Information Technology Management Essentials - D075 WGU

Ace your homework & exams now with Quizwiz!

Servers

A central computer in a computer network.

Network Hub

A central location of the computer network that serves as a traffic cop for network connection and communication.

Gantt Chart

A type of bar chart that illustrates a project schedule.

Random Access Memory

A type of memory that allows data to be accessed in any order without physical movement of the silicone media.

Word Processor

An application software used to create, compose, edit, format, and print documents.

Registers

A location in a store of data used for a specific purpose and with quick access time.

Process

Any task a computer performs.

Graphical User Interface (GUI)

The visual system of computer screen designs that allow a user to interact with an electronic device.

Chief Information Security Officer (CISO)

The CISO is generally focused on the security of an organization's data and information, making sure it is backed up, deciding who gets to see it and who does not, and so on.

Business Analytics

Attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage.

Copyright

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author.

Database Management System Software (DBMS)

An application software that is used to create a collection of related files that consist of records of data separated by fields that can be queried to produce populations of information.

Presentation Software

An application software used to present information in a slideshow format.

Denial-of-service

An attempt to make a computer or any of its resources unavailable to its intended users.

Peer-to-peer Networks (P2P)

Computer networks that connect computers directly to one another without the use of a server.

Database Administrators (DBAs)

DBAs categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business.

Default-deny Firewall Rule

The only network connections that are permitted are the ones that have been explicitly allowed.

Ring Topology

The ring shape created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other

IT Managers

IT managers are in charge of software application development teams that develop, design, program, and test software applications.

Infrastructure

The underlying foundation or basic framework for an organization or project

Data Management (DM)

The practices, architectural techniques, and tools for achieving consistent access to and delivery of data across the spectrum of data subject areas and data structure types in the enterprise.

Databases

Well-thought-out collections of computer files, the most important of which are called tables.

File-sharing system

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files?

Supervisors

Which level of management gets the most detailed reports directly from the transaction processing system?

Data that have been given context become information.

What is the distinguishing feature that differentiates data from information?

Computer resource management

What is the major function of a computer operating system?

It is a visual presentation of graphs, charts, and diagrams.

What is the purpose of a dashboard in business intelligence (BI) software?

It uniquely identifies the records in a specific table.

What is the purpose of the primary key in a database?

Chief Security Officer (CSO)

A CSO is in charge of such things as the physical security and safety of employees, facilities, and corporate assets and may have a law enforcement background.

MAC (Media Access Control) Address

A MAC is responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel.

Object Linking and Embedding

A Microsoft technology that allows a user to share information and data from an entire area in one application in part of another application.

A knowledge management system

A business organization can increase collaboration if it has a database of its internal reports, articles, documents, policies, and decisions. Which tool helps manage this type of information?

Network Interface Controller

A card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers.

Software Suite

A collection of business computer application programs of associated functionality that share a common graphical user interface and have the capacity to smoothly exchange data across the programs.

Software

A collection of computer programs that accomplish a specific task.

Operating System

A collection of computer programs that work together to manage hardware and software to ensure that they are working properly.

Cloud database

A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company?

Optical Disk

A computer disk that uses optical storage techniques and technology to read and write data.

Metropolitan Area Network (MAN)

A computer network that connects two or more LANs or CANs together within the boundaries of a town or city.

Local Area Network (LAN)

A computer network that is relatively small, typically in a single building, but sometimes as small as a single room.

Spyware

A computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent.

Identity Theft

A crime concerning the unlawful practice of assuming another individual's identity.

Phishing

A criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details by masquerading as a legitimate business organization, typically in a legitimate-looking email.

Clients

An end user's computer in a computer network.

Click Fraud

An internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee.

Best Practice

A management process, technique, or method that is most effective at arriving at a desired outcome or a better outcome than any other process, technique, or method

File Allocation Table (FAT)

A table of contents that directs the read/write arm of the hard drive to the location where data exist and accesses the data upon the user's request.

Node

Any device that is connected as part of a computer network, including computers, hubs, printers, and switches.

Semi-structured Data

Data that can be converted into structured data with a lot of work.

Big Data

Data that is collected from all over the internet, including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources.

Wide Area Networks (WAN)

Computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together.

Internet Fraud

Refers to any fraudulent activity in an online setting. Internet fraud can occur through email systems, message boards, chat rooms, or websites.

Virtual Memory

Memory that appears to exist as main storage although most of it is supported by data held in secondary storage, transfer between the two being made automatically as required.

Disk Storage

Nonvolatile, secondary storage on a physical device like a hard drive or optical disk with a read/write apparatus

Campus Area Network (CAN)

A computer network that connects two or more LANs that are located on a campus.

Point of Failure

A part of a system that, if it fails, will stop the entire system from working.

Data Management Processes

The process of acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business.

Validity Checks

The process of ensuring that a concept or construct is acceptable in the context of the process or system that it is to be used in.

Data Mining

The examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships.

Schema

The organization or layout of a database that defines the tables, fields, keys, and integrity of the database. It is the reference or blueprint of the database.

Unstructured Data

Unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional data tables

Information Security Analysts (ISA)

ISAs are responsible for protecting all sensitive information within an organization.

Data Analysis

The application of statistics and logic techniques to define, illustrate, and evaluate data.

