C182 Intro to IT

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which type of systems testing includes having developers test internal structures of software? a. Analysis b. Beta c. White-box d. User acceptance

c

Microprocessors (1971-Present) a. 1st Generation b. 2nd Generation c. 3rd Generation d. 4th Generation e. 5th Generation

d

What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore'; a. All records from the Patient table where the patient's last name is "Moore" b. All records from the SQL table c. All records from the Patient table d. All records from the Patient table where the patient's last name is not "Moore"

a

What is the role of the CPU in a computing system? a. Performing instructions of computer programs b. Permanently storing all data and programs on the computer c. Temporarily storing activities before transferring them to the hard disk d. Distributing signals between all the parts in the computer

a

- 20 years from filling - protect the creation and the idea behind the creation. a. patent b. copyright

a

- allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe. - typically involve the latest and greatest storage equipment and the fastest protocols. - typically located close to the client or in multiple locations to ensure fast access. a. hot storage b. cold storage

a

- provides access in a virtualized environment, and the computing resources are composed of virtualized hardware. -This includes things like network connections, virtual server space, and load balancers. - renting hardware a. Infrastructure as a service (IaaS) b. platform as a service (PaaS) c. software as service (SaaS)

a

-non-public but not harmful ex. email, cellphone number a. sensitive b. private c. confidential

a

As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's: a. Business plan b. Information security plan c. Risk management plan d. Business continuity plan

a

Carries the destination address of where the data is assigned to be processed. a. address bus b. data bus c. control bus

a

Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe? a. Implementation b. Design c. Testing d. Requirements analysis

a

Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern? a. Resistance to change b. Resource risk c. Contract risk d. Project dependencies

a

Artificial Intelligence (Future) a. 1st Generation b. 2nd Generation c. 3rd Generation d. 4th Generation e. 5th Generation

e

True or False Data breaches are easy to detect.

false

Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern? a. Project dependencies b. Resistance to change c. Scope creep d. Resource risk

a

Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern? a. Contract risk b. Project dependencies c. Scope creep d. Resource risk

a

Requires U.S telecommunications carriers to modify their equipment to accommodate law enforcement tabs. a. Communication Assistance for Law Enforcement Act b. Electronic Communication privacy act c. Federal Information Security Management Act d. Computer Fraud and Abuse Act e. Anticybersquatting Consumer Protection Act

a

Specifies the rights of copyright owners and users of digital media. a. Digital Millennium Copyright Act b. Family Educational Rights and Privacy Act c. Health Insurance Privacy and Accountability Act d. Section 508 of the Rehabilitation Act e. Computer Matching and Privacy Protection Act

a

The name, address, and account balance of each individual patient in Mei's office is known as a: a. Record b. Key field c. Database d. File

a

What is the tool used to encode a document while focusing on appearance known as? a. HTML b. HTTP c. URL d. DNS

a

When you visit Mei's office's website, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other previous activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers? a. Yes, the cookies allow a web application to respond to the user as an individual. b. No, they impede the user interaction with the website. c. No, patient information could be leaked d. Yes, as long as the patient regularly clears cookies from their machin

a

Which function would Mei be completing in her database administrator role? a. Giving new users access to various databases b. Managing the telephone system network c. Connecting two or more computers together so they can communicate d. Training employees to use the billing applications

a

Which of the following contains the basic functions of the operating system? a. Kernel b. Applications c. Utility software d. File manager

a

Which of the following would be a disadvantage of an ethical code of conduct? a. It has no legal impact and It may not apply to new issues. b. It is entirely voluntary and it is legally binding.

a

___________ plan specifies how a business will resume after an event to continue its operations. a. disaster recovery b. disaster reconciliation c. business reconciliation d. business continuity

a

____________involves setting up the operating system to simultaneously write copies of the data on several storage devices. If something happens to one drive, another drive will be used in place of the faulty one, enabling the systems to recover functionality quickly without significant degradation of service. a. Data mirroring b. Data back ups c. off-site storage

a

vacuum tubes (1946-1959 a. 1st Generation b. 2nd Generation c. 3rd Generation d. 4th Generation e. 5th Generation

a

Which part of the CIA triad addresses the level of assurance that can be given as to how accurate and trustworthy data is? a. Confidentiality b. Integrity c. Availability

b

The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? (Select all that apply.) a. Mei should follow the protocol advised by the medical council of her state. b. Mei should follow both HIPAA and state privacy protocols. c. Mei can disclose information about A.J. only with a warrant. d. Mei should only follow HIPAA guidelines and disclose information about A.J. to law enforcement.

