Introduction to IT - C182 WGU, Introduction to IT - C182 WGU, WGU C182 Introduction to IT

Ace your homework & exams now with Quizwiz!

What is OLAP?

*Online Analytical Processing* - describes the *functionality for spectral manipulation and analysis of huge volumes of complex data*

A proxy server is used in an organization to

A proxy server is used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.

Print Server

Monitors print jobs

Why did hardware become ubiquitous?

Because of the reduction in size, increase in capability, and reduction in prices most everyone was able to have a computer.

Server

Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network

CIA

Confidentiality Integrity Availability

CIA

Confidentiality, Integrity, Availability

How is data used?

Data can be organized, manipulated, filtered, sorted and used for computation.

Define data in relation to DIKW Hierarchy.

Data is the input directly received by the human or computer.

Data Validation

Ensuring that users enter the correct data type

Octal

Every value is represented with some combination of 8 digits (0 - 7)

When did the fourth generation of computers occur?

From early 1970's through today.

Language Translator Programs

Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer

What led to computer users learning computers with little or no training?

GUI (Graphical User Interface) operating systems.

What are the 3 primary roles of peripherals?

Input Output Storage

What is one problem regarding patenting software?

It is difficult for patent officials to determine whether a specific form of software is an actual invention or would be obvious to someone of ordinary skill in the field.

FTP Server

Like a web server in that it hosts files and allows clients to access those files.

The ___ model is one application where the various design logic (input, business and interface) are logically separated. This differs from the n-tier development model where each tier is a separate application.

MVC

What are typical N-tier development projects broken down into?

Presentation Tier Logic Tier Data Tier

Information

Processed data.

Difference between IT Professional and IT Specialist

Professional: Expected to understand theory, hardware/software components, and programming techniques; need less math than a computer scientist. Specialist: Have greater privileges with respect to the computer systems - have access to many resources; must become aware of the impacts that computers, and IT in general, have on society (jack of all trades).

Structured Programming

Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements

Implementation

Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users.

Multi-tier development

Separation of different aspect of a system, rather than have one program perform all aspects of a system.

4th Generation of Computers

Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use

What is horizontal software?

Software that can be used across all divisions within an organization. Productivity software is sometimes referred to as horizontal software.

OLTP

Online Transaction Processing

Boolean/Logical

True/False

Freeware

Usually software that has become obsolete; is free

Data tier

Where data are stored, retrieved, and updated from database tables. Also resides on the organization's servers and usually on a separate database server.

What are the two components of the domain name and what does it do?

The Host Name Top-Level Domain Name

IPOS

The Input-Procession-Output-Storage Cycle

Data mirroring

The OS writes data (and changes to data) to multiple hard drives at the same time.

Natasha prints out the quarterly report of sales figures. Which step of the N-tier development would this be?

The Presentation tier. This is where the user interacts with the computer and the icons needed to print a document.

Slicing

creates a subset of the data by reducing the data from multiple dimensions to one dimension.

Private

is information that could be a threat if disclosed to others such as social security and credit card numbers, or health and education information. This information is often protected from disclosure by federal legislation.

Rolling up

is similar to drilling up in that it summarizes data, but in doing so, it collapses the data from multiple items (possible over more than one dimension) into a single value.

IP Addresses

The address used to communicate on the internet, also called a URL (universal resource locator). IP address consists of four numbers, where each number is between 0 and 255. (ex: cnn.com is 157.166.226.26) IP addresses are between 4 and 32 bits in size

Software as a Service (SaaS)

delivers applications over the cloud using a pay-per-use revenue model. IE, you are leasing the software. Ex: Office 365

What is included in the OS kernel?

The components that handle process management, resource management, and memory management. Without these, you wouldn't be able to start a new program or have that program run efficiently.

Local Computer

The computer that the user is using; physically present with

User

Those who use a computer.

Domain Name Parts

Top level domain (TLD) name and Host name

Skills and duties of IT Personnel

- Troubleshooting problem solving - Knowledge of operating systems - System level programming - System security - Use, install and replace hardware

The Internet of Things (IoT)

refers to the myriad types of devices that can and will be connected to the Internet in the next few years.

Data Mart

the means by which users obtain data or information out of the data warehouse.

Computer Network Advantages

1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication

What are the detractors of a star network topology

1. Does require a dedicated device (switch, hub or server), making it more expensive than the bus topology. 2. If the hub is lost, all devices lose connectivity.

Strategic Risk Analysis

1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats

Primary Key

A field int he relations that contains a unique value

A file server is

A file server is in essence a computer with a large hard disk storing files that any or many users of the network may wish to access. The more complex file servers are used to not only store data files but also to store software to be run over the network.

Algorithms

A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process

Mesh Network topology

A fully connected network. Requires that every device have a point-to-point connection with every other device.

System Deployment

1. System Conversion 2. Final Documentation 3. End User Training

Hierarchical Databases

A hierarchical database format organizes data using a tree-like or organizational chart type structure. The main data points can have multiple sub-data points associated with them referred to as a parent-child model; however, the sub-data points can only have one main data point, i.e. the child can only have one parent.

What is a Join (database query)

A join withdraws information from multiple relations and joins them together to obtain multiple records from multiple relations.

A language translator is

A language translator is a program that takes one program, written in a high-level language, as input, and creates a machine language program as output. These high-level languages are also called programming languages, which are a vocabulary and set of rules for instructing a computer to perform certain tasks.

Packet Switched Network

A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic

What is a Graphical User Interface (GUI)

A method of human-computer interaction characterized by a graphical display, a mouse to move a pointer around the screen, and the ability to perform actions by pointing at objects on the screen and clicking a mouse button.

What do today's computers typically provide for storage size?

32 bits (4 bytes) and 64 bits (8 bytes).

What is a MAC address?

48 bit address used to identify networking cards and appliances

Define computer system (system for short).

A collection of components that work together to meet the needs of the user. These components are typically categorized as either hardware or software. In addition, networks and users are often considered to be part of a computer system.

Computer System

A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.

Network

A collection of computers and resources connected by various media so that they can communicate with each other.

What is a network?

A collection of computers and resources connected by various media so they can communicate with each other

What is an information system?

A collection of data and information used to support management of an organization. The technical components and human resources that enable the assembly, storage, and processing of data.

Information Systems

A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.

What is the world wide web

A collection of files, linked together by hyperlinks. These files are stored on servers, and these servers are among the various computers connected to the internet.

Data Warehouse

A collection of organized databases

Data Warehouse

A collection of organized databases.

Protocol Stack

A collection of protocols. TCP/IP is an example.

Network Hub

A device that connects multiple computers together. When there are multiple computers connected to a hub, a message received by the hub is forwarded to all ports on the hub. A destination address attached to the message indicates which computer the message is intended for, but it does not prevent other computers from picking up the message. A hub broadcasts the transmission, as it sends the data to every device on the network.

Router

A device that connects multiple networks together. Typically used in specific locations in a network so that messages can be routed to other networks. A router contains programmable routing tables and includes at least one input that comes from another network, differentiating itself from a switch and hub.

What is a projection (databases)

A type of query that returns all of the records from the relation, but only select attributes or fields. Ex: project the relation from a table to provide just the first and last names.

What is MySQL

A very popular, open source databases server. MySQL is actually an umbrella name for a number of different database products: - MySQL Community (database server) - Proxy server for a MySQL database - Cluster server for high-speed transactional database interaction - A tool to support a GUI construction.

Binary

A way of representing information using only two options. (0,1)

Queries can be used to do all of the following except: A. Determine whether data in relations is accurate B. Delete records of given characteristics C. Retrieve data from relations with specific characteristics D. Modify multiple records based on a given set of criteria

A. Determine whether data in relations is accurate. A query can only conduct searches for specific characteristics.

Character Representation

ASCII and Unicode

What are some System Administrator duties?

Account management: creating new user accounts and deleting obsolete user accounts. Password management: making sure that all users have passwords that agree with the security policy. File protection management: making sure that files are appropriately protected (for instance, making sure that important documents are not writable by the outside world) and performing timely backups of the file system Installing and configuring new hardware and troubleshooting hardware including the network. Installing and configuring new software including updating new operating system (OS) patches, and troubleshooting software. Providing documentation, support, and training for computer users. Performing system-level programming as necessary (usually through scripting languages rather than writing large-scale applications or systems software). Security: installing and maintaining a firewall, examining log files to see if there are any odd patterns of attempted logins, and examining suspicious processes that perhaps should not be running.

Proxy Server

Acts as a giant cache of web pages that anyone in the organization has recently retrieved

SQL Injection

An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database

E-mail Server

An e-mail server provides e-mail service. Its job is to accept e-mail requests from clients, send messages out to other e-mail servers, receive e-mails from other servers, and alert the user that e-mail has arrived.

Network administrators

Are responsible for the installation and maintenance of hardware and software that make up a computer network. Network administrators may also be required to secure the network; this task may be accomplished in conjunction with other IT personnel such as system administrators.

How have users progressed with technology?

As computers got simpler to use, and the advent of personal computers and GUI operating systems, users could learn to use computers with little to no training.

64-bit processor

A microprocessor with registers, address bus, and a data bus that hold 64 bits of data, in contrast to 32-bit processors that hold 32 bits of data

Network Switch

A more functional connection than a hub. It records and recognizes the local network addresses (MAC addresses) of all computers connected to the switch. A message is only passed along to the computer that matches the destination address. While a switch can be used to broadcast to all computers in a network, its purpose is to only send transmissions to a specific, intended computer.

Relational Database

A relational database is the most common structure for databases. A relational database has multiple tables (relations) with interrelated fields. When you perform a query in a relational database, data can be pulled from any number of relations that may be contained in multiple databases. Relational databases can also create new tables out of requested information in a query.

A projection is

A projection is another form of query that returns all of the records from the relation, but only select attributes or fields. Note: I've been a database programmer 20+ years and I've never heard of anyone refer to a projection query in the workplace. I'm sure this is technically correct, but the vast majority of queries you will perform in the real world will be "projection" queries since you will request specific fields instead of every field in most cases.

Projection

A query that returns all of the records from the relation, but only select attributes or fields

The Model (MVC)

A representation of an object or event in MVC. The model can take on different forms depending on the complexity of the application. Ex: In e-commerce, the model could be of a company's product. The product model could interact with the database containing information about "Products," (vender information, price information, quantity information, etc.) The model is used to retrieve information about the product, to add new Product information, or to update Product information.

Both coaxial cable and twisted wire transmit information using using _________ ______voltage (e.g. 10BASET uses +2.5V or -2.5V), whereas fiber optic cable uses _______ _________.

electromagnetic waves light pulses

Authenticity

ensures that the data, information, or resource is genuine. This allows a valid transaction to take place (whether in person or over the Internet). Authenticity is most commonly implemented by security certificates or other form of digital signature.

In the case of a ______ ________, the server's role is to send files over the network at the request of clients.

file server

Non-repudiation

is a legal obligation to follow through on a contract between two parties. In e-commerce, this would mean that the customer is obligated to pay for the transaction and the business is obligated to perform the service or provide the object purchased.

Computer support specialist

is somewhat of an umbrella term. Certainly, some of the roles of the support specialist could be a responsibility of a system administrator. The support specialist primarily operates as a trainer and troubleshooter. Training tasks may include the production of material such as technical manuals, documentation, and training scripts.

Project management

is the application of knowledge, skills and techniques to execute projects effectively and efficiently.

Dicing

is the same as slicing except that the result can be in multiple dimensions, but still obtaining a subset of the data.

WHERE

is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.

SELECT

is used to inform the DBMS what fields or attributes are of interest

FROM

is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.

In networks we define computers as being _______ or ________.

local remote

A ____ server functions by: one submits e-mail to the server to be sent to another e-mail server. The two e-mail servers communicate with each other, and once the e-mail is received at its destination, the recipient server informs the recipient user that new e-mail has arrived.

mail

Drilling up and down

merely shifts the view of the data. Drilling down provides more detail and drilling up provides summarized data.

In a ____ network, every device is connected directly to every other device in the network.

mesh

What type of data is the following: - 4 - 4.2

Number integer: a whole number floating-point: a number with a decimal point (numeric data)

Floating-point

Number with a decimal point

Cloud Computing

Offers, as a service, the ability to offload computation and storage from your local computer

Relation

Often presented as a table

N-tier Development

Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects

Direct Conversion

Old system is turned off and the new system is turned on at a specific data and time

Project Closing

Once all deliverables have been met, a project is considered closed. In reality, though, organizations often build in a testing phase to gather data about aspects of a project that may need to be fine-tuned in the future.

Difference between information and data

Once data from sender is *verified and validated* by receiver, then it is considered information. Information can also be considered as processed, or interpreted, data: raw data is the input and information is the output of some process.

