IT Fundamentals Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/113

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

114 Terms

1
New cards

In order to determine if another computer is available and accessible over your network, you might use which program to test it?

ping

2
New cards

Which network topology is generally considered the cheapest?

bus

3
New cards

Which service is used to map IP aliases to IP addresses?

DNS

4
New cards

Switches use which type of addresses to send a message to the proper device?

MAC addresses

5
New cards

The ability of a network to carry multiple messages at the same time is known as…

multiplexing

6
New cards

Which technology differentiates a normal extranet from a virtual private network?

encryption

7
New cards

The term used to describe the amount of data that can be transferred of a network over a unit of time, such as bits per second, is known as…

bandwidth

8
New cards

A network port…

…indicates the message’s intended application software.

9
New cards

In streaming audio and video, would TCP or UDP be preferred to trade off speed for assurance of arrival?

TCP

10
New cards

“T” connectors are used to join computers together in which network topology?

bus

11
New cards

Last mile technology is used to express the idea that…

…some households still use low-bandwidth telephone lines to access the Internet.

12
New cards

At which layer of the OSI model are data units decomposed into packets?

data link layer

13
New cards

If a computer were to go offline in a network, which topology would most likely be impacted by this?

ring

14
New cards

A jam signal is used in an Ethernet network to…

…inform all computers on the network of a collision.

15
New cards

IPv4 offers approximately how many unique IP addresses?

4 billion

16
New cards

Long-distance communication (dozens, hundreds or thousands of miles) generally does not use what?

fiber optic cable

17
New cards

A network with a file server which services the local computers would be considered a(n) ...

client-server network

18
New cards

Which layer of the OSI model takes care of reliability?

transport layer

19
New cards

In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?

3

20
New cards

True or False: We can think of the Internet and the World Wide Web interchangeably.

False

21
New cards

True or False: We view computer networks at a logical level while the operating system views the network at a physical level.

False

22
New cards

Which layer of the OSI model performs routing?

network layer

23
New cards

What term is used to denote a computer you wish to access over a network?

remote computer

24
New cards

In which protocol can you use UDP type packets?

TCP

25
New cards

What mathematical operation is used to obtain the checksum once the sum of the bits is computed?

modulo

26
New cards

As a network gets larger (has more computers connected to it), which network topology performance is most affected?

ring

27
New cards

An intranet LAN has what property?

LAN uses IP to easily extend the network to the Internet.

28
New cards

True or False: In a circuit-switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.

True

29
New cards

Mapping an external IP address into an internal IP address is known as ...

network address translation

30
New cards

What device deals with IP addresses?

router

31
New cards

What device would transmit any message received on to all computers in its local area network?

repeater

32
New cards

A checksum is used in network communication for what purpose?

error-checking

33
New cards

Each layer of the OSI model adds header information onto the message, except for the ...

physical layer

34
New cards

The full mesh network is seldom used because ...

…it costs the most.

35
New cards

Morris’ Internet worm was an attempt to ...

…demonstrate weaknesses in Unix security.

36
New cards

TCP/IP introduced what communication idea?

three-way network handshake

37
New cards

True or False: In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.

True

38
New cards

To use the telephone network for computer communication, one must ...

... convert the analog information stored in the computer into a digital form.

39
New cards

A Class C network has how many IP addresses available for the network?

256

40
New cards

The first message broadcast on the Internet, in its earliest incarnation, was in which year?

1969

41
New cards

Twisted wire pair is most commonly used in what?

The public telephone network in the US

42
New cards

In a Linux system, the address(es) of your DNS servers will be stored in which file?

/etc/hosts.conf

43
New cards

Which network type (sizes or classifications) is generally considered the smallest?

PAN

44
New cards

Which network programs send information in clear text and so are not secure?

rlogin, telnet, ftp, not ssh

45
New cards

IPv4 addresses are ____ bits long.

32

46
New cards

True or False: The Internet uses packet switching while local area networks use circuit switching.

False

47
New cards

What noteworthy event happened to the ARPANet in 1973?

The first international computer was added to the network.

48
New cards

How many computers were on the original ARPAnet?

4

49
New cards

TCP/IP’s link layer is roughly equivalent to the OSI model’s ...

physical and data link layers

50
New cards

SSL, the secure sockets layer, is an implementation of which layer of the OSI model?

presentation layer

51
New cards

A database is commonly a collection of…

relations

52
New cards

True or False: Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.

