D075

Ace your homework & exams now with Quizwiz!

All networks require these four basic components:

1. Network interface controller (NIC) card, or wireless network (Wi-Fi) capability. 2. Standard language (protocol) 3. Physical cable system 4. Network hub

What is A computer network?

A computer network is defined as two or more computers connected together to communicate and share resources. The shared resources may refer to computer files, folders, software, and peripheral hardware like printers, scanners, and webcams.

A metropolitan area network (MAN)

A computer network that connects two or more LANs or CANs together but within the boundaries of a town or city. An example of a MAN might be a bank with different branch locations throughout a metropolitan area that are all connected.

A campus area network (CAN)

A computer network that connects two or more LANs that are located on a campus, like a university, an organization's national headquarters, or even an industrial complex. For example, a CAN may connect an English department's LAN to a math department's LAN, thereby allowing them to share resources. Additionally, a business campus would be able to connect the accounting department's LAN with the human resources LAN. A CAN is typically limited in size to the specific size of the campus it serves.

A local area network (LAN)

A computer network that is relatively small, typically in a single building, but sometimes as small as a single room. LANs can serve smaller businesses and often serve smaller parts of a large business, like an accounting department or sales division.

What is a worm?

A computer worm is a virus in that it is self-replicating and does not need to attach itself to an existing program to spread. Worms use networks to travel by sending copies of themselves to other parts of the network without a user's knowledge or intervention. A worm can slow a system's performance, erase files, and damage physical hardware.

What is a peripheral device in a network?

A device shared by multiple end users in a network

What is a firewall?

A firewall is a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet.

Which category of computer is a business laptop? Minicomputer Handheld computer Mainframe computer Microcomputer

A microcomputer is a small computer that contains a microprocessor as its central processor and is unable to process large amounts of data or transactions.

Which component must each client computer in the office have in order to install the new network? A network interface controller A network switch An internal network An internal network server

A network interface controller. The NIC is plugged into a slot on the motherboard inside of each computer in the network and allows a network cable to be plugged in so the computer can interface or communicate with other computers.

What is a standard language (network protocol)

A network protocol provides a common language and rules for communication. A network protocol is a convention or standard that controls or allows communication and data transfer between two computers. Simply stated, network protocols are the rules that govern network communication. Network protocols are governed by hardware, software, or an arrangement of both

Which example of a peripheral device can the manager provide based on the supply list? A hub A printer A laptop A router

A printer is a peripheral device, which is a device that resides outside of the computer but is still considered hardware.

What is a ring topology?

A ring topology is shaped like a ring. Each computer (node) is connected to two other computers in the network with the first and last computers being connected to each other. Data are transmitted between computers in a circular manner. Least used topology with microcomputers. In a ring topology, if the traffic cannot flow in one direction, then it can try to flow in the other direction around the ring. This makes it more robust because there is no hub through which all the traffic flows.

Which type of computer runs a network operating system (NOS)? A mainframe computer A router A client computer on a network A server

A server runs a NOS.

What is the InTRAnet?

An intranet is a like a private version of the internet that works the same way, but it is confined within an organization. Intranets contain company policies, computer files, and a host of other business resources.

What is Application software?

Application software is defined as software an end user chooses to use, like Microsoft Excel or Adobe Photoshop, that accomplishes a specific task for the user

The company's board of directors has expressed concerns about the software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors? IT architect Programmer IT manager CIO

CIO

Chief technology officers (CTO)

CTO runs the organization's IT engineering group and serves as the company's top technology architect. Unlike CIOs, CTOs have to be very inventive and imaginative to be successful. CTOs also collaborate and manage vendors to enhance the company's product or service. CTOs use IT to enhance the company's products and develop strategies to increase the business's revenue. CIO mainly deals with internal customers, while a CTO mainly focuses on external customers.

Big Data

Data come from everywhere—including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources—to be sifted for patterns and trends. These collected data sets are coined big data.

Data mining

Data mining/discovery is the examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships.

What is data?