Flat File Database

One large single table; used if the amount of data that is being recorded is fairly minimal

Denial of Service (DOS)

One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business

OLAP

Online Analytical Processing. In OLAP data are processed through a suite of analysis software tools. You might think of OLAP as sitting on top of the data warehouse so that the user can retrieve data from the data warehouse and analyze the data without having to separate the database management system (DBMS) operations from the more advanced analysis operations. OLAP operations include slicing, dicing, drilling down (or up), rolling-up, and pivoting the data.

What is OLDP?

Online Data Processing - operates with data in real time, aka a "live" database. Used by systems that require data to be processed immediately in real-time. Ex: booking an airline ticket, playing World of Warcraft

ODBC

Open Database Connectivity

What is the most popular web server used today?

Open source Apache server. Aside from servicing requests, Apache can execute scripts to generate dynamic pages, use security mechanisms to ensure that requests are not forms of attacks, log requests so that analysts can find trends in the public's browser behavior of the website, and many other tasks.

Describe knowledge of OS's (IT Skill)

Operating system installation, application software installation, user account creation, system monitoring. Examples: versions of Windows, Mac OS, Linux, Unix, etc.

By the mid 1960's the resident monitor was being called an __________ ___________, a program that allowed a user to operate a computer.

Operating system.

Bus

Permits information to move between each component; electrical channels that enable communication among the electronic components

What are the levels that computer networks can be viewed at?

Physical - connections or physical media over which communication is possible (such as copper cables or other physical objects that can be held) Logical - network topology (how the network is laid out or organized) Software - protocols and programs that allow the computers to communicate.

Hardware

Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.

Cold Site

Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have

Hot Site

Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.

What are daemons?

Pieces of software in the operating system that run in the background all of the time. They wait for an event to arise before they take action. Other pieces of the operating system are executed based on a scheduler.

Security Education

Users learn how to protect their passwords and other security measures

Hexadecimal

Uses a base 16

Buffer Overflow

Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code

PaaS

Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.

Decimal

Uses base 10 to represent numbers (0 - 9)

Binary

Uses base 2 system (0 and 1)

Event-driven Processing

Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another

Alpha Testing

occurs where the system will be used. For example, software may be tested by a client or by a specific department within an organization. During alpha testing, system developers often assist end users as they interact with the new system. It is common for simulated data to be used to prevent any damage to a user's actual data.

6 steps in SDLC

Preliminary investigation Analysis Logical design Physical design Implementation Maintenance

Common Steps in SDLC

Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance

Operating Systems

Primary task is to allow a computer user to easily access the hardware and software of a computer system

Administrator Ethics

Privacy, Ownership, Control, Accuracy, Security

Project Initiation

Problem definition, resource allocation, risk assessment

Describe storage in relation to IPOS cycle.

Processed information is stored for permanent record.

Storage

Processed information is stored for permanent record.

Batch Processing

Processing large amounts of data all in one batch when the computer system is not busy

Describe computer families.

Produced during the third generation, computers in a given family were able to run the same programs without having to alter their program code.

Utility Programs

Programs that allow the user to monitor and improve system performance.

System software

Programs that make up the operating system. Usually directly supports the computer system itself.

Authentication

Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)

The rows in a database are called ________.

Records. They describe the item of interest, which could be people, objects or concepts (ex: a customer, an automobile, or a college course). Formally known as tuples. Ex: *Student ID* *First Name* *Last Name* 11151631 George Duke 10857134 Mike Keneally *19756311* *Ian* *Underwood*

Big Data

Refers to data sets that are so large and complex that they will require more advanced database management/processing tools.

The Internet of Things (IoT)

Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.

Protocol: https://

Reflects the set of rules by which the resource is transmitted. Web pages use HyperText Transfer Protocol (HTTP). When the content being transferred requires encryption (ex: financial transactions), a secure protocol to the server is used (https://)

What is the typical organizing principle of a database?

Relation. A relation is where data about a single entity, like customers, inventory, and sales are stored. Ex: a relation might consist of student records. For each student, there is a first name, a last name, a student ID, a major, a minor (optional), and a GPA.

Characteristics of Quality Data

Relevance - the data being used must apply directly to the decision being made Timely - data must be efficient and must be provided in a timely manner Thorough - the data must be complete Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible. Reliable - data should reflect stable and consistent data collection processes across collections points and over time

List the characteristics of quality data? (hint: RTTAR)

Relevance, Timely, Thorough, Accurate, Reliable.

Data Qualities

Reliable Accurate Thorough Timely Relevant

Boolean/logical data

Represents data fields that have only two possible answers: yes/no or true/false. Just like the binary digital system used by the computer, these data types have two states: 0 or 1

Unnecessary Requirements

Requirements that are not actually needed but are "nice to have"

Circuit Switched Network

Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission

Confidentiality

Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users

Integrity

Requires that data is correct

Availability

Requires that information is available when needed

In the early 1960's the operating system was called a ________ _______.

Resident monitor.It would always be resident in memory, available to be called upon by any user. It was known as a monitor because it would monitor user requests. The requests were largely limited to running a program, specifying the location of the input (which tape drive or disk drive, which file(s)), and the destination of the output (printer, disk file, tape file, etc.).

Database Server

Responds to queries by pulling from the database. Typically only to local clients.

What are benefits to ring topology?

Rings are cheap, like bus networks, as there is no dedicated resource that serves as a central point.

Difference between Security and Network administrators

Security: securing the network parameter by allowing/denying access to data ports over the network; working with firewalls specifically Network: Physically installing and securing networking devices.

Worms

Self contained programs that do not need other programs to propagate across computers and computer networks

File Server

Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files.

Multi-tier Development

Separation of different aspect of a system

Bus Network Topology

Simplest form next to point-to-point. Every resource is connected to a single cable through T-connections. The network cable carries one message at at time. All devices listen to any communications over the single cable and ignore other messages not intended for them.

What is the major drawback of the Bus Network topology

Since all messages travel along one cable, however, the efficiency degrades as more devices are connected to it.

Logic Tier

Sits between the user interface and the data. Acts as a conduit through which data flows to the user from the database as well as how data input from the user is used to update the underlying records in the database. The logic tier is where the system does its logic processing.

Shell Scripting

Small programs that place Linux commands or DOS batch files into a file

Object-oriented programming (OOP) was first introduced in the language __________ in the 1970's and early 1980's.

Smalltalk

SaaS

Software as a Service. Can access and use software through the Internet.

Open Source

Software created in the Open Source Community and made freely available as source code.

Proprietary Software

Software purchased from a vendor; also known as commercial

Virus

Software that attaches itself to another legitimate software application

Public Domain

Software that has been moved into the public domain. Like freeware, this is software that no one wishes to make money off of or support. Anything found in the public domain can be used however you feel; no one is claiming rights to it.

Public Domain

Software that has been moved into the public domain; can be used however you feel

Local Applications

Software that is stored on an individual computer

What is a database management system?

Software that responds to user queries to create, manipulate, and retrieve records from the database.

In a _________ switched network, a message's pathway is only established as it is sent. When a message is received at one location, if it is not the destination location, then the message is forwarded on to another location. The choice of pathway is based on network availability and amount of message traffic. Most computer networks are _______ switched, with the Internet being the most well-known and commonly cited example.

packet

A _____ means that each computer is roughly equal to every other computer.

peer

We can also classify networks by the role that computers play within the network. Specifically, we refer to networks as either ___________ or ___________ networks.

peer-to-peer client-server

Implementation

Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users

Digital Signature and Electronic Authentication Law of 1998 (SEAL)

permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures. This was followed 2 years later with the Electronic Signatures in Global and National Commerce Act.

Confidentiality

requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.

Integrity

requires that data is correct. This requires at a minimum three different efforts. First, data gathering must include a component that ensures the accuracy of the collected data. Second, data must be entered into the system accurately. But third and most importantly, data modification must be tracked.

Availability

requires that information is available when needed.

In a ____ network, each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.

ring

Security Breach Notification Laws

since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both unencrypted and compromised.

Ownership

who owns the data accumulated and the products produced by the organization?

Preliminary investigation

Assesses the feasibility of the proposed project and selects a development methodology

Anti-viral Software

Attempts to identify if a file contains a virus or some form of malware

True or false: Business intelligence systems are best used for resource management.

False. BI systems are best used to make strategic decisions, like whether or not a company should expand.

True or false: Applications store data in their own files.

False. Databases store data, not applications.

True or False: First Generation computers were relatively inexpensive compared to today's computers

False. ENIAC itself cost $500,000. Even without accounting for inflation, first generation computers were far more expensive than today's computers.

True or false: As computers became more widely available, users waned more detailed control over how the computer ran programs

False. On the contrary, as more people began using computer systems, users wanted more convenience and easier access to computer systems which resulted in the development of operating systems.

True or False: One database can only support one application.

False. One database can support multiple applications.

True or False: Business intelligence systems help organizations make short-term operational decisions.

False. The information presented by a BI system aids in making large, impactful company choices, rather than simpler operational decisions.

Attributes

Fields in a database (column headers)

What are some reasons file servers are still advantageous for most organizations

File servers support file sharing, permits easy backup of user files, allows for encryption of data storage, allows remote access to files.

Why aren't file servers not very prominent today?

File servers used to be very prominent in computer networks because hard disk storage was prohibitively expensive. Today, with 1 TB of hard disk space costing $100, any organizations have forgone the use of file servers.

What is an advantage to a flat file format?

Files can be easily imported into other programs that use a different file format Data can be captured through one program and then imported into another.

Evolution of Users

First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.

Business intelligence is considered what part of the DIKW hierarchy?

Formally defined, Business Intelligence is knowledge, and a business intelligence system helps to capture the knowledge contained in various information systems within the company for strategic decisions.

When did the third generation of computers occur?

From 1965 until early 1970's.

When did the second generation of computers occur?

From around 1959 until 1965.

What are some broadcast devices used in a network?

Hubs, switches and routers. These devices "glue" the network together by providing points where a network can connect to devices and other networks.

Why did integrated circuits replace transistors and magnetic core memory?

ICs take up less space reducing distance current has to flow, could be mass produced. They could be used for computation and for storage.

Define Knowledge in the DIKW Hierarchy.

Knowledge is sometimes defined as information that has been put to use. In other cases, knowledge is a synthesis of several different sources of information. One way to think of knowledge is that it is information placed into a context, perhaps the result of experience gained from using information. Additionally, we might think of knowledge as being refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed. As an example, one may learn how to solve algebraic problems by studying algebraic laws. The laws represent information, whereas the practice of selecting the proper law to apply in a given situation is knowledge.

What is a disadvantage of a compiled language?

Lack of portability. When the entire program is translated, it is translated into machine code that is compatible with a specific type of computer. E.g., different types of PCs, Apple, and mobile devices need different machine languages to work. The program itself is portable in that it can be compiled differently for different computers.

High-level Programming Languages

Languages that take more work for the computer to decode, but are easier to program in.

Although very expensive, magnetic core memory permitted computers to have. . .

Larger main memory sizes (from hundreds or thousands of bytes to upward of a million bytes).

Define Wisdom in the DIKW Hierarchy.

Some refer to wisdom as an understanding of "why"—whether this is "why things happened the way they did" or "why people do what they do." Wisdom can only come by having both knowledge and experience. Knowledge, on the other hand, can be learned from others who have it. Wisdom is the ultimate goal for a human in that it improves the person's ability to function in the modern world and to make informed decisions that take into account beliefs and values.

Script

Sometimes uses to refer to a small program that have been traditionally used for automation

Sort

Sorting records based on some field(s) such as ascending order by last name

What is the most commonly used proxy server

Squid, although Apache can also serve as a proxy server. Squid can be configured for the number and size of caches, and the Squid firewall to permit or prohibit access of various types.

RAM

Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power). You can choose the amount of RAM your computer has.

Web Server

Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.

Memory

Stores the programs being executed and the data they are using.

What is Machine/Low-level Languages?

Machine language is the most basic set of instructions that a computer can execute directly. Early computer programs were written in machine language, written for a specific machine, often by an engineer who built and ran the computer themselves.

Early computer programs were written in ________ ____________.

Machine language. Often for a specific machine, often by the engineers who built and ran the computers. Entering the program was not a simple matter of typing it in but of connecting memory locations to computational circuits by means of cable, much like a telephone operator used to connect calls. Once the program was executed, one would have to "rewire" the entire computer to run the next program.

What innovation along with transistors helped usher in the second generation of computers?

Magnetic core memory. Magnetic core memory consists of small rings made of magnetic materials, placed in a wire-mesh framework. Each ring stores one bit by having magnetic current rotate in either clockwise or counterclockwise fashion.

Computers of the second generation were largely called what?

Mainframe computers - computers built around a solid metal framework.

System Administrator

Maintains all aspects of the system including hardware, software, and programming.

Flat File Database

It is one large single table without the relations between tables that a relational format provides. The most common example of a flat file is a CSV file (comma separated values). Records in a flat file are separated by a delimiter. In a CSV file, that delimiter is a comma. One of the advantages of the flat file format, is that these files can be easily imported into other programs that use a different file format; data can be captured through one program and then imported into another.

