WGU Intro to IT C182

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

System conversion methods...

Direct, parallel, pilot, and phased.

Main function of an Operating System (OS) is...

Allows a computer user to easily access the hardware and software of a computer system

Computer Matching and Privacy Protection Act of 1988

Amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases.

ALU (Arithmetic Logic Unit)

Arithematic Logic Unit. Does the actual processing of the data, from mathematical calculations and logical operations

Associated with CIA

Authenticity - data, information, or resource is genuine (e.g.security certificates, digital signatures) Non-repudiation - follow through on contracts and promises

BIOS

Basic Input Output System

Pipe-lined CPU

Fetch-execute cycle is overlapped

Which generation of computers: Magnetic core memory

2nd Gen

Which generation of computers: Mainframes first appear

2nd Gen

Which generation of computers: Mass produced transistors

2nd Gen

Which generation of computers: Larger memory sizes than vacuum tubes

2nd Gen (magnetic core memory)

Which generation of computers: Families of computers first appear

3rd Gen

Which generation of computers: Integrated Circuits (ICs) are printed on silicon

3rd Gen

Which generation of computers: Integrated Circuits (ICs) replace transistors

3rd Gen

Which generation of computers: Minicomputers first appear

3rd Gen

Which generation of computers: Programs compiled for a family of computers could run on any computer in the family

3rd Gen

Which generation of computers: Regular people start using computers

3rd Gen

Which generation of computers: Software development field is born

3rd Gen

Which generation of computers: First generation of personal computers

4th Gen

Which generation of computers: Microcomputers first appear

4th Gen

Which generation of computers: Miniturization biggest change since 1974

4th Gen

Which generation of computers: Single chip processors (microprocessor) first appears

4th Gen

Which generation of computers: Small computers built around a single chip

4th Gen

Cold Site

Just a shell without hardware, etc.

Components of an OS

Kernel, Device Drivers, Shell, Services, Utility Programs

Preliminary Investigation (SDLC)

Phase #1 cost / benefit analysis of the new system are weighed

Analysis (SDLC)

Phase #2 Develop understanding of system requirements for end user needs, address security concerns, assess accessibility concerns

Logical design (SDLC)

Phase #3 Modeling the new system using flow charts and diagrams

Physical Design (SDLC)

Phase #4 Laying out the system in physical environment

Implementation (SDLC)

Phase #5 Alpha and Beta Testing , User acceptance then system deployment

Maintenance (SDLC)

Phase #6 Modifications and corrections are made

PaaS

Platform as a Service - everyone is running off the same code platform

Types of peripherals

Ports, Slots, Cards, Bays

N-Tier components

Presentation Tier, Logic Tier, Data Tier

Define: Information

Processed Data

System software

Programs that make up the operating system. System software is software that directly supports the computer system itself. Often started automatically.

Drivers Privacy Protection Act of 1994

Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses

Components of an URL

Protocol, Domain Name, and Resource Path

Define: Wisdom

Provides a social setting to knowledge. Some refer to wisdom as an understanding of "why"

Define: Compiled Program

Translates a finished application and translates it into machine language.

Networking Media Types

Twisted Pair (UTP), Coax, Fiber Optic, and Radio - Satellites, radio towers, etc. Long distance

Define: Scripting Languages

Typically used for automation

URL

Universal Resource Locator

Viewer (MVC)

User interface (i.e.; colors, fields...ect)

Benefits of a network

Users can share hardware (decrease cost)

Algorithm

A formula or procedure for solving a problem. It can also be described as a set of steps that are followed in order to complete a computer process.

Productivity software

AKA horizontal software because the software can be used across all divisions within an organization

Two basic components of a CPU?

CU, ALU

Define: Moore's Law

The number of transistors on a chip increases by orders of magnitude every year.

Presentation Tier (N-Tier)

UI

Data Tier (N-Tier)

where data are stored, retrieved, and updated

Server software

works with hardware to provide a network service (web , e-mail, database servers, etc)

Controller (MVC)

Communication between the user and the model

Definition: Language Translator

Compilers and Interpreter

CIA... what information Security attempts to ensure.

