Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Introduction to Information Technology: Key Concepts and Definitions, Exams of Telecommunication electronics

A comprehensive overview of fundamental concepts in information technology (it), covering topics such as digital vs. Analog, lossy and lossless compression, bitmap and vector graphics, 3d graphics, operating systems, storage technologies, cpu components, processing types, networking protocols, web technologies, security threats, and it career paths. It offers clear definitions and explanations of key terms, making it a valuable resource for students and professionals seeking a foundational understanding of it.

Typology: Exams

2024/2025

Available from 03/04/2025

catewilliams-smith
catewilliams-smith 🇺🇸

172 documents

1 / 19

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
INSY 2303 UTA Scott Final Exam With Verified
Solutions| Graded A+
Digital vs. Analog ✔✔digital reads a series of ones and zeros, while analog reads a continuous flow of
data.
Lossy ✔✔Describes a method of compression in which data is lost in a way that cannot be recovered
from the compressed data.
Lossless Compression ✔✔a data compression algorithm that allows the original data to be perfectly
reconstructed from the compressed data.
pixel interpolation ✔✔A process that is used by graphics software to average the color of adjacent pixels
in an image, usually when the image is enlarged.
Data vs. Information ✔✔Data = raw facts and figures. Information = meaningful interpretation of data.
Bitmap vs. Vector Graphics ✔✔Bitmap Graphics: an image, such as a digital photo, that is stored as a
grid work of colored dots.
Vector Graphics: an image generated from descriptions that specify the position, length, and direction in
which lines and shapes are drawn
3D graphics ✔✔A digital graphics format that displays a three-dimensional image in a two-dimensional
space.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13

Partial preview of the text

Download Introduction to Information Technology: Key Concepts and Definitions and more Exams Telecommunication electronics in PDF only on Docsity!

INSY 2303 UTA Scott Final Exam With Verified

Solutions| Graded A+

Digital vs. Analog ✔✔digital reads a series of ones and zeros, while analog reads a continuous flow of data. Lossy ✔✔Describes a method of compression in which data is lost in a way that cannot be recovered from the compressed data. Lossless Compression ✔✔a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. pixel interpolation ✔✔A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged. Data vs. Information ✔✔Data = raw facts and figures. Information = meaningful interpretation of data. Bitmap vs. Vector Graphics ✔✔Bitmap Graphics: an image, such as a digital photo, that is stored as a grid work of colored dots. Vector Graphics: an image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn 3D graphics ✔✔A digital graphics format that displays a three-dimensional image in a two-dimensional space.

Vectors ✔✔Lines and curves that form simple shapes rendering ✔✔In graphics software, the process of creating a 3D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows Ray tracing ✔✔The technique for adding light and shadows to a 3-D image Application ✔✔Computer programs that help users perform a specific task such as word processing. Also called application programs, applications, or programs. Operating System ✔✔The software that controls the computer's use of its hardware resources, such as memory and disk storage space. Also called an OS. Magnetic Storage ✔✔A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating. Optical Storage ✔✔A technology that records data as light and dark spots on a CD, DVD, or other optical media Solid state storage ✔✔A technology that records data and stores it in a microscopic grid of cells on a nonvolatile, erasable, low-power chip

TCP ✔✔The protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets. IP ✔✔One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses. HTML Tags ✔✔A set of instructions, such as , inserted into an HTML document to provide formatting and display information to a Web browser. HTML5 ✔✔It is the fifth and current version of the HTML standard, can be used as an alternative to Flash media Circuit Switching ✔✔The method used by the telephone network to temporarily connect one telephone with another for the duration of a call. LAN ✔✔Local area networks are often referred to as LANs. They are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school. Packet Switching ✔✔Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer HTTP ✔✔The communications protocol used to transmit Web pages

HTTPS ✔✔(Hypertext Transfer Protocol Secure) The protocol used to create secure connections for ecommerce by adding a layer of encryption Client-side scripting ✔✔Program code that is executed by a client's browser, as opposed to being executed by the server Server-side scripting ✔✔A Web page response approach in which programs running on the Web server create Web pages before sending them back to the requesting Web clients as parts of response messages. Hypertext links ✔✔Also referred to simply as links; words, phrases, or images on a Web page that, when clicked, take you to designated URLs. Web crawler ✔✔Combs the Web to gather data that's representative of the contents of Web pages Indexer ✔✔Processes the information gathered by the crawler into a list of keywords and URLs stored in a database Database ✔✔Stores billions of index references to Web pages Query Processor ✔✔• Allows you to access the database by entering search terms, and then produces a list of Web pages that contain content relevant to your query SMPT ✔✔a communications protocol used to send e-mail across a network or the Internet

