IT Infrastructure Administration

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following tasks is typically the responsibility of a database administrator?

  • Overseeing all aspects of the computer network, including hardware and connections.
  • Designing, developing, and supporting database management systems (DBMSs). (correct)
  • Maintaining web servers, including installation, configuration, and security.
  • Installing and configuring firewall security to protect the organization's systems.

In the context of IT infrastructure, which of the following best describes the role of 'memory' in a computer system?

  • Permitting information to move between all components.
  • Providing short-term and long-term data storage. (correct)
  • Managing all peripheral devices, including input, output, and network devices.
  • Executing program instructions and commanding various components.

Which of the following is an example of a high-level programming language?

  • Assembly language
  • Binary code
  • Machine language
  • C++ (correct)

What is the primary function of a compiler in the context of programming languages?

<p>To translate the entire program into an executable file before running it. (D)</p> Signup and view all the answers

Which network topology connects each device directly to every other device in the network?

<p>Mesh network (B)</p> Signup and view all the answers

Which of the following security principles ensures that data is accessible and available when needed?

<p>Availability (B)</p> Signup and view all the answers

Which type of encryption uses the same key for both encrypting and decrypting information?

<p>Symmetric key encryption (A)</p> Signup and view all the answers

What is the primary purpose of an Operating System (OS)?

<p>To enable users to easily access and utilize computer hardware and software resources. (C)</p> Signup and view all the answers

Which of the following best describes 'Big Data'?

<p>Integrating and analyzing vast amounts of internally and externally generated data. (B)</p> Signup and view all the answers

In cloud computing, which service model provides the most comprehensive set of resources, including servers and data storage, managed outside of the organization?

<p>Infrastructure as a Service (IaaS) (C)</p> Signup and view all the answers

Based on ethical considerations in computing, what does 'Thou shalt not use a computer to bear false witness' mean?

<p>Do not use a computer to spread misinformation or lies. (D)</p> Signup and view all the answers

Which of the following is the most accurate description of the role of an IT Department within an organization?

<p>Charged with maintaining hardware and software to meet the organization’s strategic goals. (D)</p> Signup and view all the answers

A company needs a disaster recovery solution that allows them to resume operations almost immediately after a disruption. Which type of storage would best meet this requirement?

<p>Hot Storage (C)</p> Signup and view all the answers

Which term describes software made freely available with its source code, encouraging community development and modification?

<p>Open Source Software (B)</p> Signup and view all the answers

What is the primary goal of implementing firewalls and anti-viral software on a network?

<p>To prevent certain types of messages from entering or leaving the network and detect malware. (A)</p> Signup and view all the answers

Flashcards

Network administrator

Oversees all aspects of the computer network, including physical cabling and network hardware.

Database administrator

Focuses on the design, development, and support of database management systems (DBMSs).

Security administrator

Installs, configures, and administers firewall security to protect systems against intrusions.

Web administrator

Maintains web storage, installs, configures, secures, and troubleshoots web servers.

Signup and view all the flashcards

Information Technology (IT)

Technology used in creating, maintaining, and making information accessible.

Signup and view all the flashcards

Information technology

The technology infrastructure supporting information systems, including hardware, software, networks, and databases.

Signup and view all the flashcards

IPOS Cycle

Input, Processing, Output, Storage - actions performed by a computer.

Signup and view all the flashcards

CPU (Central Processing Unit)

Executes program instructions and commands computer components.

Signup and view all the flashcards

Memory

Stores programs being executed and the data each program is using.

Signup and view all the flashcards

Bus

Device that permits information to move between computer components.

Signup and view all the flashcards

System Unit

Protective covering with internal bays and slots for computer components.

Signup and view all the flashcards

Hard drive

Stores data even when the computer is turned off.

Signup and view all the flashcards

Computer network

Collection of computers and resources connected to communicate with each other

Signup and view all the flashcards

Bandwidth

Transfer rate permissible over the media, measured in bits per second (bps).