a, b

Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? (Select all that apply.) 3 answers: a. Both Tom and Mei should disclose the conflict of interest. b. Tom and Mei should not discuss details of the contract outside official channels. c. Mei should not disclose details of offers by any respondents to the RFP. d. Tom should resign from the software production company.

a, b, c

Unstructured data refers to data that is_____________. (3 answers.) a. possibly stored in a format that is not easily decoded b. coded in a way that makes it easy to convert into a form usable for analysis c. more time consuming to parse through to retrieve the essential information d. more complex

a, c, d

Which of the following describes a computer support specialist's responsibilities? 3 answers: a. Working the help desk b. Using statistical and other quantitative methods to gain insights that support the organization's decision-making c. Training help desk personnel d. Overseeing help desk personnel

a, c, d

Which type of computer peripheral is used only as an input device? a. Monitor b. Docking station c. Keyboard d. External hard drive

c

- 70 years after the death of the author - Protect the actual creation. a. patent b. copyright

b

- customers have access to a platform that supports the development and management of web applications. - renting hardware and software (to build own application) - ex. Godaddy.com a. Infrastructure as a service (IaaS) b. platform as a service (PaaS) c. software as service (SaaS)

b

- nonpublic but harmful ex. SSN, bank account, etc a. sensitive b. private c. confidential

b

- offers less frequent access and is maintained on minimal equipment that is considered lower performance. - Returning to normal operations after a disaster is slower . - Some examples include tape backup, offline cloud storage, and even some online services such as Amazon Glacier and Google Coldline. - Less expensive a. hot storage b. cold storage

b

As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct? a. It outlines what is not acceptable use of computers. b. It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people. c. It can be used by companies to train professionals how to act. d. It provides a legal mechanism for prosecuting unethical people.

b

Carries data between the processor, the memory unit, and the input/output devices. a. address bus b. data bus c. control bus

b

Confirms an individual's right to private communication, making it illegal for ISPs to share information about clients' communication. a. Communication Assistance for Law Enforcement Act b. Electronic Communication privacy act c. Federal Information Security Management Act d. Computer Fraud and Abuse Act e. Anticybersquatting Consumer Protection Act

b

Gives U.S students a right to their own protected records and prevents colleges from sharing students information without explicit authorization. a. Digital Millennium Copyright Act b. Family Educational Rights and Privacy Act c. Health Insurance Privacy and Accountability Act d. Section 508 of the Rehabilitation Act e. Computer Matching and Privacy Protection Act

b

IP addresses are traditionally written in _____________ notation. a. binary b. dotted decimal c. encrypted d. mnemonic

b

Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario? a. Confidentiality b. Integrity c. None of the above d. Availability

b

Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10. Which part of the CIA triad has been broken in this scenario? a. Availability b. Integrity c. None of the above d. Confidentiality

b

Transistors (1959-1965) a. 1st Generation b. 2nd Generation c. 3rd Generation d. 4th Generation e. 5th Generation

b

What does the acronym CIA stand for in cybersecurity? a. Confidentiality, intelligence, accessibility b. Confidentiality, integrity, and availability c. Cybersecurity, internet, accessibility d. Central Intelligence Agency

b

What is a primary difference between a modern handheld computer and a modern desktop computer? a. A desktop is more usable. b. A desktop has more processing power. c. A handheld is more usable. d. A handheld has more processing power.

b

What is a tree-like structure of records in a database referred to as? a. Relational database structure b. Hierarchical database structure c. Flat file d. Field

b

What is one probable advantage of outsourcing? a. More control can be exercised over IT processing. b. Reliance can be placed on the expertise of outsourcing vendors. c. Employee satisfaction may increase. d. The organization can transfer its accountability in terms of privacy laws.

b

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information? Example: How many holiday lights do I need to have available at Store XYZ for the upcoming season? What sold more in Store A or Store B? Are there regional differences? a. Structured query language (SQL) b. Data and business intelligence c. Database information processing

b

Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages? a. NoSQL database b. Cloud database c. Data lake d. Distributed database

b

Which network topology best handles downed links without losing connectivity between devices? a. Star b. Mesh c. Bus d. Ring

b

Which statement is not true of compilers? a. All errors must be debugged before a compiler can compile the source code. b. Compilers do not translate source code into machine code. c. Interpreters translate and execute one line of source code at a time. d. Perl and Python are examples of programming languages that use an interpreter.

