WGU C182 Introduction to IT Exam Questions and Answers Latest (2024 / 2025) (Verified Answers by Expert)

WGU C182 Introduction to IT Exam Questions and Answers Latest (2024 / 2025) (Verified Answers by Expert)

Wgu c182 introduction to it exam questions and answers quizlet
Wgu c182 introduction to it exam questions and answers qui
Wgu c182 introduction to it exam questions and answers pdf
wgu c182 objective assessment answers
wgu c182 introduction to it quizlet
wgu intro to it quizlet d322
wgu intro to it – practice test
wgu intro to it objective assessment

get pdf at;https://learnexams.com/search/study?query=

TermText TermText 2
Marcus has a summer job working at a real estate agency. He is entering client addresses into the company’s computer system. At which state of the DIKW is Marcus working? Data
Which software is run automatically rather than by the end user System software
Which account is also referred to as root or superuser? The Administrator Account
Which of the following best describes a hierarchical database format? Data are modeled using parent-child relationships
Which of the following would NOT be the responsibility of the system administrator? Answering e-mails from potential customers
Which of the following is an example of a relational database? A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University’s system.
Which of the following describes the duties of a web administrator? Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.
Which of the following statements accurately describe IT certifications? Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.
Which of the following is NOT an important characteristic of an IT professional? Strong math background and programming skills
As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working? Knowledge
Which of the following statements describes the difference between information systems and information technology? An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software.
Which of the following statements best represents the relevant characteristic of quality data? The data used applies to the question being answered.
Which of the following is/are true of the IPOS cycle? Once words, numbers or images are entered, a computer processes the data into usable information that can then be accessed to answer questions or meet specific needs.
Which of the following is an accurate definition of a computer system? A computer system is a collection of hardware and software components that work together to meet the needs of the user.
Which of the following would NOT be considered hardware? Word processor.
Select the statement that best describes the difference between software and hardware. Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
Which of the following would NOT require the use of a network? Loading a statistical program on your personal computer.
Which type of software includes programs such as Microsoft Word and PowerPoint? Application
What is a program that will allow a computer to easily access the hardware and software of the computer system? Operating system
_ software works with hardware to provide a network service Windows Server What is another term that defines a script? Interpreted program In the design phase of the SDLC (system development life cycle) the system is described in abstract terms using modeling tools such as flowcharts, UML and entity-relationship diagrams. Logical
Software testing conducted by a client or a specific department within an organization, is called: Alpha
This phase of testing consists of using actual (i.e., live) data in the real working environment Beta
” occurs when the old system is “”turned off”” and the new system is “”turned on”” at a specific date and time.” Direct Conversion
For the following scenario, which government regulation would be relevant?Andrea is employed by the Deming Foundation, a non-profit seeking to help increase graduation rates in rural communities. She has been working hard to identify and recruit donations from wealthy businessmen and companies and is seeing a great deal of success. While she quickly runs into the grocery store for a few items, someone steals her laptop from her car, containing all her work files. Security Breach Notification Laws.
During the output of the new system is compared with the output of the old system Parallel Conversion
During the old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively. Phased Conversion
This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications Paas (Platform as a Service)
With an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere Iaas (Infrastructure as a Service)
What is the correct order of project phase for Project Management? Initiation, Planning, Executing & Controlling, Closing
During this phase of Project Management, the projects scope and requirements are defined Initiation phase
The role of a is to respond to requests most typically come from web browsers, such as HTTP web server
This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols) email server
In this network topology ALL devices have a single point-to-point connection with a central device STAR network
This type of software is made freely available as source code open source software
This software protection will protect an individuals original work (tangible form) for the authors life + 70 years Copyright
This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing patent
The keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in). SELECT
The keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined. FROM
The keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query WHERE
All of the following are high-level languages except for: Javascript
Which of the following is the correct function of the compiler? Translates the entire program, creating an executable program, which can be run at a later time.