Spyware ✔✔Any software that covertly gathers user information without the user's knowledge, usually for advertising purposes. Botnet ✔✔A group of bots under the remote control of a botmaster, used to distribute spam and denial-of-service attacks. Worm ✔✔computer worm - A software program designed to enter a computer system, usually a network, through security "holes" and then replicate itself and spread to other devices. Virus ✔✔A program designed to attach itself to a file, reproduce, destroy data, display an irritating message, or otherwise disrupt computer operations. Port Scan ✔✔An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port probe. Trojan ✔✔A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password. Firewall ✔✔Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts. Rootkit ✔✔Software that conceals running processes; used by hackers to disguise security breaches and break-ins.

Information Technology ✔✔(1) A degree program that focuses on the computer equipment and software used by businesses and organizations. (2) The use of computers and software to manipulate data. Computer Science ✔✔A career field that focuses on developing fast and efficient computers from their construction to their programming and operating systems. Systems Analyst ✔✔A computer professional responsible for analyzing requirements, designing information systems, and supervising the implementation of new information systems. Database Administrator ✔✔A person who supervises database design, development, testing, and maintenance. 1G ✔✔Computers that used vacuum tubes to process and store data, such as UNIVAC. 2G ✔✔Computers that use transistors for data processing and storage instead of vacuum tubes. 3G ✔✔Computers characterized by using integrated circuits instead of transistors or vacuum tubes for data processing. 4G ✔✔Computers, such as today's personal computers, servers, and mainframes, that use a general- purpose microprocessor for data processing. ERP ✔✔suite of software modules that integrate major business activities

Encapsulation ✔✔Refers to the process of hiding the internal details of objects and their methods. After an object is coded, it becomes a black box, which essentially hides its details from other objects and allows the data to be accessed using methods. Can be easily reused, modified, and repurposed. Polymorphism ✔✔sometimes called overloading, the ability to redefine a method in a subclass. Allows programmers to create a single, generic name for a procedure that behaves in unique ways for different classes. Allows a programmer to define different getArea() methods for each subclass. When the completed programs runs, pizza shapes are collected from the user and corresponding getArea() method can be applied to calculate the area of a pizza. Inheritance ✔✔Refers to passing certain characteristics from one class to other classes. (Ex: RoundPizza class and RectanglePIzza class) Method ✔✔A segment of code that defines an action. Names of methods usually end in a set of parentheses, such as compare() or getArea() Selections, Repetition, Sequence ✔✔Selection: Tells a computer what to do, based on whether a condition is true or false. Repetition:directs the computer to repeat one or more instructions until a certain condition is met. Sequence: Changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program 1st, 2nd, 3rd, 4th, and 5th Generation Languages ✔✔Ist Generation: Machine languages were the 1st languages available for programming computers. (Ex: 0s,1s.)

2nd Generation: Assembly languages that followed machine languages 3rd Generation: Programming languages, such as FORTRAN, BASIC, and COBOL, that followed assembly languages and provided English-like keywords. 4th Generation: Programming and query languages, such as SQL and RPG, that more closely resemble human languages than did third-generation language 5th Generation: Either declarative languages, such as Prolog, or programming languages that allow programmers to use graphical or visual tools to construct programs. Algorithm/Pseudocode/Structured English ✔✔Algorithm: a set of steps for carrying out a task that can be written down and implemented. (Ex: for macaroni and cheese = recipe) Pseudocode/Structured English: A notational system for algorithms that has been described as a mixture of English and your favorite programming language. Less formalized than structured English. Allowed to incorporate command words and syntax from the computer language you intend to use for the actual program Syntax/Run-Time/Logic Errors ✔✔Syntax: Refers to the grammar rules that create valid program statements

