ITI Quiz Knowledge

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards

A(n) _______________ is a computer dedicated to responding to requests for
Web pages.

web server

2
New cards

A(n) _______________ is a syntactic notation in HTML used to annotate the
content of a Web page.

tag

3
New cards

A Java scriptlet is code embedded in an HTML document to create dynamic content
on a Web page.

True.

4
New cards

An attribute is an HTML tag that links to another Web page.

False

5
New cards

Which of the following is a language for transforming XML into various output
formats?

XSL

6
New cards

Database Management Systems provides data consistency through
normalization.

true

7
New cards

OLTP Database (Online Transaction Processing DB)

speedy, analytic database designed for large numbers of transactions performed by multiple users. Ex: ATM and Online Banking, Online travel reservation system

8
New cards

OLAP (Online Analytical Processing)

used to provide Data Analytics from OLTP database to provide forecasting, budgeting, planning. The main process is NOT Data processing. 

9
New cards

NoSQL Database

allows unstructured and semi-unstructured data to be stored and manipulated

10
New cards

List 3 advantages of using NoSQL

Cheap, easy to implement, Non-relational, Don’t require schema

11
New cards

Disadvantages of NoSQL

No easy integration with other applications that support SQL, Doesn’t fully support relational features, No declarative query language (e.g., SQL) -> more programming

12
New cards

Describe 4 categories of NoSQL with example

Document-based
Example: MongoDB, CouchDB
2.Key-value
Example: DynamoDB, Voldermort, Scalaris
3. Column-based
Example: BigTable, Cassandra, Hbased
4. Graph-based
Example: Neo4J, InfoGrid

13
New cards

A schema provides the logical view of the data in the database.

true

14
New cards

used to retrieve data from a database?

query

15
New cards

Write an SQL statement that changes the price of the house with ID 155 to
195000 in the following table called ForSale

update ForSale set Price = 195000 where ID = 155;

16
New cards

Some will refer to wisdom as an understanding of

why

17
New cards

In OLAP, which of the following techniques allows you to alter the
perspective of the data records, for instance instead of focusing on yearly
records, seeing the records broken down by products?

pivoting

18
New cards

In rule association learning, a high frequency always means a useful rule

false

19
New cards

Describe ETL (Extract, Transform, Load) Process

–Extract data – data comes from a large variety of sources
–Transform data – data from different sources may not “sync up” (e.g., different
fields, different ranges of values) so data must be transformed to cohere
–Load data – into a storage facility

20
New cards

Data mining, as a process, is not very computationally intensive and so it is highly
attractive even if it cannot guarantee finding any information that is useful

false

21
New cards

The best way to protect the vulnerabilities of the human in IT is through

training

22
New cards

Which level of RAID provides redundancy in the form of a complete duplicate
(mirror) of the data?

1

23
New cards

Which of the following is not a threat that involves an individual in an
organization but instead is a threat to the technology itself?

protocol attack

24
New cards

Compare and contrast HTML and XML

HTML and XML are both markup languages, using tags to annotate the content of a
document. HTML has a predefined set of tags used to specify the content of a Web
page. XML has no predefined tags, and therefore acts like a metalanguage, allowing
the user to create their own markup language. An XML document can therefore be
used for many purposes, and translated into multiple output formats.

25
New cards

HTML includes six predefined elements that define various levels of
_______________, usually used for section and subsection titles.

headings

26
New cards

Structured Query Language (SQL)

a comprehensive relational database language for data manipulation and queries

27
New cards

System administrators will be expected to provide support in the form of documentation and training to the organization's users.

True

28
New cards

Which of the following is the largest storage capacity?

4 Gigabytes

29
New cards

A security administrator would be responsible for administering which of the following?

A firewall

30
New cards

An IT person in general would not be expected to handle which of the following tasks?

Monitor employees files and web browsing behavior to ensure compliance with organizational IT policies

31
New cards

You can store a number between 0 and 255 in 1 bit

False

32
New cards

A computer system consists of the hardware, software and ...

... Users.

33
New cards

Detecting that a computer is running slowly because of a computer virus infection would be an example of which type of IT skill?

Troubleshooting

34
New cards

If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is.

True

35
New cards

Internet 2.0

Running out of IPv4 addresses. Internet backbone not developed to support billions of users

Moving from 3g to 5g

36
New cards

Which of the following could be called a peripheral device?

Printer

37
New cards

Which of the following skills would an IT person employ to find and fix a problem with the operating system?

System troubleshooting

38
New cards

A smart phone should not be considered a computer

False

39
New cards

Volatility is a property of which of the following?

Memory

40
New cards

The concept of translating a program from a more readable language like Python or Java into the computer's native machine language is called

complication

41
New cards

The system unit houses the CPU and memory chips, all placed on ...

a motherboard

42
New cards

Where is swap space located?

Hard disk

43
New cards

Which of the following forms or process management did MS-DOS use?

Single tasking

44
New cards

The process and the program are the same; the two terms can be used interchangeably

False

45
New cards

When the CPU moves from one process to another in multitasking, this is known as ...