True

53
New cards

Symmetric key encryption is also known as ...

private key encryption

54
New cards

A company may draw upon multiple sources to build their data warehouse. What are some possible sources?

- Enterprise resource planning systems

- Marketing reports

- Project reports

- Sales records

55
New cards

What method is often used to determine closeness in clustering?

Euclidean distance formula

56
New cards

True or False: The goal of availability can often conflict with the goals of confidentiality and integrity.

True

57
New cards

Some will refer to wisdom as an understanding of…

…why.

58
New cards

When combining data from various databases into a data warehouse, what process might be required?

data transformation

59
New cards

What is not a threat that involves an individual in an organization but instead is a threat to the technology itself?

protocol attack

60
New cards

True or False: In rule association learning, a high frequency always means a useful rule.

False

61
New cards

In OLAP, what technique allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?

slicing

62
New cards

RAID technology uses what?

hard disks

63
New cards

Of these RAID levels, which uses the smallest possible stripe sizes?

RAID 3

64
New cards

Projections, restrictions and joins collectively are forms of database ...

queries

65
New cards

Why was Y2K an issue?

Early programmers used 2 digits to store the year.

66
New cards

True or False: All information systems are stored on computer.

False

67
New cards

True or False: The Unix operating system has no security holes in it, unlike Windows.

False

68
New cards

The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.

incremental

69
New cards

What is a form of protocol attack?

TCP hijacking

70
New cards

True or False: Law enforcement uses data mining to identify possible crime “hot spots” in their city to predict where future crimes might occur.

True

71
New cards

The idea that collected data are correct and accurate is known as ...

integrity

72
New cards

Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data?

RAID 1

73
New cards

A database projection returns _____ of a database relation.

specific fields of all records

74
New cards

True or False: A decision tree can be generated automatically from a database of records.

True

75
New cards

What form of RAID is not used because the redundancy information is too time consuming to compute efficiently?

RAID 2

76
New cards

True or False: To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like “youth”, “teen”, “young adult”, “adult”, “senior”.

True

77
New cards

We should think of information as…

interpreted data

78
New cards

True or False: Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.

False

79
New cards

What form of secure communication protocol/software is used specifically for wireless communication?

WPA2

80
New cards

Which form of RAID offers no redundancy at all?

RAID 0

81
New cards

In OLAP, what technique allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?

pivoting

82
New cards

Some organization are using biometrics in place of or in addition to passwords to support the idea of…

…who you are.

83
New cards

The best way to protect the vulnerabilities of the human in IT is through…

training

84
New cards

True or False: When generating goals of an organization, you might find that some goals contradict or conflict with other goals, requiring that they be prioritized.

True

85
New cards

Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule “if someone buys beer they will also buy pretzels” is…

80%

86
New cards

In order to demonstrate that you are an authentic operator, your website should use…

digital certificates signed by a certificate authority.

87
New cards

Encryption supports…

confidentiality

88
New cards

What encryption algorithm has been declared as insecure?

DES

89
New cards

To support confidentiality of data stored in files, we might want to implement…

access control (permissions)

90
New cards

What IT role would most need knowledge of such software as MySQL and Oracle?

Database administrator

91
New cards

What IT role would most need knowledge of VoIP and trunking protocols?

Network administrator

92
New cards

Of the various IT related professions, which is seeing jobs decline instead of grow?

Computer programmer

93
New cards

True or False: Most IT people will stay abreast to changes in the IT field by reading technical journals published by such organizations as ACM and IEEE.

False

94
New cards

True or False: Computer programmer and software engineering have the same roles and duties.

False

95
New cards

Which is not part of the 10 Commandments of computer ethics?

Thou shalt not use work computers for personal purposes.

96
New cards

What career would benefit most from having a master’s degree?

IT manager

97
New cards

What IT role would be in charge of securing a computer network?

Network administrator

98
New cards

What career would require knowledge of criminal justice?

Computer forensics

99
New cards

What is not an example of a soft skill?

ability to troubleshoot

100
New cards

True or False: As an IT employee of an organization, you should expect your employer(s) to support your efforts in continuing education by paying for you to take classes or travel to conferences and trade shows.

True