A program written in a high-level language must be converted into code to be executed by the computer. Machine
A collection of organized databases is called: a data warehouse
Which two are both types of scripting languages ASP and Python
This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations). Relational
This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure) Hierarchal
Which of the following types of information present a threat to someone’s privacy? Student ID and credit card numbers
In strategic risk analysis, what is the final step? Develop and enact policies against threats
Learning about social engineering and how to protect passwords is Education
File access rights Will include files that the user can access
A local area network (LAN) Allows hardware sharing within one office
Which device permits packet switching so that a message can be routed to the next link in a network? Router
Which of the following best describes the Internet? The Internet is a global network of networks.
All of the following are parts of a URL except for: LAN
Which of the following statements is not part of the path a message takes from one computer to another? All messages require a response from the destination machine to the sending device.
Your site’s Internet point of presence is called a: Gateway
Which of the following aligns IT goals and organization goals? IT goals include cloud computing and organization goals include real-time communications to contain costs while scaling quickly
What is IT management responsible for? Being the project manager
IT personnel who understand both the technical IT infrastructure and management of the business fill which role? IT management
What is an advantage of outsourcing? Cost-effective if time is constrained
A company’s ability to recover after a disaster is directly related to which of the following? Business continuity plan
Which of the following is the final step in creatinf a BCP plan? Testing the plan
An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following? Data mirroring
What is the definition of a Platform as a Service (PaaS)? A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
The use of IT has allowed businesses to have __
. More tools for communicating
During which generation did computers begin to see widespread use in business? Fourth generation
Which of the following high-level programming languages was created to be business-oriented? COBOL
Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer. CPU
Which of the following best describes the differences between memory and the hard drive? Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
Which of the following best describes the purpose of expansion slots in modern computers? Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
“Which of the following carries our the instructions of a computer program and is often referred to as the “”chip””?” Central Processing Unit
Which of the following statements best defines the CPU? The CPU controls the speed at which instructions are retrieved and processed in the computer.
Which of the following is an example of what 1 GB would store? Thousands of books
Which of the following statements accurately describes random access memory (RAM)? RAM is short-term memory.
Which is found on the motherboard and stores information but the information is not permanent? RAM
All of the following are input systems except: Speaker
A scanned is a peripheral device for what system? I/O
What peripheral component houses CDs and DVD? Bays
What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices? Ports
Which computer will use a docking station to function like a desktop? Notebook
An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the? Project
Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs? Planning
The team will write a final report detailing the processes and outcomes of the project in which project phase? Closing
Which project phase determines what resources are available to meet the projects needs? Initiation
Determining the project scope or the work that needs to be completed is in what project phase? Initiation
The scope of the project is? The work that needs to be done
During analysis, which system requirements prevents unauthorized users from accessing data? Security
During implementation, how is alpha testing different from beta testing? Alpha testing uses simulated data
During implementation, which testing assesses whether the system functions and is useful? User Acceptance
Which term involves replacing the old system with a new system? System conversion
Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply. By knowing the purpose, the developer can determine how many fields are needed in the database.The purpose determines the structure of the database.The developer can determine which data types would help fulfill the purpose.
Which of the following are operations used to alter the data within a relation of a database? Update, Delete, Insert
Which of the following are the three main categories of databases? Hierarchical, Flat File, Relational
Database administrators might be involved with the integration of data from where Older systems to new
Which of the following statements applies to a business intelligence system? Used when making long-term decisions.
What is the definition of business intelligence? Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
Which of the following interacts between a database and an application? A driver
Which of the following operators is used to select all of a certain data? *

TermText TermText 2
Information Technology The technology used in creating, maintaining, and making information accessible.
IT Professional Roles Administration and Support
System Administrator Maintains all aspects of the system including hardware, software, and programming.
Network Administrator In charge of all aspects of the computer network
Database Administrator Focuses on the design, development, and support of database management systems (DBMSs).
Security Administrator Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.
Web Administrator Installs, configures, maintains, secures, and troubleshoots web severs.
Support IT Professionals Help desk and training.
Information Processed data.
DIKW Hierarchy Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)
Data in DIKW The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.
Information in DIKW Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.
Knowledge in DIKW Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.
Wisdom in DIKW “Provides a social setting to knowledge; an understanding of the “”why””. Can only come by having both knowledge and experience.”
Information Systems A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.
