10/14/24, 8:42 D075 STUDY GUIDE IT MANAGEMENT
AM ESSENTIALS
Study outline for D075
Unit 2 lesson 1
Infrastructure is the underlying foundation or basic framework for something.
IT is the study, design, development, implementation, support and management of computer-based information systems, particular hardware, and software
IT infrastructure is backbone that business is built on
Six components of IT infrastructure
• Hardware: physical and tangible parts
• CPU is microprocessor chip and brain of computer to execute instructions and performs most of calculations for computer; NIC card;
motherboard or main circuit board; monitor for output; keyboards and noise for input
• Software: tells computer how to work and perform actual tasks
• Application: accomplish specific task (excel or photoshop); Utility: perform function in background and little to no interaction from user
(printers and virus protection); system: sports computers basic functions (windows, macOS, Linux)
• Networks: made up of two or more devices (network nodes), communication media for connection of devices and software
• Network nodes: laptops, smart phones, servers, routers, etc.
• Data: valuable asset to business
• People: key to IT infrastructure
• hardware technicians who install and repair computers.
• software technicians who install software and assist users in using the software.
• network technicians and administrators who design, install, and monitor the network to ensure it is running at maximum efficiency; and
• database administrators who design, create, and monitor databases so they can store and retrieve data crucial to the processes of the business.
• Systems analysts analyze business users' needs and find ways for IT to make processes more efficient or write specifications for programmers to
write code.
• Programmers take the designs from the systems analysts and create application programs to meet specifications of the business, then test the
software before it is implemented
• Processes: application a business uses in daily operations (DMV issues and updates driver’s licenses)
Computer competency is knowledge of computing system and how it relates to business
Best practice is most effective method to arrive to a desired or better outcome b
Gordon Moore states computing power doubles every 18 months
Lenders are first adopters that buy new technology to gain competitive edge; followers wait until technology proven then buy
Lesson 2
Hypertext markup language (HTML) used to create web pages
Hypertext transfer protocol (http) used to define how messages are formatted and transmitted on internet
Business computer hardware is tangible and physical aspect like circuit boards, chipsets, and keyboards and rarely changes during life of computer, but components
can be added to enhance computer power and usability
Mainframe computer: massive room sized computers that prices and store enormous amounts of bulk data and info
Midrange computer: (minicomputers) less powerful and smaller in physical size than mainframe but do exact same things on smaller scale
• Microcomputers are even smaller and so common (laptops, desktops, tablets, handheld)
Handheld: far less powerful than laptop or desktop (tablet)
Operating system software requires very little user intervention and manages the transfer of information between parts of computer (platform); windows, macOS,
Linux
• file management: storing and organizing files
- graphical user interface (GUI) how file management represented visually
• Multitasking: running more than one process (task) at a time: excel, word, photoshop
• Memory management
- RAM is fast and short term
- Virtual: allows user to run more than one application at a time; mimics computer RAM
- Cache: faster than RAM but minimal storage
- Registers: smallest and fastest type
• Disk Management: responsible for reading and writing information to a disk; disk storage is nonvolatile secondary storage on physical device like hard
drive, SSD, or optical disk
application software: performs particular task; include spreadsheets, word processors, presentation software, database software
Productivity suites: a collection of business computer application programs of associated functionality that share common GUI and have capacity to smoothly
exchange data across programs
• Copy and paste: user select data from source file, copy into temporary memory and paste in destination file
• Object embedding: allows a user to select one application from source file, and embed in destination file; source file can’t be edited
• Object linking: similar to object embedding but both files can be edited
Major function of a computer operating system is Computer Resource Management
Lesson 3
Building a computer network: ethernet cards, common protocol, ethernet cables, a hub
• First component is NIC card; allows a network cable to be plugged in so it can interface with other computers (Ethernet card is most common)
• Second component is protocol (a standard language) must exist for connected computers to communicate
• Third is physical cable system that connects them together (most common is twisted pair which is specialized words that cancel out electromagnetic
interface from other electronic devices and increase reliability)
• Fourth is network hub which is central location of computer network that serves as traffic cop for network connection and communication (most common
is Ethernet hub)
Most common network protocol is Transmission Control Protocolfiinternet protocol (TCPfiIP)
Network operating system (NOS) controls entire network
Network administrator responsible for smooth network operations, performance, and implementation of new nodes or even new networks
MAC address is used to uniquely identify a computer on a network
about:blan 1/
k 9
, 10/14/24, 8:42 D075 STUDY GUIDE IT MANAGEMENT
AM ESSENTIALS
