1/283
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
All of the following are compiled languages except for:
Javascript
BASIC
Java
C++
Javascript
Which of the following statements best describes the difference between information systems and information technology?
There is no difference between information systems and Information Technology.
An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.
Information Technology is a broader concept and information systems provide the infrastructure for information technology.
An information system requires the use of computer hardware and software; whereas information technology refers only to networks and tools that facilitate communication.
An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.
In a __________ shell forward slash (/) is used to express directory paths?
Windows
Linux
Linux
This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME?
Web Server
eMail Server
FTP Server
File Server
eMail Server
Which of the following best describes the differences between memory and the hard drive?
Memory is an internal component that directly or indirectly connects computer components; whereas the hard drive is an external storage device.
Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
Memory carries out basic instructions that operate a computer; whereas the hard drive is a long-term storage device.
Memory is an electronic component used to store instructions for future use; whereas a hard drive is attached to the motherboard and enables the communication between components.
Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
Which of the following is an accurate definition of a computer system?
A computer system is a collection of hardware and software components that work together to meet the needs of the user.
A computer system is hardware devices that work together.
A computer system consists of the operating system that tells the computer how to execute commands.
A computer system is a network that allows computers, tablets, smartphones, etc. to connect to the Internet.
A computer system is a collection of hardware and software components that work together to meet the needs of the user.
The scope of the project is considered what?
Determined in the closing phase
Always accurately identified in the initiation phase
The work that needs to be done
Not at any risk
The work that needs to be done
Which of the following best describes the purpose of expansion slots in modern computers?
Expansion slots can be used to store programs and data.
Expansion slots allow additional processors to be connected to the motherboard.
Expansion slots can be used to connect additional peripheral devices such as an external hard drive or monitor.
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
This type of software is made freely available as source code.
Open source software
Public domain software
Shareware software
Freeware software
Open Source Software
Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.
I/O Subsystem
CPU
Memory
Bus
CPU
Which of the following are the three main categories of databases?
Hierarchical , Flat File, Relational
Relational , Hierarchal, Java
Isolated , Relational, Flat File
Flat File , Isolated, Hierarchal
Hierarchical , Flat File, Relational
The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in).
FROM
SELECT
WHERE
SELECT
What is another term that defines a script?
Pascal
Compiler
Machine Code
Interpreted program
Interpreted program
This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure).
Flat File
Hierarchal
Relational
Hierarchal
A program written in a high-level language must be converted into __________ code to be executed by the computer.
JavaScript
Machine
High Level Language
C++
Machine
__________ uses the concept of reflection of light through a core made up of glass or plastic.
Chain link cable
Ethernet cable
Coaxial cable
Optical wire
Optical wire
Which of the following is the correct function of the compiler?
Every instruction is translated first and then executed and this must be done every time the program is run.
Takes the most recently entered instruction, translates it into machine language, and executes it.
Translates the entire program, creating an executable program, which can be run at a later time.
Allows programmers to more easily write programs.
Translates the entire program, creating an executable program, which can be run at a later time.
The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document.
TCP
URL
HTTP
SSL
URL
In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan.
Analysis
Design
Testing
Maintenance
Planning
Design
Which of the following is an example of a relational database?
A database that is broken up so that one part of a record is in one location in the database and another part is in a different branch.
A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.
Records in the database are separated by some delimiter, such as comma or a line.
A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.
During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders.
End-User Testing
Alpha Testing
User Acceptance
Testing
Beta Testing
User Acceptance Testing
What is the definition of business intelligence?
Business intelligence is a term used to depict a network structure that allows greater communication among different parts of an organization.
Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
Business intelligence refers to a specific type of server used to gather data that can be analyzed by an organization.
Business intelligence refers to a specific software application businesses can use to gather data from their competitors.
Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
A scanner is a peripheral device for what system?
I/O
Storage
Printer
Business
I/O
Which of the following best describes a hierarchical database format?
Data are modeled using parent-child relationships.
The database format is one of the most commonly used today.
Data are modeled using parent-child relationships.
________, sometimes referred to as middleware, facilitate the communication of hardware and software.
OLDP
Device driver
A BI system
Device driver
Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?
Data
Information
Knowledge
Wisdom
Data
Which of the following aligns IT goals and organization goals?
Breaking organization goals into smaller goals will not relate to IT activities
Improving IT infrastructure to support rapid expansion to capture less market share
IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly
Ensuring privacy and security of data shared by customers using cloud computing
IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly
Which of the following would NOT be considered hardware?
Monitor
Central processing unit
Keyboard
Word processor
Word processor
Which type of software includes programs such as Microsoft Word and PowerPoint?