Intranet

A private network that works the same way as the internet but is confined within an organization.

Default-allow Firewall Rule

A rule that all traffic is allowed unless it has been specifically blocked.

Network Operating System (NOS)

Software that controls an entire network. A computer operating system that connects computers together within a local area network.

Application Software

Software that is designed for the user to carry out a specific task.

System Software

Software that runs in the background and requires very little or no user intervention.

Computer Network

Two or more computers connected together to communicate and share resources.

Foreign Key

A field in a database table that provides a link between two tables in a relational database.

Primary Key

A field in a database table that uniquely identifies a record in the table.

Creating the marketing images

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer initial copyright protection of these marketing images?

Cache

A hardware or software component that stores data so that future requests for that data can be served faster.

The door lock

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario?

Chief Information Officer (CIO)

A job title for the board-level head of an information technology department within a business organization. The CIO's job is to make sure IT assets are in place to ensure a smooth transition.

Bus Topology

A network topology sometimes called a linear bus, where each of a network's nodes is connected to a common linear backbone that has two endpoints.Go To

Trojan Horse

A program that often seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system

Unified Modeling Language (UML)

A set of graphical notation techniques to create computer models and applications.

Transmission Control Protocol/Internet Protocol (TCP/IP)

A set of protocols used to connect a network to the internet.

Network Protocol

A set of rules a network must follow.

Solid-state Drive (SSD)

A solid-state storage device that uses integrated circuit assemblies as memory to store data persistently, typically using flash memory.

Protocol

A standard language that devices connected to a network use to communicate and transfer data.

Knowledge Management Systems (KMS)

Collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer.

Data Mapping

Extra notes about the definition of a field, its data, and its use.

Tables

Holds the data for a database. Consists of records and fields that can be queried.

Midrange Computers

Less powerful and smaller in physical size than mainframe computers, they do many of the same things but on a smaller scale.

Mainframe Computers

Massive, room-sized computers that process and store enormous amounts of bulk data and information.

Hypertext Transfer Protocol (HTTP)

Protocol used to define how messages are formatted and transmitted on the internet.

Malware

Programs specifically intended to penetrate or damage a computer system without the end user's knowledge.

Adware

Programs that automatically display or download advertising to a computer

Ethernet Card

Provides the computer with a unique 48-bit address called a MAC (media access control) address. No two Ethernet cards have the same address.

RFID (radio frequency identification)

RFID transmits product identification over radio waves for inventory.

Structured Data

Resides in a fixed format. It is typically well labeled and often with traditional fields and records of common data tables.

System Development Life Cycle (SDLC)

SDLC is a process for creating and altering computer applications through a step-by-step approach that includes planning, system analysis, design, implementation, and system maintenance.

Firewall

Specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet.

Business Intelligence (BI)

Strategies and technologies used by enterprises for the data analysis of business information.

Chief Technology Officers (CTO)

The CTO runs the organization's IT engineering group and serves as the company's top technology architect.

Spam

The abuse of an email system to arbitrarily send millions of unsolicited bulk messages.

Cybersecurity

The convergence of technologies, sound practice, and processes designed to protect networks and their devices, programs, and data from attack or unauthorized access.

Microcomputers

The least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

Volume

The main characteristic of big data is that it is big, and the remarkable volume it takes just to hold and manage it can be an effort in itself. The total volume of big data is growing exponentially year after year.

Hypertext Markup Language (HTML)

The major markup language used to create web pages.

Topology

The mapping of a physical network and logical interconnections between nodes.

Structured Query Language (SQL)

The most widely used standard computer language for relational databases, as it allows a programmer to manipulate and query data. One of the most common uses of SQL is to query tables.

Network Administrator

The person(s) responsible for smooth network operations, network performance, and implementation of new nodes or even new networks.

Hardware

The physical part of the computer.

Star Topology

The star shape created by network nodes that radiate around a central node in a spoke-like fashion.

Information Technology

The study, design, development, implementation, support, and management of computer-based information systems, particularly software and hardware.

Extract, Transform, and Load

Tools that are used to standardize data across systems and allow the data to be queried.

Variety

Variety indicates that data come both from structured and unstructured areas and in various forms. Structured data are data that you can easily recognize, such as your electric bill, and this information easily fits into a relational database. But there are also the unstructured data that come from personal writings, such as Facebook, MRI images, photographs, and blogs, and data from satellites. This is valuable information that does not fit a form.

Velocity

Velocity is how many data are presented that need to be stored or processed over a given time period. Streaming applications such as Amazon Web Services are an example of a good velocity of data, not to mention how many data your cell phone generates each minute or satellites generate and stream down for analysis.

Veracity

Veracity is akin to the "trustworthiness" of the data. Do the data represent what you believe they should? And, are there discrepancies within the data that must be ferreted out and "scrubbed" to make the data worthwhile and valuable?

The IT department provides services and support to the other departments.

What makes IT unique compared to other departments in businesses?

Keylogging

When a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard.

Search engine marketing

Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser?

Wi-Fi-connected drones with GPS and camera

Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem?


Related study sets

HHSC 105 Appendicular Skeleton: Terms & Vocabulary

View Set

Chapter 4 - Of Tests and Testing

View Set

Pharmacology Chapter 29, Fluids and Electrolytes

View Set

Unit 9 Exam - Resource/Factor Markets

View Set