What does the control unit do?

It retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU.

What are the advantages of the Start Network Topology

Its simplicity, ease of adding (or removing) devices, and the efficiency of message transferal. The star network does not have to contend with message traffic like the bus network. The number of links it takes for any message to reach its destination is always two (or one if the message is intended for the hub device).

JDBC

Java Database Connectivity

Examples of Scripting Languages

Javascript, ASP, JSP, Perl, TLC, PHP

Which type of query is used to withdraw information from multiple relations?

Join. The data from multiple relations can also have repeated attribute values

What was FORTRAN mainly used for?

Mathematical/scientific computing

What does memory do?

Memory stores the program(s) being executed and the data that each program is using.

What are some differences between a mainframe and a mini computer? (Third generation)

Mini-computers were scaled down versions of mainframes. They used same type of processor but had reduced number of registers, reduced memory, etc. A main frame might support thousands of people, whereas a minicomputer might only support tens or hundreds of people.

What is a drawback to networks?

Does NOT increase information security and can make more security risks by opening more avenues to attack a network.

Moore's Law

Doubling of transistor count roughly every 18 - 24 months (exponential increase); observation, not physical law

If you are not going to be using numbers for mathematical calculation in a database, they are to be stored as _________

String (text). Ex: Student IDs

SQL

Structured Query Language (SQL). SQL is a standard query language that is used to communicate in many DBMSs.

Difference between Switches and Hubs

Switches: - Smart Devices - Connect two devices one-to-one Hubs: - Not so smart devices - Connect devices by broadcasting

Difference between System and Network administrators

System Administrators: work with users Network Administrators: work with the physical network

SDLC

System Development Life Cycle is a process for planning, creating, testing, and deploying information systems, including hardware and software.

What factors can affect processing speed?

System clock speed Having multiple CPUs, RAM available to store data as it's processed, The wiring of electrical circuits.

During deployment what 3 things usually occur?

System conversion (which means replacing the old system with the new system) Final documentation End-user training

Alpha Testing

System developers assist end users as they interact with new system; simulated data is used

How is system software different from application software?

System software is started automatically rather than by request of the end user.

Utility Programs

System utilities are programs that allow the user to monitor and improve system performance. E.g.: defragment hard drive, scan files for viruses, etc. System utilities must be installed separately as they may not come with the Operating System.

Utility Programs

System utilities are programs that allow the user to monitor and improve system performance. Utilities greatly range in function.

Software Categories

Systems Software and Applications Software

Define system software.

Systems software includes the operating system and all the utilities that enable the computer to function.

What is the most common network protocol?

TCP/IP (Transmission Control Protocol/Internet Protocol), which is a requirement of all computers that communicate over the Internet. Note: TCP/IP is really a collection of protocols and is sometimes referred to as a protocol stack.

What is the most commonly used network protocol and a requirement of all computers to run over the internet

TCP/IP protocol.

Interpreted Language

Takes the most recently entered instruction, translates it into machine language, and executes it

Interpreted Language

Takes the most recently entered instruction, translates it into machine language, and executes it.

Interpreter

Takes the most recently entered instruction, translates it into machine language, and executes it.

What is information technology?

Task of gathering data and processing it into information. The ability to disseminate information using technology. The technology itself that permits these tasks. The collection of people who are in charge of maintaining the IT infrastructure (the computers, the networks, the operating system).

Dumb terminals

Terminals connected to a computer network that allowed individuals user to connect to the computer. Dumb terminals were merely input and output devices; it had no memory or processor, with all computation and storage taking place on the computer itself.

In the DIKW Hierarchy what do we mean when we say information has been inferred from data?

That one or more processes have been applied to the data to transform it into a more useful form.

What does the ALU do?

The ALU does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen.

What does the bus do?

The bus is the device that permits information to move between each component. The bus then is the device that allows this electrical current to flow between each component in the computer system.

How does magnetic core memory work?

The collection of magnetic cores and wires constitute memory where each ring (at the intersection of a horizontal and a vertical wire) stores a single bit. The wires are used to specify which core is being accessed. Current flows along one set of wires so that the cores can retain their charges. The other set of wires is used to send new bits to select cores or to obtain values from select ones.

What 2 parts make up the CPU?

The control unit (CU) and the arithmetic logic unit (ALU).

The Controller

The controller is the part of an application that interacts with the user (via the view) and passes along the user requests to the model. The results from the model will determine the type of view the controller uses in the interface presented to the user. It is in the controller layer that the input logic is designed.

In what layer is the input logic designed in MVC?

The controller layer.

Kernel

The core components of the operating system are referred to as the kernel. The kernel is loaded when the computer is first booted. Included in the kernel are the components that handle process management, resource management, and memory management.

OS Kernel

The core components of the operating system. The kernel is loaded when the computer is first booted. The kernel sits on top of the hardware and is the interface between the hardware and software.

What are the advantages of separating the data from the application logic in the logic-tier?

The data is made independent of the application The data can change without the need to change the application and vice versa. The data can scale more easily Removes the need for the user to interact directly with the data

Data Tier

The data tier also resides on the organization's servers and usually on a separate database server. The data tier is where data are stored, retrieved, and updated from database tables. By separating the data from the application logic in the logic-tier the data is made independent of the application.

Routers

The device that permits packet switching that a message can be routed to the next link in the network "on the fly". The Router receives a message, examines its destination IP address, and sends the message on to the next location in the network, usually another router. Routers rout messages until they reach a LAN, and finally, the LAN's router or switch sends the message to that one destination machine.

Who were the earliest computer users?

The engineers who built and programmed them. Computers were so complicated and expensive that no one else would have access.

Logic Tier

The logic tier sits between the user interface and the data. As such the logic tier is a conduit through which the data flows to the user from the databases as well as how data input from the user is used to update the underlying records in the database.

Where does the logic-tier reside?

The logic-tier resides on the server where the processing occurs.

Physical design

The logical models are converted into physical models. These physical models are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system.

When did the first generation of computers occur?

The mid 1940's till about 1959.

The Model

The model can take on different forms depending on the complexity of the application. In certain instances, the model is an actual object that is an actual implementation of the application. Using our e-commerce example, the model could be of a company's product. So the product would be the model.

Field

The modules referred to this as the physical contents of a column in one row in a table, but in the real world a column header is a better way to think of them (ie LastName, Gender, etc)

What does an IT department do?

The obvious answer is that an IT department supports the day-to-day technology needs of an organization. More broadly, an IT department is charged with helping an organization achieve its strategic goals.

Direct Conversion

The old system is "turned off" and the new system is "turned on" at a specific date and time. After the conversion, the old system is no longer available to end users.

The Controller (MVC)

The part of an application in MVC that interacts with the user (via the view) and passes along the user requests to the model. The results from the model will determine the type of view the controller uses in the interface presented to the user.

The Controller

The part of an application that interacts with the user and passes the user requests to the model

What is the Host Name of a URL?

The part of the URL that typically identifies the organization that is responsible for the information of the page or provides the server space where the information is stored. ex: www.nps.gov --> 'nps' is the domain name.

The View

The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model

Key difference between PC desktop and laptops?

The peripherals and system unit of a notebook/laptop are sold as a single unit.

In typical n-tier development projects, the tiers are divided between the

The presentation tier The logic tier The data tier

Presentation tier

The presentation tier is where the user interface for the system is developed. The notion behind a user interface is to shield the user from the underlying logic of the system as well as the underlying data structures.

Define software and its characteristics

The programs and other operating information used by the computer. - Written using a programming language. - System software - Operating system - System utilities - Applications - does real work (ex: MS office, outlook) - Intangible

The View

The view is the part of the application that represents the user interface. The view is used to capture input from the user to be passed on via the controller to the model. The information returned by the model is then presented to the user via the view. It is in the view layer of the application that the user interface logic is designed.

Minicomputers

Third generation scaled-down mainframes. Minicomputers used the same type of processor but had reduced number of registers and processing elements, reduced memory, reduced storage, etc., supporting fewer users.

Pilot Conversion

This involves starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization. The team can roll this out using either the direct approach, or the parallel approach. Once the pilot program is confirmed to be operating according to plan, the system is deployed on a larger scale.

What innovation around 1959 replaced vacuum tubes in computers?

Transistors. They could be mass produced and were far cheaper, used less power, and produced much less heat than vacuum tubes. They were much more robust than vacuum tubes. Tubes would last at most a few thousand hours, whereas transistors could last up to 50 years.

Compiled Language

Translates the entire program, creating an executable program which can be run at a later time

Compiled Language

Translates the entire program, creating an executable program, which can be run at a later time.

Compiler

Translates the entire program, creating an executable program, which can be run at a later time.

What is a company's goals

Translates the organization's philosophy in to specific, measurable outcomes the organization plans to achieve.

TCP/IP

Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.

What are some skills needed by IT personnel?

Troubleshooting and problem solving. Knowledge of operating systems. System level programming. System security Hardware

Boolean / Logical

True / False

True or False: Business Intelligence systems improve the quality of information obtained through multiple database systems.

True. A BI system takes the raw information from other systems and reorganizes it in a more useful and applicable way to the decision makers.

True or false: the size of the computer was reduced in second generation computers.

True. Because of the reduction in size of the hardware, the size of a computer was reduced.

True or False: First generation computers were less reliable than today's computers.

True. Between the relatively short shelf life of vacuum tubes and the difficulty of programming by physically connecting separate pieces of hardware, first generation computers had high failure rates.

True or false: Business Intelligence systems integrate information from various systems into one location

True. External and internal information about the company, its competitors, its employees, and many other factors are used when creating a BI system.

True or False: Application object and classes usually reflect the database structure.

True. Reflecting the structure of the database facilitates the interaction between the application and database.

True or False: Applications are independent of databases

True. They are independent of one another.

True or false: when numbers are entered as text in a database, they cannot be used for computational purposes.

True. They can be sorted and ordered, but not used for calculations.

What was the most common connection before UTP and fiber optic?

Twisted wire pair. It was used in much of the United States telephone network. We still find twisted wire pair used extensively because it is cheap and because so much of it is already in place.

Mail Server

Two email servers communicate with each other

Platform as a Service (PaaS)

supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model. IE, leasing both hardware and software. Ex: GoDaddy.com

User acceptance

testing is employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user.

Alphanumeric

text characters (string data)

32-bit operating system

Type of operating system that processes 32 bits at a time.

64-bit operating system

Type of operating system that processes 64 bits at a time.

Trojan Horse

Type of virus that completely replaces an existing application and takes the name of the taken over file

The most common form of network connection used today is __________________ and _____________.

UTP (Unshielded Twisted Pair) Fiber optic cable

What is the most common form of network connection used today?

UTP (Unshielded Twisted Pair) and fiber optic cable.

Proxy Server

Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved. Since many people in the same organization tend to view the same pages, caching these pages locally rather than remotely.

Database Management System (DBMS)

Used to create, manipulate, and access the data in a database

WHERE

Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query

Where (SQL)

Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.

SELECT

Used to inform the DBMS what fields or attributes are of interest

FROM

Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined

From (SQL)

Used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.

Web Server

Used to respond to HTTP requests. Ex: Clicking a link to a web browser (URL)

Domain Name Server (DNS)

Used to translate from an IP alias to an IP address

What are the components of the operating system (system software)

User Applications OS utilities Services Shells OS kernel Software device drivers OM BIOS drivers Hardware

Describe ways a computer may receive data (relates to DIKW).

User entered values from application, camera, microphone, bar code reader, sensor, pen tablet, etc.

Byte

a group of 8 bits. When a computer scientist or engineer has to look at data or program code in binary, they break up the thousands of bits into 8 bits, called a byte. A byte is a unit of digital information used in computing and telecommunications and is used to encode a single character of text in a computer. It is the smallest addressable unit of memory.

What was the first digital, general-purpose, programmable computer?

the ENIAC (Electronic Numerical Integrator and Computer).

Web administrator

also known as a webmaster, but more precisely referred to as a web server administrator, is responsible for maintaining websites. This differs from the development of websites. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. The web administrator may or may not be responsible for the hardware.

A _______ switched network requires that a full pathway, or ________, be established before transmission can begin and maintained during the entire transmission. The telephone network is a __________ switched network. Because the path exists during the entire conversation, communication in either direction can occur simultaneously.

circuit

When discussing a network, the ______ is a computer that will request information from another computer. The ______ is a computer that takes requests and responds with the requested information. The _________ network then is a network that contains one or more servers

client server client-server

Electronic Communication Privacy Act of 1986

this act establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping).

Control

to what degree will employee actions be monitored?

Security

to what extent does the company ensure the integrity of its data and systems?

Accuracy

to whom does the responsibility of accuracy fall, specific employees or all employees? To what extent does the company work to ensure that potential errors in data are eliminated?