Topology refers to the mapping of a physical network and logical interconnections between nodes (defined as any device that is connected as part of computer
network, including computers, hubs, printers, and switches
• Bus topology (linear bus) network where each of network’s nodes are connected to common linear backbone that has two endpoints; advantage of all
nodes receive data simultaneously, disadvantage is if backbone down, all nodes are down as well
• Star topology: center of star is hub, and the nodes are attached with spikes. Similar disadvantage to linear, advantage is ease of troubleshooting and no
data collisions (higher performance); most common; if the center hub fails, all nodes attached to the hub will also fail
• Ring topology: each node is connected to two other computers in network with first and last being connected to each other. Least used; if traffic can’t
flow in one direction, can try to flow in other direction; no hub so more robust
Local area network (LAN) is computer network that is relatively small, typically in small building or small as single room; serve smaller businesses and smaller parts of
large business
Campus area network (CAN) Computer network connects two or more LANs located on campus
Metropolitan area network (MAN) computer network that connects two or more LANs or CANs together but within boundaries of cityfitown
Wide area networks (WAN) computer network that encompasses wide geographical area and connects LANs, CANs, and MANs together
Peer to peer network (P2P) computer network that generally connects computers directly to one another without using servers but using Wi-Fi or Ethernet cable
Internet connects all networks
Network security: assures resources on network used by right people in right way
• Password with strong password or a passphrase (memorable sequence of words)
• Permission given to employees
• Firewall which is described as combination of specialized hardware and software that ensures only authorized personnel can access
computer security is concerned with risk management, integrity, confidentiality, and availability of electronic information that is stored in computer system
• Risk management is recognition, consequences, and assessment of risk to computers assets and developing strategies to manage and protect them
• Hackerfihacktivist is someone who is trying to invade or disable computers security measures to steal assets
• Unsecured computers easy to breach
Types of threats:
Threat Description Function
Computer virus Computer files that infect IT systems creating Needs a host program
copies of themselves in host, in complete memory, Created system failure, corrupts data, steals
storage or network personal data
Worms A program that uses networks to travel to send Doesn’t need host
copies of themselves to other parts of network System failure, corrupt data, steals info
without user knowledge
Trojan horse Program misleads user; when executed, releases Spread through social engineering (harmful email
malicious programs attachments, fake ads)
Spyware Without users’ knowledge or consent, once Secretly monitors keystrokes and behavior of user
program is installed it captures or takes control of
system
Adware Program automatically displaysfidownloads ads Less malicious than malware
Generates revenues for developer by showing ads
user may click on
Static box display, banner, video, or pop-up ad
Spamming Uses electronic email system to send millions of Often used in email but can be found in text
bulk messages to different users and accounts messages or mobile app
Denial of service (DoS) Can make computer or its resources unavailable to Comes from malicious program in email
user attachment
Computer slows down until it stops running
Range from attack on network to denial of
websitefisoftware
Keylogging Records every keystroke made at workstation Records sensitive login info like login ID, password,
keyboards and other sensitive info
Antivirus software attempts to identify, prevent and eliminate computer virus and malware, typically before tracking network
Internet fraud: any fraudulent activity in an online setting
• Click fraud: automatically passes user to ad whether they wanted to visit or not, to get per click fee
• Purchase scam: butters approach merchants via spam, pay for shipping with credit card. One order processed, card cancelled, and shipping company
recorded a charge back and loses money from order
• Phishing: involves social engineering, attempts to gain private info like usernames, PIN numbers, passwords, credit cards
Peripheral device functions as a resource shared by multiple end users in a network
Tracking cookies is the name of what websites keep track of a user’s actions and information; much of this information is stored on user’s computer in a private folder
on the hard drive
Lesson 4
Knowledge management system (KMS) is collaborative sterns that organize, create, and distributor organizations collective knowledge to its users and customers
Data and information exchange software and techniques are computing tools whereas collaborative software and techniques are management tools
Discussion board is where virtual community of users can post electronic messages, first post being a thread.
Slack is cloud based set of collaborative tools and services
Lesson 5
Point of failure (PoF) if one part fails, then whole system fails
Bowser based means project management software is web based and well distributed
Project management is process of leading work of team to achieve goals and meet success criteria at specified time
Gnatt chart is a bar chart that illustrates project schedule
Cloud service providers (CSPs) provide file storage and cloud-based software but also have security measures to keep info safe. Also allows users to access virtually
anywhere there is internet connection. (Dropbox)
Return on investment (ROI) calculated to find out what is worth it and what is not
about:blan 2/
k 9