b

Which tool resides between the client and server to protect the client from adverse actions of the server? a. Antivirus software b. Proxy server c. Router d. Auditing software

b

Which type of transmission media can broadcast in baseband mode? a. Wireless transmission b. Coax cable c. Optical wire d. Twisted pair cable

b

What is the role of a firewall? (2 answers) a. Block outgoing messages to all destinations b. Block outgoing messages to specified destinations c. Block incoming messages from untrustworthy sources d. Block incoming messages from trustworthy sources

b, c

Which functions would Mei be completing in her network administrator role? (2 answers) a. Giving new users access to various databases b. Managing the telephone system network c. Connecting two or more computers together so they can communicate d. Training employees to use the billing applications

b, c

Which actions might be used to support the hardening of the systems you work with? (3 answers.) a. Expect your system administrator will take care of the security of all systems b. Maintain an antivirus system c. Install security patches as they become available d. Use a random password generator and change your passwords frequently e. Click on links in an email from a person you do not know

b, c, d

Which factors should Mei consider when choosing a file organization system? (3 answers) a. Hierarchy b. Security c. Scalability d. Data retrieval speed

b, c, d

What is another title for a web administrator? 2 answers: a. Web developer b. Web server administrator c. Cybersecurity specialist d. Webmaster

b, d

- the software is licensed to customers with subscriptions and central hosting. -renting software - Some examples include Gmail, Google Docs, and Microsoft Office 365. a. Infrastructure as a service (IaaS) b. platform as a service (PaaS) c. software as service (SaaS)

c

Integrated Circuits (1965-1971) a. 1st Generation b. 2nd Generation c. 3rd Generation d. 4th Generation e. 5th Generation

c

Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe? a. Design b. Implementation c. Requirements analysis d. Testing

c

Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern? a. Scope creep b. Contract risk c. Resource risk d. Project dependencies

c

Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario? a. None of the above b. Integrity c. Availability d. Confidentiality

c

Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern? a. Scope creep b. Contract risk c. Budget risk d. Resource risk

c

Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern? a. Project dependencies b. Resistance to change c. Scope creep d. Budget risk

c

Provides U.S federal protections for personal health rights with respect to their health information. a. Digital Millennium Copyright Act b. Family Educational Rights and Privacy Act c. Health Insurance Privacy and Accountability Act d. Section 508 of the Rehabilitation Act e. Computer Matching and Privacy Protection Act

c

Requires each U.S federal agency to develop, document, and implement an agency-wide program providing information security. a. Communication Assistance for Law Enforcement Act b. Electronic Communication privacy act c. Federal Information Security Management Act d. Computer Fraud and Abuse Act e. Anticybersquatting Consumer Protection Act

c

The devices in Mei's office are interconnected in which type of network? a. PAN b. SAN c. LAN d. WAN

c

The level of assurance that data will be available to people who need it, when they need it is referred to as ___________? a. Confidentiality b. Integrity c. Availability

c

What is the minimum grade of network cable required to transmit 1 Gpbs? a. CAT5 b. CAT2 c. CAT5e d. CAT3

c

What is the primary duty of a computer support specialist? a. The computer support specialist is mainly responsible for allowing an organization to take full control of its data. b. The computer support specialist primarily identifies and helps clients adopt IT services or technologies. c. The computer support specialist primarily operates as a trainer and troubleshooter. d. The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients.

c

Which of the following is not true of Windows and Linux? a. Windows' root directory is referred to by a letter. b. Linux places the home directory within the /home/. c. Windows uses the forward slash (/) to express directory paths. d. Linux is case-sensitive.

c

Which part of the CIA triad addresses rules that restrict access to only those who need to know? a. Availability b. Integrity c. Confidentiality

c

Which role is responsible for maintaining websites? a. Cloud architect b. Network engineer c. Web administrator d. Data analyst

c

Which statement about the systems analyst role is accurate? a. The role includes planning the allocation of network addresses across an organization. b. The role includes securing an organization's network. c. The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements. d. The role includes choosing appropriate network hardware.

