specifically, we refer to networks as either ___________ or ___________ networks.
peer-to-peer client-server
Implementation
Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users
Digital Signature and Electronic Authentication Law of 1998 (SEAL)
permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures. This was followed 2 years later with the Electronic Signatures in Global and National Commerce Act.
Confidentiality
requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.
Integrity
requires that data is correct. This requires at a minimum three different efforts. First, data gathering must include a component that ensures the accuracy of the collected data. Second, data must be entered into the system accurately. But third and most importantly, data modification must be tracked.
Availability
requires that information is available when needed.
In a ____ network, each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.
ring
Security Breach Notification Laws
since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both unencrypted and compromised.
Ownership
who owns the data accumulated and the products produced by the organization?
Preliminary investigation
Assesses the feasibility of the proposed project and selects a development methodology
Anti-viral Software
Attempts to identify if a file contains a virus or some form of malware
True or false: Business intelligence systems are best used for resource management.
False. BI systems are best used to make strategic decisions, like whether or not a company should expand.
True or false: Applications store data in their own files.
False. Databases store data, not applications.
True or False: First Generation computers were relatively inexpensive compared to today's computers
False. ENIAC itself cost $500,000. Even without accounting for inflation, first generation computers were far more expensive than today's computers.
True or false: As computers became more widely available, users waned more detailed control over how the computer ran programs
False. On the contrary, as more people began using computer systems, users wanted more convenience and easier access to computer systems which resulted in the development of operating systems.
True or False: One database can only support one application.
False. One database can support multiple applications.
True or False: Business intelligence systems help organizations make short-term operational decisions.
False. The information presented by a BI system aids in making large, impactful company choices, rather than simpler operational decisions.
Attributes
Fields in a database (column headers)
What are some reasons file servers are still advantageous for most organizations
File servers support file sharing, permits easy backup of user files, allows for encryption of data storage, allows remote access to files.
Why aren't file servers not very prominent today?
File servers used to be very prominent in computer networks because hard disk storage was prohibitively expensive. Today, with 1 TB of hard disk space costing $100, any organizations have forgone the use of file servers.
What is an advantage to a flat file format?
Files can be easily imported into other programs that use a different file format Data can be captured through one program and then imported into another.
Evolution of Users
First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.
Business intelligence is considered what part of the DIKW hierarchy?
Formally defined, Business Intelligence is knowledge, and a business intelligence system helps to capture the knowledge contained in various information systems within the company for strategic decisions.
When did the third generation of computers occur?
From 1965 until early 1970's.
When did the second generation of computers occur?
From around 1959 until 1965.
What are some broadcast devices used in a network?
Hubs, switches and routers. These devices "glue" the network together by providing points where a network can connect to devices and other networks.
Why did integrated circuits replace transistors and magnetic core memory?
ICs take up less space reducing distance current has to flow, could be mass produced. They could be used for computation and for storage.
Define Knowledge in the DIKW Hierarchy.
Knowledge is sometimes defined as information that has been put to use. In other cases, knowledge is a synthesis of several different sources of information. One way to think of knowledge is that it is information placed into a context, perhaps the result of experience gained from using information. Additionally, we might think of knowledge as being refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed. As an example, one may learn how to solve algebraic problems by studying algebraic laws. The laws represent information, whereas the practice of selecting the proper law to apply in a given situation is knowledge.
What is a disadvantage of a compiled language?
Lack of portability. When the entire program is translated, it is translated into machine code that is compatible with a specific type of computer. E.g., different types of PCs, Apple, and mobile devices need different machine languages to work. The program itself is portable in that it can be compiled differently for different computers.
High-level Programming Languages
Languages that take more work for the computer to decode, but are easier to program in.
Although very expensive, magnetic core memory permitted computers to have. . .
Larger main memory sizes (from hundreds or thousands of bytes to upward of a million bytes).
Define Wisdom in the DIKW Hierarchy.
Some refer to wisdom as an understanding of "why"—whether this is "why things happened the way they did" or "why people do what they do." Wisdom can only come by having both knowledge and experience. Knowledge, on the other hand, can be learned from others who have it. Wisdom is the ultimate goal for a human in that it improves the person's ability to function in the modern world and to make informed decisions that take into account beliefs and values.
Script
Sometimes uses to refer to a small program that have been traditionally used for automation
Sort
Sorting records based on some field(s) such as ascending order by last name
What is the most commonly used proxy server
Squid, although Apache can also serve as a proxy server. Squid can be configured for the number and size of caches, and the Squid firewall to permit or prohibit access of various types.
RAM
Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power). You can choose the amount of RAM your computer has.
Web Server
Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.
Memory
Stores the programs being executed and the data they are using.
What is Machine/Low-level Languages?
Machine language is the most basic set of instructions that a computer can execute directly. Early computer programs were written in machine language, written for a specific machine, often by an engineer who built and ran the computer themselves.
Early computer programs were written in ________ ____________.
Machine language. Often for a specific machine, often by the engineers who built and ran the computers. Entering the program was not a simple matter of typing it in but of connecting memory locations to computational circuits by means of cable, much like a telephone operator used to connect calls. Once the program was executed, one would have to "rewire" the entire computer to run the next program.
What innovation along with transistors helped usher in the second generation of computers?
Magnetic core memory. Magnetic core memory consists of small rings made of magnetic materials, placed in a wire-mesh framework. Each ring stores one bit by having magnetic current rotate in either clockwise or counterclockwise fashion.
Computers of the second generation were largely called what?
Mainframe computers - computers built around a solid metal framework.
System Administrator
Maintains all aspects of the system including hardware, software, and programming.
Flat File Database
It is one large single table without the relations between tables that a relational format provides. The most common example of a flat file is a CSV file (comma separated values). Records in a flat file are separated by a delimiter. In a CSV file, that delimiter is a comma. One of the advantages of the flat file format, is that these files can be easily imported into other programs that use a different file format; data can be captured through one program and then imported into another.
What does the control unit do?
It retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU.
What are the advantages of the Start Network Topology
Its simplicity, ease of adding (or removing) devices, and the efficiency of message transferal. The star network does not have to contend with message traffic like the bus network. The number of links it takes for any message to reach its destination is always two (or one if the message is intended for the hub device).
JDBC
Java Database Connectivity
Examples of Scripting Languages
Javascript, ASP, JSP, Perl, TLC, PHP
Which type of query is used to withdraw information from multiple relations?
Join. The data from multiple relations can also have repeated attribute values
What was FORTRAN mainly used for?
Mathematical/scientific computing
What does memory do?
Memory stores the program(s) being executed and the data that each program is using.
What are some differences between a mainframe and a mini computer? (Third generation)
Mini-computers were scaled down versions of mainframes. They used same type of processor but had reduced number of registers, reduced memory, etc. A main frame might support thousands of people, whereas a minicomputer might only support tens or hundreds of people.
What is a drawback to networks?
Does NOT increase information security and can make more security risks by opening more avenues to attack a network.
Moore's Law
Doubling of transistor count roughly every 18 - 24 months (exponential increase); observation, not physical law
If you are not going to be using numbers for mathematical calculation in a database, they are to be stored as _________
String (text). Ex: Student IDs
SQL
Structured Query Language (SQL). SQL is a standard query language that is used to communicate in many DBMSs.
Difference between Switches and Hubs
Switches: - Smart Devices - Connect two devices one-to-one Hubs: - Not so smart devices - Connect devices by broadcasting
Difference between System and Network administrators
System Administrators: work with users Network Administrators: work with the physical network
SDLC
System Development Life Cycle is a process for planning, creating, testing, and deploying information systems, including hardware and software.
What factors can affect processing speed?
System clock speed Having multiple CPUs, RAM available to store data as it's processed, The wiring of electrical circuits.
During deployment what 3 things usually occur?
System conversion (which means replacing the old system with the new system) Final documentation End-user training
Alpha Testing
System developers assist end users as they interact with new system; simulated data is used
How is system software different from application software?
System software is started automatically rather than by request of the end user.
Utility Programs
System utilities are programs that allow the user to monitor and improve system performance. E.g.: defragment hard drive, scan files for viruses, etc. System utilities must be installed separately as they may not come with the Operating System.
Utility Programs
System utilities are programs that allow the user to monitor and improve system performance. Utilities greatly range in function.
Software Categories
Systems Software and Applications Software
Define system software.
Systems software includes the operating system and all the utilities that enable the computer to function.
What is the most common network protocol?
TCP/IP (Transmission Control Protocol/Internet Protocol), which is a requirement of all computers that communicate over the Internet. Note: TCP/IP is really a collection of protocols and is sometimes referred to as a protocol stack.
What is the most commonly used network protocol and a requirement of all computers to run over the internet
TCP/IP protocol.
Interpreted Language
Takes the most recently entered instruction, translates it into machine language, and executes it
Interpreted Language
Takes the most recently entered instruction, translates it into machine language, and executes it.
Interpreter
Takes the most recently entered instruction, translates it into machine language, and executes it.
What is information technology?
Task of gathering data and processing it into information. The ability to disseminate information using technology. The technology itself that permits these tasks. The collection of people who are in charge of maintaining the IT infrastructure (the computers, the networks, the operating system).
Dumb terminals
Terminals connected to a computer network that allowed individuals user to connect to the computer. Dumb terminals were merely input and output devices; it had no memory or processor, with all computation and storage taking place on the computer itself.
In the DIKW Hierarchy what do we mean when we say information has been inferred from data?
That one or more processes have been applied to the data to transform it into a more useful form.
What does the ALU do?
The ALU does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen.
What does the bus do?
The bus is the device that permits information to move between each component. The bus then is the device that allows this electrical current to flow between each component in the computer system.
How does magnetic core memory work?
The collection of magnetic cores and wires constitute memory where each ring (at the intersection of a horizontal and a vertical wire) stores a single bit. The wires are used to specify which core is being accessed. Current flows along one set of wires so that the cores can retain their charges. The other set of wires is used to send new bits to select cores or to obtain values from select ones.
What 2 parts make up the CPU?
The control unit (CU) and the arithmetic logic unit (ALU).
The Controller
The controller is the part of an application that interacts with the user (via the view) and passes along the user requests to the model. The results from the model will determine the type of view the controller uses in the interface presented to the user. It is in the controller layer that the input logic is designed.
In what layer is the input logic designed in MVC?
The controller layer.
