134,120 views
43 votes
43 votes
Explain the following IT terms Network Administrator: Network Architect: Network Security Analyst: Networking Certifications: Soft Skills: Parliamentary procedure: Information security: Malware: DoS Attack: Phishing: Internal Threats: explain all pls

User MTroy
by
3.2k points

2 Answers

27 votes
27 votes

Answer:

A network administrator is in charge of installing, maintaining, and upgrading any software or hardware needed to keep a computer network running smoothly.

Security methods to protect data, networks, and computer systems are designed, planned, and implemented by a network security analyst. They're also in charge of keeping data safe and avoiding service outages.

Network certifications are certificates you can get to show you have the knowledge and skills to work with networks in the IT profession.

Soft skills are characteristics that personality has and enable people to communicate with one another and succeed at work.

Parliamentary procedure is a set of ethics rules and practices that govern operations and meetings of clubs, deliberative assemblies , legislative bodies, and organizations.

Step-by-step explanation:

User Abraham Duran
by
3.1k points
16 votes
16 votes

Answer:

A network administrator is in charge of installing, maintaining, and upgrading any software or hardware needed to keep a computer network running smoothly.

Security methods to protect data, networks, and computer systems are designed, planned, and implemented by a network security analyst. They're also in charge of keeping data safe and avoiding service outages.

Network certifications are certificates you can get to show you have the knowledge and skills to work with networks in the IT profession.

Soft skills are characteristics that personality has and enable people to communicate with one another and succeed at work.

Parliamentary procedure is a set of ethics rules and practices that govern operations and meetings of clubs, deliberative assemblies , legislative bodies, and organizations.

Information security is an activity that prevents unauthorized access and disclosure, and the destruction of data.

Malware is software designed to damage or destroy computers and computer systems.

A denial-of-service attack attempts to halt a network, rendering it inaccessible to its intended users.

Phishing is a common social engineering attack to obtain sensitive information from individuals, such as usernames, passwords, and payment card numbers.

Internal threat is malicious action perpetrated against an organization by people who have legitimate access to the network, apps, or databases.

Step-by-step explanation:

User Jan Pisl
by
2.9k points