Data, after the finances, are the most valuable asset a company can acquire. Data is used for trend analysis, projections of sales revenue, and many other applications of viewing and massaging the data. These data are stored in databases that are designed for access in many different ways

Database administrators (DBAs)

Database administrators (DBAs) categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business. DBAs may work on a head applications developer's team, but they often also work on existing legacy systems.

What is Database software?

Database management system software (DBMS), is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) This data can be used to make business decisions. Databases can consist of hundreds of related tables, in which case they are called relational databases.

Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts? Spreadsheet software Presentation software Word processor software Database software

Database software. A database is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information.

Database Management Systems (DBMS)

Databases are created using software systems known as Database Management Systems (DBMS). In a DBMS, data are stored in computer files called tables, and tables are connected to other tables with related information; hence, a relational database. Business databases are created and made available to multiple users on the network and are secured to ensure the accuracy of the data and non-access by unauthorized users.

Databases and Tables

Databases are well-thought-out collections of computer files, the most important of which are called tables. Tables are where a database holds data. Tables consist of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information. This information can be used to make business decisions.

What are Network administrators?

Network administrators are directly responsible for the smooth operations and maintenance of a business's networks and networking technology, including its hardware and software. Network administrators often work in partnership with network engineers and network architects to implement and deploy new networks, expand old ones, or integrate an existing network with another existing network.

In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software? The network installer The network programmer The network administrator The network analyst

Network administrators are responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software.

What is a bus topology (linear bus)

Network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints. Data are transmitted between the two endpoints and the nodes are connected to the backbone. One advantage of a bus topology is that all nodes can receive data virtually simultaneously. A disadvantage is that if the backbone is down, all nodes on the backbone are down as well.

What are network?

Networks include devices such as routers, switches, and communication links that allow the computer systems to communicate with each other no matter the distance or location. Networks are sometimes known as the "backbone" of the IT infrastructure. Without communicating and sharing information, each computer would be a stand-alone device and not able to send or receive data.

Load (ETL)

Once data are transformed and normalized, they are ready to finally be transferred into the data warehouse or datamart. The more often this is done, the more up-to-date analytic reports can be. A data mart is a smaller and more targeted version of a data warehouse.

What is Keylogging?

Perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard. The computer criminal waits for a legitimate user to sign in, and then the keylogging software records the login ID, password, and any other sensitive information.

An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent? Click fraud Spyware Keylogging Phishing

Phishing usually involves attempts to deceptively gain private information, like usernames and passwords, typically in a legitimate-looking email.

Which category of software is Microsoft Office? Database software Productivity software System software Network software

Productivity software. Generally includes spreadsheets, word processors, databases, and presentation software. Microsoft Office is an example of productivity software.

Which type of software is designed to easily generate Gantt charts? Spreadsheet software Database management software Project management software Graphing software

Project management software. Gantt charts are key features of project management software.

System development life cycle (SDLC)

SDLC is a process for creating and altering computer applications through a step-by-step approach that includes planning, system analysis, design, implementation, and system maintenance.

Semi-structured data (1 of 3 data types)

Semi-structured data lands somewhere in-between structured and unstructured data. It can possibly be converted into structured data, but not without a lot of work.

What is object linking?

Similar to object embedding but differs in one very important way: object linking is dynamic. When the source file is linked into the destination file, both files stay up to date. Unlike object embedding, which simply takes a picture, object linking is a dynamic link where both files are current and editable.

Software

Software is a set of computer instructions that tell the computer how to work and actually perform computer tasks. There are three categories of software: application, system, and utility.

How will the maintenance of employee workstations be simplified by creating an office network?

Software updates for client computers can be done at once from the server.

When was the internet born?

Sometime around 1969, the internet was born. However, the internet did not really catch on until the early 90s when Hypertext Markup Language (HTML), Hypertext Transfer Protocol (HTTP), and web browsers became available to people and businesses alike.

What is spyware?

Spyware is a program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent. Monitors a user's keystrokes and behavior, but can also install new software that can include more spyware or programming to divert a computer to third party advertising websites.