Kernel
The core components of the operating system are referred to as the kernel. The kernel is loaded when the computer is first booted. Included in the kernel are the components that handle process management, resource management, and memory management.
OS Kernel
The core components of the operating system. The kernel is loaded when the computer is first booted. The kernel sits on top of the hardware and is the interface between the hardware and software.
What are the advantages of separating the data from the application logic in the logic-tier?
The data is made independent of the application The data can change without the need to change the application and vice versa. The data can scale more easily Removes the need for the user to interact directly with the data
Data Tier
The data tier also resides on the organization's servers and usually on a separate database server. The data tier is where data are stored, retrieved, and updated from database tables. By separating the data from the application logic in the logic-tier the data is made independent of the application.
Routers
The device that permits packet switching that a message can be routed to the next link in the network "on the fly". The Router receives a message, examines its destination IP address, and sends the message on to the next location in the network, usually another router. Routers rout messages until they reach a LAN, and finally, the LAN's router or switch sends the message to that one destination machine.
Who were the earliest computer users?
The engineers who built and programmed them. Computers were so complicated and expensive that no one else would have access.
Logic Tier
The logic tier sits between the user interface and the data. As such the logic tier is a conduit through which the data flows to the user from the databases as well as how data input from the user is used to update the underlying records in the database.
Where does the logic-tier reside?
The logic-tier resides on the server where the processing occurs.
Physical design
The logical models are converted into physical models. These physical models are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system.
When did the first generation of computers occur?
The mid 1940's till about 1959.
The Model
The model can take on different forms depending on the complexity of the application. In certain instances, the model is an actual object that is an actual implementation of the application. Using our e-commerce example, the model could be of a company's product. So the product would be the model.
Field
The modules referred to this as the physical contents of a column in one row in a table, but in the real world a column header is a better way to think of them (ie LastName, Gender, etc)
What does an IT department do?
The obvious answer is that an IT department supports the day-to-day technology needs of an organization. More broadly, an IT department is charged with helping an organization achieve its strategic goals.
Direct Conversion
The old system is "turned off" and the new system is "turned on" at a specific date and time. After the conversion, the old system is no longer available to end users.
The Controller (MVC)
The part of an application in MVC that interacts with the user (via the view) and passes along the user requests to the model. The results from the model will determine the type of view the controller uses in the interface presented to the user.
The Controller
The part of an application that interacts with the user and passes the user requests to the model
What is the Host Name of a URL?
The part of the URL that typically identifies the organization that is responsible for the information of the page or provides the server space where the information is stored. ex: www.nps.gov --> 'nps' is the domain name.
The View
The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model
Key difference between PC desktop and laptops?
The peripherals and system unit of a notebook/laptop are sold as a single unit.
In typical n-tier development projects, the tiers are divided between the
The presentation tier The logic tier The data tier
Presentation tier
The presentation tier is where the user interface for the system is developed. The notion behind a user interface is to shield the user from the underlying logic of the system as well as the underlying data structures.
Define software and its characteristics
The programs and other operating information used by the computer. - Written using a programming language. - System software - Operating system - System utilities - Applications - does real work (ex: MS office, outlook) - Intangible
The View
The view is the part of the application that represents the user interface. The view is used to capture input from the user to be passed on via the controller to the model. The information returned by the model is then presented to the user via the view. It is in the view layer of the application that the user interface logic is designed.
Minicomputers
Third generation scaled-down mainframes. Minicomputers used the same type of processor but had reduced number of registers and processing elements, reduced memory, reduced storage, etc., supporting fewer users.
Pilot Conversion
This involves starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization. The team can roll this out using either the direct approach, or the parallel approach. Once the pilot program is confirmed to be operating according to plan, the system is deployed on a larger scale.
What innovation around 1959 replaced vacuum tubes in computers?
Transistors. They could be mass produced and were far cheaper, used less power, and produced much less heat than vacuum tubes. They were much more robust than vacuum tubes. Tubes would last at most a few thousand hours, whereas transistors could last up to 50 years.
Compiled Language
Translates the entire program, creating an executable program which can be run at a later time
Compiled Language
Translates the entire program, creating an executable program, which can be run at a later time.
Compiler
Translates the entire program, creating an executable program, which can be run at a later time.
What is a company's goals
Translates the organization's philosophy in to specific, measurable outcomes the organization plans to achieve.
TCP/IP
Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.
What are some skills needed by IT personnel?
Troubleshooting and problem solving. Knowledge of operating systems. System level programming. System security Hardware
Boolean / Logical
True / False
True or False: Business Intelligence systems improve the quality of information obtained through multiple database systems.
True. A BI system takes the raw information from other systems and reorganizes it in a more useful and applicable way to the decision makers.
True or false: the size of the computer was reduced in second generation computers.
True. Because of the reduction in size of the hardware, the size of a computer was reduced.
True or False: First generation computers were less reliable than today's computers.
True. Between the relatively short shelf life of vacuum tubes and the difficulty of programming by physically connecting separate pieces of hardware, first generation computers had high failure rates.
True or false: Business Intelligence systems integrate information from various systems into one location
True. External and internal information about the company, its competitors, its employees, and many other factors are used when creating a BI system.
True or False: Application object and classes usually reflect the database structure.
True. Reflecting the structure of the database facilitates the interaction between the application and database.
True or False: Applications are independent of databases
True. They are independent of one another.
True or false: when numbers are entered as text in a database, they cannot be used for computational purposes.
True. They can be sorted and ordered, but not used for calculations.
What was the most common connection before UTP and fiber optic?
Twisted wire pair. It was used in much of the United States telephone network. We still find twisted wire pair used extensively because it is cheap and because so much of it is already in place.
Mail Server
Two email servers communicate with each other
Platform as a Service (PaaS)
supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model. IE, leasing both hardware and software. Ex: GoDaddy.com
User acceptance
testing is employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user.
Alphanumeric
text characters (string data)
32-bit operating system
Type of operating system that processes 32 bits at a time.
64-bit operating system
Type of operating system that processes 64 bits at a time.
Trojan Horse
Type of virus that completely replaces an existing application and takes the name of the taken over file
The most common form of network connection used today is __________________ and _____________.
UTP (Unshielded Twisted Pair) Fiber optic cable
What is the most common form of network connection used today?
UTP (Unshielded Twisted Pair) and fiber optic cable.
Proxy Server
Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved. Since many people in the same organization tend to view the same pages, caching these pages locally rather than remotely.
Database Management System (DBMS)
Used to create, manipulate, and access the data in a database
WHERE
Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query
Where (SQL)
Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.
SELECT
Used to inform the DBMS what fields or attributes are of interest
FROM
Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined
From (SQL)
Used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.
Web Server
Used to respond to HTTP requests. Ex: Clicking a link to a web browser (URL)
Domain Name Server (DNS)
Used to translate from an IP alias to an IP address
What are the components of the operating system (system software)
User Applications OS utilities Services Shells OS kernel Software device drivers OM BIOS drivers Hardware
Describe ways a computer may receive data (relates to DIKW).
User entered values from application, camera, microphone, bar code reader, sensor, pen tablet, etc.
Byte
a group of 8 bits. When a computer scientist or engineer has to look at data or program code in binary, they break up the thousands of bits into 8 bits, called a byte. A byte is a unit of digital information used in computing and telecommunications and is used to encode a single character of text in a computer. It is the smallest addressable unit of memory.
What was the first digital, general-purpose, programmable computer?
the ENIAC (Electronic Numerical Integrator and Computer).
Web administrator
also known as a webmaster, but more precisely referred to as a web server administrator, is responsible for maintaining websites. This differs from the development of websites. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. The web administrator may or may not be responsible for the hardware.
A _______ switched network requires that a full pathway, or ________, be established before transmission can begin and maintained during the entire transmission. The telephone network is a __________ switched network. Because the path exists during the entire conversation, communication in either direction can occur simultaneously.
circuit
When discussing a network, the ______ is a computer that will request information from another computer. The ______ is a computer that takes requests and responds with the requested information. The _________ network then is a network that contains one or more servers
client server client-server
Electronic Communication Privacy Act of 1986
this act establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping).
Control
to what degree will employee actions be monitored?
Security
to what extent does the company ensure the integrity of its data and systems?
Accuracy
to whom does the responsibility of accuracy fall, specific employees or all employees? To what extent does the company work to ensure that potential errors in data are eliminated?
What are the two most common support IT roles asides from administrators?
training, and help desk. Training occurs as needed, but many help desks are available 24/7.
Goals
translate the organization's philosophy into specific, measurable outcomes the organization plans to achieve.
SELECT (SQL)
used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e., which table relation they can be found in).
Phishing
Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information
User Acceptance Testing
Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user
Creative Commons (CC) License
Enables the free distribution of an otherwise copyrighted work. Used when an author wants to give people the right to share, use and build upon a work that he/she has created.
Grey Hat Hacker
Engage in both white and black hat types of hacking activities
Redundancy
Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline
Role-based Access Control
Ensures that the user gains access only to the resources that the user should be able to access
Describe system security (IT Skill)
Ensuring proper system security is in place. Following or drafting policies for users. Monitoring for threats. Examples: Keeping security patches up to date, configuring a system firewall, installing anti-malware software, examining log files of evidence of breaches or attacks.
How were programs entered and run on early computers?
Entering the program was not a simple matter of typing it in but of connecting memory locations to computational circuits by means of cable (like a telephone operator). Once the program was executed, the computer would have to be "rewired" to run the next program.
Date / Time
data type used for storing date/time information.
Which type of server responds to client database queries with responses pulled from the database.
database server
Ethics
defined as a code of moral conduct or a set of principles that govern behavior.
Infrastructure as a Service (IAAS)
delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model. IE, leasing hardware.
Vision
describes future aspirations of the organization.
Mesh Network
Every device is connected directly to every other device in the network.
Full backup
Everything on the hard drive is copied each and every time a backup is performed
The most significant change to occur to computers since 1974 is _____________.
Miniaturization. The third-generation computers comprised multiple circuit boards, interconnected in a chassis. Each board contained numerous ICs and each IC would contain a few dozen transistors (up to a few hundred by the end of the 1960s). By the 1970s, it was possible to miniaturize thousands of transistors to be placed onto a single chip. As time went on, the trend of miniaturizing transistors continued at an exponential rate.
Unnecessary Requirements
during the early phases of a project, requirements that are not actually needed are included in the project plan. Often, these requirements are in the form of "nice to have" features, which are mistaken for essentials or included without thought of how this may impact resource allocation. These unnecessary requirements consume resources that may be better used elsewhere and create an unintended risk.