Characteristics of Quality Data Relevance – the data being used must apply directly to the decision being madeTimely – data must be efficient and must be provided in a timely manner Thorough – the data must be completeAccurate – data should be captured only once, where possible and should be captured as close to the point of activity as possible.Reliable – data should reflect stable and consistent data collection processes across collections points and over time
IPOS The Input-Procession-Output-Storage Cycle
Input Raw data is entered by the user.
Processing Raw data is organized or structured for usefulness.
Output Information is output so user can see results.
Storage Processed information is stored for permanent record.
Computer System A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.
Hardware Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.
Software Computer programs that tell the computer what to do–how to execute commands and process information
Network A collection of computers and resources connected by various media so that they can communicate with each other.
User Those who use a computer.
Software Categories Systems Software and Applications Software
Evolution of Users First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.
Protocol Rules provided by which networks communicate with each other.
TCP/IP Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.
Protocol Stack A collection of protocols. TCP/IP is an example.
Components of a Computer CPU, Memory and Storage, Peripheral Devices
CPU “Executes programs’ instructions and commands various components in the computer. Referred to as the “”chip””.”
Memory Stores the programs being executed and the data they are using.
I/O Subsystem All peripheral devices where long term storage devices are used.
Bus Permits information to move between each component; electrical channels that enable communication among the electronic components
System Unit Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.
Internal Components of the System Unit Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards
Parts of the CPU Control Unit (CU) – retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALUArithmetic Logic Unit (ALU) – does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen
System Clock Controls the speed at which instructions are processed.
RAM Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power). You can choose the amount of RAM your computer has.
Types of RAM Dynamic RAM (DRAM) – typically called main memoryStatic RAM (SRAM) – cache memory and registers
BIOS ROM “BIOS stands for Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard.Is software not hardware, (“”basic”” operating system that runs when the computer is first turned on).Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk.Can’t choose the amount or contents.”
1st Generation of Computers Vacuum tubes, relay switches, the need to program in machine language
2nd Generation of Computers Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers
3rd Generation of Computers Silicon chips (known as ICs – integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals
4th Generation of Computers Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use
Moore’s Law Doubling of transistor count roughly every 18 – 24 months (exponential increase); observation, not physical law
Evolution of Storage Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage
Machine/Low-level Language Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time
Assembly Language Easier than machine but still required detailed, precise low level instructions
Language Translator Programs Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer
Complier Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient
Structured Programming Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements
Object Oriented Programming Initially introduced in Smalltalk in 1970’s and early 80’s
Interpreted Code Runs inside a special environment; is better for testing
Shell Scripting Small programs that place Linux commands or DOS batch files into a file
Local Computer The computer that the user is using; physically present with
Remote Computer A computer being accessed over the network
Network Hub Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network
Network Switch More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it
Router Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses
Wireless Access Point Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable
Circuit Switched Network Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission
Packet Switched Network A message’s pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic
Workstations Creates and maintains client network connections to remote servers
Virtual Machine (VM) A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.
Server Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network
Client-server Network Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers
File Server Sends files over the network at the request of clients.Responds over LAN, within one location/site.Support both application software and data files.
Web Server Stores data files (web pages) and programs (scripts).Responds from anywhere on the Internet.
Database Server Responds to queries by pulling from the database.Typically only to local clients.
Print Server Monitors print jobs
Mail Server Two email servers communicate with each other
FTP Server Like web server or file server in that requests are for files and responses are the files
Point-to-Point Network Link between two resources.Simplest for of a network.Limits how devices can communicate with each other
Bus Network Devices connected along a single cable.Size of network is restricted.
Star Network Each device is connected to a central devices such as a hub or switch.
Ring Network Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.
Mesh Network Every device is connected directly to every other device in the network.