Signup and view all the flashcards

Encryption

Is used to obscure the information that resides on a computer

Signup and view all the flashcards

Study Notes

  • An administrator is in charge of some portion of the IT infrastructure.
  • Network administrators oversee all aspects of the computer network, including laying cable, making connections, and working with network hardware.
  • Database administrators focus on the design, development, and support of database management systems (DBMSs).
  • Security administrators install, configure, and administer firewall security to protect organizational systems.
  • Web administrators maintain web storage, which includes installing, configuring, maintaining, securing, and troubleshooting the web server.
  • IT is gathering data, processing it into information, and disseminating it using technology, supported by IT personnel.
  • Information Technology describes the technology infrastructure, including hardware, software, networks, and databases, that supports information systems.
  • Computers perform four operations, Input, Processing, Output and Storage
  • The CPU executes program instructions and commands computer components.
  • Memory stores the program being executed and the data for each program.
  • The I/O subsystem includes peripheral devices for input, output, storage, and networking.
  • The bus allows information to move between components.
  • The system unit is a key feature of computers, containing components that enable the system to run.
  • Dynamic RAM (DRAM) is main memory.
  • Static RAM (SRAM) is cache memory and registers.
  • ROM retains its contents indefinitely.
  • BIOS is the Basic Input Output System.
  • A hard drive stores data even when the computer is turned off.
  • Peripheral devices are located outside the system unit but connected physically or wirelessly.
  • Hardware is the physical components of the computer
  • Software consists of programs and other operating information used by the computer
  • A network is a collection of computers and resources connected to communicate with each other
  • Users are the people who use the computer system
  • First-generation machines used vacuum tubes.
  • Second-generation machines used transistors.
  • Third-generation machines used integrated circuits.
  • Fourth-generation machines used microprocessors.
  • Machine language is the lowest-level programming language, using binary.
  • Assembly language uses specified instructions using words.
  • High-level languages enable programmers to write programs independent of computer type.
  • Compilers require all software components to be defined before compilation.
  • Interpreted languages run inside an interpreter, which converts and executes commands line by line.
  • C++, uses a vocabulary and rules to instruct a computer.
  • Python: used as an easy language that does not require a compiler for debugging.
  • JavaScript is designed for user engagement on web pages.
  • Tcl: prototyping is done to allow creation of GUIs, Tcl is a simple and compact language but is also very powerful.
  • PHP: an all-purpose language is especially suitable for web development.
  • A computer network is a collection of computers and resources connected for communication.
  • Bandwidth is the transfer rate over a medium, measured in bits per second (bps).
  • A network hub connects multiple computers.
  • A network switch sends transmissions to a specific computer.
  • A router connects multiple networks together
  • A wireless access point connects to a hub, switch, or router and sends a wireless signal.
  • Radio waves provide access to networks over long distances.
  • An IP address is a series of numbers indicating a specific internet location.
  • A server is a computer that takes requests and responds with information.

Network Types

  • In a Bus network, devices connect along a single cable.
  • In Mesh networks, every device connects directly to every other device.
  • In Ring networks, each device connects directly to its neighbors, and messages are forwarded until they reach their destination.
  • Star networks centralize connections through a single machine.
  • Confidentiality ensures data is secure and not accessible to unauthorized users.
  • Integrity ensures data is correct.
  • Availability ensures information is available when and where needed.
  • Strategic risk analysis translates security policies into mechanisms supporting information security.
  • Social engineering is a threat that targets users.
  • Phishing targets individuals via email, posing as a reputable entity to steal personal information.
  • Hacking is when someone gains unauthorized access to a host system.
  • Malware is 'malicious' software.
  • Spyware is often unknowingly downloaded when accessing web storage.
  • Denial of service (DOS) attacks flood a server with messages, preventing legitimate access.
  • Firewalls prevent certain messages from entering or leaving a network, and antivirus software seeks out malware.
  • Antivirus software identifies if a file contains a virus or form of malware.
  • Information security ensures the confidentiality, integrity, and availability of information during storage, processing, and transmission.
  • Encryption obfuscates information on a computer or network, making it unreadable if intercepted.
  • Symmetric key encryption uses the same key for encryption and decryption.
  • Public-key encryption uses a public and private key.
  • Software includes systems and programs developed for business functions.
  • Application software are programs that end users run to accomplish tasks
  • Operating system (OS) programs designed to improve software and hardware access.
  • Server software works with hardware to provide a network service.
  • Cloud computing combines distributed computing, computer networks, and storage area networks to offload computation and storage to the cloud.
  • The kernel is the core component of the OS.
  • Device drivers provide interfaces between the OS and hardware.
  • A shell is a user interface, often personalized.
  • System utilities let users monitor and improve system performance.
  • GUI allows users to control the computer with a mouse.
  • Web servers respond to HTTP requests.
  • Proxy servers act as a giant cache of web pages within an organization.
  • Database servers allow database access across a network.
  • Proprietary software is purchased from a vendor.
  • Shareware provides a trial version of software.
  • Freeware is obsolete software or software with no support.
  • Public Domain software has been moved into the public domain.
  • The algorithm is a formula or procedure for solving a problem.
  • The Flat file database is used to for data that is fairly minimal
  • A relational database has multiple tables (relations) with interrelated fields.
  • Hierarchical databases organize data in a tree-like structure.
  • Business Intelligence (BI) is knowledge derived from information.
  • A Business Intelligence system capture’s knowledge within information systems for strategic decisions.
  • SQL interacts with data in databases with commands like SELECT fields FROM tables WHERE fields match criteria.
  • Quality data is relevant, timely, thorough, accurate, and reliable.
  • The IT department supports the day-to-day technology needs of an organization in order to reach goals.
  • Business continuity encompasses IT systems and processes, with key components being a plan and its testing.
  • A hot storage is a physical location fully equipped for operations, allowing the quickest return to business.
  • A cold storage is a physical location without equipment, requiring the organization to purchase and install hardware and software.
  • Bluetooth enables devices to exchange data wirelessly.
  • The Internet of Things refers to devices connected to the Internet.
  • Big data integrates vast amounts of data to find relationships.
  • SaaS allows businesses to access and use software over the Internet.
  • PaaS is a tool to develop and deliver applications more reliably.
  • IaaS has all resources located outside of the organization and accessible everywhere.
  • Ethics is a code of moral conduct.

The 10 Commandments of Computer Ethics

  • Do not use a computer to hard other people
  • Users shall never interfere with other people's files
  • Do not copy files or use them to steal
  • Users shalt not copy proprietary software
  • Users shall think about the social consequences of the program

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

CCNA 200-301: Intro to System & Network Admin
41 questions
Active Directory Overview and Functionality
32 questions
Active Directory Basics Quiz
57 questions

Active Directory Basics Quiz

GracefulIslamicArt5348 avatar
GracefulIslamicArt5348
Use Quizgecko on...
Browser
Browser