What is the most significant change that occurred since 1974 (fourth generation)?
Miniaturization. Third-generation computers comprised multiple circuit boards, interconnected in a chassis. Each board contained numerous ICs that would contain a few dozen transistors (up to a few hundred by the end of the 1960s). By the end of 1970s, it was possible to miniaturize thousands of transistors to be placed onto a single chip. As time went on, the trend of miniaturization increased at an exponential rate.
MVC model
Model-View-Controller (MVC) model is a development technique used in the implementation of user interfaces. Similar to N-tier, MVC model separates the user interface into different components: the model, the view, and the controller.
Maintenance
Modifications or corrections to the system are made
Network Switch
More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it
How was most processing performed in early days of computers?
Most—if not all—processing was done without human interaction at all. The user specified the program, the source of input, the location of output, and sent the program off to run. The user would see the results once the computer ran the program, which might have been immediately, or many hours later!
What do computers need to communicate over a network?
An appropriate protocol.
String Data
Alphanumeric or text character
OS Shell
An interface for he user, often personalized for that given user.
Components of a Computer
CPU, Memory and Storage, Peripheral Devices
Image backups
Create a copy of everything that is on a hard drive
Describe input in relation to IPOS cycle.
Raw data is entered by the user.
Input
Raw data is entered by the user.
Name the two new pieces of hardware that symbolized the second generation computers:
- Transistors - Magnetic core memory.
Software applications today do not store data needed for the application. What are the benefits of this?
- A reduction in redundant data (since the individual applications that might use the same data do not have to maintain their own data) - Integration across business functional areas (i.e., marketing does not "own" their marketing data separate from the manufacturing department), - Applications can be modified without the need to modify where or how the data is stored - Changes can be made to the data without the need to re-write the software application.
Assembler vs. Compiler vs. Interpreter
- All of them are translators - Assemblers translate from assembly language to machine language - Compilers translate from compiled languages to machine language - Interpreters translate from scripting languages to machine language - Compilers accept the whole program. Translate the whole program and produce an equivalent machine language program - Interpreters translate on the fly and everytime you run the program, you need to translate
What is data?
- Any input that *has not been verified* by both sender and receiver. In essence, it is simply raw.
For a business, the data for the data warehouse might come from any number of sources. These sources include:
- Enterprise resource planning systems - Supply chain management systems - Marketing and public relations reports - Sales records - Purchasing and inventory records - Direct input from customers (e.g., input from a web form or a survey) - Human relations records - Budget planning - Ongoing project reports - General accounting data
Database Administrator duties
- Focus on design, development and support of data management systems (DBMS) - Support, maintain, do performance tuning, and schema development on DBMSs
What improvements and innovations were brought forth with fourth generation computers?
- Improved microprocessors and computer memory capacities. - Rudimentary computer graphics - Word Processing and accounting software - Niche market software (desktop publishing, music and arts, education, etc.) - Graphical User Interfaces (GUI) - Miniaturization
Web Administrator duties
- Install, configure, maintain, secure and troubleshoot web server - May be required to set up password files and establish locations where server scripts can be stored and tested.
What innovations improved programming?
- Language translator program, which would take another program as input and output a machine language version, which could then be run on the computer. - The earliest language translators were known as assemblers, which would translate an assembly program into machine language. Although easier than machine language, assembly language required extremely detailed, precise, and low-level instructions.
System Administrator duties
- Maintaining operating system of a computer system - Supporting the user - Installing new information
Network Administrator duties
- Physically laying down cable - Making connections - Working with the network hardware (routers and switches) - Supporting physical network
What are the characteristics of quality data?
- Relevance - Timeliness - Thoroughness - Accuracy - Reliability
Security Administrators duties
- Stay informed of the many different types of attacks (denial of service, IP spoofing, buffer overflow, etc.) - Install, configure and administer appropriate firewall security to protect the organization systems - Work proactively against intrusions
Why were transistors favored over vacuum tubes?
- They could be mass produced - Cheaper to produce - While vacuum tubes gave off a great deal of heat and had a shelf life of only a few thousand hours, transistors could last for up to 50 years. - Used less power and were far more robust.
What are ways applications interact with databases
- Through database query language SQL - Open Database Connectivity (ODBC) - Java Database Connectivity (JDBC) driver (for applications written in Java)
Ethics
A code of moral conduct or a set of principles that govern behavior.
Describe processing in relation to IPOS cycle.
Raw data is organized or structured for usefulness.
What is not Information Technology?
1) Raw data alone is not IT 2) Standalone technology devices and software (such as purely output devices). Use of technology itself to a means is not IT (ex: a background check) 3) People doing personal things outside the scope of information dissemination (such as making a birthday card for someone).
What is Information Technology
1) The task of gathering data and processing it into information and the ability to disseminate that information using technology 2) The technology itself that permits creating, maintaining and making information accessible, which includes the software, data, and computer networks 3) The collection of people who enable the processing of data and provide IT support (the computer, networks and operating systems).
What are the three main parts of a Web page's URL
1. Protocol (https://) 2. Domain Name (www.forbes.com) 3. Resource/filename (/technology/)
Processing
Raw data is organized or structured for usefulness.
Data Integrity Efforts
1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked
Byte
8 bits; a single character of text in a computer
What is the most common flat file database?
A Comma Separated Values (CSV) file. Records in a flat file are separated by a delimiter. In the CSV file case, the delimiter is a comma (,)
Intranet
A LAN that uses the Internet Protocol
Intranet
A LAN that uses the Internet Protocol is known as an intranet. The advantage of an intranet is that applications intended for Internet usage (e-mail, web browsing, telnet/ssh, etc.) will work internally as easily as they work externally.
Hexidecimal
A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.
Bit
A binary digit (1 or 0).
Why does a company use a database?
A company can use a well-designed database to access accurate, up-to-date information and make prudent business decisions.
Give three examples of information systems.
A company's directory, a company's customer database, a university course catalog.
Remote Computer
A computer being accessed over the network
File Server
A computer with a large hard disk storing files that any or many users of the network may wish to access. The more complex file servers are used to not only store data files but also to store software to be run over the network.
Shareware
A copyrighted software that can be sampled before it is purchased. Usually has some limitations to it, unlocking the full version of the software once purchased.
A database is
A database is an organized collection of data. We typically create, manipulate, and access the data in a database through some form of database management system (DBMS). DBMSs include Microsoft Access, SQL, and its variations (MySQL, Microsoft SQL, PostgreSQL, etc., and Oracle, to name a few).
Relational database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables. When you perform a query in a relational database, data can be pulled from any number of relations that may be contained in multiple databases to generate reports and provide information to users. Most common type of structure for databases.
Define network.
A network is a collection of computers and resources connected by various media so that they can communicate with each other.
Octal Number System
A number system that has a base of 8; digits from 0 to 7 are used to express an octal number.
System Development Life Cycle (SDLC)
A process for planning, creating, testing, and deploying information systems, including hardware and software
32-bit processor
A processor that can effectively use up to 4GB of main memory
Operating system
A program that allows a computer user to easily access the hardware and software of a computer system.
Language Translators
A program that takes one program, written in a high level language, and creates a machine language program as output
What does the LAN need to be connected to to communicate over the internet.
A router, which connects one network to another.
Query
A search of data in the relation or relations that fit specific parameters
What is a Query in a Database?
A search of data in the relation or relations that fit specific parameters. Ex: "Show me all students who are CIT majors" or "show me all students who are CIT majors with a GPA > = 3.0"
Off-Site Storage
A secure location for storing backup media
Describe the Domain Name Server (DNS)
A server that has a table that contains Host IP addresses and aliases
What is a network protocol?
A set of rules by which networks communicate.
What is a protocol?
A set of rules by which people behave.
Copyleft
A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights.
Virtual Machine (VM)
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.
Business Intelligence
A specific information system to help an organization reach its strategic goals
What is SQL
A standard query language that is used to communicate in many DBMSs.
Structured Query Language (SQL)
A standard query language that is used to communicate in may DBMSs
Database Server
A structured data repository. A database server permits access across a network and will perform such tasks as data analysis, data manipulation, security and archiving. The database server may or may not store the database itself.
Why is IT viewed as a system?
A system is a combination of independent parts all working together to accomplish a goal.
OS Services
AKA daemons, act as operating system programs that run in the background. This program, while it is active, does not take up any CPU time until it is called upon to do so.
Scope Creep
Adding to the scope of the project; can impact the allocation of resources.
IT Professional Roles
Administration and Support
When does data become usable?
After it's been converted to a relevant form, for computers this would be binary representation.
End User License Agreement
Aka Software License Agreement. Serves as a contract between the licensor (e.g., software company) and the purchaser, indicating that the purchaser has the right to use the software. These contracts are created by the licensor and do not leave room for negotiation by the purchaser - they can either accept the agreement, or reject the agreement and surrender his or her rights and ability to use the software.
What is a Unique Identifier?
Aka primary key, a field in a table which uniquely identifies each row/record in a database table. Primary keys must contain unique values. A primary key column cannot have NULL values. A table can have only one primary key, which may consist of single or multiple fields. When multiple fields are used as a primary key, they are called a composite key.
Star Network Topology
All devices have a single point-to-point connection with a central device. This dedicated device acts as a communications hub, routing messages from one machine to destination
I/O Subsystem
All peripheral devices where long term storage devices are used.
What are some characteristics of first generation computers?
All were one-of-a-kind machines. Classified not only by time period but reliance on vacuum tubes, relay switches, and the need to program in machine language.
Buffer overflow
Allows hackers to invade computer memory with their own code
Packet Sniffing
Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted
What type of data is the following: - James (Last Name) - 623 Hill Street
Alphanumeric or text character (string data)
TLD(Top Level Domain) Name
Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page
An FTP server is
An FTP server is like a webserver in that it hosts files and allows clients to access those files. However, with FTP, access is in the form of uploading files and downloading files. Any files downloaded are saved to disk unlike the web service where most files are loaded directly into the client's web browser.
What is used instead of the IP address to search websites
An IP alias, such as www.google.com.
What is an OLTP system?
An Online Transaction Processing system captures business transactions and stores them in databases which can then be processed via queries to support decision making.
Algorithm
An algorithm is a formula or procedure for solving a problem. It can also be described as a set of steps that are followed in order to complete a computer process.
