ITEC110 Pointers Midterm PDF
Document Details
Tags
Summary
This document covers concepts in system administration, including roles, skills, and qualifications. It also touches on topics relating to file systems, backup management and automation.
Full Transcript
System Administrator – The first-point-of-contact for an organization’s network users when they experience technical Types of Automation problems. o Home automation Server Administrator – maintains the operating system of the...
System Administrator – The first-point-of-contact for an organization’s network users when they experience technical Types of Automation problems. o Home automation Server Administrator – maintains the operating system of the o Data center automation servers. o Network automation Network Administrator – maintains the network infrastructure. o Test automation Database Administrator (DBA) – maintains the database o Office automation system used by the company or organization. o Basic automation Database Administrator – responsible for backing up systems in o Process automation case of a power outage or other disaster. o Automated website testing o Integration automation Some of the skills and qualifications of a System Administrator o Artificial Intelligence (AI) automation include: Ability to solve problems in stressful situations File system is a process that manages how and where data on Strong attention to detail a storage disk Communication skills Hard disk is consists of a set of stacked platters, each of which Ability to explain technical concepts to has data stored electromagnetically in concentric circles, or inexperienced users tracks Time management skills Buffer Memory is the mechanical nature of reading and writing Content Management System (CMS) is an application that is data on rotating platters used to manage web content. File Allocation Table is considered simple and reliable, and it is Presentation Layer provides the ability to translate the data to modeled after legacy file systems suit the applications needs. Global File System is a file system for the Linux OS, and it is a Portals – used for management, presentation, and shared disk file system aggregation of multiple streams of information into a unified Distributed file system (DFS) is a file system with data stored on system. a server Web Content Management The management of content CD-ROM and DVD-ROM refer to read-only optical storage primarily intended for mass delivery via a website. disks. Enterprise Content Management (ECM) The management of CD-R and DVD-R format disks are recordable, but cannot be general business content, not necessarily intended for mass overwritten. delivery or consumption. CD-RW and DVD-RW This allows you can to write new data on Digital Asset Management (DAM) The management and them and erase unwanted data from them as much as you manipulation of rich digital assets such as images, audio, and want. video for usage in other media. Records Management (RM) The management of transactional Platter: The physical media where data is stored in a information and other records that are created as a disk drive. byproduct of business operations. A file system stores and organizes data and can be Component Content Management Systems used for thought of as a type of index for all the data management of extremely fine-grained content. contained in a storage device Learning Management Systems Used for management of File system is a logical disk component that manages learning resources and student interaction a disk's internal operations. Virtual Server also known as virtual machines. FAT was designed in 1977 for floppy disks, but was Virtualization is a major trend in today’s server environments. later adapted for hard disks. Hierarchical file system (HFS) was developed for use Kinds of Backup Management with Mac operating systems differential backup mirrored backup Application software – is a software program or group of full backup programs designed for end-users. incremental backup Firmware – is software that’s stored on a computer’s virtual backup motherboard or chipset Driver software - communicates with hardware and control Network vulnerabilities allow threats such as spyware devices and peripherals attached to a computer. and malware to gain entry into a company’s Utility software – is designed to analyze and optimize a device. network. Package Management System (PMS) is a program used to Penetration Tests: (also known as pen tests) are install, uninstall and manage software packages designed to identify exploitable vulnerabilities in a company’s computer network. Patch management ensures your software and Endpoint security involves protecting an applications are kept up-to-date and run smoothly, organization’s computer network by protecting the supporting system uptime remote devices that are bridged to it. With the continued rise in cyber-attacks, Risk evaluation: Assess potential hazards that put your organizations are often required by regulatory bodies organization at risk to maintain a certain level of compliance. Testing and optimization: The recovery team should In Closed Source Software the app can be continually test and update its strategy to address commercial or private but it requires payment of ever-evolving threats and business needs some kind to use. Freeware software does not expose or share its Types of Disaster Recovery Plan source code. o Back-up Open source means you can explore the actual o Cold Site code that the app was written in. o Hot Site o Disaster Recovery as a Service (DRaaS) Read and Study (On Google Classroom) o Back Up as a Service Remote Access o Datacenter disaster recovery VPN o Virtualization LAN and WAN o Point-in-time copies OSI Model: 7 Layers of Network Architecture o Instant recovery Remote Access - is the ability for an authorized person to access a computer or network from a geographical distance through a network connection. Types of Remote Access 1. Cable Broadband - connects your home to a fibre cabinet in your area. it uses coaxial cables 2. DSL (Digital Subscriber Line) Broadband - is a modem technology that uses existing telephone lines to transport high-bandwidth data 3. Cellular Internet Services is a type of wireless connection facilitated by cellular towers. 4. Satellite Internet Access- is wireless internet beamed down from satellites orbiting the Earth 5. Fiber Optics Broadband - Fiber optic Internet is an Internet connection that transfers data fully or partially via fiber optic cables. Fiber Optic - is a complex technology that allows the transmission of information in the form of light rather than electricity. VPN - aka Virtual Private Network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. Desktop Sharing - Refers to the technologies that allow remote access of your computer or mobile device by another user on a separate device. Privileged Accounts - Standard User Accounts - Have a limited set of privileges, such as for internet browsing - Guest User Accounts - Possess fewer privileges than standard user accounts Examples: - Super user account - Domain administrative account - Local administrative account - Emergency account - Privileged business user OSI (Open System Interconnection) model is a conceptual framework used to understand and implement network connections. Layer 1: Physical Layer - responsible for the transmission of raw bitstreams over a physical medium. Ex: cables Layer 2: Data Link Layer - ensures reliable communication between directly connected nodes by providing error detection and correction. Layer 3: Network Layer - is responsible for routing data packets between devices across different networks. Layer 4: Transport Layer - ensures end-to-end communication and data integrity between devices. Layer 5: Session Layer - manages and controls the connections (sessions) between computers. Layer 6: Presentation Layer - translates data between the application layer and the network, ensuring that data is presented in a readable format. Layer 7: Application Layer - is the closest layer to the end user and interacts directly with software applications. LAN – Local Area Network (uses coaxial cables) used for a small are where the transmission is rapid and accurate WAN – Wide Area Network (uses satellite links) is a network that extends over a large geographic are connecting multiple LANs.