Intro to IT

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/112

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

113 Terms

1
New cards

The disadvantage to a ___ network topology is that if one computer malfunctions, the entire network goes down.

Bus

2
New cards

Which of the DKIW involves understanding patterns?

Knowledge

3
New cards

Business continuity purpose.

Outlining a regular schedule for preventative maintenance.

4
New cards

What is the name of the networking technology that reduces network traffic on a LAN by management of network messages?

Switch

5
New cards

Which part of a computer system contains instructions for initializing various computer components?

ROM

6
New cards

Outlining a regular schedule for preventative maintenance is a purpose for which plan?

Business Continuity

7
New cards

The ___ helps other organizations design and apply appropriate approaches to personal data collection, use and disclosure?

International Association of Privacy Professionals (IAPP)

8
New cards

Cloud Computing Services Mnemonic

SaaS: software, simplest

PaaS: platform, programming

IaaS: infrastructure, involved

9
New cards

Within __ all the resources an IT department needs are located outside of the organization and accessible by anyone, anywhere.

SaaS

10
New cards

An example of SaaS is:

Gmail, Dropbox

11
New cards

An example of PaaS is:

Google App Engine

12
New cards

An example of IaaS is:

Amazon Web Services, Google Compute Engine

13
New cards

Distributing signals between all the parts in a computer is the responsibility of the ___.

CPU

14
New cards

The name, address and account balance of each patient is known as __.

Record

15
New cards

The global organization ___ promotes the responsible use of technology through education.

Computer Professionals for Social Responsibility (CPSR)

16
New cards

The __ gives US students a right to their own protected records and prevents colleges from sharing student info.

Family Educational Rights and Privacy Act

17
New cards

During __ users test the system in an operational setting to make sure it continues to align with business objectives and meets stakeholder goals.

User Acceptance Testing

18
New cards

Marcus has a summer job working at a real estate agency. He is entering addresses into the system. At which stage of the DIKW hierarchy is Marcus working?

Data

19
New cards

What two types of software licenses are free?

Freeware and open source

20
New cards

__ prohibits intentionally accessing a computer without authorization. The anti hacking law

Computer Fraud and Abuse Act

21
New cards

In the __ phase of SDLC, architects think about the components they would need to solve the problem or implement the plan.

Design

22
New cards

Which administrator is responsible for installing, administering and troubleshooting network security issues?

Security Administrator

23
New cards

Data is stored in ___.

Records (rows)

24
New cards

Three examples of regulatory groups or other standard bodies:

  1. PCI

  2. CIA Triad

  3. HIPAA

25
New cards

What profession investigates business problems and creates information systems to provide solutions?

Systems Analyst

26
New cards

What four devices can be used to combine networks?

  1. Bridges

  2. Repeaters

  3. Switches

  4. Routers

27
New cards

The client is responsible for licensing the OS and managing back-end networking in ___.

IaaS

28
New cards

Software is licensed to customers with subscriptions and central hosting in ___.

SaaS

29
New cards

System software can be divided into:

Operating software and utility software

30
New cards

Tier ___ of ISPs are typically dependent internets and intranets operated by a single organization that supplies internet access to homes and businesses.

3

31
New cards

____ can generally be classified as either internet, intranet or extranet.

Websites

32
New cards

Computing professionals and organizations must continuously consider what 5 things?

  1. Ethical and Regulatory Obligations

  2. Ownership

  3. Security

  4. Liability

  5. Social impact

33
New cards

Data is ___ when it meets the requirements of the data collection process.

Valid

34
New cards

Information Technology as a system includes what 4 things?

  1. Software

  2. Hardware

  3. The people who use technology

  4. Networking elements (maintained by IT professionals)

35
New cards

The first laser printer was launched by Xerox in which generation?

4th Generation

36
New cards

The ___ ___ specialist primarily operates as a trainer and troubleshooter.

Computer support specialist

37
New cards

The ____ administration function includes managing user access to resources.

Database

38
New cards

The purpose of a ___ plan is to enable an organization to continue offering critical services in the event of disruptions.

Business continuity

39
New cards

What three factors should be considered when choosing a file organization system?

  1. Security

  2. Scalability

  3. Data retrieval speed

40
New cards

__ administrators are responsible for rh installation and maintenance of hardware and software that make up a computer network.

Network

41
New cards

What is the collection of names, addresses, and account balances of all patients technically known as?

Database

42
New cards

__ administrators are responsible for supporting, monitoring and maintaining workplace technology and end users.

Systems

43
New cards

What programming language is used in data science, machine learning, web apps and game development?

Python

44
New cards

What programming language is used in Android and web based apps?

Java

45
New cards

What programming language is used in games, GUI and OS?

