1/64
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the definition of information technology?
It is a system of dependent parts working separately to accomplish information goals
It is a system indirectly used to support and improve particular aspects of a department
It is the technology used to create data, configure servers, and construct buildings
It is the technology used to create, maintain and make information accessible
It is the technology used to create, maintain and make information accessible
Which IT position has the responsibility of working with routers and switches?
Network administrator
Systems administrator
Database administrator
Website administrator
Network Administrator
In which generation were silicon chips first used in computers?
First generation
Second generation
Third generation
Fourth generation
Third generation
Which low-level language corresponds one-to-one with assembly?
Translator language
Machine language
Compiler language
Programming language
machine language
What is a cloud model that delivers third-party software such as email or games through the internet?
LaaS
SaaS
RFID
PaaS
SaaS
What is one of IT's roles in globalization?
It provides support for JIT manufacturing.
It allows companies to achieve ISO 9001:2008 certification.
It provides tax havens for companies.
t allows companies to reach a wider customer base.
It allows companies to reach a wider customer base
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
Handheld
Laptop
Desktop
Mainframe
Desktop
Which two software application packages would be classified as productivity software? Choose 2 answers
Word Processor
Spreadsheet program
FTP client
Word processor and spreadsheet program
Which two computer peripherals are connected to the computer through a port? Choose 2 answers
DVD
PC Card
External Microphone
Camera Card
USB flash drive
External Microphone and USB flashdrive
Which term is defined as a collection of information used to support management of an organization?
Information Technology
Information Security
Information System
Information Archiving
Information system
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors.
What is the timestamp considered in this scenario?
Data
Information
Knowledge
Wisdom
Data
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made.
Which characteristic of valuable data is the manager considering?
Timely
Thorough
Accurate
Reliable
Timely
Which two are parts of an information system? Choose 2 answers
Oscilloscope
Customers
Networks
Databases
Networks and Databases
What is the difference between processing and storage?
Information is received by processing, while data is received by storage.
Processing handles data and information, while storage is restricted to handling data.
Processing collects and translates data into useful information, while storage places the translated data in specific locations.
Users are responsible for processing, while computers are responsible for storage.
Processing collects and translates data into useful information, while storage places the translated data in specific locations
Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?
Costs for hardware resources are decreased
Security of information is increased
Data integrity is increased
Internet usage by employees for non-business tasks is decreased
Costs for hardware resources are decreased
Which statement correctly describes the operating system?
Consists of programs that end users run to accomplish some tasks and is sometimes referred to as horizontal software
Works with hardware to provide a network service that can be distributed across several machines on the network
Requires the user to have specialized training concerning specific commands that must be entered with proper syntax
Allows the user to control the actions of the software, and through the software, to access hardware
Allows the user to control the actions of the software, and through the software, to access hardware
Which action by application programs requires support from a networked operating system?
A word processor program edits texts within a file.
An Internet browser displays a web page.
A photo editing software enhances a picture.
A payroll program computes federal tax of an employee.
An internet browser displays a web page
The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.What type of server will meet this need?
Web server
Proxy Server
Database Server
File server
Proxy server
Which characteristic identifies application software that is cloud-based?
Hosted on an individual computer
Hosted in the internal business network
Provided by servers in the internal business network
Provided by third-party providers
Provided by third-party providers
What type of software permits free temporary use followed by long-term activation for a fee?
Proprietary
Public Domain
Open Source
Shareware
Shareware
What is the purpose of an End User License Agreement for a commercial software package?
Establishes the customer's right to use the software
Establishes the customer's right to resell the software
Establishes the customer's right to modify the source code
Establishes the customer's right to purchase without paying user fees
Establishes the customer's right to use the software
What is the difference between proprietary and open-source software license?
Proprietary software has a cost whereas open-source software is free.
Open-source software lacks technical support whereas proprietary software provides this assistance.
Open-source software can be freely modified whereas proprietary software cannot be modified.
Proprietary software can be copyrighted by the business that uses it whereas open-source software cannot be copyrighted.
Proprietary software has a cost whereas open-source software is free
What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?
A patent
A copyright
A trademark
A trade secret
A copyright
Which two components are parts of a central processing unit (CPU)? Choose 2 answers
Control Unit (CU)
Read only memory (ROM)
Arithmetic logic unit (ALU)
Random Access memory (RAM)
CU and ALU
An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Choose 2 answers
Printer
Monitor
Scanner
Web Camera
Printer and monitor
Which item is a storage device?
Scanner
Printer
Flash Drive
Monitor
Flash drive
In which type of network topology is each networked device directly connected to every other networked device?
BUS
STAR
RING
MESH
Mesh
Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?
Coaxial cable
Twisted pair cable
Shielded twisted pair
Radio signals
Radio signals
What indicates a specific Internet location?
The IP address
The interrupt vector
The packet identifier
The media access control (MAC)
The IP address
Which description explains the role of a domain name system (DNS)?
Decodes packet addresses
Transforms network nodes into URLs
Renders host responses as sender directions
Translates human-readable aliases into IP addresses
Translates human-readable aliases into IP addresses
Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?
Protocol
IP address
Domain name
Resource path ID
Resource path ID
Which goal of Information Assurance (IA) requires that information is accessible when needed?
Confidentiality
Availability
Integrity
Stability
Availability
Which technique uses all possible combinations of letters and numbers to crack a password?
