Intro to IT Study Guide

pdf

School

Columbia Southern University *

*We aren’t endorsed by this school

Course

1010

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

11

Uploaded by DerrickR1

Report
Updated 2/4/2023 STUDY RESOURCE This study resource is intended as a supplement to the course, not as a replacement. It will still be necessary to study the course. STUDY RESOURCE FOR INTRODUCTION TO IT
Updated 2/4/2023 Introduction to IT Study Resource Identify Major IT Roles & Functions Administration - An administrator is in charge of some portion of the IT infrastructure. Network administrator - oversees all aspects of the computer network. The network administrator’s duties include physically laying down cable, making connections, and working with the network hardware (for instance, routers and switches). Database administrator - focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas Security administrator - install, configure, and administer appropriate firewall security to protect the organization's systems and to work proactively against such intrusions. Web administrator - also known as a webmaster, but more precisely referred to as a web server administrator. This role is responsible for maintaining web storages, which differs from the development of web storage. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. Define Information Technology: IT is a term used to describe several aspects: the task of gathering data and processing it into information, the ability to disseminate information using technology, the technology itself that permits these tasks, and the collection of people who are in charge of maintaining the IT infrastructure (the computers, the networks, and the operating systems). Generically, we will consider IT to be the technology used in creating, maintaining, and making information accessible. In other words, IT combines people with computing resources, software, data, and computer networks. Information technology - describes the technology infrastructure that may support information systems, although Information Technology could also support many other types of systems (e.g., telecommunications systems). Information Technology includes hardware, software, networks, and databases that work together to allow an organization to manage data and information. A computer performs four operations : (Input-Processing-Output-Storage cycle, typically referred to as IPOS) Input Processing Output Storage Computer structure: The CPU is the device that not only executes your programs’ instructions, but also commands the various components in the computer. Memory stores the program(s) being executed and the data that each program is
Updated 2/4/2023 using. The I/O subsystem includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape). The bus is the device that permits information to move between each component. The system unit is a core feature of notebooks, tablets, smartphones, and other types of computers; therefore, it comes in a variety of shapes and sizes. The system unit contains various components that enable the PC system to run programs and complete other important functions. Various different types of computers are likely to have many of the same components. These include the case, which is a protective covering, internal bays and slots that grip the internal components, buses, which are the circuitry and electrical channels that enable communication among the electronic components, bays (external openings) and ports that connect peripherals, and lights and indicators that show the computer is turned on. Memory - short-term and long-term storage. Dynamic RAM (DRAM) which is typically called main memory Static RAM (SRAM), which is cache memory and registers Read only memory (ROM), which retains its contents indefinitely BIOS - Basic Input Output System Hard drive - store data even when the computer is turned off Peripheral devices - components that are located outside the system unit yet are connected physically or wirelessly to it. Hardware Software Network Users The physical components of the computer The programs and other operating information used by the computer A collection of computers and resources connected by various media so they can communicate with each other The people who use the computer system
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Updated 2/4/2023 Generations of Machines: 1 st generation - vacuum tubes 2 nd generation – transistors 3 rd generation – integrated circuits 4 th generation - microprocessors Machine language - The lowest-level programming languages understood by computers, representing instructions in binary (0s and 1s) Assembly language - specified instructions using words High level language – is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Compiler - requires that the components of the software all be defined before compilation can begin to run all at once. Examples are C, C++, C#. Interpreted language - runs inside of a special environment called the interpreter, the interpreter converts that command to machine language and executes it line by line. Examples are Perl and Python. Computer network - collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources Bandwidth - transfer rate permissible over the media, described as some number of bits per second (bps). Network hub - device that connects multiple computers together Network switch - more functional connection than a hub, its purpose is to only send transmissions to a specific, intended computer. Router - device that connects multiple networks together Wireless access point - connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable Radio waves - provide access to networks over long distances
Updated 2/4/2023 IP address - a series of numbers that indicates a specific internet location Server - computer that takes requests and responds with the requested information Network Types Star networks have a single machine serving as a central point to which all others are connected. Confidentiality - requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users. Integrity - requires that data are correct Availability - requires that information is available when needed Strategic risk analysis , - security policies are translated into mechanisms which support information security. We will focus on the risk management process\ Social engineering - threat that targets users. Phishing - is the process of targeting a specific individual, usually via email, under the guise of a reputable or trustworthy entity to reveal private or personal details such as usernames or password Hacking - is when an individual obtains unauthorized access to a host Malware - "malicious" software Spyware - is often downloaded unknown to the user when accessing web storages. Denial of service (DOS) attack - In the DOS attack, one or more attackers attempts to flood a server with so many incoming messages that the server is unable to handle legitimate business Firewalls - prevent certain types of messages from coming into or out of the network and anti-viral software seeks out malware Antivirus software - attempts to identify if a file contains a virus or, more generally, some form of malware. Information security - attempts to ensure the confidentiality, integrity, and availability of information when it is stored, processed, and transmitted (across a network)