What are the two most common support IT roles asides from administrators?

training, and help desk. Training occurs as needed, but many help desks are available 24/7.

Goals

translate the organization's philosophy into specific, measurable outcomes the organization plans to achieve.

SELECT (SQL)

used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e., which table relation they can be found in).

Phishing

Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information

User Acceptance Testing

Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user

Creative Commons (CC) License

Enables the free distribution of an otherwise copyrighted work. Used when an author wants to give people the right to share, use and build upon a work that he/she has created.

Grey Hat Hacker

Engage in both white and black hat types of hacking activities

Redundancy

Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline

Role-based Access Control

Ensures that the user gains access only to the resources that the user should be able to access

Describe system security (IT Skill)

Ensuring proper system security is in place. Following or drafting policies for users. Monitoring for threats. Examples: Keeping security patches up to date, configuring a system firewall, installing anti-malware software, examining log files of evidence of breaches or attacks.

How were programs entered and run on early computers?

Entering the program was not a simple matter of typing it in but of connecting memory locations to computational circuits by means of cable (like a telephone operator). Once the program was executed, the computer would have to be "rewired" to run the next program.

Date / Time

data type used for storing date/time information.

Which type of server responds to client database queries with responses pulled from the database.

database server

Ethics

defined as a code of moral conduct or a set of principles that govern behavior.

Infrastructure as a Service (IAAS)

delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model. IE, leasing hardware.

Vision

describes future aspirations of the organization.

Mesh Network

Every device is connected directly to every other device in the network.

Full backup

Everything on the hard drive is copied each and every time a backup is performed

The most significant change to occur to computers since 1974 is _____________.

Miniaturization. The third-generation computers comprised multiple circuit boards, interconnected in a chassis. Each board contained numerous ICs and each IC would contain a few dozen transistors (up to a few hundred by the end of the 1960s). By the 1970s, it was possible to miniaturize thousands of transistors to be placed onto a single chip. As time went on, the trend of miniaturizing transistors continued at an exponential rate.

Unnecessary Requirements

during the early phases of a project, requirements that are not actually needed are included in the project plan. Often, these requirements are in the form of "nice to have" features, which are mistaken for essentials or included without thought of how this may impact resource allocation. These unnecessary requirements consume resources that may be better used elsewhere and create an unintended risk.

What is the most significant change that occurred since 1974 (fourth generation)?

Miniaturization. Third-generation computers comprised multiple circuit boards, interconnected in a chassis. Each board contained numerous ICs that would contain a few dozen transistors (up to a few hundred by the end of the 1960s). By the end of 1970s, it was possible to miniaturize thousands of transistors to be placed onto a single chip. As time went on, the trend of miniaturization increased at an exponential rate.

MVC model

Model-View-Controller (MVC) model is a development technique used in the implementation of user interfaces. Similar to N-tier, MVC model separates the user interface into different components: the model, the view, and the controller.

Maintenance

Modifications or corrections to the system are made

Network Switch

More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it

How was most processing performed in early days of computers?

Most—if not all—processing was done without human interaction at all. The user specified the program, the source of input, the location of output, and sent the program off to run. The user would see the results once the computer ran the program, which might have been immediately, or many hours later!

What do computers need to communicate over a network?

An appropriate protocol.

String Data

Alphanumeric or text character

OS Shell

An interface for he user, often personalized for that given user.

Components of a Computer

CPU, Memory and Storage, Peripheral Devices

Image backups

Create a copy of everything that is on a hard drive

Describe input in relation to IPOS cycle.

Raw data is entered by the user.

Input

Raw data is entered by the user.

Name the two new pieces of hardware that symbolized the second generation computers:

- Transistors - Magnetic core memory.

Software applications today do not store data needed for the application. What are the benefits of this?

- A reduction in redundant data (since the individual applications that might use the same data do not have to maintain their own data) - Integration across business functional areas (i.e., marketing does not "own" their marketing data separate from the manufacturing department), - Applications can be modified without the need to modify where or how the data is stored - Changes can be made to the data without the need to re-write the software application.

Assembler vs. Compiler vs. Interpreter

- All of them are translators - Assemblers translate from assembly language to machine language - Compilers translate from compiled languages to machine language - Interpreters translate from scripting languages to machine language - Compilers accept the whole program. Translate the whole program and produce an equivalent machine language program - Interpreters translate on the fly and everytime you run the program, you need to translate

What is data?

- Any input that *has not been verified* by both sender and receiver. In essence, it is simply raw.

For a business, the data for the data warehouse might come from any number of sources. These sources include:

- Enterprise resource planning systems - Supply chain management systems - Marketing and public relations reports - Sales records - Purchasing and inventory records - Direct input from customers (e.g., input from a web form or a survey) - Human relations records - Budget planning - Ongoing project reports - General accounting data

Database Administrator duties

- Focus on design, development and support of data management systems (DBMS) - Support, maintain, do performance tuning, and schema development on DBMSs

What improvements and innovations were brought forth with fourth generation computers?

- Improved microprocessors and computer memory capacities. - Rudimentary computer graphics - Word Processing and accounting software - Niche market software (desktop publishing, music and arts, education, etc.) - Graphical User Interfaces (GUI) - Miniaturization

Web Administrator duties

- Install, configure, maintain, secure and troubleshoot web server - May be required to set up password files and establish locations where server scripts can be stored and tested.

What innovations improved programming?

- Language translator program, which would take another program as input and output a machine language version, which could then be run on the computer. - The earliest language translators were known as assemblers, which would translate an assembly program into machine language. Although easier than machine language, assembly language required extremely detailed, precise, and low-level instructions.

System Administrator duties

- Maintaining operating system of a computer system - Supporting the user - Installing new information

Network Administrator duties

- Physically laying down cable - Making connections - Working with the network hardware (routers and switches) - Supporting physical network

What are the characteristics of quality data?

- Relevance - Timeliness - Thoroughness - Accuracy - Reliability

Security Administrators duties

- Stay informed of the many different types of attacks (denial of service, IP spoofing, buffer overflow, etc.) - Install, configure and administer appropriate firewall security to protect the organization systems - Work proactively against intrusions

Why were transistors favored over vacuum tubes?

- They could be mass produced - Cheaper to produce - While vacuum tubes gave off a great deal of heat and had a shelf life of only a few thousand hours, transistors could last for up to 50 years. - Used less power and were far more robust.

What are ways applications interact with databases

- Through database query language SQL - Open Database Connectivity (ODBC) - Java Database Connectivity (JDBC) driver (for applications written in Java)

Ethics

A code of moral conduct or a set of principles that govern behavior.

Describe processing in relation to IPOS cycle.

Raw data is organized or structured for usefulness.

What is not Information Technology?

1) Raw data alone is not IT 2) Standalone technology devices and software (such as purely output devices). Use of technology itself to a means is not IT (ex: a background check) 3) People doing personal things outside the scope of information dissemination (such as making a birthday card for someone).

What is Information Technology

1) The task of gathering data and processing it into information and the ability to disseminate that information using technology 2) The technology itself that permits creating, maintaining and making information accessible, which includes the software, data, and computer networks 3) The collection of people who enable the processing of data and provide IT support (the computer, networks and operating systems).

What are the three main parts of a Web page's URL

1. Protocol (https://) 2. Domain Name (www.forbes.com) 3. Resource/filename (/technology/)

Processing

Raw data is organized or structured for usefulness.

Data Integrity Efforts

1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked

Byte

8 bits; a single character of text in a computer

What is the most common flat file database?

A Comma Separated Values (CSV) file. Records in a flat file are separated by a delimiter. In the CSV file case, the delimiter is a comma (,)

Intranet

A LAN that uses the Internet Protocol

Intranet

A LAN that uses the Internet Protocol is known as an intranet. The advantage of an intranet is that applications intended for Internet usage (e-mail, web browsing, telnet/ssh, etc.) will work internally as easily as they work externally.

Hexidecimal

A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.

Bit

A binary digit (1 or 0).

Why does a company use a database?

A company can use a well-designed database to access accurate, up-to-date information and make prudent business decisions.

Give three examples of information systems.

A company's directory, a company's customer database, a university course catalog.

Remote Computer

A computer being accessed over the network

File Server

A computer with a large hard disk storing files that any or many users of the network may wish to access. The more complex file servers are used to not only store data files but also to store software to be run over the network.

Shareware

A copyrighted software that can be sampled before it is purchased. Usually has some limitations to it, unlocking the full version of the software once purchased.

A database is

A database is an organized collection of data. We typically create, manipulate, and access the data in a database through some form of database management system (DBMS). DBMSs include Microsoft Access, SQL, and its variations (MySQL, Microsoft SQL, PostgreSQL, etc., and Oracle, to name a few).

Relational database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables. When you perform a query in a relational database, data can be pulled from any number of relations that may be contained in multiple databases to generate reports and provide information to users. Most common type of structure for databases.

Define network.

A network is a collection of computers and resources connected by various media so that they can communicate with each other.

Octal Number System

A number system that has a base of 8; digits from 0 to 7 are used to express an octal number.

System Development Life Cycle (SDLC)

A process for planning, creating, testing, and deploying information systems, including hardware and software

32-bit processor

A processor that can effectively use up to 4GB of main memory

Operating system

A program that allows a computer user to easily access the hardware and software of a computer system.

Language Translators

A program that takes one program, written in a high level language, and creates a machine language program as output

What does the LAN need to be connected to to communicate over the internet.

A router, which connects one network to another.

Query

A search of data in the relation or relations that fit specific parameters

What is a Query in a Database?

A search of data in the relation or relations that fit specific parameters. Ex: "Show me all students who are CIT majors" or "show me all students who are CIT majors with a GPA > = 3.0"

Off-Site Storage

A secure location for storing backup media

Describe the Domain Name Server (DNS)

A server that has a table that contains Host IP addresses and aliases

What is a network protocol?

A set of rules by which networks communicate.

What is a protocol?

A set of rules by which people behave.

Copyleft

A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights.

Virtual Machine (VM)

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.

Business Intelligence

A specific information system to help an organization reach its strategic goals

What is SQL

A standard query language that is used to communicate in many DBMSs.

Structured Query Language (SQL)

A standard query language that is used to communicate in may DBMSs

Database Server

A structured data repository. A database server permits access across a network and will perform such tasks as data analysis, data manipulation, security and archiving. The database server may or may not store the database itself.

Why is IT viewed as a system?

A system is a combination of independent parts all working together to accomplish a goal.

OS Services

AKA daemons, act as operating system programs that run in the background. This program, while it is active, does not take up any CPU time until it is called upon to do so.

Scope Creep

Adding to the scope of the project; can impact the allocation of resources.

IT Professional Roles

Administration and Support

When does data become usable?

After it's been converted to a relevant form, for computers this would be binary representation.

End User License Agreement

Aka Software License Agreement. Serves as a contract between the licensor (e.g., software company) and the purchaser, indicating that the purchaser has the right to use the software. These contracts are created by the licensor and do not leave room for negotiation by the purchaser - they can either accept the agreement, or reject the agreement and surrender his or her rights and ability to use the software.

What is a Unique Identifier?

Aka primary key, a field in a table which uniquely identifies each row/record in a database table. Primary keys must contain unique values. A primary key column cannot have NULL values. A table can have only one primary key, which may consist of single or multiple fields. When multiple fields are used as a primary key, they are called a composite key.

Star Network Topology

All devices have a single point-to-point connection with a central device. This dedicated device acts as a communications hub, routing messages from one machine to destination

I/O Subsystem

All peripheral devices where long term storage devices are used.

What are some characteristics of first generation computers?

All were one-of-a-kind machines. Classified not only by time period but reliance on vacuum tubes, relay switches, and the need to program in machine language.

Buffer overflow

Allows hackers to invade computer memory with their own code

Packet Sniffing

Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted

What type of data is the following: - James (Last Name) - 623 Hill Street

Alphanumeric or text character (string data)

TLD(Top Level Domain) Name

Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page

An FTP server is

An FTP server is like a webserver in that it hosts files and allows clients to access those files. However, with FTP, access is in the form of uploading files and downloading files. Any files downloaded are saved to disk unlike the web service where most files are loaded directly into the client's web browser.

What is used instead of the IP address to search websites

An IP alias, such as www.google.com.

What is an OLTP system?

An Online Transaction Processing system captures business transactions and stores them in databases which can then be processed via queries to support decision making.

Algorithm

An algorithm is a formula or procedure for solving a problem. It can also be described as a set of steps that are followed in order to complete a computer process.

Define information system.

An information system is in essence a collection of data and information used to support management of an organization. The term also refers to the technical components and human resources that enable the assembly, storage, and processing of data, and the delivery of information.

Incremental backup

An initial full backup is completed and then subsequent backups only capture the changes since the last backup

Incremental backup

An initial, full backup is completed and then subsequent backups only capture the changes since the last backup.

Shell

An interface for the user, often personalized for that given user, that provides access to the kernel.