Daemons
Application
Server
System
Application
All of the following are parts of a URL except for:
LAN
Protocol
Host name
TLD
LAN
What is an advantage of outsourcing?
Hiring more employees
Less control over the subject
Losing the opportunity for internal growth
Cost-effective if time is constrained
Cost-effective if time is constrained
Which of the following types of information present a threat to someone's privacy?
Secret business plans
Names and addresses in the phone book
Student ID and credit card numbers
Phone numbers and e-mail addresses
Student ID and credit card numbers
In this network topology ALL devices have a single point-to-point connection with a central device.
RING network
BUS network
STAR network
STAR network
A ____________ is also known as a datasheet.
Database System
Database Record
Database Table
Database Field
Database Table
During which generation did computers begin to see widespread use in business?
Fourth generation
First generation
Third generation
Second generation
Fourth generation
Which of the following statements best defines the CPU?
The CPU outputs the raw computer data, including mathematical calculations and logical operations.
The CPU controls the speed at which instructions are retrieved and processed in the computer.
The CPU is responsible for storing data as it is being processed.
The CPU retrieves the instructions of a computer program and the raw data that is input.
The CPU controls the speed at which instructions are retrieved and processed in the computer.
Which of the following would NOT be the responsibility of the system administrator?
Providing support to users
Creating new user accounts
Installing new file server hardware and software
Answering e-mails from potential customers.
Answering e-mails from potential customers.
Which of the following statements best represents the relevant characteristic of quality data?
The data used applies to the question being answered.
The data has been gathered using consistent, detailed collection processes.
The data has been inputted correctly and is accurate for its intended use.
The data is current enough to still serve its purpose for being accessed
The data used applies to the question being answered.
The data has been gathered using consistent, detailed collection processes.
The data has been inputted correctly and is accurate for its intended use.
The data is current enough to still serve its purpose for being accessed
An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?
Backup media
Image backups
Data mirroring
Incremental backups
Data mirroring
Which is found on the motherboard and stores information, but the information is not permanent?
CPU
RAM
Bus
ROM
RAM
___________ is ephemeral, meaning data stored is lost when the computer is powered off.
ROM
RAM
BIOS
CMOS
RAM
In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released.
Alpha
Beta
End User
User Agreement
Beta
In 2nd generation computers, which of the following high-level programming languages was created to be business-oriented?
SNOBOL
FORTRAN
COBOL
LISP
COBOL
The team will write a final report detailing the processes and outcomes of the project in which project phase?
Initiation
Planning
Executing & Controlling
Closing
Closing
As a new sales manager, Edgar is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Edgar working?
Wisdom
Knowledge
Information
Data
Knowledge
In a SQL query, the __________ operation combines two tables together?
JOIN
MERGE
COMBINE
SELECT
JOIN
What is a program that will allow a computer to easily access the hardware and software of the computer system?
Server
Operating system
Mobile device
Workstation
Operating system
What is the correct order of project phase for Project Management?
Planning, Executing & Controlling, Closing, Initiation
Executing & Controlling, Closing, Initiation, Planning
Initiation, Planning, Executing, Closing
Initiation, Planning, Executing, Closing
Which software is run automatically rather than by the end user?
Productivity Software
Microsoft Office Software
System Software
System Software
Which of the following would NOT require the use of a network?
Computers in an office sharing the same printer.
Loading a statistical program on your personal computer.
Schools turning in attendance files to the district office.
Gourmet chocolate being sold on the Internet.
Loading a statistical program on your personal computer.
Which two are both types of scripting languages?
ASP and Python
C++ and Pascal
Python and C++
Pascal and ASP
ASP and Python
This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications
SaaS (Software as a Service)
IaaS (Infrastructure as a Service)
PaaS (Platform as a Service)
PaaS (Platform as a Service)
The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.
SELECT clause
FROM clause
WHERE clause
SELECT
A company's ability to recover after a disaster is directly related to which of the following?
Strategic Partnership Plan
Marketing strategy
Financial plan
Business continuity plan
Business continuity plan
Learning about social engineering and how to protect passwords is ___.
Education
Access control
Authentication
Authorization
Access control
During this phase of Project Management, the projects scope and project management plan are defined.
Executing phase
Initiation phase
Planning phase
Closing phase
Planning phase
Which of the following are operations used to alter the data within a relation of a database?
Update , Delete , Insert
Delete, Join, Insert
Join , Insert, Update
Insert , Join, Update
Update , Delete , Insert
The __________________ is the electronic circuit responsible for executing computer program instructions.