Updated 2/4/2023 Encryption - is the idea of obfuscating the information that resides on a computer or is sent over a network so that if it is intercepted the hacker will be unable to use the information. Encryption uses a mathematical algorithm for converting the plain-text information to the encrypted form Symmetric key encryption - uses the same key for performing the encryption and decryption. Public-key encryption - uses two keys, a public and private key. Software - is the term we use for the systems and programs that are developed, as a result of programming and scripting efforts by individuals, to perform a business function. Application software - consists of programs that end users run to accomplish tasks System software - consists of programs that make up the operating system Server software - works with hardware to provide a network service Cloud computing - combines several different technologies: distributed computing, computer networks, and storage area networks. The idea is to offer, as a service, the ability to offload computation and storage from your local computer to the cloud Operating system (OS) - is a program. Its primary task is to allow a computer user to easily access the hardware and software of a computer system. Beyond this, we might say that an OS is required to maintain the computer’s environment. (Windows 7/8/10, Linux,and Mac OS X., Android, Windows, and iOS) Kernel - The core components of the operating system Device drivers - provide specific interfaces between the OS running a computer and hardware Shell - an interface for the user, often personalized for that given user System utilities - programs that allow the user to monitor and improve system performance. GUI - allows a user to control the computer by using the mouse and pointing and clicking at objects on the screen (icons, menus, buttons, etc.). Web server - The role of a web server is to respond to HTTP requests Proxy server - used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved. Database server - permits database access across a network Proprietary software - is purchased from a vendor Shareware - usually provides you a trial version of the software Freeware - is usually software that has become obsolete because a newer software has replaced it, or is software that the original producer (whether an individual or a company) no longer wishes to maintain and provide support for Public Domain software -on the other hand, is software that has been moved into the public domain. Open source software -This software was created in the Open Source Community and made freely available as source code Algorithm - is a formula or procedure for solving a problem
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Updated 2/4/2023 Flat file database - is used if the amount of data that is being recorded is fairly minimal. It is one large single table without the relations between tables that a relational format provides Relational database - is the most common structure for databases. A relational database has multiple tables (relations) with interrelated fields. Hierarchical database - format organizes data using a tree-like or organizational chart type structure. Business Intelligence - is knowledge Business Intelligence system - helps to capture the knowledge contained in various information systems within the company for making strategic decisions Structured Query Language (SQL) - is a standard query language that is used to communicate in many DBMSs. In general, SQL uses the following format for interacting with the data contained within a database: SELECT fields FROM tables WHERE fields from tables match criteria The DIKW hierarchy describes the transition of date to wisdom. Types of Data Integers 4 34 394850 Floating Point Numbers 9.5 45.5 1.7 Characters F ! # Character Strings abc def456 3erf78!@ Boolean Values True false Quality data – relevant, timely, thorough, accurate and reliability IT department - supports the day-to-day technology needs of an organization. More broadly, an IT department is charged with helping an organization achieve its strategic goals. Goals – translate the organization’s philosophy into specific, measurable outcomes the organization plans to achieve.
Updated 2/4/2023 Project Management Life Cycle System Development Life Cycle
Updated 2/4/2023 Software Development Life Cycle (Video) Planning Design Implementation Testing Deployment Maintenance Business continuity - relates to information technology systems, as well as all other business processes, including marketing, manufacturing, finance, accounting, human resources, management, and so on. Key components of the process are developing a plan and testing the plan. A hot storage - is a physical location where an organization can move its operations. A hot storage includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data. Hot storages allow for the quickest return to business (often without any delay), but they are expensive. A cold storage - is also a physical location, but unlike a hot storage, it is not equipped with hardware, servers, and the full range of items a hot storage has. A cold storage is more like a shell that can be used for operations should the need arise. It is less costly than a hot storage, but the organization must be able to purchase, receive, and install all the necessary hardware and software before operations can continue. Bluetooth - is a standard that enables devices to exchange data using wireless technology The Internet of Things - refers to the myriad types of devices that can and will be connected to the Internet in the next few years. Big data - means integrating these vast amounts of data, whether the data is generated internally or externally and finding ways to investigate the relationships that can be discerned from the data. Planning Design Implementation Testing Deployment Maintenance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Updated 2/4/2023 Software as a Service (SaaS) - businesses can access and use software through the Internet. Companies in many industries now use Google Docs and other programs that use SaaS Platform as a Service (PaaS) - is to be able to develop and deliver applications quickly and reliably. Infrastructure as a Service (IaaS) - all the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.
Updated 2/4/2023 Ethics - a code of moral conduct or a set of principles that govern behavior. The 10 Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use computers in ways that ensure consideration and respect for fellow humans. Know these: 1. The Family Educational Rights and Privacy Act of 1974 (FERPA) 2. Electronic Communication Privacy Act of 1986 3. Computer Matching and Privacy Protection Act of 1988 4. Health Insurance Portability and Accountability Act of 1996 (HIPAA) 5. Digital Signature and Electronic Authentication Law of 1998 (SEAL) 6. The AITP code of ethics ( http://www.aitp.org/?page=Ethics ) 7. Information Systems Audit and Control Association (ISACA) Please contact your Course Instructor if you need any assistance.