Domain Name Server (DNS) Used to translate from an IP alias to an IP address
Parts of URL (Uniform Resource Locator) Protocol, Domain name, Resource/Filename
Domain Name Identifies the server on which the web page can be found
Domain Name Parts Top level domain (TLD) name and Host name
Host Name Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored
TLD(Top Level Domain) Name Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page
Resource/Filename ID Indicates the name of the file you are accessing, or the location of the document on the server
CIA Confidentiality, Integrity, Availability
Confidentiality Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users
Integrity Requires that data is correct
Availability Requires that information is available when needed
Data Integrity Efforts 1st – Must include a component that ensures the accuracy of the collected data2nd – Must be entered into the system accurately3rd – Data modification must be tracked
Strategic Risk Analysis 1. Identify the organization’s information assets2. Identify vulnerabilities of each asset3. Determine threats4. Prioritizing risks5. Develop and enact policies that will reduce threats
Information Security Classifications Public – available through public sources; includes names and addressesSensitive – not considered a threat to a person’s privacy if others learn of it; include email addressesPrivate – information that could be a threat if disclosed to others; includes social security and credit card numbersConfidential – information that an organization will keep secret; includes patentable information and business plans
Defense in Depth Protecting every layer that surrounds data
Phishing Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information
SQL Injection An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company’s website; web server might pass the command onto the database which then allows potentially anything to be done to the database
Buffer Overflow Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code
Hacking When an individual obtains unauthorized access to a host
White Hat Hacker Informs companies of potential problems with software so companies can fix
Black Hat Hacker Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism
Grey Hat Hacker Engage in both white and black hat types of hacking activities
Packet Sniffing Allows you to obtain anything being sent over a network if the data being transmitted isn’t encrypted
Virus Software that attaches itself to another legitimate software application
Worms Self contained programs that do not need other programs to propagate across computers and computer networks
Trojan Horse Type of virus that completely replaces an existing application and takes the name of the taken over file
Denial of Service (DOS) One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business
Firewalls Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked
Anti-viral Software Attempts to identify if a file contains a virus or some form of malware
Redundancy Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline
Encryption Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information
Symmetric Key Encryption Uses the same key for performing the encryption and decryption
Public Key Encryption Uses two keys, a public and private key for performing encryption and decryption
Security Education Users learn how to protect their passwords and other security measures
Authentication Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)
Role-based Access Control Ensures that the user gains access only to the resources that the user should be able to access
Computer Network Advantages 1. Cost savings benefits2. Increased efficiency and productivity3. Increased facilitation of communication
Application Software Consists of programs that end users run to accomplish tasks
System Software Consists of programs that make up the OS; software that directly supports the computer system itself
Server Software Works with hardware to provide a network service
Local Applications Software that is stored on an individual computer
Intranet A LAN that uses the Internet Protocol
Cloud Computing Offers, as a service, the ability to offload computation and storage from your local computer
Operating Systems Primary task is to allow a computer user to easily access the hardware and software of a computer system
Kernel Core components of the OS that is loaded when the computer is first booted.
Device Drivers Provide specific interfaces between the OS running a computer and hardware devices.
Shell An interface for the user, often personalized for that given user, that provides access to the kernel.
Services Os programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.
Utility Programs Programs that allow the user to monitor and improve system performance.
Proxy Server Acts as a giant cache of web pages that anyone in the organization has recently retrieved
Proprietary Software Software purchased from a vendor; also known as commercial
Shareware Provides a trial version of the software.
Freeware Usually software that has become obsolete; is free
Public Domain Software that has been moved into the public domain; can be used however you feel
Open Source Created in the Open Source Community and made freely available as source code
Copyrights Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author’s life plus 70 years.
Patents Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date
End User License Agreement (EULA) Gives the purchaser the right to use the software
Decimal Uses base 10 to represent numbers (0 – 9)
Binary Uses base 2 system (0 and 1)
Byte 8 bits; a single character of text in a computer
Octal Every value is represented with some combination of 8 digits (0 – 7)
Hexadecimal Uses a base 16
Character Representation ASCII and Unicode
Language Translators A program that takes one program, written in a high level language, and creates a machine language program as output
Compiled Language Translates the entire program, creating an executable program which can be run at a later time
Interpreted Language Takes the most recently entered instruction, translates it into machine language, and executes it
Script Sometimes uses to refer to a small program that have been traditionally used for automation
Algorithms A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process
Multi-tier Development Separation of different aspect of a system
N-tier Development Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects
Presentation Tier Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures
Logic Tier Tier that sits between the user interface and the data.