In the scenario above, how should the IT department resolve the incompatibility issue? Hold a training on how to use each software product to remove incompatibility. Increase help desk support for various software packages. Implement a process that translates data from one software to another. Standardize software throughout the organization.

Standardize software throughout the organization.

What is a Star topology?

Star topologies are the most common of all topologies. A star topology includes nodes that radiate around a central node in a spoke-like fashion. The center of the star is the hub that attaches to the nodes with spokes. If the central hub fails, every node attached to the hub will also fail.

Structured data (1 of 3 data types)

Structured data resides in fixed formats. This data is typically well labeled and often with traditional fields and records of common data tables. Structured data does not necessarily have to be "table-like," but needs to at least be in a standard format and have recognizable patterns that allow it to be more easily queried and searched.

What are switches, routers, and hubs?

Switches, routers, and hubs are devices that act like a traffic cop in a network. Routers forward information throughout a network, switches filter the information to the correct part of a network, and hubs are a common point of connection on a network.

What is System software?

System software, like the Microsoft Windows operating system, is software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

What hardware component performs most of the calculations for a computer?

The CPU is the "brain" of the computer and performs most of the calculations for a computer

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect? Chief technology officer (CTO) Chief information officer (CIO) IT project manager Chief information security officer

The CTO runs the organization's IT engineering group and serves as the company's top technology architect.

What is a Network interface controller (NIC) card?

The NIC is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers. The most common NIC is called an Ethernet card.

What are Processes?

The applications that a business uses in its daily operations. These are the functions that end users work with on a daily basis. eg) the DMV has a process where it issues and updates drivers' licenses, a bank has a process whereby it accepts deposits and makes withdrawals of customer finances, WGU has a process that facilitates student study methods by providing online texts. Each of these processes is supported by software that facilitates that particular function.

Unified Modeling Language (UML)

UML includes a set of graphical notation techniques to create computer models and applications. It could be said that UML is a blueprint for developing applications. When a business wants to outsource a computer programming job, it will often use UML to describe the project.

Unstructured data (1 of 3 data types)

Unstructured data is unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional data tables. Imagine collecting massive numbers of Facebook messages and Instagram posts to determine future fashion trends. Organizations attempt to collect videos, documents, and all manner of fragmented data to eventually make sense of it. A whopping 80% of all data is unstructured!

What is a Trojan horse?

a Trojan horse is a program that seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs. A particular computer action or even a particular date can initiate them.

What are Knowledge management systems (KMS)?

collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer. They are like private search engines for a business that become more valuable with time because of the accumulated amount of knowledge. The KMS serves as a central location that organizes every idea ever posted into searchable categories, making them easy to access company-wide.

Data management (DM)

data management (DM) consists of the practices, architectural techniques, and tools for achieving consistent access to and delivery of data across the spectrum of data subject areas and data structure types in the enterprise.

What is an operating system (OS)?

often called a platform, is a collection of computer programs that work together to manage hardware and software to ensure that they are working properly. Performs jobs like allocating memory, administering input and output, and managing files. The most popular platforms in today's market are Microsoft Windows, Mac iOS, Linux, and UNIX.

What does value added mean?

something extra to make a product more desirable

What is a hub?

the most common hub is an Ethernet hub. The hub is a central location of the computer network that serves as a traffic cop for network connection and communication. Hubs ensure that computer traffic collisions are eliminated. Cables from network computers and other devices are plugged into a hub.

What is object embedding?

Allows a user to select an entire area from one application and a part of another. A budget spreadsheet (source file), for example, can be embedded in a proposal document (destination file). Object embedding is static and only takes a "snapshot." When the proposal document is reopened, it can be edited, but the budget spreadsheet source file embedded in it cannot.

What is structured data?

Also called normalized data, meaning it is typically well-labeled, often with traditional fields and records common to data tables.

What is a denial-of-service (DoS)?

An attempt to make a computer or any of its resources unavailable to its intended users. eg) email attachment that runs constantly and requires an enormous amount of processing power of the computer. The computer slows down or stops running altogether. DoS attacks often target something as large as an entire network or simply deny use of a website or software.

