Info Tech Data quiz, Info Tech Hardware Quiz, Info Tech People Quiz, Info Tech Software Quiz, Info Tech Process Quiz
Match each activity below with the step in the DMAIC process in which it is most likely to occur. - Review throughput reports for each step in the process - Write a business process diagram indicating each step in the current process - Make specific plans to change one or more steps in the process
- Analyze - Define - Improve
Which two of the following statements are true regarding the relationship between application software, an operating system, and computer hardware?
- Application software must be compiled before it can be executed by an operating system. - The operating system executes the instructions given to it by the application software.
Select the best definition of Master Data from the options below.
Corporate data assets which are shared across the enterprise
When thinking about business process improvement, process waste is anything that does not create value for a customer .
Create value for a customer
Which discipline within the area of Data Management is most directly responsible for protecting data from harm.
Data Security
The acronym, "TIMWOOD" is a helpful aid in remembering which of the following?
Forms of process waste
In the DMAIC process management framework the M stands for...
Measure
Which two items below were not listed in the video lectures as disciplines falling under data management function? (Select all that apply)
- Data flow diagrams - Data entry
Which of the following statements are true about the relationship between business processes and information systems?
- Information systems can execute processes quickly and accurately. - Information systems make sure the right information is available at the right time.
Managing stakeholder expectations and outcomes is an important aspect of managing any information system (or software). One way to categorize stakeholders involves rating each individual as high or low on two important criteria. Those two criteria are: - How much integrity they have over decisions related to the system, and - How strong their implication is in the system's outcomes.
- Integrity - Implication
There are a variety of techniques software designers can use to build highly satisfying user experiences. One technique called _______ attempts to get user feedback as frequently as possible. Another technique called, _______ creates multiple prototypes and collects user feedback before settling on one.
- Iterative design - Parallel design
Scenario: Leticia has just received a paper invoice in the mail from one of her suppliers. She opens her accounting system and records the payment details including the supplier name, the amount, and the date the payment should be sent. The system then creates a pending payment record and stores it in the accounts payable database. Question: In this example, the pending payment records is a process _______ . The paper invoice Leticia received is a(n) _______ in this case. In this simple process, Leticia functions as a _______.
- Output - Input - Resource
Neural networks are a form of artificial intelligence that is designed to roughly imitate the human _______. A neural network consists of several _______ of 'neurons' which receive inputs from other neurons and transform those into numeric outputs which are then eventually sent to _______ neurons which give the 'answer' to the problem they are designed to solve.
- Respiratory system - Layers - Output
One common theory of group dynamics states that groups tend to progress through four common stages. Which of the following statements are true as they relate to group performance.
- Teams typically reach their highest levels of performance only after passing trough a period of conflict. - Norming refers to the process of setting standards and expectations for team members. Often, these norms are not formally written down or even openly stated.
There are two major categories of data storage hardware. Primary storage is referred to as _______, meaning it _______ its value when the power goes off. Secondary storage is _______, meaning it _______ its value when the power is off.
- Volatile - Loses - Non-volatile - Retains
The binary number system uses just two digits (0 and 1) to represent any counting number. Match each of the familiar 'base-10' numbers below with their 8-digit binary equivalents. 1- (15) 2- (8) 3- (13) 4- (65)
1- (00001111) 2- (00001000) 3- (00001101) 4- (01000001)
You are conducting research on the transmission rate of a new infectious disease. Your database allows you to record information about individuals, locations they may visit, and government restrictions imposed to help slow the spread of the disease. The database allows you to store the following information: INDIVIDUAL: Birth Date, Gender, Ethnicity, and Infection Status LOCATION: Latitude, Longitude, Name, Capacity RESTRICTION: Description, Date Imposed, Jurisdiction Now match each item below with the role it plays in the data model. 1- Birth Date 2- Individual visits Location 3- Restriction 4- Capacity
1- Attribute 2- Relationship 3- Entity 4- Attribute
A large brick and mortar store uses an information system to speed up the process of calculating and collecting payment from its customers. Here is how it works. The customer provides a list of items they wish to purchase. The system then determines the price to charge for each item by looking up each item in the list of current discounts. If a promotional discount applies, the discount price is used to determine the price to charge. The next step in determining the price to charge is to search the product catalog for each item to see if it is taxable or not. When all items have been priced, the system sends the total purchase amount to the card reader to complete the remaining steps to collect payment. Now match each item below with the role it plays in the data flow diagram for this scenario. 1- Items to Purchase 2- Determine price to charge 3- Customer 4- Collect Payment 5- Product Catalog 6- Total purchase amount
1- Data Flow 2- Process 3- Entity 4- Process 5- Data Store 6- Data Flow
Match these positive or negative software descriptions with the dimension of user experience to which they are most directly related. 1- On the site's home page, there is a prominent 'search' box to help me navigate directly to where I need to be. 2- Links on the page are packed so close together it's hard to see where I need to click. 3- As soon as I load the page, an upbeat track immediately begins to play