What is Graphical User Interface (GUI)

An interface that allows the user to issue commands to the computer for the computer to work (ex: Point and Click)

Device Drivers

Another piece of the operating system is the collection of device drivers. Device drivers provide specific interfaces between the OS running a computer and hardware.

What are the benefits of a mesh network topology

Any device can directly communicate with any other device without concern of message traffic. If any device were removed, it would not harm the connectivity of the network.

Define application software.

Applications software includes programs that do real work for users. For example, word processors, spreadsheets, and database management systems fall under the category of applications software.

Productivity software

Applications that are useful to just about everyone (ie word processors, powerpoint, etc.)

BIOS ROM

BIOS stands for Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software not hardware, ("basic" operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can't choose the amount or contents.

____________ is the transfer rate permissible over the media, described as some number of bits per second (bps or b/s). Modern _________s are on the order of millions or billions of bits per second (Mbits/second, Mbps or Gbits/second, Gbps). Older technologies such as computer MODEMs (described later) were limited to hundreds or thousands of bits per second, such as 56 Kbps or 56,000 bits per second.

Bandwidth

What is Batch Processing?

Batch Processing processes transactions in batches or groups and updated only periodically (daily,monthly, etc.= Generally slower information.

What industry standards are used to connect peripherals to computers?

Bays (house CDs and DVDs) Typically on front. Slots (modem cards, wireless access cards, other pc cards) Ports (connect additional input, output, storage and communication devices)

What type of data is this: - True/False (active subscriber)

Boolean/Logical

An employee is using telnet to log into a colleague's computer to troubleshoot an issue. Is this remote, local or both?

Both. Telnet is used to access one computer from another; therefore requires a local and remote computer.

An employee logs in from home to the company's server to update their time sheet. Is this remote, local or both?

Both. The employee's home computer is local and the sever is remote.

Which is the cheapest network topology

Bus Topology

What is Business Continuity?

Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions.

Business intelligence

Business intelligence is a special application of the DIKW hierarchy when employed as a specific information system to help an organization reach its strategic goals.

Why would one separate a database server from the database?

By separating the server from the database, one can use different mechanisms to store the database, for instance a storage area network to support load balancing.

What is the benefit of modifying or deleting attributes of a database?

By using some filtering criteria with the update or delete, we are able to modify or remove all records that fit some criteria. Ex: GPA = GPA *1.1 where Major = "CIT". This modifies each record whose Major is "CIT" to update the GPA field to be GPA *1.1, multiplying each GPA by 1.1

In the mid 1980's Smalltalk's object oriented capabilities were incorporated into a new version of __ called ____.

C C++

Database Information Processing (OLAP)

Data is processed through a suite of analysis software tools

What are the three goals prescribed by IAS?

CIA: - Confidentiality - Integrity - Availability

What is COBOL mainly used for

COBOL (Common Business Oriented Language) is a business-oriented language, as its name suggests.

A business oriented language produced roughly at the same time as FORTRAN is known as ___________.

COBOL (Common Business Oriented Language).

What are the 4 components of most computer systems?

CPU (processor) Memory Input/output (I/O) subsystem Bus

What is the structure of most computer systems?

CPU - ALU, Control Unit, Registers Memory - SCRAM, DRAM, ROM I/O Subsystem - Input devices, Output devices, Storage devices System Bus - Connects the CPU, Memory and I/O bus I/O Bus - Connects the System Bus and I/O subsystem

Wireless Access Point

Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable

Firewalls

Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked

The Model

Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application

Internal Components of the System Unit

Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards

DIKW Hierarchy

Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)

What are benefits of Bus Network Topology

Cheapest topology and very reliable, does not degrade if resource is removed from network or crashes.

Difference between Security and Web administrators

Security: Secure data access Web: Secure webpage access

Cloud Computing

Cloud computing combines several different technologies: distributed computing, computer networks, and storage area networks. The idea is to offer, as a service, the ability to offload computation and storage from your local computer to the cloud.

What is the difference between Coax cable/twisted wire and fiber optic cable?

Coax and twisted wire cable both transmit information using electromagnetic waves voltage (e.g. 10BASET uses =2.5V or -2.5V) Fiber optic cable uses light pulses.

What are programming languages?

Code written in pseudo English which translates into machine language (binary)

Attributes

Columns of the relation

What are some visions and goals of IT?

Communication, both internal and external Sharing of resources Facilitating the integration of Departments Management of Information Ensuring that the organization runs according to ethical practices

What are the three components of the IAS (Information Assurance and Security) model.

Communications, hardware, and software - with information utilized by the three components.

By 1959 the improved class of language translators was known as ___________, and the languages were called ____ ____ _______.

Compilers High Level Languages

Although a network can consist of many types of resources, it is the ______ that is the primary tool used to communicate over a network

Computer

Software

Computer programs that tell the computer what to do--how to execute commands and process information

Wireless Access Point (WAP)

Connected to a hub, switch or router that sends out a wireless signal so computers on the network can connect without a cable. Today, many routers act as a wireless access point, forgoing the need for another device.

What is another way that a computer can communicate over the internet?

Connecting to a LAN (local area network).

Network Hub

Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network

Router

Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses

Application Software

Consists of programs that end users run to accomplish tasks

Application Software

Consists of programs that end users run to accomplish tasks.

System Software

Consists of programs that make up the OS; software that directly supports the computer system itself

What is magnetic core memory?

Consists of small rings made of magnetic materials, placed in a wire-mesh framework. Each ring stores one bit by having magnetic current rotate in either clockwise or counterclockwise fashion.

Client-server Network

Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers

Field

Contains the data of an attribute for a record within a relation

Parts of the CPU

Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen

System Clock

Controls the speed at which instructions are processed.

Copyrights protect an

Copyrights protect an original work (in its tangible, expressed form), but not the ideas behind the work. The copyright holder has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years. "Fair use" provides an exception to this by allowing nonprofits or educational institutions to use the copyrighted work. Copyrighted works are registered as a matter of public record. However, copyright law may be interpreted inconsistently and the protections may not be very strong. Therefore, the use of patents has become more common.

Kernel

Core components of the OS that is loaded when the computer is first booted.

Open Source

Created in the Open Source Community and made freely available as source code

Slicing

Creates a subset of the data by reducing the data from multiple dimensions to one dimension

Workstations

Creates and maintains client network connections to remote servers

System Unit

Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.

Harold inputs the new customer list for January. Which step of the N-tier development would this be?

Data tier. Harold is putting in new information that will be stored in the data tier.

What reflects how information is classified?

Data types. Programming languages require a programmer to signify the data type of every piece of data. In most database systems, when setting up a database it is critical to specify the type of each data field. In other words, data type relates to the format in which data is entered so that it can be processed correctly.

What does DIKW Hierarchy stand for and what is it's purpose?

Data, Information, Knowledge, Wisdom. It describes the transition of data to information to knowledge to wisdom.

Dante manages the inventory and ordering systems for a large auto parts manufacturing plant. He must make sure that part orders are in the company system and are updated if a client changes their order. Additionally, in order to plan production to meet the needs of upcoming or potential future orders, Dante must analyze patterns in ordering and recommend production rates to the plant manager. What server would he use?

Database Server. The database server is needed if Dante is responding to user queries to manipulate the database and performing tasks such as data analysis.

Database administrators

Database administrators have a long list of important responsibilities, with a focus on the design, development, and support of database management systems (DBMSs). Their tasks include installation, maintenance, performance analysis, and troubleshooting. There are specific applications, performance tuning parameters, account creation, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to new. As many or most database systems are now available over the Internet (or at least over local area networks), the administrator must also ensure proper security measures for remote access. A database administrator is often expected to play a role in application design and development. This may be by assisting the application developers with the design of the databases needed to effectively support those applications. This requires a unique set of skills that include database modeling, schema development, normalization, and performance tuning.

Flat file database

Database which consists of just one table. Used if the amount of data that is being recorded is fairly minimal.

Difference between Database and Web administrators

Database: Works specifically with DBMS Web: works with webpages that serve the DBMS

What type of data is this: - 10/02/2012 (order date) - 10:15

Date/Time

Online Data Processing (OLDP)

Deals with data in real time

Point-to-point network

Dedicated link between two resources. Not often used as a network topology because it limits how devices can communicate with each other. Seen in connections within a computer such as connection between the monitor and motherboard.

Phased Conversion

Deploys a subset of the system first, rather than deploying the whole system at once

What is a company's vision

Describes future aspirations of an organization

What is the "DIKW hierarchy?"

Describes the transition of data to wisdom: - Data - Information - Knowledge - Wisdom

3 most typical types of computers?

Desktop - designed for use in one physical location Laptops - lightweight and portable Handheld - variety of forms including tablets, smartphones, and mp3 players.

Describe trouble shooting (IT Skill)

Detect and diagnose a problem, then find a solution. Examples: Poor processor performance, full hard drive, virus or other malware.

Analysis

Determines the user requirements for the new system and develops logical models of the system

What are three factors in the need for development of operating systems

Development of language translators Improved speed of hardware Increased number of users.

Bus Network

Devices connected along a single cable. Size of network is restricted.

Ring network topology

Devices have point-to-point connections with their neighbors. Communication between devices requires sending a message to a neighbor and having that neighbor forward the message along the ring until it reaches its destination.

What input/output device allowed users to access computers remotely? (third generation)

Dumb terminals with no memory or processor.

Project Planning

During the planning phase of a project, the team must determine the objectives and activities, organize the activities, and estimate time and costs required to successfully complete the project.

Maintenance

During this step, modifications or corrections to the system are made.

Logical design

During this step, the logical models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step.

Types of RAM

Dynamic RAM (DRAM) - typically called main memory Static RAM (SRAM) - cache memory and registers

What are the two main forms of RAM?

Dynamic RAM (DRAM) which is typically called main memory, and static RAM (SRAM), which is cache memory and registers.

What constituted the first generation of computer hardware?

ENIAC and other laboratory computers like it. They are classified not only by the timeline but also the reliance on: - vacuum tubes, - relay switches and - the need to program in machine language.

What distinguished the ENIAC from previous analog computers?

ENIAC was general purpose, whereas previous computers were either for a special purpose (could only run programs of a certain type) or were not electronic but electromechanical. A general-purpose computer could conceivably execute any program that can be written for that computer.

Ring Network

Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.

Star Network

Each device is connected to a central devices such as a hub or switch.

Assembly Language

Easier than machine but still required detailed, precise low level instructions

CPU

Executes programs' instructions and commands various components in the computer. Referred to as the "chip".

What are the physical components of the computer system and networks?

External parts: - Chassis Internal Parts: - CPU - Memory - Motherboard Network Components - Routers - Switches - Hubs - Ethernet Cables - NICs (network interface cards)

What are some differences between hubs, routers and switches?

Externally, there is little to differentiate a hub from a switch from a router (other than perhaps the size). Internally, the switch has more hardware, including storage space for MAC and IP addresses, than a hub. A router contains programmable routing tables and includes at least one input that comes from another network.

Describe the "E" in the ETL process

Extract Data - the data comes from various sources. These sources must be identified and understood.

ETL

Extract, Transform, Load

What is the ETL process?

Extract, Transform, Load process; takes about 70% of the time in building the DW.

The first compiler was for the __________ language.

FORTRAN (FORmula TRANslator). FORTRAN was primarily intended for mathematical/scientific computing.

What was the language that the first language translator was used for?

FORTRAN. With this language, the programmer would largely specify mathematical formulas using algebraic notation, along with input, output, and control statements. FORTRAN comes from FORmula TRANslator.

An ___ server is much like a web server or file server in that requests are for files and responses are the files.

FTP

Database Administrator

Focuses on the design, development, and support of database management systems (DBMSs).

End User License Agreement (EULA)

Gives the purchaser the right to use the software

One of the founder's of Intel, ___________ ____________, noticed which trend that was later named after him?

Gordon Moore first noticed this rapidly increasing "transistor count" phenomenon. In a 1965 paper, Moore observed that the trend from 1958 to 1965 was that the number of transistors on a chip was doubling every year. This phenomenon has been dubbed "Moore's law." Moore predicted that this trend would continue for at least 10 more years.

What are core components of IT?

Hardware Software People

Relational Database

Has multiple tables (relations) with interrelated fields; most common structure for databases

Information in DIKW

Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.

Site Sharing

Having multiple data centers located in disparate regions; typically used by large organizations.

HIPAA

Health Insurance Portability and Accountability Act. This act protects the privacy of an individual's health records.

Support IT Professionals

Help desk and training.

What are the benefits of a network?

Helps people and devices communicate with each other Sharing information reduces business cost by allowing devices to be shared.

Define the Physical level of a network.

How information is carried over the network. At this level, information is transmitted as bits over some type of Media - a physical connection

How is the MVC model useful over N-tier?

MVC is useful in separating the programming logic between input logic, business logic, and interface logic.