Chief Information Officer (CIO)

Board-level head of an information technology department. Reports to the chief operations officer (COO) or chief executive officer (CEO). Slowly replacing the older "IT director" title that is more common throughout the world. Serve as a company's top IT infrastructure manager. The CIO essentially runs the business's internal IT operations. Manage vendors that supply infrastructure solutions. Align the business's IT infrastructure with its priorities. It is the CIO's job to make sure IT assets are in place to ensure a smooth transition. They deal mostly with internal customers (people who work with their organization). Responsible for explaining and advocating for a new plan to the company's board of directors.

Which methodology for sharing information would be most appropriate for a remote business? WAN-based Forward-facing Browser-based LAN-based

Browser-based means the project management software is web-based and well distributed.

Wide area networks (WAN)

Computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together. Often, WANs rely on a telephone company's transmission facilities to connect the smaller networks together. Many large organizations rely on WANs to centralize data and information in a main office and then have the capability to disseminate that information nationwide, or even worldwide. For example, airlines rely on WANs to provide ticketing agents with access to all flight information. The airline is an example of a network with agents connected using what are referred to as "dumb" terminals. A dumb terminal can be best defined as a computer whose sole purpose is to connect to the network and nothing else.

Computer programmers

Computer programmers (informally called coders) produce both system and application software by writing lines of programming instructions for a computer to follow. Some of the more popular computer programming languages are C, C++, Java, and Python. People who know several programming languages are sometimes referred to as generalists.

Computer support specialists

Computer support specialists install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly.

Which IT professional installs and performs minor repairs to hardware, performs software troubleshooting, and makes sure peripheral equipment works properly? Computer programmer Information security analyst Computer support specialist Computer systems administrator

Computer support specialists install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly.

A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server? Computer System Administrator Computer Programmer Computer System Analyst Computer Support Specialist

Computer system administrators are responsible for setting up larger computer assets like network servers and maintaining them for smooth, error-free operation.

Which observation about computing technology is expressed in Moore's law?

Computing processing power doubles every 18 months.

What is unstructured data?

Disorganized and cannot be easily read or processed by a computer because it is not stored in rows and columns like structured data.

ETL

ETL is an acronym for extract, transform, and load, and are tools that are used to standardize data across systems and allow the data to be queried. Querying is a tool that lets you ask your data questions that in turn lead to answers and assist in making decisions.

What is a MAC (Media Access Control) address?

Each network interface, both NIC and Wi-Fi, provide the computer with a unique 48bit address called a MAC (media access control) address, meaning that no two network interfaces have the same address and therefore uniquely identifies that computer network interface to the network.

Extract (ETL)

Extract: Once you have determined where your data reside, you can start extracting. The data are often extracted from customer relationship management (CRM) or enterprise resource planning (ERP) systems. One of ERP's main functions is to centralize an organization's data so that they end up being a wealth of data with value across the organization.

What are the six major components of an IT infrastructure?

Hardware Software Networks Data People Processes

What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards? Information Technology Software Operating System Hardware

Hardware is the physical components of a computer system.

IT architects

IT architects (applications architects) design parts of computer applications like screen interfaces, middleware, and programming infrastructure that comply with the head applications developer's design principles. Middleware is the computer programming and software that connect the components that an applications architect designs with the programming infrastructure, which includes the actual programming language components that help an application work as designed.

Which professional designs parts of computer applications (like screen interfaces, middleware, and programming infrastructure) that comply with the head application developer's design principles? IT architect Computer systems administrator Computer systems analyst Database administrator

IT architects design the parts of computer applications that comply with the head application developer's design principles.

Who is responsible for designing a detailed plan to address software incompatibility issues? IT architect Chief information officer IT portfolio manager Computer systems administrator

IT portfolio managers are responsible for the standardization of software rules and plans.

IT portfolio managers

IT portfolio managers are responsible for the standardization of software rules and plans. They design a detailed plan to address software incompatibility issues.