Define information system.
An information system is in essence a collection of data and information used to support management of an organization. The term also refers to the technical components and human resources that enable the assembly, storage, and processing of data, and the delivery of information.
Incremental backup
An initial full backup is completed and then subsequent backups only capture the changes since the last backup
Incremental backup
An initial, full backup is completed and then subsequent backups only capture the changes since the last backup.
Shell
An interface for the user, often personalized for that given user, that provides access to the kernel.
What is Graphical User Interface (GUI)
An interface that allows the user to issue commands to the computer for the computer to work (ex: Point and Click)
Device Drivers
Another piece of the operating system is the collection of device drivers. Device drivers provide specific interfaces between the OS running a computer and hardware.
What are the benefits of a mesh network topology
Any device can directly communicate with any other device without concern of message traffic. If any device were removed, it would not harm the connectivity of the network.
Define application software.
Applications software includes programs that do real work for users. For example, word processors, spreadsheets, and database management systems fall under the category of applications software.
Productivity software
Applications that are useful to just about everyone (ie word processors, powerpoint, etc.)
BIOS ROM
BIOS stands for Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software not hardware, ("basic" operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can't choose the amount or contents.
____________ is the transfer rate permissible over the media, described as some number of bits per second (bps or b/s). Modern _________s are on the order of millions or billions of bits per second (Mbits/second, Mbps or Gbits/second, Gbps). Older technologies such as computer MODEMs (described later) were limited to hundreds or thousands of bits per second, such as 56 Kbps or 56,000 bits per second.
Bandwidth
What is Batch Processing?
Batch Processing processes transactions in batches or groups and updated only periodically (daily,monthly, etc.= Generally slower information.
What industry standards are used to connect peripherals to computers?
Bays (house CDs and DVDs) Typically on front. Slots (modem cards, wireless access cards, other pc cards) Ports (connect additional input, output, storage and communication devices)
What type of data is this: - True/False (active subscriber)
Boolean/Logical
An employee is using telnet to log into a colleague's computer to troubleshoot an issue. Is this remote, local or both?
Both. Telnet is used to access one computer from another; therefore requires a local and remote computer.
An employee logs in from home to the company's server to update their time sheet. Is this remote, local or both?
Both. The employee's home computer is local and the sever is remote.
Which is the cheapest network topology
Bus Topology
What is Business Continuity?
Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions.
Business intelligence
Business intelligence is a special application of the DIKW hierarchy when employed as a specific information system to help an organization reach its strategic goals.
Why would one separate a database server from the database?
By separating the server from the database, one can use different mechanisms to store the database, for instance a storage area network to support load balancing.
What is the benefit of modifying or deleting attributes of a database?
By using some filtering criteria with the update or delete, we are able to modify or remove all records that fit some criteria. Ex: GPA = GPA *1.1 where Major = "CIT". This modifies each record whose Major is "CIT" to update the GPA field to be GPA *1.1, multiplying each GPA by 1.1
In the mid 1980's Smalltalk's object oriented capabilities were incorporated into a new version of __ called ____.
C C++
Database Information Processing (OLAP)
Data is processed through a suite of analysis software tools
What are the three goals prescribed by IAS?
CIA: - Confidentiality - Integrity - Availability
What is COBOL mainly used for
COBOL (Common Business Oriented Language) is a business-oriented language, as its name suggests.
A business oriented language produced roughly at the same time as FORTRAN is known as ___________.
COBOL (Common Business Oriented Language).
What are the 4 components of most computer systems?
CPU (processor) Memory Input/output (I/O) subsystem Bus
What is the structure of most computer systems?
CPU - ALU, Control Unit, Registers Memory - SCRAM, DRAM, ROM I/O Subsystem - Input devices, Output devices, Storage devices System Bus - Connects the CPU, Memory and I/O bus I/O Bus - Connects the System Bus and I/O subsystem
Wireless Access Point
Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable
Firewalls
Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked
The Model
Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application
Internal Components of the System Unit
Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards
DIKW Hierarchy
Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)
What are benefits of Bus Network Topology
Cheapest topology and very reliable, does not degrade if resource is removed from network or crashes.
Difference between Security and Web administrators
Security: Secure data access Web: Secure webpage access
Cloud Computing
Cloud computing combines several different technologies: distributed computing, computer networks, and storage area networks. The idea is to offer, as a service, the ability to offload computation and storage from your local computer to the cloud.
What is the difference between Coax cable/twisted wire and fiber optic cable?
Coax and twisted wire cable both transmit information using electromagnetic waves voltage (e.g. 10BASET uses =2.5V or -2.5V) Fiber optic cable uses light pulses.
What are programming languages?
Code written in pseudo English which translates into machine language (binary)
Attributes
Columns of the relation
What are some visions and goals of IT?
Communication, both internal and external Sharing of resources Facilitating the integration of Departments Management of Information Ensuring that the organization runs according to ethical practices
What are the three components of the IAS (Information Assurance and Security) model.
Communications, hardware, and software - with information utilized by the three components.
By 1959 the improved class of language translators was known as ___________, and the languages were called ____ ____ _______.
Compilers High Level Languages
Although a network can consist of many types of resources, it is the ______ that is the primary tool used to communicate over a network
Computer
Software
Computer programs that tell the computer what to do--how to execute commands and process information
Wireless Access Point (WAP)
Connected to a hub, switch or router that sends out a wireless signal so computers on the network can connect without a cable. Today, many routers act as a wireless access point, forgoing the need for another device.
What is another way that a computer can communicate over the internet?
Connecting to a LAN (local area network).
Network Hub
Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network
Router
Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses
Application Software
Consists of programs that end users run to accomplish tasks
Application Software
Consists of programs that end users run to accomplish tasks.
System Software
Consists of programs that make up the OS; software that directly supports the computer system itself
What is magnetic core memory?
Consists of small rings made of magnetic materials, placed in a wire-mesh framework. Each ring stores one bit by having magnetic current rotate in either clockwise or counterclockwise fashion.
Client-server Network
Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers
Field
Contains the data of an attribute for a record within a relation
Parts of the CPU
Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen
System Clock
Controls the speed at which instructions are processed.
Copyrights protect an
Copyrights protect an original work (in its tangible, expressed form), but not the ideas behind the work. The copyright holder has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years. "Fair use" provides an exception to this by allowing nonprofits or educational institutions to use the copyrighted work. Copyrighted works are registered as a matter of public record. However, copyright law may be interpreted inconsistently and the protections may not be very strong. Therefore, the use of patents has become more common.
Kernel
Core components of the OS that is loaded when the computer is first booted.
Open Source
Created in the Open Source Community and made freely available as source code
Slicing
Creates a subset of the data by reducing the data from multiple dimensions to one dimension
Workstations
Creates and maintains client network connections to remote servers
System Unit
Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.
Harold inputs the new customer list for January. Which step of the N-tier development would this be?
Data tier. Harold is putting in new information that will be stored in the data tier.
What reflects how information is classified?
Data types. Programming languages require a programmer to signify the data type of every piece of data. In most database systems, when setting up a database it is critical to specify the type of each data field. In other words, data type relates to the format in which data is entered so that it can be processed correctly.
What does DIKW Hierarchy stand for and what is it's purpose?
Data, Information, Knowledge, Wisdom. It describes the transition of data to information to knowledge to wisdom.
Dante manages the inventory and ordering systems for a large auto parts manufacturing plant. He must make sure that part orders are in the company system and are updated if a client changes their order. Additionally, in order to plan production to meet the needs of upcoming or potential future orders, Dante must analyze patterns in ordering and recommend production rates to the plant manager. What server would he use?
Database Server. The database server is needed if Dante is responding to user queries to manipulate the database and performing tasks such as data analysis.
Database administrators
Database administrators have a long list of important responsibilities, with a focus on the design, development, and support of database management systems (DBMSs). Their tasks include installation, maintenance, performance analysis, and troubleshooting. There are specific applications, performance tuning parameters, account creation, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to new. As many or most database systems are now available over the Internet (or at least over local area networks), the administrator must also ensure proper security measures for remote access. A database administrator is often expected to play a role in application design and development. This may be by assisting the application developers with the design of the databases needed to effectively support those applications. This requires a unique set of skills that include database modeling, schema development, normalization, and performance tuning.
Flat file database
Database which consists of just one table. Used if the amount of data that is being recorded is fairly minimal.
Difference between Database and Web administrators
Database: Works specifically with DBMS Web: works with webpages that serve the DBMS
What type of data is this: - 10/02/2012 (order date) - 10:15
Date/Time
Online Data Processing (OLDP)
Deals with data in real time
Point-to-point network
Dedicated link between two resources. Not often used as a network topology because it limits how devices can communicate with each other. Seen in connections within a computer such as connection between the monitor and motherboard.
Phased Conversion
Deploys a subset of the system first, rather than deploying the whole system at once
What is a company's vision
Describes future aspirations of an organization
What is the "DIKW hierarchy?"
Describes the transition of data to wisdom: - Data - Information - Knowledge - Wisdom
3 most typical types of computers?
Desktop - designed for use in one physical location Laptops - lightweight and portable Handheld - variety of forms including tablets, smartphones, and mp3 players.
Describe trouble shooting (IT Skill)
Detect and diagnose a problem, then find a solution. Examples: Poor processor performance, full hard drive, virus or other malware.
Analysis
Determines the user requirements for the new system and develops logical models of the system
What are three factors in the need for development of operating systems
Development of language translators Improved speed of hardware Increased number of users.
Bus Network
Devices connected along a single cable. Size of network is restricted.
Ring network topology
Devices have point-to-point connections with their neighbors. Communication between devices requires sending a message to a neighbor and having that neighbor forward the message along the ring until it reaches its destination.
What input/output device allowed users to access computers remotely? (third generation)
Dumb terminals with no memory or processor.
Project Planning
During the planning phase of a project, the team must determine the objectives and activities, organize the activities, and estimate time and costs required to successfully complete the project.
Maintenance
During this step, modifications or corrections to the system are made.
Logical design
During this step, the logical models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step.
Types of RAM
Dynamic RAM (DRAM) - typically called main memory Static RAM (SRAM) - cache memory and registers
What are the two main forms of RAM?
Dynamic RAM (DRAM) which is typically called main memory, and static RAM (SRAM), which is cache memory and registers.
What constituted the first generation of computer hardware?