Central Processing Unit
Compiler
Motherboard
System Unit
Central Processing Unit
Which of the following best describes the Internet?
In order to communicate over the Internet, a host does not need to run the IP network protocol.
The Internet is an isolated computer network.
The Internet uses circuit switching.
The Internet is a global network of networks.
The Internet is a global network of networks.
The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.
INTO
WHERE
SELECT
FROM
FROM
Select the statement that best describes the difference between software and hardware.
Computer software consists of drivers and their associated devices whereas computer hardware includes only internal system devices.
Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
Computer software consists of applications such as word processing and spreadsheet programs whereas computer hardware includes the operating system.
Computer programming language instructions can be very broad and general whereas computer hardware specifications must be very specific.
Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables.
Flat File
Hierarchal
Relational
Relational
Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply.
By knowing the purpose, the developer can determine how many fields are needed in the database.
The purpose determines the structure of the database.
The developer can determine which data types would help fulfill the purpose.
The number of fields in the database determines the cost of that database, so if careful planning doesn't occur, money can be wasted.
By knowing the purpose, the developer can determine how many fields are needed in the database.
The purpose determines the structure of the database.
The developer can determine which data types would help fulfill the purpose.
Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?
Closing
Initiation
Executing & Controlling
Planning
Planning
With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere.
SaaS (Software as a Service)
IaaS (Infrastructure as a Service)
PaaS (Platform as a Service)
IaaS (Infrastructure as a Service)
The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP
Print server
File server
Web server
FTP server
Web server
A local area network (LAN)
Allows hardware sharing between two offices
Allows software sharing between two offices
Allows hardware sharing within one office
Allows hardware sharing between offices in geographically dispersed locations
Allows hardware sharing within one office
________________ is a general term that describes any attack that takes advantage of humans' trusting nature.
Special Tactics
Brute Force
Social engineering
Access Control
Social engineering
Which of the following is/are true of the IPOS cycle?
If there will be no future need for certain information, a user can go straight from the input stage to the output stage without going through the processing and storage stages.
Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.
As long as the data is entered correctly, there is no need to store it. The reason for storage is to be able to prove what has been entered.
The steps of the IPOS cycle can occur in any order.
Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.
What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?
Hard drives
Bays
Ports
Slots
Ports
What is the definition of a Platform as a Service (PaaS)?
A Platform as a Service is the ability to store data and aid communication for remote teams.
A Platform as a Service makes it possible for businesses to access and use software through the Internet.
A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
A Platform as a Service makes it possible to have all of your businesses IT departments needs sited outside of the organization and available to anyone, wherever.
A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
Which device permits packet switching so that a message can be routed to the next link in a network?
Router
DNS
LAN
IP Address
Router
A ________ translates source code into machine language and translates the entire program, creating an executable program which can be run at a later time.
Compiler
A Web page's URL (Uniform Resource Locator) has three main parts:
The protocol, the domain name, and the resource or file name.
Thru this CLOUD computing function, businesses can access and use software through the Internet?
SaaS (Software as a Service)
Which factors should Mike NOT consider when choosing a file organization system?
Hierarchy
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?
Router
What does the acronym IPOS stand for?
Input, process, output, storage
Read the following scenario, and then select the job title that most accurately depicts the descriptions. Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be use
Database administrator
What is NOT part of data hygiene?
Lots of data
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?
A desktop has more processing power.
Which statement describes the role of a systems administrator?
Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
What two types of software licenses are free?
Freeware and Open source
Which one of these is NOT a operation for database queries?
Serve
______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use?
Big Data
What is one probable advantage of outsourcing?
Reliance can be placed on the expertise of outsourcing vendors.
A petabytes consists of how many terabytes?
1,000
A monitor is a peripheral device for what system?
I/O
Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
Flat file
The name, address, and telephone number of each individual patient in Dr. Alan's office is known as a:
Record
A typical database application has how many layers?
2
Which statement is not true of compilers and interpreters?
Compilers do not translate source code into machine code.
Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law.
Computer Fraud and Abuse Act
Which data format is not in an easily usable format and takes greater effort to extract?
Unstructured
IT functions cover these five different domains:
- communication
- data collection and management
- information security management
- consumer relationship management
- process improvement
True
Which of the description of duties below would be for a System Administrator?
This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
Read the following scenario and determine the best hardware or software solution for the situation. Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.
Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.
Which of the following statements describes why network protocols are necessary.
Network protocols are necessary for computers to communicate with each other.
Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier?
Relational Database
What is a tree-like structure of records in a database referred to as?
Hierarchical database structure