Information security analysts (ISA)

Information security analysts (ISA) (or cybersecurity analysts) are responsible for protecting all sensitive information within an organization. Duties include deploying firewalls to protect intranets and encrypting data transmissions to protect against attacks from inside and outside of an organization. ISAs are responsible for identifying security problems and attacks as well as determining an organization's potential weaknesses.

What is Information technology (IT)?

Information technology (IT) is the study, design, development, implementation, support, and management of computer-based information systems, particularly software and hardware.

Why is a passphrase useful?

It is secure and easy to memorize.

What is the defining characteristic of application software?

It performs a specific task for the user.

How does a knowledge management system (KMS) help a company? It generates knowledge from outside data. It provides access to collective company knowledge. It creates rules for sharing company knowledge. It evaluates company knowledge for decision-making.

It provides access to collective company knowledge.

What are Mainframe computers?

Mainframe computers are massive, room-sized computers that process and store enormous amounts of bulk data and information. They are typically used by very large organizations like credit card processors who employ them for transaction processing and vital applications. Mainframes require a huge amount of physical space and have special requirements like specialized air-conditioning units and fire protection systems.

What are Microcomputers?

Microcomputers are smaller than mainframes and midrange computers and are so common that they are most commonly referred to simply as computers and sometimes just referred to as boxes. They are the least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

What are Mid-range computers?

Midrange computers (sometimes called minicomputers) are less powerful and smaller in physical size than mainframe computers; they do many of the same things but on a smaller scale.

An additional problem that the consultant identified was that unauthorized users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue? Database administrator Computer systems administrator Web developer Information security analyst

The information security analyst has the responsibility for assigning access and monitoring unauthorized access.

What is The Internet?

The internet is the world's largest network and connects thousands of other networks together including LANs, CANs, MANs, and WANs. The interconnection of public, private, commercial, industrial, and governmental networks is called the internet.

What is a Physical cable system?

The most commonly used network cable is an Ethernet cable. Ethernet network cables are specialized wires with adapters that plug into the NIC, and the most common type of cable wire is called a twisted pair. A twisted pair is a specialized wire that cancels out electromagnetic interference from other electronic devices and increases reliability.

What is the main purpose of a firewall? To stop malware from causing damage within the network. To prevent employees from sharing data outside the network. To prevent unauthorized users from accessing the network. To stop denial-of-service attacks from spreading to the network.

To prevent unauthorized users from accessing the network. Firewalls ensure that only authorized personnel can access and use an organization's intranet.

What is Topology?

Topology is the mapping of a physical network and logical interconnections between nodes. It is the way a network is arranged and laid out. A node is any device that is connected as part of a computer network, including computers, hubs, printers, and switches.

Transform (ETL)

Transform: Once you have extracted data, they need to become normalized. Normalizing data means that your data are typically organized into the fields and records of a relational database. Normalization also reduces redundancy in storing data, which saves space and helps ensure that data are consistent.

On-demand cloud computing (ODC) platforms can be used to reduce data storage costs. True or False?

True. With an ODC a company does not have to pay for more storage than it will use.

What is a computer network?

Two or more computers connected to shared resources

What is utility software?

Utility software performs a particular function in the "background"; in other words, it requires little or no interaction with the user, but it is essential to the functioning of the computer. Examples of utility software include virus protection software and printer drivers.

What are four general attributes that define big data?

Volume Variety Veracity (Trustworthiness) Velocity

Web developers

Web developers prepare, plan, and implement web-based software applications like shopping carts for online stores to advanced intranet deployment. Generally, a business will identify a legacy system and ask senior web developers to rewrite it completely to make it browser-based so that it can be deployed on the World Wide Web for global distribution. Senior web developer is one of the most sought-after and highly paid positions in the information technology field.


Related study sets

Cell Cycle Intro and DNA Replication + PCR and Genome Variation

View Set

Chapter 10- Essential Peripherals

View Set

HY 136 Cooke | Test 1 Study Guide Multiple Choice

View Set

TO THE VIRGINS TO MAKE MUCH OF TIME & YOUTH'S THE SEASON MADE FOR JOY

View Set

T-38 Instruments/Nav Shooters Gouge

View Set