Brute force
Packet sniffing
Dictionary attack
Password generator
Brute force
Which is a type of two-factor authentication?
Smart card
Least privilege
Packet sniffing
Access right
Smart card
Which is a characteristic of high-level languages?
They are machine dependent.
Code is more difficult to write than low-level language
.The source code has to be complied.
The instructions interact directly with registers and memory.
The source code has to be compiled
How does a compiler work?
It relies on a session to complete its task
It allows a programmer to easily test out changes to code.
It takes the most recent instructions and translates them into machine language.
It interprets instructions into pseudo code.
It takes the most recent instructions and translates them into machine language
What statement is true concerning compiled and interpreted computer language?
Both compiled and interpreted languages are written in binary code.
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
A compiled language program is portable and can be run on multiple types of systems, whereas an interpreted program runs on a single type of system.
An interpreted language program runs faster than a compiled language program.
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
Which language is often used for rapid prototyping and the creation of GUIs?
TCL
C++
COBOL
Python
TCL
Which is true of databases and the applications that interact with them?
The database can support at most one application.
The database determines the application classes.
Applications store data in their own files.
Applications are interdependent of the database.
Applications store data in their own files
What is another term for a formula that outlines how to execute a task?
Process
User-defined function
Algorithm
Pseudocode
Algorithm
Which data type is used to represent product order code that comprises alphanumeric characters?
String
Fixed-point
Floating-point
Boolean
String
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number.
Which data type will be required in order to create his database?
Numeric integer
Floating point
Boolean
Character string
Character String
Why is it important to ensure that data support business goals?
To provide opportunities for communication
To ensure raw data is captured
To establish needs of users
To aid in making strategic decisions
To aid in making strategic decisions
In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?
Data
information
Knowledge
Wisdom
Knowledge
Which field must contain a unique value in order for a relational database table to function?
Record Number
ID Number
Primary Key
Name
Primary Key
What are the three main categories of databases?
Relation, join, project
Flat file, relational, hierarchal
Spreadsheet, simple, complex
Table, query, report
Flat File, Relational, Hierarchal
What is the database administrator's role in security?
To eliminate data redundancy when integrating old with new systems
To create a redundant server architecture
To institute protocols to protect the databases from external threats
To set ports on the router to secure the transport of data
To institute protocols to protect the databases from external threats
What type of information processing allows input data to be accepted as a set of records and processed as a unit?
Real-time
Event-driven
Batch
Just in time
Batch
What is the role of drivers in facilitating communication between applications and databases?
They allow the application to interact with the database.
They allow all the data to be communicated via the network.
They allow ODBC to be used for interactions with the database and applications.
They allow SQL to manage communications between applications and databases.
They allow SQL to manage communications between applications and databases
Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?
WHERE
FROM
HERE
SELECT
FROM
What is the purpose of an IT department?
It helps the organization achieve strategic goals
It promotes the firm's products.
It hires employees for the organization.
It oversees funds flowing through the organization.
It helps the organization achieve strategic goals
What is a role of the systems administrator?
To install and maintain the website
To design networks
To install and maintain network resources
To develop and maintain the websites on the company web server
To install and maintain network resources
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?
Supporting the continuation of the current infrastructure
Scheduling their own internal meetings to discuss department goals
Expanding the infrastructure to support additional locations
Working independently from business management to achieve company goals
Expanding the infrastructure to support additional locations
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product
Build the software with in-house resources
Suggest that the company continues to explore options
Begin coding the solution with estimated parameters
Contact the group to arrange a demo of their product
Which risk assessment question is part of the Initiation Phase?
Could the end users reject the outcome of the project?
Was the project completed within budget?
What were the strengths of the project?
Did the scope change after the induction of the project?
Could the end users reject the outcome of the project
In what phase of a project does time estimation occur?
Initiation
Planning
Executing and Controlling
Closing
Planning
What effect does scope creep have on a project?
It provides additional control to the project.
It increases unplanned costs for the project.
It includes unqualified team members on the project.
It adds non-essential features to the project.
It increases unplanned costs for the project
Which system requirement is an example of considering user needs in the design of an information system?
Including an eye-tracking device for an input device
Allowing secure access to customer account information
Ensuring that insertions into the buffer are limited in size
Incorporating a program that can translate text into spoken words
Allowing secure access to customer account information
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
Beta
Alpha
User Acceptance
Analysis
User Acceptance
Which type of systems conversion involves starting the conversion with a portion of end users?
Pilot
Direct
Parallel
Phased
Pilot
What are two necessary elements of business continuity planning?Choose 2 answers
Assessing key organizational activities
Ensuring continuity in the sequence of staffing schedules
Identifying risks that may occur
Hiring an outside consultant to develop a plan
Assessing key organization activities and identifying risks that may occur
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
Cold site storage
Data mirroring
Storing tape backups
Site sharing
Data mirroring
Which action would support confidentiality?
Checking that data is correct
Making sure data is available when needed
Updating security software
Ensuring that software is properly licensed
Updating security software
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?
Computer Matching and Primary Protection Act of 1988
Security Breach Notification laws
The Electronic Communication Privacy Act of 1986
Digital Signature and Electronic Authorization laws
Security breach notification laws
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage
By monitoring network throughput
By ensuring databases are backed up
By establishing optimal server performance
By developing policies for information usage