Name the four computer operations

IPO+S: - Input: raw data is entered by the user - Processing: raw data is organized or structured for usefulness - Output: information output so user can see the results - Storage: Processed information is stored for permanent record.

Because of the limitation now being felt by 32-bit addresses, what is used now for IP addresses?

IPv6, using 128 bits.

Encryption

Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information

Host Name

Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored

What is a company's Mission

Identifies the reason the organization exists, including the people it serves and the principles and standards of practice that should guide everyday operations.

Domain Name

Identifies the server on which the web page can be found

Domain name: www.forbes.com

Identifies the server on which the web page can be found.

Strategic Risk Analysis steps

Identify information assets. Identify vulnerability of assets. Determine threats based on vulnerabilities. Prioritize risks. Develop and enact policies as necessary.

For what scenario would you use a scripting language over a compiled language?

If the program that is being written is simple or doesn't have a long lifespan.

What are the drawbacks of mesh topology network

Impractical due to cost Requires an excessive number of connections, with every device needing n-1 ports available to make those connections. Ex: six devices = 25 connections.

Complier

Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient

How is the MVC model different from N-tier?

In an MVC implementation, the user interacts with the controller. The user wouldn't form the actual query, but would input the type of data requested. The controller would send this data to the model. The model would then develop a query based on the information sent to it from the controller and the result of the query would be presented in the selected view back to the user.

Network Administrator

In charge of all aspects of the computer network

Resource/Filename ID

Indicates the name of the file you are accessing, or the location of the document on the server

Resource ID: /technology/

Indicates the name of the file you are accessing, or the location of the document on the server. The part of the resource after slash (/) is the file name for the page. The file may end with a three or four-letter designation that signifies the file type. Ex: - .htm or .html = standard webpage - .jpg or .gif = graphic file - .pdf = a portable document file

Black Hat Hacker

Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism

Why does a database consist of multiple and overlapping relations?

Information can be drawn from multiple relations at a time, which can be used in a database query called a "join".

Define information.

Information is often defined as processed data. That is, raw data are the input and information is the output of some process. In fact, more generically, we should think of information as any form of interpreted data.

Output

Information is output so user can see results.

What is the benefit of information

Information is presented to humans in support of decision making.

Describe output in relation to IPOS cycle.

Information output so user can see results.

Define Knowledge in the DIKW hierarchy

Information that has been put to use A synthesis of several different sources of information. Information that is placed into a context, such as experience gained from using information. `

Knowledge in DIKW

Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.

White Hat Hacker

Informs companies of potential problems with software so companies can fix

LaaS

Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.

Object Oriented Programming

Initially introduced in Smalltalk in 1970's and early 80's

What are the five project phases?

Initiation Planning Executing Monitoring and controlling Closing

What are the four project phases?

Initiation Planning Executing & controlling Closing

Project phases

Initiation, planning, executing and controlling, and closing

What are the four operations a computer performs? (hint: IPOS)

Input, Processing, Output, Storage.

Describe hardware (IT Skill)

Installing and configuring new hardware. Troubleshooting, repairing, or replacing defective hardware. Examples: replacing CPUs and disk drives, connecting network cables to network hubs, switches, routers.

Security Administrator

Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.

Web Administrator

Installs, configures, maintains, secures, and troubleshoots web severs.

What are some other aspects of a database administrator's job?

Integration of data from older systems to new, ensure proper security measures for remote access (for database systems available over the internet), assisting developers with application design and development so the database can effectively support said applications.

ODBC (Open Database Connectivity)

Interacts with a database via a database driver

Pilot Conversion

Involves starting the conversation with a portion of end users

Model-View-Controller (MVC)

Is a development technique used in the implementation of user interfaces

What is one of the most useful aspects of a database?

It can be used to conduct a query.

Describe a Database Administrator's duties.

Like system administrators, database administrators have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, account creation, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to new ones. As many or most database systems are now available over the Internet (or at least over local area networks), the administrator must also ensure proper security measures for remote access.

FTP Server

Like web server or file server in that requests are for files and responses are the files

Describe first generation computer input/output (I/O)

Limited mostly to reading from punch cards or magnetic tape and writing to magnetic tape. Any output produced would be stored onto tape, unmounted from the tape drive, mounted to a printer, and then printed out. Since computers only ran one program at a time, I/O was restricted to this manner.

Point-to-Point Network

Link between two resources. Simplest for of a network. Limits how devices can communicate with each other

The ___ programming language developed at the end of the 1950's for artificial intelligence research used an __________. This allowed programmers to test out one instruction at a time so they could build their program piecemeal.

Lisp interpreter

Describe the "L" in the ETL process

Load Data - into the storage facility, that is, the transformed data must be stored in the data warehouse using the appropriate representation format.

The sales associate is using their desktop to develop a report using Excel. Is this remote, local or both?

Local. A desktop computer is accessed by an employee in the same location as a local computer.

The IT department is updating the SSH (secure shell) on the company's server to provide improved access when employees are off-site. Is this remote, local or both?

Local. Through using SSH for improved off-site access the IT department is working on servers locally.

What the difference between a local and remote computer?

Local: the user is physically present with that computer. Remote: a computer being accessed over the network (ex: remote desktop connection or telnet).

Nancy needs to determine the annual rate of increased sales over last year. Which step of the N-tier development would this be>

Logic tier. The logic tier performs logical tasks that would determine the rate of increase.

Physical design

Logical models are converted into physical models

Logical design

Logical models are revised to ensure that the new system will meet the user requirements identified in the first step

Describe a Security Administrator's duties.

Must stay informed of the many different types of attacks, such as denial of service attacks on web servers, IP spoofing to intercept messages, and buffer overflow that allows a hacker to invade computer memory with their own code. Although these are all known forms of attacks, it does not necessarily mean that a system is protected against them. And as these attacks are known, newer attacks are being thought of. It is the responsibility of the security administrator to install, configure, and administer appropriate firewall security to protect the organization's systems and to work proactively against such intrusions.

A device that connects multiple computers together. When there are multiple computers connected to this device a message received by the device is forwarded to all ports on the device. A destination address attached to the message indicates which computer the message is intended for, but it does not prevent other computers from picking up the message. The device broadcasts the transmission, as it sends the data to every device in the network.

Network hub

What is system software?

Operating systems and system utilities

Off-Site Storage

Organizations may choose to use a hot site, cold site, or site sharing.

Project Planning

Organize activities, time estimation, cost estimation

Hierarchical Database

Organizes data using a tree like or organizational chart type structure

Hierarchical Databases

Organizes data using a tree-like organizational chart type structure. The main data points can have multiple sub-data points associated with them referred to as parent-child model. The sub-data points can only have one main data point, I.E., the child can only have one parent.

Services

Os programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.

What are the three technologies that "glue" the internet, home and organization networks together?

Packet switching Routers IP Addresses

Resource allocation

Part of the Initiation Phase of Project Management. A team must determine what resources are available to meet the needs of the project. Resources are commonly thought of as time and capital.

The View (MVC)

Part of the application that represents the user interface. The view is used to capture input from the user to be passed on via the controller to the model. The information returned by the model is then presented to the user via the view.

Examples of Compiled Languages

Pascal, COBOL, Fortran, C, C++, Java, Ada

Patent Vs. Copyright

Patent: - Protects 20 years from filing - Protects the creation and the idea behind the creation Copyright: - Protects 70 years after the death of the author. - Protects the actual creation, not the idea behind it.

Patents protect the

Patents protect the creation of inventive concepts as well as the tangible work product (not just the tangible work, as copyrights do). To receive a patent, the applicant must be able to show that the idea is original, useful, and not obvious to someone of "ordinary skill" in the field. The patent owner can then prevent others from making, selling, or using the patented invention for 20 years from the patent application filing date. The U.S. patent system is intended to encourage innovation.

Describe users

People who use the computer system.

Beta Testing

Performed by the end user without any assistance from the system developers; live data in a real working environment is used.

Examples of scripting languages are?

Perl php ruby python asp

The term _____ is another form of query that returns all of the records from the relation, but only select attributes or fields.

Projection.

Copyrights

Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author's life plus 70 years.

Patents

Protect the creation of inventive concepts as well as the tangible work product (not just the tangible work, as copyright do) Copyright law may be interpreted inconsistently and the protections may not be very strong, so the use of patents have become more common. The patent owner can prevent others from making, selling, or using the patented invention for 20 years from the patent application date.

Patents

Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date

Defense in Depth

Protecting every layer that surrounds data

Copyright

Protects an original work (in its tangible, expressed form), but not the ideas behind the work. The copyright holder has the exclusive right to make copies, prepare derivative works, and distribute copies of the author's life plus 70 years.

Parts of URL (Uniform Resource Locator)

Protocol, Domain name, Resource/Filename

Device Drivers

Provide specific interfaces between the OS running a computer and hardware devices.

OS Device Drivers

Provide specific interfaces between the OS running a computer and hardware. Many popular device drivers are preloaded into the operating system, whereas others must be loaded off of the internet or CD-ROM when a new hardware device has been purchased.

What is another function of a proxy server

Provides a degree of anonymity, since the IP address recorded by the web server in response to the request is that of the proxy server, not the individual client. Proxy servers can also be used to block certain content from being returned, rejecting responses that contain certain content (e.g., the word "porn") and rejecting requests going to specific servers (e.g. Facebook).

Wisdom in DIKW

Provides a social setting to knowledge; an understanding of the "why". Can only come by having both knowledge and experience.

Shareware

Provides a trial version of the software.

E-mail server

Provides e-mail service. Accepts e-mail requests from clients, send messages out to other e-mail servers, receive e-mails from other servers, and alert the user that e-mail has arrived.

Antonio runs the computer lab for River County High School. Many of the teachers at the high school send students to the computer lab to work on research projects or homework assignments. Antonio is looking for a way to speed up access to websites that students commonly access, such as Wikipedia while also blocking certain websites that students shouldn't be on while they are working, like social networking sites. What kind of server should he use?

Proxy Server. A proxy server would allow students to access some websites quicker by accessing a local rather than a remote copy. Additionally, using a proxy server, Antonio could block specific websites from the lab.

Information Security Classifications

Public - available through public sources; includes names and addresses Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses Private - information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential - information that an organization will keep secret; includes patentable information and business plans

Evolution of Storage

Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage

Is Python a scripting or compiling language

Python is both a scripting and compiling language.

A ______ is a search of data in the relation that fit specific parameters

Query. One of the most valuable aspects of a database.

How do radio signals work?

Radio signals are sent via radio towers, cell phone towers, and bounced off of satellites in orbit.

Radio Waves

Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic spectrum longer than infrared light. Radio Waves can be used to access networks over long distances. They are sent via radio towers, cell phone towers, and bounced off satellites in orbit to give them a broad coverage area.

Pivot

Rotates data to view the data from a different perspective

Difference between routers and switches

Routers: - Connect devices within WANs - Use IP addresses to connect devices Switches - Connect devices within LANs - Use MAC addresses to connect devices.

Tuples

Rows of a relation

tuples

Rows/records in a database.

Protocol

Rules provided by which networks communicate with each other.

Interpreted Code

Runs inside a special environment; is better for testing

Preliminary investigation

SDLC begins when an organization discovers a problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology.

Database Interacting Format

SELECT fields FROM tables WHERE fields from tables match criteria

What is the format for SQL when interacting with the data contained within a database?

SELECT fields FROM tables WHERE fields from tables match criteria;

Dicing

Same as slicing except that the result can be in multiple dimensions

Early generations of computers, due to their size and limited capacity were limited mostly to?

Scientific tasks and some business tasks like accounting that processed large volumes of transactional data.

Services

Services, or daemons, are operating system programs that are usually started when the operating system is loaded and initialized, but they run in the background. This means that the program, while it is active, does not take up any CPU time until it is called upon to do so.

Interpreters rely on a __________.

Session

Describe system level programming (IT Skill)

Shell scripts to automate processes, manipulating configuration files for system services. Examples: Bash, Csh scripts, Ruby scripts, C/C++ programs

Drilling up and down

Shifts the view of the data; down provides more detail, up provides summarized data

What is another way to think of data?

Signals. For humans: sight, sound smell, taste, feel For computers: values entered by the user when running an application; data received through camera, microphone, bar code reader, sensor, etc.

What innovation ushered in the third generation of computers?

Silicon chips (also known as printed circuits or integrated circuits (ICs). One IC could incorporate dozens of transistors.

3rd Generation of Computers

Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals

What was the innovation that replaced transistors and magnetic core memories?

Silicon chips, aka printed circuits or integrated circuits (ICs). ICs would replace both the bulkier transistors and magnetic core memories, so that chips would be used for both computation and storage. ICs took up less space, so the distance of the current flow was reduced, resulting in faster computers. ICs could be mass produced, resulting in reduced costs.

Rolling up

Similar to drilling up but it collapses the data from multiple items into a single value

What does the CPU do?