1- Findable 2- Accessible 3- Desirable
Several different types of people may have some kind of interest in a software system or application. These people are referred to as "Stakeholders". Match each 'should' below with the stakeholder group to which it is most important. 1- The system should make money. 2- The system should be easy to use 3- The system should be ethical and legal 4- The system should be easy to build and maintain
1- Owners 2- Users 3- Regulators 4- Implementers
Match the descriptions of each component of a system's value proposition with the correct label as described in the lecture video. 1- Things the user or customer wants to avoid 2- Things that would delight the user 3- A list of things the customer or user must accomplish
1- Pains 2- Gains 3- Jobs
Match each type of memory below with its proper category. 1- Random Access Memory (RAM) 2- Magnetic Tape 3- Digital Video Disk (DVD) 4- Cache
1- Primary 2- Secondary 3- Secondary 4- Primary
Match each license type with its description. 1- Only one person can use the software 2- Multiple users can install and use the license 3- Allows users to install the software on a computer on the network or on a home computer
1- Single user license 2- Network User 3- Site license
Match each symptom of group think with its antidote. 1- Illusion of invulnerability 2- Mind guard 3- Self-censorship 4- Stereotyping
1- Unbiased assessment 2- Encouraged Dissent 3- Speak your mind 4- Inclusive Approach
Suppose your internet connection is currently downloading a file at the steady rate of 16 Mbps. At this speed, how long will it take to download a file that is 6MB in size
3 seconds
If a computer's Central Processing Unit (CPU) is operating at a rate of 4.2 GHz that means it is capable of completing how many processing cycles per unit of time?
4,200,000,000/second
Which of these wasteful process conditions could most likely be described as, "Transportation" waste?
A data quality analyst regularly copies data files to her local computer for processing instead of processing them on the server where they are currently located.
One of the first standard coding systems for storing text characters as numbers in a digital computer was called...
ASCII
If a web page has been designed to be, "responsive" we would expect it to...
Adjust its appearance according to the size of the screen on which it is displayed
The instruction below is an example of which programming concept? "If the employee does not clock in on time on their first day then send a text message to the HR director." Otherwise, send the employee a thank you text"
Branching
Which discipline within the area of Data Management is most directly responsible for developing reports and executive dashboards.
Business Intelligence
The following activity is actually a small part of a larger process. Analyze the activity and select the larger process below of which it is most likely a part. "The credit card reader sends a request to the bank to verify that funds are available to make the purchase."
Collect payment
In a typical data life-cycle, once a piece of data is initially captured and recorded, it is often moved into a data 'warehouse' where it can be analyzed in a broader context. The process of moving data to a central location is often described by the acronym, "ETL". What do these three letters stand for?
Extract, Transform, Load
Business Process Re-engineering projects usually result in a continuous series of small, incremental improvements over time.
False
Business rules are important to software developers because they help determine the hours the employee is allowed to work.
False
Given that memory space is now so inexpensive, there is rarely any need or business justification for deleting data.
False
In a Client-Server network architecture, there are several small 'server' computers all focused on making their services (such as data storage, and processing capacity) available to one central 'client' computer.
False
Programming an artificial intelligence system is very difficult because the programmer has to anticipate hundreds of possible scenarios in which the system may need to operate.
False
When a file is sent across the internet, the data travels together as one single stream to minimize the chance that data will be lost in transit.
False
Which part of an operating system is responsible for sending and receiving information to and from the computer?
File manager
"I love geography and a new virtual reality system lets me 'visit' places I never dreamed of seeing in person. It makes me feel almost as if I were actually there." This is an example of which element of the system's value proposition.
Gain Creators
As it relates to software design, the term, "User experience" refers to...
How a person feels overall about the system they are using
The instruction below is an example of which programming concept? "Perform these actions for each newly hired employee."
Looping
To describe units of computing capacity we use Greek prefixes which represent multiples of 1,000. Order the following prefixes from smallest to largest. Giga Tera Mega Peta
Mega, Giga, Tera, Peta
"I despise taking a long time in the grocery store. A new system now lets me scan the bar codes of items as I shop so I don't have to spend as much time scanning them at checkout." This is an example of which element of the system's value proposition.
Pain Relievers
If you r company is using a cloud service provider that manages the operating system you are using but not the applications or the data, then you are using a category of cloud service called...
Platform as a Service (PaaS)
Business Process Improvement is often focused on identifying and resolving the root causes of problems.
True
When developing a data governance framework, all governance policies should support the overall corporate mission.
True
When developing a data governance framework, it is critical to agree on the metrics by which the data function will be measured before establishing individual policies and permissions.
True
The instruction below is an example of which programming concept? "EmployeeHireDate = 5 Aug 2016"
Variables