ENIAC and other laboratory computers like it. They are classified not only by the timeline but also the reliance on: - vacuum tubes, - relay switches and - the need to program in machine language.
What distinguished the ENIAC from previous analog computers?
ENIAC was general purpose, whereas previous computers were either for a special purpose (could only run programs of a certain type) or were not electronic but electromechanical. A general-purpose computer could conceivably execute any program that can be written for that computer.
Ring Network
Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.
Star Network
Each device is connected to a central devices such as a hub or switch.
Assembly Language
Easier than machine but still required detailed, precise low level instructions
CPU
Executes programs' instructions and commands various components in the computer. Referred to as the "chip".
What are the physical components of the computer system and networks?
External parts: - Chassis Internal Parts: - CPU - Memory - Motherboard Network Components - Routers - Switches - Hubs - Ethernet Cables - NICs (network interface cards)
What are some differences between hubs, routers and switches?
Externally, there is little to differentiate a hub from a switch from a router (other than perhaps the size). Internally, the switch has more hardware, including storage space for MAC and IP addresses, than a hub. A router contains programmable routing tables and includes at least one input that comes from another network.
Describe the "E" in the ETL process
Extract Data - the data comes from various sources. These sources must be identified and understood.
ETL
Extract, Transform, Load
What is the ETL process?
Extract, Transform, Load process; takes about 70% of the time in building the DW.
The first compiler was for the __________ language.
FORTRAN (FORmula TRANslator). FORTRAN was primarily intended for mathematical/scientific computing.
What was the language that the first language translator was used for?
FORTRAN. With this language, the programmer would largely specify mathematical formulas using algebraic notation, along with input, output, and control statements. FORTRAN comes from FORmula TRANslator.
An ___ server is much like a web server or file server in that requests are for files and responses are the files.
FTP
Database Administrator
Focuses on the design, development, and support of database management systems (DBMSs).
End User License Agreement (EULA)
Gives the purchaser the right to use the software
One of the founder's of Intel, ___________ ____________, noticed which trend that was later named after him?
Gordon Moore first noticed this rapidly increasing "transistor count" phenomenon. In a 1965 paper, Moore observed that the trend from 1958 to 1965 was that the number of transistors on a chip was doubling every year. This phenomenon has been dubbed "Moore's law." Moore predicted that this trend would continue for at least 10 more years.
What are core components of IT?
Hardware Software People
Relational Database
Has multiple tables (relations) with interrelated fields; most common structure for databases
Information in DIKW
Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.
Site Sharing
Having multiple data centers located in disparate regions; typically used by large organizations.
HIPAA
Health Insurance Portability and Accountability Act. This act protects the privacy of an individual's health records.
Support IT Professionals
Help desk and training.
What are the benefits of a network?
Helps people and devices communicate with each other Sharing information reduces business cost by allowing devices to be shared.
Define the Physical level of a network.
How information is carried over the network. At this level, information is transmitted as bits over some type of Media - a physical connection
How is the MVC model useful over N-tier?
MVC is useful in separating the programming logic between input logic, business logic, and interface logic.
Name the four computer operations
IPO+S: - Input: raw data is entered by the user - Processing: raw data is organized or structured for usefulness - Output: information output so user can see the results - Storage: Processed information is stored for permanent record.
Because of the limitation now being felt by 32-bit addresses, what is used now for IP addresses?
IPv6, using 128 bits.
Encryption
Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information
Host Name
Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored
What is a company's Mission
Identifies the reason the organization exists, including the people it serves and the principles and standards of practice that should guide everyday operations.
Domain Name
Identifies the server on which the web page can be found
Domain name: www.forbes.com
Identifies the server on which the web page can be found.
Strategic Risk Analysis steps
Identify information assets. Identify vulnerability of assets. Determine threats based on vulnerabilities. Prioritize risks. Develop and enact policies as necessary.
For what scenario would you use a scripting language over a compiled language?
If the program that is being written is simple or doesn't have a long lifespan.
What are the drawbacks of mesh topology network
Impractical due to cost Requires an excessive number of connections, with every device needing n-1 ports available to make those connections. Ex: six devices = 25 connections.
Complier
Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient
How is the MVC model different from N-tier?
In an MVC implementation, the user interacts with the controller. The user wouldn't form the actual query, but would input the type of data requested. The controller would send this data to the model. The model would then develop a query based on the information sent to it from the controller and the result of the query would be presented in the selected view back to the user.
Network Administrator
In charge of all aspects of the computer network
Resource/Filename ID
Indicates the name of the file you are accessing, or the location of the document on the server
Resource ID: /technology/
Indicates the name of the file you are accessing, or the location of the document on the server. The part of the resource after slash (/) is the file name for the page. The file may end with a three or four-letter designation that signifies the file type. Ex: - .htm or .html = standard webpage - .jpg or .gif = graphic file - .pdf = a portable document file
Black Hat Hacker
Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism
Why does a database consist of multiple and overlapping relations?
Information can be drawn from multiple relations at a time, which can be used in a database query called a "join".
Define information.
Information is often defined as processed data. That is, raw data are the input and information is the output of some process. In fact, more generically, we should think of information as any form of interpreted data.
Output
Information is output so user can see results.
What is the benefit of information
Information is presented to humans in support of decision making.
Describe output in relation to IPOS cycle.
Information output so user can see results.
Define Knowledge in the DIKW hierarchy
Information that has been put to use A synthesis of several different sources of information. Information that is placed into a context, such as experience gained from using information. `
Knowledge in DIKW
Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.
White Hat Hacker
Informs companies of potential problems with software so companies can fix
LaaS
Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.
Object Oriented Programming
Initially introduced in Smalltalk in 1970's and early 80's
What are the five project phases?
Initiation Planning Executing Monitoring and controlling Closing
What are the four project phases?
Initiation Planning Executing & controlling Closing
Project phases
Initiation, planning, executing and controlling, and closing
What are the four operations a computer performs? (hint: IPOS)
Input, Processing, Output, Storage.
Describe hardware (IT Skill)
Installing and configuring new hardware. Troubleshooting, repairing, or replacing defective hardware. Examples: replacing CPUs and disk drives, connecting network cables to network hubs, switches, routers.
Security Administrator
Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.
Web Administrator
Installs, configures, maintains, secures, and troubleshoots web severs.
What are some other aspects of a database administrator's job?
Integration of data from older systems to new, ensure proper security measures for remote access (for database systems available over the internet), assisting developers with application design and development so the database can effectively support said applications.
ODBC (Open Database Connectivity)
Interacts with a database via a database driver
Pilot Conversion
Involves starting the conversation with a portion of end users
Model-View-Controller (MVC)
Is a development technique used in the implementation of user interfaces
What is one of the most useful aspects of a database?
It can be used to conduct a query.
Describe a Database Administrator's duties.
Like system administrators, database administrators have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, account creation, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to new ones. As many or most database systems are now available over the Internet (or at least over local area networks), the administrator must also ensure proper security measures for remote access.
FTP Server
Like web server or file server in that requests are for files and responses are the files
Describe first generation computer input/output (I/O)
Limited mostly to reading from punch cards or magnetic tape and writing to magnetic tape. Any output produced would be stored onto tape, unmounted from the tape drive, mounted to a printer, and then printed out. Since computers only ran one program at a time, I/O was restricted to this manner.
Point-to-Point Network
Link between two resources. Simplest for of a network. Limits how devices can communicate with each other
The ___ programming language developed at the end of the 1950's for artificial intelligence research used an __________. This allowed programmers to test out one instruction at a time so they could build their program piecemeal.
Lisp interpreter
Describe the "L" in the ETL process
Load Data - into the storage facility, that is, the transformed data must be stored in the data warehouse using the appropriate representation format.
The sales associate is using their desktop to develop a report using Excel. Is this remote, local or both?
Local. A desktop computer is accessed by an employee in the same location as a local computer.
The IT department is updating the SSH (secure shell) on the company's server to provide improved access when employees are off-site. Is this remote, local or both?
Local. Through using SSH for improved off-site access the IT department is working on servers locally.
What the difference between a local and remote computer?
Local: the user is physically present with that computer. Remote: a computer being accessed over the network (ex: remote desktop connection or telnet).
Nancy needs to determine the annual rate of increased sales over last year. Which step of the N-tier development would this be>
Logic tier. The logic tier performs logical tasks that would determine the rate of increase.
Physical design
Logical models are converted into physical models
Logical design
Logical models are revised to ensure that the new system will meet the user requirements identified in the first step
Describe a Security Administrator's duties.
Must stay informed of the many different types of attacks, such as denial of service attacks on web servers, IP spoofing to intercept messages, and buffer overflow that allows a hacker to invade computer memory with their own code. Although these are all known forms of attacks, it does not necessarily mean that a system is protected against them. And as these attacks are known, newer attacks are being thought of. It is the responsibility of the security administrator to install, configure, and administer appropriate firewall security to protect the organization's systems and to work proactively against such intrusions.
A device that connects multiple computers together. When there are multiple computers connected to this device a message received by the device is forwarded to all ports on the device. A destination address attached to the message indicates which computer the message is intended for, but it does not prevent other computers from picking up the message. The device broadcasts the transmission, as it sends the data to every device in the network.
Network hub
What is system software?
Operating systems and system utilities
Off-Site Storage
Organizations may choose to use a hot site, cold site, or site sharing.
Project Planning
Organize activities, time estimation, cost estimation
Hierarchical Database
Organizes data using a tree like or organizational chart type structure
Hierarchical Databases
Organizes data using a tree-like organizational chart type structure. The main data points can have multiple sub-data points associated with them referred to as parent-child model. The sub-data points can only have one main data point, I.E., the child can only have one parent.
Services
Os programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.
What are the three technologies that "glue" the internet, home and organization networks together?
Packet switching Routers IP Addresses
Resource allocation
Part of the Initiation Phase of Project Management. A team must determine what resources are available to meet the needs of the project. Resources are commonly thought of as time and capital.
The View (MVC)
Part of the application that represents the user interface. The view is used to capture input from the user to be passed on via the controller to the model. The information returned by the model is then presented to the user via the view.
Examples of Compiled Languages
Pascal, COBOL, Fortran, C, C++, Java, Ada
Patent Vs. Copyright
Patent: - Protects 20 years from filing - Protects the creation and the idea behind the creation Copyright: - Protects 70 years after the death of the author. - Protects the actual creation, not the idea behind it.