Browse Popular Homework Q&A

Q: Which of these is not a correct citation to the Internal Revenue Code? A. All of these are correct…
Q: Solve the following triangle using either the Law of Sines or the Law of Cosines. b=4, c 16, A = 58°…
Q: (Related to Checkpoint 9.3) (Bond valuation relationships) You own a bond that pays $110 in annual…
Q: an aircraft is spotted by two observers who are 1000 feet apart. as the airplane passes over the…
Q: d. Calculate the probability of four or more students being in line or being served. (Round your…
Q: C) Immunosuppressive therapy is most commonly applied after tissue transplantation. Describe another…
Q: Please explain  calculation of transaction b)  Where the value 612 is coming
Q: 8. (a) Determine whether each series converges or diverges and write a brief explanation. Σ…
Q: What is virtualization "speed performance” in relation to virtualization?
Q: Use the method of Lagrange multipliers to find the maximum and minimum values of the function…
Q: Use the vectors in the figure at the right to graph the following vector. v+w Choose the correct…
Q: Determine the value of Ksp for AglO, by constructing an ICE table, writing the solubility constant…
Q: O Solve the following initial value problem: dx dt dy dt = = 2x + 5y 2x - y x(0) = 1, y(0) = 6
Q: State the domain, vertical asymptote, and end behavior of the function.   h(x)=−log(3x−7)+7…
Q: 1. Compare and contrast pyramids and cones. Be sure to use mathematical terms to describe parts of…
Q: niles. Groundwater is discharged from through evapotranspiration and pumping in tl which encompasses…
Q: Solve the structure of this compound by looking at the 1H, 13C NMR data provided.  You must fill all…
Q: A rod shaped virus has a diameter of 1*102 nm and a length of 5*102nm.What is the volume of the…
Q: (Cost of debt) Temple-Midland, Inc. is issuing a $1,000 par value bond that pays 7.9 percent annual…
Q: Research on autism has shown recently a developmental difference in development of white-matter…
Q: (b) (i) Fill in the missing parts: The Ratio Test for (ii) Find the value of L. Σ gives L = lim n=0…
Q: The ANOVA summary table to the right is for a multiple regression model with six independent…