... a context switch.

46
New cards

The process of swapping is triggered under which circumstance?

A page fault

47
New cards

The portion of the operating system that must be resident in memory at all times is...

... the kernel.

48
New cards

What does an interrupt interrupt?

the CPU during its fetch-execute cycle

49
New cards

Which form of processing would run one process at a time, but when that process requires I/O, the CPU would switch temporarily to another process?

multitasking

50
New cards

Which portion of the operating system can be personalized by the user

shell

51
New cards

Which of the following is true in competitive multitasking

The CPU switches between processes when a timer forces a context switch.

52
New cards

A multithreaded operating system is more efficient than a multitasking operating system when executing threads.

True

53
New cards

Concurrent processing means that the operating system executes processes in an overlapped fashion, which of the following is not a form of concurrent processing?

batch processing

54
New cards

The foreground process is the one that the user can directly interact with.

True

55
New cards

If two processes are deadlocked, what is your best move to free them from deadlock?

kill one of the processes

56
New cards

With virtual memory, only portions of the running program are stored in memory.

True

57
New cards

The use of permissions to control who/what cannot access and use system resources is part of which of these operating system roles?

Protection

58
New cards

Cooperative multitasking are the same thing

False

59
New cards

If a process generates an address that is part of another process' area of memory, this is known as ...

... a memory violation

60
New cards

elements

words such as head, title, and body specify the type of the tag

61
New cards

tags

enclosed in angle brackets (<..>) / (</…>)

62
New cards

In order for the operating system to be able to communicate with a specific piece of hardware, one must install the appropriate ...

device driver

63
New cards

Which of the following forms of processing does not provide any form of interaction with the user but instead requires I/O be handled before/after program execution?

multiprogramming

64
New cards

GRUB is an example of ...

boot loader program

65
New cards

When two threads need to "meet up" in order to share data, this is known as ...

... rendezvous

66
New cards

Which of these hardware devices can force the processor to move from one process to another in multitasking?

Program Counter

67
New cards

To determine where a given page is stored in memory, the operating system uses...

... the page table

68
New cards

If an entry in a page table is listed as not valid, then accessing that page will cause ...

page fault

69
New cards

Two threads will always share the same ...

program code

70
New cards

If a hard disk contains 4 platters, how many read/write heads will the hard disk contain?

8

71
New cards

In a linked list, to reach the 5th block, how many links do you have to follow?

4

72
New cards

The zip and tar programs can be used to create...

... archives

73
New cards

Files are broken into fixed sized units called ...

blocks

74
New cards

With file blocks distributed across the file system instead of being stored in consecutive disk blocks, accessing the file requires traversing the blocks creating what one might call a ...

... linked list

75
New cards

Mounting ...

... makes a partition available

76
New cards

The surface of a hard disk is broken into which types of regions?

Tracks and sectors

77
New cards

In file compression, lossy compression ...

.. reduces the file size by discarding some of the data.

78
New cards

In order to discover your password, someone might call you on the phone and try to trick you into divulging it to them, for instance by acting as someone from your organization's IT group. This is often called ...

... social engineering

79
New cards

What operating system task is access control lists used for?

Protection

80
New cards

The first message broadcast on the Internet, in its earliest incarnation, was in which year?

1969

81
New cards

TCP/IP's link layer is roughly equivalent to the OSI model's...

... physical and data link layers

82
New cards

Switches use which of the following addresses to send a message to the proper device?

MAC addresses

83
New cards

If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?

ring

84
New cards

Last mile technology is used to express the idea that ...

... some households still use low bandwidth telephone lines to access the Internet.

85
New cards

In order to determine if another computer is available and accessible over your network, you might use which program to test it?

ping

86
New cards

The Internet uses packet switching while local area networks use circuit switching.

False

87
New cards

To use the telephone network for computer communication, one must ...

... convert the analog information stored in the computer into a digital form.

88
New cards

IPv4 offers approximately how many unique IP addresses?

4 billion

89
New cards

The number of computers on the original ARPAnet was...

4

90
New cards

Which level of the OSI model performs routing?

network

91
New cards

At which level of the OSI model are data units decomposed into packets?

data link

92
New cards

Morris Internet worm was an attempt to...

... demonstrate weaknesses, and UNIX security

93
New cards

The ability of a network to carry multiple messages at the same time as known as...

... multiplexing

94
New cards

In which protocol can you use UDP type packets?

TCP

95
New cards

IPV4 addresses are ____ bits long

32

96
New cards

And intranet LAN has which of the following properties?

The LAN uses IP to easily extend the network to the Internet.

97
New cards

Which of the following devices deals with IP addresses?

router

98
New cards

Which mathematical operation is used to obtain the check sum once the sum of the bits is computed

Modulo

99
New cards

Of the following network types (sizes or classifications), which is generally considered the smallest?

PAN

100
New cards

SSL, the secure socket layer is an implementation of which level of the OSI model?

Presentation