Data Tier Tier where data is stored, retrieved and updated from database tables
Model-View-Controller (MVC) Is a development technique used in the implementation of user interfaces
The Model Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application
The View The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model
The Controller The part of an application that interacts with the user and passes the user requests to the model
Data Validation Ensuring that users enter the correct data type
String Data Alphanumeric or text character
Floating-point Number with a decimal point
Boolean/Logical True/False
Flat File Database One large single table; used if the amount of data that is being recorded is fairly minimal
Relational Database Has multiple tables (relations) with interrelated fields; most common structure for databases
Hierarchical Database Organizes data using a tree like or organizational chart type structure
Database Management System (DBMS) Used to create, manipulate, and access the data in a database
Relation Often presented as a table
Tuples Rows of a relation
Attributes Columns of the relation
Field Contains the data of an attribute for a record within a relation
Query A search of data in the relation or relations that fit specific parameters
Projection A query that returns all of the records from the relation, but only select attributes or fields
Sort Sorting records based on some field(s) such as ascending order by last name
Join Withdraws information from multiple relations
Primary Key A field int he relations that contains a unique value
Business Intelligence A specific information system to help an organization reach its strategic goals
Data Warehouse A collection of organized databases
Database Information Processing (OLAP) Data is processed through a suite of analysis software tools
Slicing Creates a subset of the data by reducing the data from multiple dimensions to one dimension
Dicing Same as slicing except that the result can be in multiple dimensions
Drilling up and down Shifts the view of the data; down provides more detail, up provides summarized data
Rolling up Similar to drilling up but it collapses the data from multiple items into a single value
Pivot Rotates data to view the data from a different perspective
Online Data Processing (OLDP) Deals with data in real time
Event-driven Processing Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another
Batch Processing Processing large amounts of data all in one batch when the computer system is not busy
ODBC (Open Database Connectivity) Interacts with a database via a database driver
Structured Query Language (SQL) A standard query language that is used to communicate in may DBMSs
Database Interacting Format SELECT fields FROM tables WHERE fields from tables match criteria
SELECT Used to inform the DBMS what fields or attributes are of interest
FROM Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined
WHERE Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query
Project phases Initiation, planning, executing and controlling, and closing
Project Initiation Problem definition, resource allocation, risk assessment
Project Planning Organize activities, time estimation, cost estimation
Project Executing and Controlling Reports Variance reports, Status reports, Resource Allocation reports
Scope Creep Adding to the scope of the project; can impact the allocation of resources.
Unnecessary Requirements “Requirements that are not actually needed but are “”nice to have”””
System Development Life Cycle (SDLC) A process for planning, creating, testing, and deploying information systems, including hardware and software
Common Steps in SDLC Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance
Preliminary investigation Assesses the feasibility of the proposed project and selects a development methodology
Analysis Determines the user requirements for the new system and develops logical models of the system
Logical design Logical models are revised to ensure that the new system will meet the user requirements identified in the first step
Physical design Logical models are converted into physical models
Implementation Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users
Maintenance Modifications or corrections to the system are made
Alpha Testing System developers assist end users as they interact with new system; simulated data is used
Beta Testing Performed by the end user without any assistance from the system developers; live data in a real working environment is used.
User Acceptance Testing Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user
System Deployment 1. System Conversion2. Final Documentation3. End User Training
Direct Conversion Old system is turned off and the new system is turned on at a specific data and time
Parallel Conversion There is a period of time in which both systems are operating concurrently
Pilot Conversion Involves starting the conversation with a portion of end users
Phased Conversion Deploys a subset of the system first, rather than deploying the whole system at once
Business Continuity The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.
Image backups Create a copy of everything that is on a hard drive
Full backup Everything on the hard drive is copied each and every time a backup is performed
Incremental backup An initial full backup is completed and then subsequent backups only capture the changes since the last backup
Data mirroring The OS writes data (and changes to data) to multiple hard drives at the same time.
Off-Site Storage A secure location for storing backup media
Hot Site Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.
Cold Site Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have
Site Sharing Having multiple data centers located in disparate regions; typically used by large organizations.
The Internet of Things (IoT) Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.
Big Data Refers to data sets that are so large and complex that they will require more advanced database management/processing tools.
SaaS Software as a Service. Can access and use software through the Internet.
PaaS Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.
LaaS Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.
Ethics A code of moral conduct or a set of principles that govern behavior.
Administrator Ethics Privacy, Ownership, Control, Accuracy, Security

Scroll to Top