Normalization ✔✔s the process of organizing the columns (attributes) and tables (relations) of a relational database to reduce data redundancy and improve data integrity What is the planning phase of a SDLC ✔✔(Systems Development Life Cycle) This is the first phase, the purpose of this step is to find out the scope of the problem and determine solutions What the design phase of a SDLC ✔✔The third phase describes the necessary specifications, features and operations that will satisfy the functional requirements of the proposed system which will be in place The current standard for object-oriented documentation is referred to as... ✔✔UML (Unified Modeling Language) Operational Database ✔✔the source of data for a data warehouse Relational database ✔✔a database structured to recognize relations among stored items of information DBMS ✔✔A database management system (DBMS) is system software for creating and managing databases (The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data) Keylogger ✔✔A program, sometimes part of a trojan, that records a person's keystrokes, saves them, and then sends them to a system administrator or remote hacker

Cryptographic Key/Algorithm ✔✔A cryptographic key is a specific word, number, or phrase that must be used to encrypt or decrypt data, whereas a cryptographic algorithm is a specific procedure for encrypting and decrypting data. SDLC order of phases ✔✔Planning, analysis, design, implementation, maintenance Object-Oriented Methodology ✔✔An approach to system development that regards the elements of a system as a collection of objects that interact with each other to accomplish tasks UML ✔✔A tool for diagramming a set of object classes. Class Diagram ✔✔A diagram that provides the name of each object, a list of the object's attributes, a list of methods, and an indication of the cardinality between objects Use Case Diagram ✔✔A diagram documenting the tasks performed by the users of an information system Sequence Diagram ✔✔A tool used by a project team that depicts the detailed interactions that take place within an information system Expert System ✔✔A computer system that incorporates knowledge from human experts, in order to analyze data and produce a recommendation or decision (also called a knowledge-based system). Knowledge Engineering ✔✔The process of designing rules, entering them into an expert system, and testing them

Programming Paradigms ✔✔A programming methodology or approach, as in the object-oriented paradigm. Programming Control Structures ✔✔1. Selection - A component of a computer program that tells a computer what to do, depending on whether a condition is true or false (also called decision structure or branch).

  1. Repetition - A component of a computer program that repeats one or more instructions until a certain condition is met (also called loop or iteration).
  2. Sequence - A programming construct that alters the order in which instructions are executed. Interpreter vs. Compiler ✔✔An interpreter is a program that can analyze and execute a program line by line, and a compiler is software that translates a program written in a high-level language into low-level instructions before the program is executed. Class vs. Object ✔✔A class in object-oriented terminology, a group with specific characteristics to which an object belongs, and an object in an object database or OO programming language, a discrete piece of code describing a person, place, thing, event, or type of information Attribute ✔✔In the context of object-oriented programming, a characteristic that defines the members of a class. Similar to a field in a database The Web ✔✔An Internet-based collection of linked HTML documents identified by URLs and accessed using browsers and the HTTP protocol Web server ✔✔- A computer that listens for queries from Web browsers and transmits HTML documents over the Internet.

Communications Network ✔✔A collection of devices used to originate, send, route, and receive data transmissions. Wired vs. Wireless ✔✔Wired channels are communication pathways that use copper, coaxial, or fiber cables to carry data, whereas wireless channels are communication pathways that travel through the air as radio frequencies or microwave signals. Modem ✔✔- A device that modulates and demodulates a signal; typically used to send data from a computer to the Internet over telephone, cable television, or satellite networks. Internet Backbone ✔✔The major communications links that form the core of the Internet. TCP/IP ✔✔TCP is the protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets, and IP is one of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses. Cloud Computing ✔✔provided access to information, applications, communications, and storage over the Internet. Convergence ✔✔a process by which several technologies with distinct functionalities evolve to form a single product

Absolute vs. Relative Reference ✔✔An absolute reference in a worksheet formula, is a cell reference (usually preceded by a $ symbol) that cannot change as a result of a move or copy operation, whereas a relative reference is a cell reference that can change if cells change position as a result of a move or copy operation. Virtual Machine ✔✔- Software that creates an operating environment that emulates another computer platform (for example, Parallels Desktop creates a virtual PC on an Intel Macintosh computer). Types of Software ✔✔1. Commercial - Copyrighted computer applications sold to consumers for profit.

  1. Proprietary - Software that carries restrictions on its use that are delineated by copyrights, patents, or license agreements.
  2. Public Domain - Software that is available for public use without restriction except that it cannot be copyrighted.
  3. Demoware - Software that is supplied for free, but is limited in some way until you pay for it.
  4. Freeware - Copyrighted software that is given away by the author or copyright owner.
  5. Shareware - Copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it.