IT D322 Exam Questions
- studiers in 3 days 4.2 (25 reviews)
Students also studied Terms in this set (136) Western Governors UniversityIT C182 Save WGU - Intro to IT - D322 - Full study...414 terms Atraniv_98Preview Test Prep - WGU - Principles of Man...105 terms C_BondePreview
WGU Section 7: The Business Of IT S...
120 terms anna_striedel1 Preview WGU C 195 term asto Key ComponentsHardware, Software, Data Information TechnologyThe technology used in creating, maintaining, and making information accessible Information SystemTakes in raw data entered by a user or acquired from a data source or sources (input), deliberately transforms the data into information (process), and provides the results of the transformation to the user (output) IT department in an organizationIT is responsible for the storage, processing, and distribution of information.NetworksOrganization servers and give employees access to the resources, the data, and the exchange of networks.InfrastructureThe system of hardware, software, facilities, and service components that support the delivery of business systems and IT-enabled processes.Difference between input, output, and storage*Input: hard disk is inserted into the computer to store information in the computer
*Output: displays information in a pictorial form allowing the user to interact
directly with the computer
*Storage: Random Access Memory (RAM) holds programs and data when the
computer is in use Core of Components of IT HardwareHard Disk, Monitor, Motherboard, CPU, RAM Software DevelopmentImplementing various algorithms that transform data into another, which performs calculations, manipulate files, or complete other repetitive tasks, can be time- consuming or dangerous to an employee.
Business Analysis*Organizations improve their operations by optimizing their technology *IT changes rapidly, so organizations must constantly investigate and plan or replace systems.Information Systems Requirements and needs*Security: Organizations try to aim for secure systems to prevent incidents that can disrupt business. Unauthorized access could cause data loss or modifications
*Accessibility functions: These functions are designed to help people with
disabilities use technology more easily IT department in an organizationAnalyzing, specifying, designing, developing, testing, and maintaining software that is beneficial and effective for the company or client. Oversees the installation and maintenance of computer network systems within a company. Helps an organization to analyze its current IT and identify areas where changes could lead to cost savings.IntranetA local or restricted communications network, especially a private network created using World Wide Web software.Business Intelligence Project Management Outsourcing Services (OS)The business practice of hiring a party outside a company to perform services or create goods that were traditionally performed in-house by the company's own employees and staff.TaxonomiesThe discipline studying the classification criteria of a given set of items and a specific classification system of knowledge organization Software EngineerA person who is responsible for designing and developing software that makes hardware and software systems work, including operating systems, database systems, and embedded systems.Network EngineerA person who is responsible for setup, configure, maintain, and upgrade system where data resides that support the exchange of information, including communication systems and networks.Cloud EngineerThese individuals design and set up automation, cloud storage, data centers, virtual servers, and web services with an emphasis on a particular solution's cost benefits to users, and security of data processing.IT Professional RolesDevelops, designs, programs, and analyzes applications designed to serve its core business needs. Provides oversight of the company's numerous communications channels, including the company's email system, network drives, intranet, and phone system.IT AdministratorIn terms of, which technologies should be used, what should be the security protocols, which should have access to which files and resources on the network, and so on.
Network AdministratorOversees all aspects of the computer network. The network administrator's duties include physically laying down cables, making connections, and working with the network hardware (for instance, routers and switches).Database AdministratorFocus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting, as with the other administrative areas Security AdministratorInstall, configure, and administer appropriate firewall security to protect the organization's systems and to work proactively against such intrusions.Web AdministratorAlso known as a webmaster, but more precisely referred to as a web server administrator. This role is responsible for webstorages, which differs from the development of webstorages. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server.Cloud ArchitectResponsible for overseeing a company's cloud computing systems. This position requires a bachelor's degree in computer science, computer engineering, Cybersecurity ArchitectThey are responsible for designing, building, testing, and implementing security systems within an organization's information technology network. An individual within this position requires a thorough understanding of an organization's IT systems to anticipate possible network security breaches DIKW hierarchy describes the transition of data to wisdom Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom) IT ArchitectsArchitects are responsible for designing the big picture, i.e., the goals and the systems required to reach those goals. In other words, IT architects set the strategy and direction for technology usage in the organization, define technical standards and design principles, and guide people in implementing those standards and regulations in their day-to-day work.Quality DataRelevant, timely, thorough, accurate, and reliable IPOSThe Input-Procession-Output-Storage Cycle CPU (Central Processing Unit)Executes programs' instructions and commands various components in the computer. Referred to as the "chip".responsible for processing all information from programs run by your computer.The speed at which the processor processes information is measured in gigahertz (GHz) The ENIAC (Electronic Numerical Integrator and Calculator), The development of computer systems largely depended on advancements in technology, such as the invention of the transistor
AbacusA device that stores values represented by the position of the beads on the rods.The human operator carries out mathematical operations by moving the beads The Leibniz MachineThe gears of the machine are initially mechanically set in a position that represents the input, and their final state represents the output of the calculations.Desktop ComputersIBM introduced its first desktop computer called the personal computer, or PC, whose underlying software was developed by a newly formed company known as Microsoft.Generation 1*The ENIAC (Electronic Numerical Integrator And Computer)was the first real computer designed for military and military-type applications.*Vacuum tubes, relay switches, the need to program in machine language Generation 2*Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers Generation 3*Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals Generation 4Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use MemoryStores the programs being executed and the data they are using.DRAM (Dynamic) SRAM ROM (Read-Only-Memory) RAM*Stands for Random Access Memory.*It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power).*You can choose the amount of RAM your computer has.Types of RAMDynamic RAM (DRAM). Static RAM (SRAM) BOIS ROM (Basic Input Output System)ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is the software not hardware, ("basic" operating system that runs when the computer is first turned on) Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Cannot choose the amount or contents.Hard DriveStore data even when the computer is turned off Peripheral devicesComponents that are located outside the system unit yet are connected physically or wirelessly to it