Patents protect the
Patents protect the creation of inventive concepts as well as the tangible work product (not just the tangible work, as copyrights do). To receive a patent, the applicant must be able to show that the idea is original, useful, and not obvious to someone of "ordinary skill" in the field. The patent owner can then prevent others from making, selling, or using the patented invention for 20 years from the patent application filing date. The U.S. patent system is intended to encourage innovation.
Describe users
People who use the computer system.
Beta Testing
Performed by the end user without any assistance from the system developers; live data in a real working environment is used.
Examples of scripting languages are?
Perl php ruby python asp
The term _____ is another form of query that returns all of the records from the relation, but only select attributes or fields.
Projection.
Copyrights
Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author's life plus 70 years.
Patents
Protect the creation of inventive concepts as well as the tangible work product (not just the tangible work, as copyright do) Copyright law may be interpreted inconsistently and the protections may not be very strong, so the use of patents have become more common. The patent owner can prevent others from making, selling, or using the patented invention for 20 years from the patent application date.
Patents
Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date
Defense in Depth
Protecting every layer that surrounds data
Copyright
Protects an original work (in its tangible, expressed form), but not the ideas behind the work. The copyright holder has the exclusive right to make copies, prepare derivative works, and distribute copies of the author's life plus 70 years.
Parts of URL (Uniform Resource Locator)
Protocol, Domain name, Resource/Filename
Device Drivers
Provide specific interfaces between the OS running a computer and hardware devices.
OS Device Drivers
Provide specific interfaces between the OS running a computer and hardware. Many popular device drivers are preloaded into the operating system, whereas others must be loaded off of the internet or CD-ROM when a new hardware device has been purchased.
What is another function of a proxy server
Provides a degree of anonymity, since the IP address recorded by the web server in response to the request is that of the proxy server, not the individual client. Proxy servers can also be used to block certain content from being returned, rejecting responses that contain certain content (e.g., the word "porn") and rejecting requests going to specific servers (e.g. Facebook).
Wisdom in DIKW
Provides a social setting to knowledge; an understanding of the "why". Can only come by having both knowledge and experience.
Shareware
Provides a trial version of the software.
E-mail server
Provides e-mail service. Accepts e-mail requests from clients, send messages out to other e-mail servers, receive e-mails from other servers, and alert the user that e-mail has arrived.
Antonio runs the computer lab for River County High School. Many of the teachers at the high school send students to the computer lab to work on research projects or homework assignments. Antonio is looking for a way to speed up access to websites that students commonly access, such as Wikipedia while also blocking certain websites that students shouldn't be on while they are working, like social networking sites. What kind of server should he use?
Proxy Server. A proxy server would allow students to access some websites quicker by accessing a local rather than a remote copy. Additionally, using a proxy server, Antonio could block specific websites from the lab.
Information Security Classifications
Public - available through public sources; includes names and addresses Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses Private - information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential - information that an organization will keep secret; includes patentable information and business plans
Evolution of Storage
Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage
Is Python a scripting or compiling language
Python is both a scripting and compiling language.
A ______ is a search of data in the relation that fit specific parameters
Query. One of the most valuable aspects of a database.
How do radio signals work?
Radio signals are sent via radio towers, cell phone towers, and bounced off of satellites in orbit.
Radio Waves
Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic spectrum longer than infrared light. Radio Waves can be used to access networks over long distances. They are sent via radio towers, cell phone towers, and bounced off satellites in orbit to give them a broad coverage area.
Pivot
Rotates data to view the data from a different perspective
Difference between routers and switches
Routers: - Connect devices within WANs - Use IP addresses to connect devices Switches - Connect devices within LANs - Use MAC addresses to connect devices.
Tuples
Rows of a relation
tuples
Rows/records in a database.
Protocol
Rules provided by which networks communicate with each other.
Interpreted Code
Runs inside a special environment; is better for testing
Preliminary investigation
SDLC begins when an organization discovers a problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology.
Database Interacting Format
SELECT fields FROM tables WHERE fields from tables match criteria
What is the format for SQL when interacting with the data contained within a database?
SELECT fields FROM tables WHERE fields from tables match criteria;
Dicing
Same as slicing except that the result can be in multiple dimensions
Early generations of computers, due to their size and limited capacity were limited mostly to?
Scientific tasks and some business tasks like accounting that processed large volumes of transactional data.
Services
Services, or daemons, are operating system programs that are usually started when the operating system is loaded and initialized, but they run in the background. This means that the program, while it is active, does not take up any CPU time until it is called upon to do so.
Interpreters rely on a __________.
Session
Describe system level programming (IT Skill)
Shell scripts to automate processes, manipulating configuration files for system services. Examples: Bash, Csh scripts, Ruby scripts, C/C++ programs
Drilling up and down
Shifts the view of the data; down provides more detail, up provides summarized data
What is another way to think of data?
Signals. For humans: sight, sound smell, taste, feel For computers: values entered by the user when running an application; data received through camera, microphone, bar code reader, sensor, etc.
What innovation ushered in the third generation of computers?
Silicon chips (also known as printed circuits or integrated circuits (ICs). One IC could incorporate dozens of transistors.
3rd Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals
What was the innovation that replaced transistors and magnetic core memories?
Silicon chips, aka printed circuits or integrated circuits (ICs). ICs would replace both the bulkier transistors and magnetic core memories, so that chips would be used for both computation and storage. ICs took up less space, so the distance of the current flow was reduced, resulting in faster computers. ICs could be mass produced, resulting in reduced costs.
Rolling up
Similar to drilling up but it collapses the data from multiple items into a single value
What does the CPU do?
The CPU is the device that not only executes your programs' instructions, but also commands the various components in the computer.
In the MVC model, the ____ facilitates communication between the model and the view.
The Controller
How does the DBMS use the Unique Identifier?
The DBMS will use the unique identifier to match records in different relations when using a join operation. Ex: A query asking for the phone numbers of students with a GPA > 3.0. The DBMS will first search the scholastic information for records whose GPA matches the criteria, then withdraw the phone numbers from the contact relation. To identify the students between the relations, the unique identifier (student ID) is used.
What does the DNS do when provided with an IP alias?
The DNS looks up the entry in its own DNS table and returns the corresponding address. The IP address is then sent back to your computer. If the IP address is not found in the DNS server, then it is sent out to DNS servers that are higher in the hierarchy until a particular DNS can translate the alias into an IP address. The information is then sent back down the chain to the DNS server making the initial request. If the highest level of the hierarchy does not recognize the alias, an error is returned and your message will never make it out of your computer.
What is the focus of a database administrator
The Design, development and support of database management systems (DBMSs). This includes installation, maintenance, performance analysis, and troubleshooting.
What was the first digital, general purpose, programmable computer?
The ENIAC (Electronic Numerical Integrator and Computer).
The GNUs Public License is used for
The GNUs Public License is used for free software and is designed so that it will stay free regardless of who modifies the software. Copyleft is a play-on-words of copyright: instead of using rights to limit users (as proprietary software does), it promotes freedom and flexibility of use.
What makes up the I/O subsystem?
The I/O subsystem includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape).
What is an Integrated Chip (IC)?
The IC would be a pattern of transistors etched onto the surface of a piece of silicon, which would conduct electricity (thus the term semiconductor). Pins would allow the IC, or chip, to be attached to a socket, so that the electrical current could flow from one location in the computer through the circuit and out to another location.
Why were integrated circuits referred to as semi-conductors?
The IC would be a pattern of transistors etched onto the surface of a piece of silicon, which would conduct electricity, thus the term semiconductor. Pins would allow the IC, or chip, to be attached to a socket, so that electrical current could flow from one location in the computer through the circuit and out to another location.
How is the MVC model different from the N-tier development model?
The MVC model is one application where the various design logic (input, business, and interface) are logically separated. This differs from the N-tier development model where each tier is a separate application.
What was the first microcomputer sold mainly to hobbyists?
The Mark 8.
In the MVC, the ______ is where changes and updates are made to the data based on new data
The Model
In what layer is business logic designed in the MVC model?
The Model layer.
In the MVC model, the _______ is where a form is used to capture the user input data
The View
In what layer of the application in MVC is the user interface logic designed
The View layer
Name some advantages of a network.
The ability to share information, share hardware such as a printer, and even share software.
What is another useful aspect of a database besides the ability to conduct a query?
The ability to update or modify the data within a relation. Ex: - Insert operations (add a record) - Update operations (modify one or more attributes of one or more records) - Delete operations (delete one or more records)
Business Continuity
The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.
How does one receive a patent?
The applicant must be able to show that the idea is original, useful, and not obvious to someone of "ordinary skill" in the field.
What is project management?
The application of knowledge, skills, tools, and techniques to project activities to meet project requirements. A project is an undertaking with a defined start and end, specific goals, and tasks that need to be performed to reach those goals.
What does the bus consist of?
The bus consists of a number of wires, each wire allows 1 bit (a single 1 or 0, high or low current) to flow over it.
The term server may be used to refer to what three different things?
The first is a dedicated computer used to provide a service. Servers are typically high-performance computers with large hard disk drives. The second use of the term server is of the software that is run on the machine. Server software includes print service, ftp server, web server, e-mail server, database server, and file server. The software server must be installed, configured, and managed. These steps may be involved. For instance, configuring and managing the Apache web server could potentially be a job by itself rather than one left up to either a system administrator or web developer. The third usage for server is the collection of hardware, software, and data that together constitutes the server. For instance, we might refer to a web server as hardware, software, and the documents stored there.
How was the first operating system different from the latest operating system
The first operating system was time consuming to switch between and execute programs.
Initiation Phase
The first phase of project management process. Consists of three key elements: - Problem definition - Resource allocation - Risk assessment
What does a host need to communicate over the internet
The host needs to run the TCP/IP protocol.
Why did companies start producing families of computers during the third generation?
The idea was that any computer in a given family should be able to run the same programs without having to alter the program code. This was largely attributable to computers of the same family using the same processor, or at least processors that had the same instruction set (machine language). The computer family gave birth to the software development field; code could be written for an entire family and the program sold to potentially dozens or hundreds of customers.
Data in DIKW
The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.
PaaS
The intention with Platform as a Service is to be able to quickly and reliably develop and deliver applications. Now, teams of developers located around the world can collaborate on the development of an app by accessing the same environment in real-time. This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers.