C++

46
New cards

What programming language is used for mobile apps and presentations?

JavaScript

47
New cards

What programming language is used in iOS apps and iOT?

Swift

48
New cards

What programming language is used in games and web apps?

C+

49
New cards

Java is a ____ language.

Compiler

50
New cards

JavaScript is a ___ language.

Interpreter

51
New cards

C++, C, C# and Visual Basic .NET are ___ languages.

Compiler

52
New cards

Python, Perl, TCL, and PHP are ___ languages.

Interpreter

53
New cards

1st Gen used ___ language.

Machine

54
New cards

2nd Gen used ___ language programming.

Assembly, first high level programming language- FORTRAN

55
New cards

3rd Gen used ___ programming language.

C, C++, Java

56
New cards

4th Gen used ___ programming language.

SQL and MTLAB

57
New cards

1st Gen was in what years and used what hardware and input/ output?

1946-1959, vacuum tubes, punch cards and printouts

58
New cards

2nd gen was when and used what hardware and input/ output?

1959-1965, transistors, punch cards and printouts

59
New cards

3rd gen was when and used what hardware and input/ output?

1965-1970, Integrated Circuits (IC), keyboard and monitor

60
New cards

4th gen was when, used what hardware and input/ output?

1970-present, microprocessors - thousands of ICs, GUIs

61
New cards

Ruby and Python are both types of ___ languages.

Scripting

62
New cards

Scripting code is a ___ programming language.

interpreter

63
New cards

Update, delete and insert are operations used to ___ data within a relation of a database.

Alter

64
New cards

“The oven is nearing the needed temperature” is an example of ____.

Knowledge

65
New cards

__ is applying knowledge to make smart decisions.

Wisdom

66
New cards

“It is 1:50 so I should head to room 126” is an example of ___.

Wisdom

67
New cards

“The machine starts at 8:00” is an example of ___.

Information

68
New cards

What is volatile storage that is lost when the computer is turned off?

RAM

69
New cards

What is nonvolatile storage that stores instructions for crucial system activities?

ROM - Read only memory

70
New cards

What are the three parts of the CPU?

  1. ALU - Arithmetic Logic Unit

  2. The control unit

  3. Processor register

71
New cards

The ___ contains circuitry that performs operations on data.

ALU

72
New cards

The ___ contains circuitry coordinating the machine’s activities.

Control unit

73
New cards

The ___ contains data storage cells called registers

Processor register

74
New cards

__ are wires that serves as electrical roadways. Transmits between cpu and other components

Bus

75
New cards

The __ bus carries destination address of where data is assigned to be processed

Address

76
New cards

The __ bus carries data between processor, memory unit and input/output devices

Data bus

77
New cards

The ___ bus carries control signals (commands) from the cpu

Control bus

78
New cards

__ OS is known for personal use, user friendly design and clear graphics.

Windows

79
New cards

__ OS is known for media editing and graphic rendering capabilities

macOS

80
New cards

Windows uses a __ slash.

Backward

81
New cards

Linux uses __ slash and is case sensitive

Forward

82
New cards

What mobile OS has the largest user base?

Android

83
New cards

Which ‘wares’ have EULA and copyright laws?

Shareware and freeware

84
New cards

Compilers use ___ language.

Programming

85
New cards

The __ layer communicates with end user and does not directly manipulate data.

Application

86
New cards

The __ layer alters the database after receiving the request - and performs the required searches.

Database Management

87
New cards

The __ database stores data in a plain text file.

Flat-file database

88
New cards

A __ database stores data in tables.

Relational database

89
New cards

What are the project management life cycle phases?

  1. Initiation

  2. Planning

  3. Execution

  4. Closure

90
New cards

What are the CLEAR goals?

Collaborative, Limited, Emotional, Appreciable, Refinable

91
New cards

Business case, feasibility study and project charter are completed in which phase of project management?

Initiation

92
New cards

The kickoff meeting is done is which phase of project planning?

Execution

93
New cards

What are the three project risks?

  1. Risk in Execution

  2. Risk in Integration

  3. Risk of the Unknown

94
New cards

Uncontrolled changes leading to added tasks and costs are called __.

Scope creep

95
New cards

Solutions for recovery with minimal data loss are called __.

Disaster Recovery Plans

96
New cards

A __ plan allows business to operate with limited resources during disruptions.

Business Continuity Plans

97
New cards

Offsite storage locations:

Salt mines, caves and cloud storage

98
New cards

What is the criteria for offsite storage?

Accessibility, cost, environment, geographic area, and security.

99
New cards

What software provides private or shareable file management via the cloud?

Document storage

100
New cards

Which component of the OS uses scheduling to control access to shared resources?

Kernel