c

Which task describes the role of a database administrator? a. Working with organizations to keep their information systems secure and ensuring integrity, confidentiality, and availability of data b. Organizing people, time, and other resources to make sure projects meet requirements and are completed on time and within budget c. Integrating data from legacy systems to newer systems and playing a role in application design and development d. Creating, documenting, executing, and manually creating test plans and procedures relating to system anomalies

c

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person? a. Packet sniffing b. Buffer overflow c. Phishing d. Black hat

c

Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe? a. Testing b. Requirements analysis c. Implementation d. Design

d

Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law. a. Communication Assistance for Law Enforcement Act b. Electronic Communication privacy act c. Federal Information Security Management Act d. Computer Fraud and Abuse Act e. Anticybersquatting Consumer Protection Act

d

Requires the U.S Federal government's information and communication be accessible to person with disabilities. a. Digital Millennium Copyright Act b. Family Educational Rights and Privacy Act c. Health Insurance Privacy and Accountability Act d. Section 508 of the Rehabilitation Act e. Computer Matching and Privacy Protection Act

d

What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as? a. File b. Key field c. Record d. Database

d

What is the purpose of a business continuity plan? a. To develop plans for continued business operations regardless of the circumstances b. To assess risks for key processes in the event of man-made disasters c. To identify who is responsible for permanent growth of the business in the event of natural disasters d. To enable an organization to continue offering critical services in the event of disruptions

d

Which are examples of structured data? a. Telephone number b. Date of birth or transaction c. First and last name d. All of the above

d

Which statement describes the role of a network administrator? a. Network administrators have a long list of essential responsibilities but mostly focus on the design, development, and support of database management systems. b. Network administrators are accountable for the installation and maintenance of the resources on a network. c. Network administrators are responsible for maintaining websites. d. Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.

d

Which statement describes the role of a systems administrator? a. Systems administrators are responsible for monitoring an organization's network for security breaches. b. Systems administrators are responsible for the installation and maintenance of the resources of an organization's network. c. Systems administrators are responsible for designing and developing software that makes hardware and software systems work. d. Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

d

Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user? a. A desktop is more usable. b. A handheld has more processing power. c. A handheld is more usable. d. A desktop has more processing power.

d

Which type of computer peripheral is used only as an input device? a. Monitor b. External hard drive c. Docking station d. Keyboard

d

Why is merging unstructured and structured data essential? a. Both types of data contain essential information. b. Most of the data stored today is unstructured. c. Better insights and discovery of hidden connections in data sets help strengthen decision-making. d. All of the above

d

____________ plan specifies how the business will keep providing products and services and generate revenue after an event. a. disaster recovery b. disaster reconciliation c. business reconciliation d. business continuity

d

Protects U.S organizations from purchasing domain names that are identical and confusingly similar to a trademark name. a. Communication Assistance for Law Enforcement Act b. Electronic Communication privacy act c. Federal Information Security Management Act d. Computer Fraud and Abuse Act e. Anticybersquatting Consumer Protection Act

e

Requires written agreements between agencies before data for use in matching programs can be shared. a. Digital Millennium Copyright Act b. Family Educational Rights and Privacy Act c. Health Insurance Privacy and Accountability Act d. Section 508 of the Rehabilitation Act e. Computer Matching and Privacy Protection Act

e

The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? a. Mei should ask a colleague to interview Mary's daughter. b. Mei should not discuss the job with Mary. c. Mei should use the same selection criteria for all candidates. d. Mei should ask a colleague to sit in on the interview with Mary's daughter. e. All of the above

e

Which of the following systems are examples of database applications in Mei's medical office? a. Patient scheduling system b. Billing system c. Equipment inventory system d. Accounting system e. All of the above

e

True or False Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs).

true

True or False Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information.

true

True or False Most of the data stored today are unstructured and include things such as text, blogs, clickstreams, tweets, and audio. This data is not organized in a way that allows for analysis.

true

True or False The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix.

true

True or False Data breaches are often very difficult to detect and may go undetected for weeks, months, or possibly even years. Often the perpetrators of these crimes are never caught.

true


Conjuntos de estudio relacionados

Computer Organization and Architecture Chapter 1

View Set

MPJE: Federal Pharmacy Law (Q &A)

View Set

Chapter 56, Nursing Management: Acute Intracranial Problems: Increased Intracranial Pressure

View Set

Nutrition Chapter 4 Review Questions

View Set

Quiz - Class 8 - Free Throws, Point of Interruption and Correctable Errors

View Set