How is the World Wide Web different from the Internet
The internet is a computer network, utilizing computers and computer resources to communicate with each other, the media connecting these devices together, and the broadcast devices such as switches and routers. It is a physical entity, containing parts you can touch and point to. The World Wide Web sits on top of the internet. It is a collection of files. The internet predates the World Wide Web, and there could be no World Wide Web without the internet, but we could have the internet without the World Wide Web.
What is the main difference between a compiled language and an interpreted language?
The interpreted language runs inside of a special environment called the interpreter. The programmer enters a command, then the interpreter converts that command to machine language and executes it.
What is a drawback to the ring topology
The larger the ring becomes, the greater the potential distance that a message might have to travel, creating lengthier transmission times. Since ring topologies can be unidirectional or bidirectional, losing a device can do one of two things: - Unidirectional: if a device were to go offline, it would detach the network into two, such that some devices could no longer communicate with others. - Bidirectional: would require losing two devices before portions of the network became isolated.
Role of a Web server is
The role of a web server is to respond to HTTP requests. HTTP requests most typically come from web browsers, but other software and users can also submit requests.
What are some characteristics of the second generation of computers?
The second generation found cheaper, faster, easier to program, and more reliable computers. Computers no longer limited to government labs and university labs. Largely referred to as mainframes because of being built around a solid metal frame.
Which generation of computers was the first to use boolean operators?
The second generation.
Which generation of computers was the first to use mainframe computers?
The second generation.
Shell
The shell is an interface for the user, often personalized for that given user. The shell provides access to the kernel. For instance, a GUI shell will translate mouse motions into calls to kernel routines (e.g., open a file, start a program, move a file). Desktop elements include shortcut icons, the theme of the windows, menus and background, the appearance of toolbars and programs on the start menu, and desktop gadgets.
Explain how the OS Shell works
The shell provides access to the kernel. For example: A GUI shell will translate mouse motions into calls to kernel routines (e.g., open a file, start a program, move a file).
What major innovation in 1974 by IBM ushered in the fourth generation of computers?
The single chip processor, also known as microprocessor. Up until this point, all processors were distributed over several, perhaps dozens, of chips. By creating a single-chip processor one could build a small computer around the single chip. These computers were called microcomputers. Such a computer would be small enough to sit on a person's desk. This ushered in the most recent generation, the fourth generation.
Key differences between peripheral devices of standard PC computer and smartphone?
The smartphone has items normally thought of as peripherals such as keyboard and monitor built in, whereas with the desktop computer the peripherals are largely external.
What did the advent of computer families give birth to?
The software development field; code could be written for an entire family and the program sold to potentially dozens or hundreds of customers.
Systems administrators
The system administrator will, at a minimum, be required to install and configure operating systems on the organization's machines, install new hardware, perform software upgrades and maintenance, and handle user administration. Other duties include performing backup and recovery, system monitoring, performance tuning, and troubleshooting. The system administrator may also be involved with application development and deployment, system security and reliability, and have to work with networked file systems. The system administrator would most likely have to perform some programming through shell scripting so that repetitive tasks can be automated. A greater amount of programming might be required depending on the organization's size and staff. Policy creation and IT infrastructure planning may also be tasks assigned to system administrators.
What does the system clock do?
The system clock controls the speed at which instructions are processed. Processing speed is listed in terms of megahertz (MHz), (millions of processes per second) or gigahertz (GHz) (billions of processes per second).
Phased Conversion
The team deploys a subset of the system first, rather than deploying the whole system at once. The old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively.
Analysis
The team determines the user requirements for the new system and develops logical models of the system (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes).
Information Technology
The technology used in creating, maintaining, and making information accessible.
Packet Switching
The telephone network uses circuit switching, which remains fixed and established until one of the phones hangs up. Packet switching, on the contrary, breaks the communication down into small packets of data, and each is sent across the network separately. Each packet could potentially take a different pathway to reach the destination
Which generation of computers introduced computer networks?
The third generation.
What is the Top-Level Domain Name?
The three or two letter extension after the period which signifies the type of organization or country associated with the page Ex: .com, .gov, .edu; .au (Australia), .uk (United Kingdom), .ca (Canada).
Describe bandwidth
The transfer rate permissible over the form of media, described as some number of bits per second (bps). The form of media dictates the network's bandwidth. Modern bandwidths are on the order of millions or billions of bits per second (Mbits/second, mbps or Gbits/second, Gbps).
Describe a Web Administrator's (aka Webmaster) duties.
The web administrator, also known as a webmaster, but more precisely referred to as a web server administrator, is responsible for maintaining websites. This responsibility differs from the development of websites. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. The web server is software that runs on one or more computers. The web administrator may or may not be responsible for the hardware. Typically, the web administrator is not a system administrator on that or those computers. Therefore, the web administrator will have to work with the system administrator on some aspects of installation and configuration. Securing the web server becomes critical for businesses. Individuals outside and inside the organization may have reason to access data on the web-server without authorization thus requiring the need for securing the web server. The web administrator may be required to set up password files and establish locations where server scripts can be stored and tested. Security may be implemented directly through the web server software, or added through the operating system, or some combination. Security issues may be discovered by analyzing log files that are also used for data mining.
Parallel Conversion
There is a period of time in which both systems (the old and the new) are operating concurrently. This is done so that the output of the new system can be compared with the output of the old system. Once it is confirmed that everything is working as expected, the old system is shut down and the new system continues to operate.
Parallel Conversion
There is a period of time in which both systems are operating concurrently
Integer
a whole number
SaaS
Through Software as a Service (SaaS), businesses can access and use software through the Internet. Companies in many industries now use Google Docs and other programs that use SaaS. With SaaS, companies no longer have to purchase hardware and software to manage tasks such as payroll and e-mail, and these applications can be accessed by employees anywhere, anytime.
How does an ODBC compliant application interact with databases?
Through an ODBC driver that translates functions in the application to queries in the database.
How is an IP alias translated to an IP address
Through the use of a Domain Name Server (DNS), which acts as a sort of address book for the IP addresses.
Logic Tier
Tier that sits between the user interface and the data.
Data Tier
Tier where data is stored, retrieved and updated from database tables
Presentation Tier
Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures
What were the first computers needed for during World War II?
To assist in computing rocket trajectories. Crack German codes.
What is the goal of a Business Intelligence (BI) system?
To help support management in their strategic decision-making process.
What is the notion behind a user interface?
To shield the user from the underlying logic of the system as well as the underlying data structures.
Describe the "T" in the ETL process
Transform Data - given that the data come from different sources, it is likely that the data are not organized using the same collection of attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This will include altering data relations or objects (or whichever format is preferred), recognizing the unique identifier(s), and selecting the appropriate attributes (fields).
2nd Generation of Computers
Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers
What was used to replace vacuum tubes in second generation computers?
Transistor components.
What is the difference between FTP/Web servers and e-mail servers
Unlike FTP and Web servers, which have a limited number of protocols to handle (primarily FTP, FTPS, HTTP and HTTPS), there are more e-mail protocols that servers have to handle: IMAP, POP3, SMTP, HTTP, MAPI, and MIME.
How is FTP server different from a web server?
Unlike a web server, which responds to HTTP requests, an FTP server access is in the form of uploading files and downloading files. Any files downloaded are saved to disk, unlike the web service where most files are loaded directly into a client's web browser.
What is event-driven processing?
Uses business events, such as submitting an order to a vendor, receiving goods, or creating new employee records to trigger messages to be sen by middleware between software modules that are completely independent of one another. In EDA, each event is handled individually as it appears; the business unit experiencing the event "pushes" the event to the recipient, providing the recipient with immediate relevant business events; these events are "pushed" simultaneously to all interested parties (i.e., purchasing, receiving, manufacturing, sales and the customer).
Symmetric Key Encryption
Uses the same key for performing the encryption and decryption
Public Key Encryption
Uses two keys, a public and private key for performing encryption and decryption
Freeware
Usually software that has become obsolete because newer software has replaced it, or is software that the original producer no longer wishes to maintain and provide support for. You are bound by the same agreements when you install it, but are otherwise free to use it as if you have purchased it
What are vacuum tubes?
Vacuum tubes were used for storage and were a defining characteristic of first generation computers.
1st Generation of Computers
Vacuum tubes, relay switches, the need to program in machine language
Project Executing and Controlling Reports
Variance reports, Status reports, Resource Allocation reports
Presentation Tier
Where the user interface for the system is developed. Designed to run on the client and interface with the server.
Generic definition of IT.
We will consider IT to be the technology used in creating, maintaining, and making information accessible. In other words, IT combines people with computing resources, software, data, and computer networks. IT personnel, sometimes referred to collectively as "IT," are those people whose job it is to supply and support IT. These include computer engineers who design and build computer chips, computer scientists who write software for computers, and administrators who provide the IT infrastructure for organizations.
Natalie works for an advertising firm that specializes in web distributed advertising. Natalie needs to report to clients how many potential customers have viewed or traveled to the advertising website and if those potential customers continued to the company website to directly purchase products. Additionally, Natalie must make sure that the company's web advertising remains free from malicious code that could affect potential customer computers. What kind of server could she use?
Web server. The web server is needed if Natalie is using web advertising and wants to ensure that HTTP requests are not attacks.
Authentication is often done by proving who you are via these three "what you" statements.
What you know What you have (encryption key, physical keys, etc) What you are (biometrics, finger prints, etc)
Hacking
When an individual obtains unauthorized access to a host
What is Coax Cable?
a copper cored cable surrounded by heavy shielding
What are different operating systems for workstations and laptops
Windows 7/8/10 Linux Mac OS X
Name some different operating systems
Windows, Linux, Mac OS, FreeBSD, Solaris, redhat
What is the difference between knowledge and wisdom
Wisdom can only come by having both knowledge and experience. Knowledge can be learned from others who have it.
Define Wisdom in the DIKW hierarchy
Wisdom provides a social setting to knowledge - an understanding of "why".
IaaS
With Infrastructure as a Service, all the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.
