WGU Intro to IT C182
System conversion methods...
Direct, parallel, pilot, and phased.
Main function of an Operating System (OS) is...
Allows a computer user to easily access the hardware and software of a computer system
Computer Matching and Privacy Protection Act of 1988
Amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases.
ALU (Arithmetic Logic Unit)
Arithematic Logic Unit. Does the actual processing of the data, from mathematical calculations and logical operations
Associated with CIA
Authenticity - data, information, or resource is genuine (e.g.security certificates, digital signatures) Non-repudiation - follow through on contracts and promises
BIOS
Basic Input Output System
Pipe-lined CPU
Fetch-execute cycle is overlapped
Which generation of computers: Magnetic core memory
2nd Gen
Which generation of computers: Mainframes first appear
2nd Gen
Which generation of computers: Mass produced transistors
2nd Gen
Which generation of computers: Larger memory sizes than vacuum tubes
2nd Gen (magnetic core memory)
Which generation of computers: Families of computers first appear
3rd Gen
Which generation of computers: Integrated Circuits (ICs) are printed on silicon
3rd Gen
Which generation of computers: Integrated Circuits (ICs) replace transistors
3rd Gen
Which generation of computers: Minicomputers first appear
3rd Gen
Which generation of computers: Programs compiled for a family of computers could run on any computer in the family
3rd Gen
Which generation of computers: Regular people start using computers
3rd Gen
Which generation of computers: Software development field is born
3rd Gen
Which generation of computers: First generation of personal computers
4th Gen
Which generation of computers: Microcomputers first appear
4th Gen
Which generation of computers: Miniturization biggest change since 1974
4th Gen
Which generation of computers: Single chip processors (microprocessor) first appears
4th Gen
Which generation of computers: Small computers built around a single chip
4th Gen
Cold Site
Just a shell without hardware, etc.
Components of an OS
Kernel, Device Drivers, Shell, Services, Utility Programs
Preliminary Investigation (SDLC)
Phase #1 cost / benefit analysis of the new system are weighed
Analysis (SDLC)
Phase #2 Develop understanding of system requirements for end user needs, address security concerns, assess accessibility concerns
Logical design (SDLC)
Phase #3 Modeling the new system using flow charts and diagrams
Physical Design (SDLC)
Phase #4 Laying out the system in physical environment
Implementation (SDLC)
Phase #5 Alpha and Beta Testing , User acceptance then system deployment
Maintenance (SDLC)
Phase #6 Modifications and corrections are made
PaaS
Platform as a Service - everyone is running off the same code platform
Types of peripherals
Ports, Slots, Cards, Bays
N-Tier components
Presentation Tier, Logic Tier, Data Tier
Define: Information
Processed Data
System software
Programs that make up the operating system. System software is software that directly supports the computer system itself. Often started automatically.
Drivers Privacy Protection Act of 1994
Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses
Components of an URL
Protocol, Domain Name, and Resource Path
Define: Wisdom
Provides a social setting to knowledge. Some refer to wisdom as an understanding of "why"
Define: Compiled Program
Translates a finished application and translates it into machine language.
Networking Media Types
Twisted Pair (UTP), Coax, Fiber Optic, and Radio - Satellites, radio towers, etc. Long distance
Define: Scripting Languages
Typically used for automation
URL
Universal Resource Locator
Viewer (MVC)
User interface (i.e.; colors, fields...ect)
Benefits of a network
Users can share hardware (decrease cost)
Algorithm
A formula or procedure for solving a problem. It can also be described as a set of steps that are followed in order to complete a computer process.
Productivity software
AKA horizontal software because the software can be used across all divisions within an organization
Two basic components of a CPU?
CU, ALU
Define: Moore's Law
The number of transistors on a chip increases by orders of magnitude every year.
Presentation Tier (N-Tier)
UI
Data Tier (N-Tier)
where data are stored, retrieved, and updated
Server software
works with hardware to provide a network service (web , e-mail, database servers, etc)
Controller (MVC)
Communication between the user and the model
Definition: Language Translator
Compilers and Interpreter
CIA... what information Security attempts to ensure.
Confidentiality, integrity, and availability
Kernel
Core of the OS. Interface between hardware and software. Performs resource and memory management.
Strategies for Ensuring Business Continuity
Data Backups, Data Mirroring, Off-Site Storage
Integrity (CIA)
Data is correct Verify accuracy and track changes to data.
DIKW stands for what?
Data, Information, Knowledge, Wisdom
Device Drivers
Device drivers provide specific interfaces between the OS running a computer and hardware.
DNS
Domain Name Service translates domain names into IP addresses
Electronic Communication Privacy Act of 1986
Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping).
Hot Site
Everything needed to restart operations
Purpose of an IT Department
Help organizations achieve their strategic goals.
Off-site Storage types...
Hot Site, Cold Site
Four operations a computer performs
IOP+S Model (Input, Output, Processing, and Storage)
Project Planning Phases
IPEC - Initiation, Planning, Execution, Controlling
Digital Millennium Copyright Act of 1998 (DMCA)
Implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer. This law includes clauses that make it illegal to post on websites or download from websites copyrighted material whether that material originally existed as text, sound, video, or program code. Additionally, the act removes liability from Internet Service Providers who are providing Internet access for a criminal prosecuted under this act.
IaaS
Infrastructure as a Service - servers hosted remotely
IOP+S
Input, Output, Processing, and Storage
Phases of SDLC
Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance
Define: Assembly Language
Low level programming language. Machine language (hex / binary)
MVC Components
Model, Viewer, Controller
Digital Signature and Electronic Authentication Law of 1998 (SEAL)
Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures.
Define: Data
Raw Input
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition).
Confidentiality (CIA)
Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.
Availability (CIA)
Requires that information is available when needed
Network Topology Types
Ring, Star, Mesh, Bus
Cloud Services...
SaaS, IaaS, PaaS
Security Breach Notification Laws
Since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both unencrypted and compromised.
SDLC
Software Development Life Cycle
SaaS
Software as a Service - online apps hosted somewhere else
Model (MVC)
Software logic, business rules and application data
Roles of Information Technology Professionals
System Admin, Web Admin, DB Admin, Security Admin, Support Specialist
Define: Information Technology
System of dependent parts working separately to accomplish information goals. Includes technology and people.
Utility Programs
System utilities are programs that allow the user to monitor and improve system performance
Define: DIKW
Transition of data to information to knowledge to wisdom
Privacy Act of 1974
The earliest piece of legislation that pertains to the collection and usage of personal data
Shell
The shell is an interface for the user. Provides access to kernel interfaces
Quality Data is...
Timely. Thorough, Reliable, Accurate
IP Address
a specific location on a network and / or the internet.
Why is it important that data supports business goals?
businesses use databases to collect and analyze data to reach their strategic goals.
The Family Educational Rights and Privacy Act of 1974 (FERPA)
gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization.
Define: Knowledge
information that has been put to use. knowledge is a synthesis of several different sources of information. Also,Information placed into a context,
Define: Interpreted Program
instructions are executed in the order in which they're presented one-by-one
Business intelligence is...
knowledge
Which generation of computers: What time period was 3rd Generation of computers
mid 60's - mid 70's
Services (daemons)
programs that are usually started when the operating system is loaded and initialized, but they run in the background
Application software
programs that end users run to accomplish tasks.
CU (Control Unit)
retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU
Logic Tier (N-Tier)
sits between the user interface and the data. where the system performs its logic processing on data