The CPU is the device that not only executes your programs' instructions, but also commands the various components in the computer.

In the MVC model, the ____ facilitates communication between the model and the view.

The Controller

How does the DBMS use the Unique Identifier?

The DBMS will use the unique identifier to match records in different relations when using a join operation. Ex: A query asking for the phone numbers of students with a GPA > 3.0. The DBMS will first search the scholastic information for records whose GPA matches the criteria, then withdraw the phone numbers from the contact relation. To identify the students between the relations, the unique identifier (student ID) is used.

What does the DNS do when provided with an IP alias?

The DNS looks up the entry in its own DNS table and returns the corresponding address. The IP address is then sent back to your computer. If the IP address is not found in the DNS server, then it is sent out to DNS servers that are higher in the hierarchy until a particular DNS can translate the alias into an IP address. The information is then sent back down the chain to the DNS server making the initial request. If the highest level of the hierarchy does not recognize the alias, an error is returned and your message will never make it out of your computer.

What is the focus of a database administrator

The Design, development and support of database management systems (DBMSs). This includes installation, maintenance, performance analysis, and troubleshooting.

What was the first digital, general purpose, programmable computer?

The ENIAC (Electronic Numerical Integrator and Computer).

The GNUs Public License is used for

The GNUs Public License is used for free software and is designed so that it will stay free regardless of who modifies the software. Copyleft is a play-on-words of copyright: instead of using rights to limit users (as proprietary software does), it promotes freedom and flexibility of use.

What makes up the I/O subsystem?

The I/O subsystem includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape).

What is an Integrated Chip (IC)?

The IC would be a pattern of transistors etched onto the surface of a piece of silicon, which would conduct electricity (thus the term semiconductor). Pins would allow the IC, or chip, to be attached to a socket, so that the electrical current could flow from one location in the computer through the circuit and out to another location.

Why were integrated circuits referred to as semi-conductors?

The IC would be a pattern of transistors etched onto the surface of a piece of silicon, which would conduct electricity, thus the term semiconductor. Pins would allow the IC, or chip, to be attached to a socket, so that electrical current could flow from one location in the computer through the circuit and out to another location.

How is the MVC model different from the N-tier development model?

The MVC model is one application where the various design logic (input, business, and interface) are logically separated. This differs from the N-tier development model where each tier is a separate application.

What was the first microcomputer sold mainly to hobbyists?

The Mark 8.

In the MVC, the ______ is where changes and updates are made to the data based on new data

The Model

In what layer is business logic designed in the MVC model?

The Model layer.

In the MVC model, the _______ is where a form is used to capture the user input data

The View

In what layer of the application in MVC is the user interface logic designed

The View layer

Name some advantages of a network.

The ability to share information, share hardware such as a printer, and even share software.

What is another useful aspect of a database besides the ability to conduct a query?

The ability to update or modify the data within a relation. Ex: - Insert operations (add a record) - Update operations (modify one or more attributes of one or more records) - Delete operations (delete one or more records)

Business Continuity

The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.

How does one receive a patent?

The applicant must be able to show that the idea is original, useful, and not obvious to someone of "ordinary skill" in the field.

What is project management?

The application of knowledge, skills, tools, and techniques to project activities to meet project requirements. A project is an undertaking with a defined start and end, specific goals, and tasks that need to be performed to reach those goals.

What does the bus consist of?

The bus consists of a number of wires, each wire allows 1 bit (a single 1 or 0, high or low current) to flow over it.

The term server may be used to refer to what three different things?

The first is a dedicated computer used to provide a service. Servers are typically high-performance computers with large hard disk drives. The second use of the term server is of the software that is run on the machine. Server software includes print service, ftp server, web server, e-mail server, database server, and file server. The software server must be installed, configured, and managed. These steps may be involved. For instance, configuring and managing the Apache web server could potentially be a job by itself rather than one left up to either a system administrator or web developer. The third usage for server is the collection of hardware, software, and data that together constitutes the server. For instance, we might refer to a web server as hardware, software, and the documents stored there.

How was the first operating system different from the latest operating system

The first operating system was time consuming to switch between and execute programs.

Initiation Phase

The first phase of project management process. Consists of three key elements: - Problem definition - Resource allocation - Risk assessment

What does a host need to communicate over the internet

The host needs to run the TCP/IP protocol.

Why did companies start producing families of computers during the third generation?

The idea was that any computer in a given family should be able to run the same programs without having to alter the program code. This was largely attributable to computers of the same family using the same processor, or at least processors that had the same instruction set (machine language). The computer family gave birth to the software development field; code could be written for an entire family and the program sold to potentially dozens or hundreds of customers.

Data in DIKW

The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.

PaaS

The intention with Platform as a Service is to be able to quickly and reliably develop and deliver applications. Now, teams of developers located around the world can collaborate on the development of an app by accessing the same environment in real-time. This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers.

How is the World Wide Web different from the Internet

The internet is a computer network, utilizing computers and computer resources to communicate with each other, the media connecting these devices together, and the broadcast devices such as switches and routers. It is a physical entity, containing parts you can touch and point to. The World Wide Web sits on top of the internet. It is a collection of files. The internet predates the World Wide Web, and there could be no World Wide Web without the internet, but we could have the internet without the World Wide Web.

What is the main difference between a compiled language and an interpreted language?

The interpreted language runs inside of a special environment called the interpreter. The programmer enters a command, then the interpreter converts that command to machine language and executes it.

What is a drawback to the ring topology

The larger the ring becomes, the greater the potential distance that a message might have to travel, creating lengthier transmission times. Since ring topologies can be unidirectional or bidirectional, losing a device can do one of two things: - Unidirectional: if a device were to go offline, it would detach the network into two, such that some devices could no longer communicate with others. - Bidirectional: would require losing two devices before portions of the network became isolated.

Role of a Web server is

The role of a web server is to respond to HTTP requests. HTTP requests most typically come from web browsers, but other software and users can also submit requests.

What are some characteristics of the second generation of computers?

The second generation found cheaper, faster, easier to program, and more reliable computers. Computers no longer limited to government labs and university labs. Largely referred to as mainframes because of being built around a solid metal frame.

Which generation of computers was the first to use boolean operators?

The second generation.

Which generation of computers was the first to use mainframe computers?

The second generation.

Shell

The shell is an interface for the user, often personalized for that given user. The shell provides access to the kernel. For instance, a GUI shell will translate mouse motions into calls to kernel routines (e.g., open a file, start a program, move a file). Desktop elements include shortcut icons, the theme of the windows, menus and background, the appearance of toolbars and programs on the start menu, and desktop gadgets.

Explain how the OS Shell works

The shell provides access to the kernel. For example: A GUI shell will translate mouse motions into calls to kernel routines (e.g., open a file, start a program, move a file).

What major innovation in 1974 by IBM ushered in the fourth generation of computers?

The single chip processor, also known as microprocessor. Up until this point, all processors were distributed over several, perhaps dozens, of chips. By creating a single-chip processor one could build a small computer around the single chip. These computers were called microcomputers. Such a computer would be small enough to sit on a person's desk. This ushered in the most recent generation, the fourth generation.

Key differences between peripheral devices of standard PC computer and smartphone?

The smartphone has items normally thought of as peripherals such as keyboard and monitor built in, whereas with the desktop computer the peripherals are largely external.

What did the advent of computer families give birth to?

The software development field; code could be written for an entire family and the program sold to potentially dozens or hundreds of customers.

Systems administrators

The system administrator will, at a minimum, be required to install and configure operating systems on the organization's machines, install new hardware, perform software upgrades and maintenance, and handle user administration. Other duties include performing backup and recovery, system monitoring, performance tuning, and troubleshooting. The system administrator may also be involved with application development and deployment, system security and reliability, and have to work with networked file systems. The system administrator would most likely have to perform some programming through shell scripting so that repetitive tasks can be automated. A greater amount of programming might be required depending on the organization's size and staff. Policy creation and IT infrastructure planning may also be tasks assigned to system administrators.

What does the system clock do?

The system clock controls the speed at which instructions are processed. Processing speed is listed in terms of megahertz (MHz), (millions of processes per second) or gigahertz (GHz) (billions of processes per second).

Phased Conversion

The team deploys a subset of the system first, rather than deploying the whole system at once. The old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively.

Analysis

The team determines the user requirements for the new system and develops logical models of the system (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes).

Information Technology

The technology used in creating, maintaining, and making information accessible.

Packet Switching

The telephone network uses circuit switching, which remains fixed and established until one of the phones hangs up. Packet switching, on the contrary, breaks the communication down into small packets of data, and each is sent across the network separately. Each packet could potentially take a different pathway to reach the destination

Which generation of computers introduced computer networks?

The third generation.

What is the Top-Level Domain Name?

The three or two letter extension after the period which signifies the type of organization or country associated with the page Ex: .com, .gov, .edu; .au (Australia), .uk (United Kingdom), .ca (Canada).

Describe bandwidth

The transfer rate permissible over the form of media, described as some number of bits per second (bps). The form of media dictates the network's bandwidth. Modern bandwidths are on the order of millions or billions of bits per second (Mbits/second, mbps or Gbits/second, Gbps).

Describe a Web Administrator's (aka Webmaster) duties.

The web administrator, also known as a webmaster, but more precisely referred to as a web server administrator, is responsible for maintaining websites. This responsibility differs from the development of websites. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. The web server is software that runs on one or more computers. The web administrator may or may not be responsible for the hardware. Typically, the web administrator is not a system administrator on that or those computers. Therefore, the web administrator will have to work with the system administrator on some aspects of installation and configuration. Securing the web server becomes critical for businesses. Individuals outside and inside the organization may have reason to access data on the web-server without authorization thus requiring the need for securing the web server. The web administrator may be required to set up password files and establish locations where server scripts can be stored and tested. Security may be implemented directly through the web server software, or added through the operating system, or some combination. Security issues may be discovered by analyzing log files that are also used for data mining.

Parallel Conversion

There is a period of time in which both systems (the old and the new) are operating concurrently. This is done so that the output of the new system can be compared with the output of the old system. Once it is confirmed that everything is working as expected, the old system is shut down and the new system continues to operate.

Parallel Conversion

There is a period of time in which both systems are operating concurrently

Integer

a whole number

SaaS

Through Software as a Service (SaaS), businesses can access and use software through the Internet. Companies in many industries now use Google Docs and other programs that use SaaS. With SaaS, companies no longer have to purchase hardware and software to manage tasks such as payroll and e-mail, and these applications can be accessed by employees anywhere, anytime.

How does an ODBC compliant application interact with databases?

Through an ODBC driver that translates functions in the application to queries in the database.

How is an IP alias translated to an IP address

Through the use of a Domain Name Server (DNS), which acts as a sort of address book for the IP addresses.

Logic Tier

Tier that sits between the user interface and the data.

Data Tier

Tier where data is stored, retrieved and updated from database tables

Presentation Tier

Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures

What were the first computers needed for during World War II?

To assist in computing rocket trajectories. Crack German codes.

What is the goal of a Business Intelligence (BI) system?

To help support management in their strategic decision-making process.

What is the notion behind a user interface?

To shield the user from the underlying logic of the system as well as the underlying data structures.

Describe the "T" in the ETL process

Transform Data - given that the data come from different sources, it is likely that the data are not organized using the same collection of attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This will include altering data relations or objects (or whichever format is preferred), recognizing the unique identifier(s), and selecting the appropriate attributes (fields).

2nd Generation of Computers

Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers

What was used to replace vacuum tubes in second generation computers?

Transistor components.

What is the difference between FTP/Web servers and e-mail servers

Unlike FTP and Web servers, which have a limited number of protocols to handle (primarily FTP, FTPS, HTTP and HTTPS), there are more e-mail protocols that servers have to handle: IMAP, POP3, SMTP, HTTP, MAPI, and MIME.

How is FTP server different from a web server?

Unlike a web server, which responds to HTTP requests, an FTP server access is in the form of uploading files and downloading files. Any files downloaded are saved to disk, unlike the web service where most files are loaded directly into a client's web browser.

What is event-driven processing?

Uses business events, such as submitting an order to a vendor, receiving goods, or creating new employee records to trigger messages to be sen by middleware between software modules that are completely independent of one another. In EDA, each event is handled individually as it appears; the business unit experiencing the event "pushes" the event to the recipient, providing the recipient with immediate relevant business events; these events are "pushed" simultaneously to all interested parties (i.e., purchasing, receiving, manufacturing, sales and the customer).

Symmetric Key Encryption

Uses the same key for performing the encryption and decryption

Public Key Encryption

Uses two keys, a public and private key for performing encryption and decryption

Freeware

Usually software that has become obsolete because newer software has replaced it, or is software that the original producer no longer wishes to maintain and provide support for. You are bound by the same agreements when you install it, but are otherwise free to use it as if you have purchased it

What are vacuum tubes?

