1 / 17
WGU D075 Information Technology Management Essentials
1.Adware: Programs that automatically display or download
advertising to a com- puter.
2.Application Software: Software that is designed for the user to
carry out a specific task.
3.Best Practice: A management process, technique, or method that
is most effective at arriving at a desired outcome or a better
outcome than any other process, technique, or method.
4.Big Data: Data that is collected from all over the internet, including
smartphone metadata, internet usage records, social media activity,
computer usage records, and countless other data sources.
5.Bus Topology: A network topology sometimes called a linear bus,
where each of a network’s nodes is connected to a common linear
backbone that has two endpoints.
2 / 17
6.Business Analytics: Attempts to make connections between data so
organiza- tions can try to predict future trends that may give them a
competitive advantage.
7.Business Intelligence (BI): Strategies and technologies used by
enterprises for the data analysis of business information.
8.Cache: A hardware or software component that stores data so
that future requests for that data can be served faster.
9.Campus Area Network (CAN): A computer network that connects two
or more LANs that are located on a campus.
10.Chief Information Officer (CIO): A job title for the board-level head of
an information technology department within a business organization.
The CIO’s job is to make sure IT assets are in place to ensure a
smooth transition.
11.Chief Information Security Officer (CISO): The CISO is generally
focused on the security of an organization’s data and information,
making sure it is backed up, deciding who gets to see it and who does
3 / 17
not, and so on.
12.Chief Security Officer (CSO): A CSO is in charge of such things as the
physical security and safety of employees, facilities, and corporate
assets and may have a law enforcement background.
13.Chief Technology Officers (CTO): The CTO runs the organization’s IT
engi- neering group and serves as the company’s top technology
architect.
14.Click Fraud: An internet fraud scheme that automatically passes a
user to an advertiser, whether they had any intention of visiting or not,
in order to collect a per-click fee.
4 / 17
15.Clients: An end user’s computer in a computer network.
16.Computer Network: Two or more computers connected together to
commu- nicate and share resources.
17.Cybersecurity: The convergence of technologies, sound practice,
and processes designed to protect networks and their devices,
programs, and data from attack or unauthorized access.
18.Data Analysis: The application of statistics and logic techniques
to define, illustrate, and evaluate data.
19.Data Management (DM): The practices, architectural techniques, and
tools for achieving consistent access to and delivery of data across the
spectrum of data subject areas and data structure types in the
enterprise.
20.Data Management Processes: The process of acquiring data, making
sure the data are valid, and then storing and processing the data into
usable information for a business.
21.Data Mapping: Extra notes about the definition of a field, its data,
and its use.
22.Data Mining: The examination of huge sets of data to find
patterns and connections and identify outliers and hidden
relationships.
23.Database Administrators (DBAs): DBAs categorize data requirements
and create the database entities and models that ensure accurate and
smooth-flowing information throughout a business.