Confidentiality, integrity, and availability

Kernel

Core of the OS. Interface between hardware and software. Performs resource and memory management.

Strategies for Ensuring Business Continuity

Data Backups, Data Mirroring, Off-Site Storage

Integrity (CIA)

Data is correct Verify accuracy and track changes to data.

DIKW stands for what?

Data, Information, Knowledge, Wisdom

Device Drivers

Device drivers provide specific interfaces between the OS running a computer and hardware.

DNS

Domain Name Service translates domain names into IP addresses

Electronic Communication Privacy Act of 1986

Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping).

Hot Site

Everything needed to restart operations

Purpose of an IT Department

Help organizations achieve their strategic goals.

Off-site Storage types...

Hot Site, Cold Site

Four operations a computer performs

IOP+S Model (Input, Output, Processing, and Storage)

Project Planning Phases

IPEC - Initiation, Planning, Execution, Controlling

Digital Millennium Copyright Act of 1998 (DMCA)

Implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer. This law includes clauses that make it illegal to post on websites or download from websites copyrighted material whether that material originally existed as text, sound, video, or program code. Additionally, the act removes liability from Internet Service Providers who are providing Internet access for a criminal prosecuted under this act.

IaaS

Infrastructure as a Service - servers hosted remotely

IOP+S

Input, Output, Processing, and Storage

Phases of SDLC

Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance

Define: Assembly Language

Low level programming language. Machine language (hex / binary)

MVC Components

Model, Viewer, Controller

Digital Signature and Electronic Authentication Law of 1998 (SEAL)

Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures.

Define: Data

Raw Input

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition).

Confidentiality (CIA)

Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.

Availability (CIA)

Requires that information is available when needed

Network Topology Types

Ring, Star, Mesh, Bus

Cloud Services...

SaaS, IaaS, PaaS

Security Breach Notification Laws

Since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both unencrypted and compromised.

SDLC

Software Development Life Cycle

SaaS

Software as a Service - online apps hosted somewhere else

Model (MVC)

Software logic, business rules and application data

Roles of Information Technology Professionals

System Admin, Web Admin, DB Admin, Security Admin, Support Specialist

Define: Information Technology

System of dependent parts working separately to accomplish information goals. Includes technology and people.

Utility Programs

System utilities are programs that allow the user to monitor and improve system performance

Define: DIKW

Transition of data to information to knowledge to wisdom

Privacy Act of 1974

The earliest piece of legislation that pertains to the collection and usage of personal data

Shell

The shell is an interface for the user. Provides access to kernel interfaces

Quality Data is...

Timely. Thorough, Reliable, Accurate

IP Address

a specific location on a network and / or the internet.

Why is it important that data supports business goals?

businesses use databases to collect and analyze data to reach their strategic goals.

The Family Educational Rights and Privacy Act of 1974 (FERPA)

gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization.

Define: Knowledge

information that has been put to use. knowledge is a synthesis of several different sources of information. Also,Information placed into a context,

Define: Interpreted Program

instructions are executed in the order in which they're presented one-by-one

Business intelligence is...

knowledge

Which generation of computers: What time period was 3rd Generation of computers

mid 60's - mid 70's

Services (daemons)

programs that are usually started when the operating system is loaded and initialized, but they run in the background

Application software

programs that end users run to accomplish tasks.

CU (Control Unit)

retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU

Logic Tier (N-Tier)

sits between the user interface and the data. where the system performs its logic processing on data


Set pelajaran terkait

4.05: Parallel and Perpendicular Lines

View Set

CH 6: NJ Laws, Rules, and Regulations Pertinent to Life Insurance Only

View Set

Terms, Audit Procedures, and Types of Evidence

View Set

The next person you meet in haven

View Set

GMU CS262 Final Exam Spring 2022

View Set

Nursing 351 Ethical Issues in Nursing

View Set