Vacuum tubes were used for storage and were a defining characteristic of first generation computers.

1st Generation of Computers

Vacuum tubes, relay switches, the need to program in machine language

Project Executing and Controlling Reports

Variance reports, Status reports, Resource Allocation reports

Presentation Tier

Where the user interface for the system is developed. Designed to run on the client and interface with the server.

Generic definition of IT.

We will consider IT to be the technology used in creating, maintaining, and making information accessible. In other words, IT combines people with computing resources, software, data, and computer networks. IT personnel, sometimes referred to collectively as "IT," are those people whose job it is to supply and support IT. These include computer engineers who design and build computer chips, computer scientists who write software for computers, and administrators who provide the IT infrastructure for organizations.

Natalie works for an advertising firm that specializes in web distributed advertising. Natalie needs to report to clients how many potential customers have viewed or traveled to the advertising website and if those potential customers continued to the company website to directly purchase products. Additionally, Natalie must make sure that the company's web advertising remains free from malicious code that could affect potential customer computers. What kind of server could she use?

Web server. The web server is needed if Natalie is using web advertising and wants to ensure that HTTP requests are not attacks.

Authentication is often done by proving who you are via these three "what you" statements.

What you know What you have (encryption key, physical keys, etc) What you are (biometrics, finger prints, etc)

Hacking

When an individual obtains unauthorized access to a host

What is Coax Cable?

a copper cored cable surrounded by heavy shielding

What are different operating systems for workstations and laptops

Windows 7/8/10 Linux Mac OS X

Name some different operating systems

Windows, Linux, Mac OS, FreeBSD, Solaris, redhat

What is the difference between knowledge and wisdom

Wisdom can only come by having both knowledge and experience. Knowledge can be learned from others who have it.

Define Wisdom in the DIKW hierarchy

Wisdom provides a social setting to knowledge - an understanding of "why".

IaaS

With Infrastructure as a Service, all the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.

Project Executing the Plan and Controlling the Project

With proper preparation in place, the team begins to execute the plan. This may involve hiring or training personnel, purchasing hardware, and developing, testing, and deploying a product or service. The specifics of this phase are dependent on the previously identified project scope. While the plan is being executed, the project manager must track the progress of the project in order to mitigate any problems that could impact the project. The project manager uses the information from Phases 1 and 2 to help ensure the project stays on track in terms of time, capital, and scope, and will be completed successfully. To facilitate this process, the project manager generates the various reports described below and uses these on an ongoing basis. Variance Reports indicate differences between planned resources (what has been allocated for each activity or task) and actual resources (what has been used thus far in the project). Status Reports indicate the state of the project. The status report provides specific information on the achievement of objectives and completion of activities. It is critical to track such progress, particularly for those activities that are dependent on other activities. Resource Allocation Reports indicate how time and capital have been used thus far for the project. This report, which is tied to the budget, keeps everyone informed of where the project is in relation to the resources originally allocated for the project. Together, all of these reports provide a project manager and the team with valuable information and transparency that can facilitate keeping a project on track, within budget, and successful.

Why did computers get faster as they got smaller?

With smaller computers, the physical distance electrical currents had to travel between components was lessened, helping the computers get faster.

Join

Withdraws information from multiple relations

Server Software

Works with hardware to provide a network service

Server Software

Works with hardware to provide a network service. Includes webservers, e-mail servers, and database servers.

Machine/Low-level Language

Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time

The first windowing operating system developed by ______ was used to demonstrate the use of OOP.

Xerox

How is Open Source different from the others?

You may obtain the software for free; you may enhance the software; you may distribute the software. However, you must abide by the copyright provided with the software.

ASCII (American Standard Code for Information Exchange

a code for representing English characters as numbers, with each letter assigned a number from 0 to 127

Attribute (field)

a column in a table containing information about spatial features. An attribute are characteristics which are used to describe a record, and are the column headings of a table. Ex: *Last name* Duke Keneally Underwood

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

Floating-point

a number with a decimal point (numeric data)

Hot site

a physical location where an organization can move its operations. A hot site includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data. Hot sites allow for the quickest return to business (often without any delay), but they are expensive.

Cold site

a physical location, but unlike a hot site, it is not equipped with hardware, servers, and the full range of items a hot site has. A cold site is more like a shell that can be used for operations should the need arise. It is less costly than a hot site, but the organization must be able to purchase, receive, and install all the necessary hardware and software before operations can continue.

Language translators

a program that takes a high-level language program as input, and creates a machine-language program as output.

Computer Matching and Privacy Protection Act of 1988

amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases. Without this act, one agency could potentially access data from other agencies to build a profile on a particular individual.

Scripts have traditionally been used more for _________ than for software development.

automation

In a ___ network, devices are connected along a single cable.

bus

All computers no matter their generation use the _______ system for programming.

binary

In the ___ network, all devices listen to any communications over the single cable and ignore all messages that are not intended for them. The ___ provides a dynamic network in that devices can be added and removed from the network at any time as long as there are still "T" connectors available. This is also the cheapest of all network topologies and a very reliable form of network. It does not degrade if a resource is either removed from the network or crashes. In spite of this, the network topology has a large drawback. All messages travel along the single cable and so the network's efficiency degrades as more devices are connected to it.

bus

A _______ ___________ is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

computer network

Confidential

consists of information that an organization will keep secret, such as patentable information and business plans.

Project Initiation

consists of three key elements: problem definition, resource allocation, and risk assessment

The Family Educational Rights and Privacy Act of 1974 (FERPA)

gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization. This is an important act because it prevents faculty from sharing student information (e.g., grades) with students' parents unless explicitly permitted by the students. In addition, it requires student authorization to release transcripts to, for instance, graduate schools or prospective employers.

Database administrators

have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to newer systems. As many or most database systems are now available over the Internet (or at least over local-area networks), the administrator must ensure proper security measures for remote access as well. Unlike a web administrator who will probably not be involved in web development, a database administrator is often expected to play a role in application design and development.

Mission

identifies the reason the organization exists, including the people it serves and the principles and standards of practice that should guide everyday operations.

Alpha testing, beta testing, and user acceptance occur during the ____________ phase.

implementation

Digital Millennium Copyright Act of 1998 (DMCA)

implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer. This law includes clauses that make it illegal to post on websites or download from websites copyrighted material whether that material originally existed as text, sound, video, or program code. Additionally, the act removes liability from Internet Service Providers who are providing Internet access for a criminal prosecuted under this act. As a result of this law, YouTube was not held liable for copyrighted content posted to the YouTube site by various users; however, as a result, YouTube often orders the removal of copyrighted material at the request of the copyright holder.

One of the main purposes of a BI system is to

improve the timeliness and quality of the information that goes into making strategic decisions. Unlike an operational decision (e.g., how much and when to order new supplies), a strategic decision is typically one that covers a long time frame (e.g., five years) and may involve such issues as whether or not an organization should expand into a new geographic region

The ____ network, also known as a fully connected network, requires that every device have a point-to-point connection with every other device. If there are n devices in the network, there are as many as (n - 1)^2 connections. Any device can directly communicate with any other device without concern of message traffic, and if any device were removed, it would not harm the connectivity of the network. However, the ____ network is impractical because of the cost. Not only does it require an excessive number of connections, it requires that every device have n - 1 ports available to make those connections. The ____ network is typically found in high-performance parallel processing computers but not used in computer networks. A small ____ network of six devices is shown in the image above. With six devices, there are a total of 25 connections. Imagine the number of connections required for a ____ of 50 devices instead. This would require 2401 connections!

mesh

Sensitive

might include e-mail addresses. Although this is not public information, it is information that will not be considered a threat to a person's privacy if others were to learn of it.

A ________ ________ is a more functional connection than a hub. For one, it records and recognizes the local network addresses [Media Access Control (MAC) addresses or IP addresses] of all computers connected to the switch. A message is then only passed along to the computer that matches the destination address. Thus, the switch is able to utilize network bandwidth more efficiently. While this device can be used to broadcast to all computers in a network, its purpose is to only send transmissions to a specific, intended computer.

network switch

What are some Network Administrator duties?

physically laying down cable. making connections. working with the network hardware (for instance, routers and switches). like the system administrator, the network administrator will edit configuration files, install software (related to the network), and so forth. Troubleshooting the network may combine physical troubleshooting (e.g., is a cable bad?) and software troubleshooting. There is also a security aspect to the computer network. Both the system administrator and network administrator may work on system firewalls. Editing configuration files, writing shell scripts, and installing software and patches will all be part of a network administrators tasks.

In a ___________ CPU the fetch-execute cycle is performed in an overlapped fashion on several instructions. For instance, while instruction 1 is being executed, instruction 2 is being decoded and instruction 3 is being fetched. This would result in three instructions all being in some state of execution at the same time.

pipelined.

RAM is referred to as __________ memory, while hard disk storage is referred to as _________ memory.

primary (RAM), secondary (disk storage)

Big Data

refers to data sets that are so enormous and multifaceted that they will require more sophisticated database management/processing tools than we currently use.

Site sharing

refers to having multiple data centers located in disparate regions. This approach is typically used by large organizations, which can shift critical functions to other sites when one site is impacted by a disaster.

A _____ server monitors print jobs and replies with an acknowledgment that the print job has completed, or an error message.

print

Drivers Privacy Protection Act of 1994

prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs).

Public

public information might include names and addresses (since this information is available through the phone book).

In the ____ network, devices have point-to-point connections with their neighbors. Communication between devices requires sending a message to a neighbor and having that neighbor forward the message along the ____ until it reaches its destination. The ____ is easily expanded by adding new devices between any two nodes. However, the larger the ring becomes, the greater the potential distance that a message might have to travel. This, in turn, can create lengthier transmission times. ____s are cheap, like buses, in that there is no dedicated resource that serves as a central point. A ring network could be unidirectional or bidirectional in terms of the direction that messages travel. In a unidirectional ____, if a device were to go offline, it would detach the network into two such that some devices could no longer communicate with others. Assume, for instance, that the ____ topology shown above were unidirectional and all communication traveled clockwise around the ____. If the topmost device were to fail, the device to the immediate left of the failed device would not be able to reach any other device, whereas the device to the immediate right of the failed device would not be able to receive communication from any other device. A bidirectional ____ would require losing two devices before portions of the network became isolated.

ring

Pivot

rotates data to view the data from a different perspective.

The ________ is a device that connects multiple networks together. Although you can use the device to directly connect computers in a network, the devices are typically used instead in specific locations in a network so that messages can be routed to other networks.

router

Name several duties the web server that the file server does not.

running server side scripts logging requests and errors handling security.

In _____________ _______________ the programmer is limited to high level control constructs such as while loops, for loops, and if-else statements, and is not allowed to use the more primitive GOTO statement. This ushered in a new era of high level languages, C and Pascal being among the most notable.

structured programming

In a ____ network, each device is connected to a central device, such as a hub or switch.

star

The ____ network is in some ways the opposite of the bus network. In the star network, all devices have a single point-to-point connection with a central device. This dedicated device acts as a communication hub, routing messages from one machine to the destination. The advantages of the network are its simplicity, ease of adding (or removing) devices, and the efficiency of message transferal. The network does not have to contend with message traffic like the bus network (although the hub can quickly become a bottleneck if there are a lot of simultaneous messages). The number of links that it takes for any message to reach its destination is always two (or one if the message is intended for the hub device). The network has two detractors. First, it does require a dedicated device, making it a more expensive network than the bus. The hub of the network may be a hub or switch. The hub of the network may also be a server, which would make the network more expensive. Second, although losing any single device would not degrade the network, if the hub is lost, all devices lose connectivity.

star

Privacy Act of 1974

the earliest piece of legislation that pertains to the collection and usage of personal data, this act limits actions of the federal government. The act states that: No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with prior written consent of, the individual to whom the record pertains. The act also states that federal agencies must publicly make available the data that they are collecting, the reason for the collection of the data, and the ability for any individual to consult the data collected on them to ensure its integrity.

Data Mirroring

the operating system writes data (and changes to the data) to multiple hard drives at the same time.

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Combines several different technologies: distributed computing, computer networks, and storage area networks.

Scope Creep

the team or other individuals may realize that additional features are needed or could be beneficial. This is commonly referred to as scope creep.

Beta testing

the tests are performed by the end user without any assistance from the system developers. Beta testing uses actual (i.e., live) data in the real working environment.

Privacy

under what circumstances should an administrator view other people's files? Under what circumstances should a company use the data accumulated about its customers?

A ___________ _____________ is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

virtual machine

A ________ ____________ is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.

virtual machine (VM)

This is a special type of file server in that it still stores data files (web pages) and programs (scripts).

web server

Full backup

when everything on the hard drive is copied each and every time a backup is performed.


Related study sets

chapter 4 Which of the following statements best describes the boundary between the two tectonic plates: the Relative motion of the North American & the Pacific Plate

View Set

NREMT practice questions (missed)

View Set