1/112
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The disadvantage to a ___ network topology is that if one computer malfunctions, the entire network goes down.
Bus
Which of the DKIW involves understanding patterns?
Knowledge
Business continuity purpose.
Outlining a regular schedule for preventative maintenance.
What is the name of the networking technology that reduces network traffic on a LAN by management of network messages?
Switch
Which part of a computer system contains instructions for initializing various computer components?
ROM
Outlining a regular schedule for preventative maintenance is a purpose for which plan?
Business Continuity
The ___ helps other organizations design and apply appropriate approaches to personal data collection, use and disclosure?
International Association of Privacy Professionals (IAPP)
Cloud Computing Services Mnemonic
SaaS: software, simplest
PaaS: platform, programming
IaaS: infrastructure, involved
Within __ all the resources an IT department needs are located outside of the organization and accessible by anyone, anywhere.
SaaS
An example of SaaS is:
Gmail, Dropbox
An example of PaaS is:
Google App Engine
An example of IaaS is:
Amazon Web Services, Google Compute Engine
Distributing signals between all the parts in a computer is the responsibility of the ___.
CPU
The name, address and account balance of each patient is known as __.
Record
The global organization ___ promotes the responsible use of technology through education.
Computer Professionals for Social Responsibility (CPSR)
The __ gives US students a right to their own protected records and prevents colleges from sharing student info.
Family Educational Rights and Privacy Act
During __ users test the system in an operational setting to make sure it continues to align with business objectives and meets stakeholder goals.
User Acceptance Testing
Marcus has a summer job working at a real estate agency. He is entering addresses into the system. At which stage of the DIKW hierarchy is Marcus working?
Data
What two types of software licenses are free?
Freeware and open source
__ prohibits intentionally accessing a computer without authorization. The anti hacking law
Computer Fraud and Abuse Act
In the __ phase of SDLC, architects think about the components they would need to solve the problem or implement the plan.
Design
Which administrator is responsible for installing, administering and troubleshooting network security issues?
Security Administrator
Data is stored in ___.
Records (rows)
Three examples of regulatory groups or other standard bodies:
PCI
CIA Triad
HIPAA
What profession investigates business problems and creates information systems to provide solutions?
Systems Analyst
What four devices can be used to combine networks?
Bridges
Repeaters
Switches
Routers
The client is responsible for licensing the OS and managing back-end networking in ___.
IaaS
Software is licensed to customers with subscriptions and central hosting in ___.
SaaS
System software can be divided into:
Operating software and utility software
Tier ___ of ISPs are typically dependent internets and intranets operated by a single organization that supplies internet access to homes and businesses.
3
____ can generally be classified as either internet, intranet or extranet.
Websites
Computing professionals and organizations must continuously consider what 5 things?
Ethical and Regulatory Obligations
Ownership
Security
Liability
Social impact
Data is ___ when it meets the requirements of the data collection process.
Valid
Information Technology as a system includes what 4 things?
Software
Hardware
The people who use technology
Networking elements (maintained by IT professionals)
The first laser printer was launched by Xerox in which generation?
4th Generation
The ___ ___ specialist primarily operates as a trainer and troubleshooter.
Computer support specialist
The ____ administration function includes managing user access to resources.
Database
The purpose of a ___ plan is to enable an organization to continue offering critical services in the event of disruptions.
Business continuity
What three factors should be considered when choosing a file organization system?
Security
Scalability
Data retrieval speed
__ administrators are responsible for rh installation and maintenance of hardware and software that make up a computer network.
Network
What is the collection of names, addresses, and account balances of all patients technically known as?
Database
__ administrators are responsible for supporting, monitoring and maintaining workplace technology and end users.
Systems
What programming language is used in data science, machine learning, web apps and game development?
Python
What programming language is used in Android and web based apps?
Java
What programming language is used in games, GUI and OS?
C++
What programming language is used for mobile apps and presentations?
JavaScript
What programming language is used in iOS apps and iOT?
Swift
What programming language is used in games and web apps?
C+
Java is a ____ language.
Compiler
JavaScript is a ___ language.
Interpreter
C++, C, C# and Visual Basic .NET are ___ languages.
Compiler
Python, Perl, TCL, and PHP are ___ languages.
Interpreter
1st Gen used ___ language.
Machine
2nd Gen used ___ language programming.
Assembly, first high level programming language- FORTRAN
3rd Gen used ___ programming language.
C, C++, Java
4th Gen used ___ programming language.
SQL and MTLAB
1st Gen was in what years and used what hardware and input/ output?
1946-1959, vacuum tubes, punch cards and printouts
2nd gen was when and used what hardware and input/ output?
1959-1965, transistors, punch cards and printouts
3rd gen was when and used what hardware and input/ output?
1965-1970, Integrated Circuits (IC), keyboard and monitor
4th gen was when, used what hardware and input/ output?
1970-present, microprocessors - thousands of ICs, GUIs
Ruby and Python are both types of ___ languages.
Scripting
Scripting code is a ___ programming language.
interpreter
Update, delete and insert are operations used to ___ data within a relation of a database.
Alter
“The oven is nearing the needed temperature” is an example of ____.
Knowledge
__ is applying knowledge to make smart decisions.
Wisdom
“It is 1:50 so I should head to room 126” is an example of ___.
Wisdom
“The machine starts at 8:00” is an example of ___.
Information
What is volatile storage that is lost when the computer is turned off?
RAM
What is nonvolatile storage that stores instructions for crucial system activities?
ROM - Read only memory
What are the three parts of the CPU?
ALU - Arithmetic Logic Unit
The control unit
Processor register
The ___ contains circuitry that performs operations on data.
ALU
The ___ contains circuitry coordinating the machine’s activities.
Control unit
The ___ contains data storage cells called registers
Processor register
__ are wires that serves as electrical roadways. Transmits between cpu and other components
Bus
The __ bus carries destination address of where data is assigned to be processed
Address
The __ bus carries data between processor, memory unit and input/output devices
Data bus
The ___ bus carries control signals (commands) from the cpu
Control bus
__ OS is known for personal use, user friendly design and clear graphics.
Windows
__ OS is known for media editing and graphic rendering capabilities
macOS
Windows uses a __ slash.
Backward
Linux uses __ slash and is case sensitive
Forward
What mobile OS has the largest user base?
Android
Which ‘wares’ have EULA and copyright laws?
Shareware and freeware
Compilers use ___ language.
Programming
The __ layer communicates with end user and does not directly manipulate data.
Application
The __ layer alters the database after receiving the request - and performs the required searches.
Database Management
The __ database stores data in a plain text file.
Flat-file database
A __ database stores data in tables.
Relational database
What are the project management life cycle phases?
Initiation
Planning
Execution
Closure
What are the CLEAR goals?
Collaborative, Limited, Emotional, Appreciable, Refinable
Business case, feasibility study and project charter are completed in which phase of project management?
Initiation
The kickoff meeting is done is which phase of project planning?
Execution
What are the three project risks?
Risk in Execution
Risk in Integration
Risk of the Unknown
Uncontrolled changes leading to added tasks and costs are called __.
Scope creep
Solutions for recovery with minimal data loss are called __.
Disaster Recovery Plans
A __ plan allows business to operate with limited resources during disruptions.
Business Continuity Plans
Offsite storage locations:
Salt mines, caves and cloud storage
What is the criteria for offsite storage?
Accessibility, cost, environment, geographic area, and security.
What software provides private or shareable file management via the cloud?
Document storage
Which component of the OS uses scheduling to control access to shared resources?
Kernel