Project Executing the Plan and Controlling the Project
With proper preparation in place, the team begins to execute the plan. This may involve hiring or training personnel, purchasing hardware, and developing, testing, and deploying a product or service. The specifics of this phase are dependent on the previously identified project scope. While the plan is being executed, the project manager must track the progress of the project in order to mitigate any problems that could impact the project. The project manager uses the information from Phases 1 and 2 to help ensure the project stays on track in terms of time, capital, and scope, and will be completed successfully. To facilitate this process, the project manager generates the various reports described below and uses these on an ongoing basis. Variance Reports indicate differences between planned resources (what has been allocated for each activity or task) and actual resources (what has been used thus far in the project). Status Reports indicate the state of the project. The status report provides specific information on the achievement of objectives and completion of activities. It is critical to track such progress, particularly for those activities that are dependent on other activities. Resource Allocation Reports indicate how time and capital have been used thus far for the project. This report, which is tied to the budget, keeps everyone informed of where the project is in relation to the resources originally allocated for the project. Together, all of these reports provide a project manager and the team with valuable information and transparency that can facilitate keeping a project on track, within budget, and successful.
Why did computers get faster as they got smaller?
With smaller computers, the physical distance electrical currents had to travel between components was lessened, helping the computers get faster.
Join
Withdraws information from multiple relations
Server Software
Works with hardware to provide a network service
Server Software
Works with hardware to provide a network service. Includes webservers, e-mail servers, and database servers.
Machine/Low-level Language
Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time
The first windowing operating system developed by ______ was used to demonstrate the use of OOP.
Xerox
How is Open Source different from the others?
You may obtain the software for free; you may enhance the software; you may distribute the software. However, you must abide by the copyright provided with the software.
ASCII (American Standard Code for Information Exchange
a code for representing English characters as numbers, with each letter assigned a number from 0 to 127
Attribute (field)
a column in a table containing information about spatial features. An attribute are characteristics which are used to describe a record, and are the column headings of a table. Ex: *Last name* Duke Keneally Underwood
Intranet
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
Floating-point
a number with a decimal point (numeric data)
Hot site
a physical location where an organization can move its operations. A hot site includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data. Hot sites allow for the quickest return to business (often without any delay), but they are expensive.
Cold site
a physical location, but unlike a hot site, it is not equipped with hardware, servers, and the full range of items a hot site has. A cold site is more like a shell that can be used for operations should the need arise. It is less costly than a hot site, but the organization must be able to purchase, receive, and install all the necessary hardware and software before operations can continue.
Language translators
a program that takes a high-level language program as input, and creates a machine-language program as output.
Computer Matching and Privacy Protection Act of 1988
amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases. Without this act, one agency could potentially access data from other agencies to build a profile on a particular individual.
Scripts have traditionally been used more for _________ than for software development.
automation
In a ___ network, devices are connected along a single cable.
bus
All computers no matter their generation use the _______ system for programming.
binary
In the ___ network, all devices listen to any communications over the single cable and ignore all messages that are not intended for them. The ___ provides a dynamic network in that devices can be added and removed from the network at any time as long as there are still "T" connectors available. This is also the cheapest of all network topologies and a very reliable form of network. It does not degrade if a resource is either removed from the network or crashes. In spite of this, the network topology has a large drawback. All messages travel along the single cable and so the network's efficiency degrades as more devices are connected to it.
bus
A _______ ___________ is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
computer network
Confidential
consists of information that an organization will keep secret, such as patentable information and business plans.
Project Initiation
consists of three key elements: problem definition, resource allocation, and risk assessment
The Family Educational Rights and Privacy Act of 1974 (FERPA)
gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization. This is an important act because it prevents faculty from sharing student information (e.g., grades) with students' parents unless explicitly permitted by the students. In addition, it requires student authorization to release transcripts to, for instance, graduate schools or prospective employers.
Database administrators
have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to newer systems. As many or most database systems are now available over the Internet (or at least over local-area networks), the administrator must ensure proper security measures for remote access as well. Unlike a web administrator who will probably not be involved in web development, a database administrator is often expected to play a role in application design and development.
Mission
identifies the reason the organization exists, including the people it serves and the principles and standards of practice that should guide everyday operations.
Alpha testing, beta testing, and user acceptance occur during the ____________ phase.
implementation
Digital Millennium Copyright Act of 1998 (DMCA)
implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer. This law includes clauses that make it illegal to post on websites or download from websites copyrighted material whether that material originally existed as text, sound, video, or program code. Additionally, the act removes liability from Internet Service Providers who are providing Internet access for a criminal prosecuted under this act. As a result of this law, YouTube was not held liable for copyrighted content posted to the YouTube site by various users; however, as a result, YouTube often orders the removal of copyrighted material at the request of the copyright holder.
One of the main purposes of a BI system is to
improve the timeliness and quality of the information that goes into making strategic decisions. Unlike an operational decision (e.g., how much and when to order new supplies), a strategic decision is typically one that covers a long time frame (e.g., five years) and may involve such issues as whether or not an organization should expand into a new geographic region
The ____ network, also known as a fully connected network, requires that every device have a point-to-point connection with every other device. If there are n devices in the network, there are as many as (n - 1)^2 connections. Any device can directly communicate with any other device without concern of message traffic, and if any device were removed, it would not harm the connectivity of the network. However, the ____ network is impractical because of the cost. Not only does it require an excessive number of connections, it requires that every device have n - 1 ports available to make those connections. The ____ network is typically found in high-performance parallel processing computers but not used in computer networks. A small ____ network of six devices is shown in the image above. With six devices, there are a total of 25 connections. Imagine the number of connections required for a ____ of 50 devices instead. This would require 2401 connections!
mesh
Sensitive
might include e-mail addresses. Although this is not public information, it is information that will not be considered a threat to a person's privacy if others were to learn of it.
A ________ ________ is a more functional connection than a hub. For one, it records and recognizes the local network addresses [Media Access Control (MAC) addresses or IP addresses] of all computers connected to the switch. A message is then only passed along to the computer that matches the destination address. Thus, the switch is able to utilize network bandwidth more efficiently. While this device can be used to broadcast to all computers in a network, its purpose is to only send transmissions to a specific, intended computer.
network switch
What are some Network Administrator duties?
physically laying down cable. making connections. working with the network hardware (for instance, routers and switches). like the system administrator, the network administrator will edit configuration files, install software (related to the network), and so forth. Troubleshooting the network may combine physical troubleshooting (e.g., is a cable bad?) and software troubleshooting. There is also a security aspect to the computer network. Both the system administrator and network administrator may work on system firewalls. Editing configuration files, writing shell scripts, and installing software and patches will all be part of a network administrators tasks.
In a ___________ CPU the fetch-execute cycle is performed in an overlapped fashion on several instructions. For instance, while instruction 1 is being executed, instruction 2 is being decoded and instruction 3 is being fetched. This would result in three instructions all being in some state of execution at the same time.
pipelined.
RAM is referred to as __________ memory, while hard disk storage is referred to as _________ memory.
primary (RAM), secondary (disk storage)
Big Data
refers to data sets that are so enormous and multifaceted that they will require more sophisticated database management/processing tools than we currently use.
Site sharing
refers to having multiple data centers located in disparate regions. This approach is typically used by large organizations, which can shift critical functions to other sites when one site is impacted by a disaster.
A _____ server monitors print jobs and replies with an acknowledgment that the print job has completed, or an error message.
Drivers Privacy Protection Act of 1994
prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs).
Public
public information might include names and addresses (since this information is available through the phone book).
In the ____ network, devices have point-to-point connections with their neighbors. Communication between devices requires sending a message to a neighbor and having that neighbor forward the message along the ____ until it reaches its destination. The ____ is easily expanded by adding new devices between any two nodes. However, the larger the ring becomes, the greater the potential distance that a message might have to travel. This, in turn, can create lengthier transmission times. ____s are cheap, like buses, in that there is no dedicated resource that serves as a central point. A ring network could be unidirectional or bidirectional in terms of the direction that messages travel. In a unidirectional ____, if a device were to go offline, it would detach the network into two such that some devices could no longer communicate with others. Assume, for instance, that the ____ topology shown above were unidirectional and all communication traveled clockwise around the ____. If the topmost device were to fail, the device to the immediate left of the failed device would not be able to reach any other device, whereas the device to the immediate right of the failed device would not be able to receive communication from any other device. A bidirectional ____ would require losing two devices before portions of the network became isolated.
ring
Pivot
rotates data to view the data from a different perspective.
The ________ is a device that connects multiple networks together. Although you can use the device to directly connect computers in a network, the devices are typically used instead in specific locations in a network so that messages can be routed to other networks.
router
Name several duties the web server that the file server does not.
running server side scripts logging requests and errors handling security.
In _____________ _______________ the programmer is limited to high level control constructs such as while loops, for loops, and if-else statements, and is not allowed to use the more primitive GOTO statement. This ushered in a new era of high level languages, C and Pascal being among the most notable.
structured programming
In a ____ network, each device is connected to a central device, such as a hub or switch.
star
The ____ network is in some ways the opposite of the bus network. In the star network, all devices have a single point-to-point connection with a central device. This dedicated device acts as a communication hub, routing messages from one machine to the destination. The advantages of the network are its simplicity, ease of adding (or removing) devices, and the efficiency of message transferal. The network does not have to contend with message traffic like the bus network (although the hub can quickly become a bottleneck if there are a lot of simultaneous messages). The number of links that it takes for any message to reach its destination is always two (or one if the message is intended for the hub device). The network has two detractors. First, it does require a dedicated device, making it a more expensive network than the bus. The hub of the network may be a hub or switch. The hub of the network may also be a server, which would make the network more expensive. Second, although losing any single device would not degrade the network, if the hub is lost, all devices lose connectivity.
star
Privacy Act of 1974
the earliest piece of legislation that pertains to the collection and usage of personal data, this act limits actions of the federal government. The act states that: No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with prior written consent of, the individual to whom the record pertains. The act also states that federal agencies must publicly make available the data that they are collecting, the reason for the collection of the data, and the ability for any individual to consult the data collected on them to ensure its integrity.
Data Mirroring
the operating system writes data (and changes to the data) to multiple hard drives at the same time.
Cloud Computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Combines several different technologies: distributed computing, computer networks, and storage area networks.
Scope Creep
the team or other individuals may realize that additional features are needed or could be beneficial. This is commonly referred to as scope creep.
Beta testing
the tests are performed by the end user without any assistance from the system developers. Beta testing uses actual (i.e., live) data in the real working environment.
Privacy
under what circumstances should an administrator view other people's files? Under what circumstances should a company use the data accumulated about its customers?
A ___________ _____________ is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
virtual machine
A ________ ____________ is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.
virtual machine (VM)
This is a special type of file server in that it still stores data files (web pages) and programs (scripts).
web server
Full backup
when everything on the hard drive is copied each and every time a backup is performed.