Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

IP addresses are traditionally written in _____________ notation. A. mnemonic B. dotted decimal C. encrypted D. binary

B

Which type of transmission media can broadcast in baseband mode? A. Wireless transmission B. Coax cable C. Twisted pair cable D. Optical wire

B

A __________ plan specifies how the business will keep providing products and services and generate revenue after an event. A. disaster continuation B. business disaster C. business continuity D. disaster reconciliation

C

A __________ plan specifies how a business will resume after an event to continue its operations. A. disaster reconciliation B. business continuity C. business reconciliation D. disaster recovery

D

Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe? A. Requirements analysis B. Design C. Testing D. Implementation

D

What is the minimum grade of network cable required to transmit 1 Gpbs? A. CAT5 B. CAT3 C. CAT2 D. CAT5e

D

True or False Data breaches are easy to detect.

False

True or False The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix

True

The level of assurance that data will be available to people who need it, when they need it is referred to as: A. Availability B. Integrity C. Confidentiality

A

What is one probable advantage of outsourcing? A. Reliance can be placed on the expertise of outsourcing vendors. B. More control can be exercised over IT processing. C. The organization can transfer its accountability in terms of privacy laws. D. Employee satisfaction may increase.

A

What is the primary duty of a computer support specialist? A. The computer support specialist primarily operates as a trainer and troubleshooter. B. The computer support specialist is mainly responsible for allowing an organization to take full control of its data. C. The computer support specialist primarily identifies and helps clients adopt IT services or technologies. D. The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients

A

Which network topology best handles downed links without losing connectivity between devices? A. Mesh B. Ring C. Bus D. Star

A

Which of the following contains the basic functions of the operating system? A. Kernel B. Applications C. File manager D. Utility software

A

Which part of the CIA triad addresses rules that restrict access to only those who need to know? A. Confidentiality B. Availability C. Integrity

A

Which statement describes the role of a systems administrator? A. Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users. B. Systems administrators are responsible for monitoring an organization's network for security breaches. C. Systems administrators are responsible for designing and developing software that makes hardware and software systems work. D. Systems administrators are responsible for the installation and maintenance of the resources of an organization's network

A

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person? A. Phishing B. Packet sniffing C. Black hat D. Buffer overflow

A

What is the role of a firewall? (Select all that apply.) A. Block outgoing messages to specified destinations B. Block incoming messages from untrustworthy sources C. Block incoming messages from trustworthy sources D. Block outgoing messages to all destinations

A, B

Which of the following describes a computer support specialist's responsibilities? (Select all that apply.) A. Training help desk personnel B. Working the help desk C. Overseeing help desk personnel D. Using statistical and other quantitative methods to gain insights that support the organization's decision-making

A, B, C

Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe? A. Design B. Requirements analysis C. Testing D. Implementation

B

Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10. Which part of the CIA triad has been broken in this scenario? A. Availability B. Integrity C. None of the above D. Confidentiality

B

Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern? A. Resource risk B. Resistance to change C. Contract risk D. Project dependencies

B

What is a primary difference between a modern handheld computer and a modern desktop computer? A. A desktop is more usable. B. A desktop has more processing power. C. A handheld is more usable. D. A handheld has more processing power.

B

What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore'; A. All records from the Patient table B. All records from the Patient table where the patient's last name is "Moore" C. All records from the SQL table D. All records from the Patient table where the patient's last name is not "Moore"

B

What is the purpose of a business continuity plan? A. To develop plans for continued business operations regardless of the circumstances B. To enable an organization to continue offering critical services in the event of disruptions C. To identify who is responsible for permanent growth of the business in the event of natural disasters D. To assess risks for key processes in the event of man-made disasters

B

What is the role of the CPU in a computing system? A. Distributing signals between all the parts in the computer B. Performing instructions of computer programs C. Temporarily storing activities before transferring them to the hard disk D. Permanently storing all data and programs on the computer

B

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information? A. Database information processing B. Data and business intelligence C. Structured query language (SQL)

B

Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages? A. Data lake B. Cloud database C. NoSQL database D. Distributed database

B

Which function would Mei be completing in her database administrator role? A. Managing the telephone system network B. Giving new users access to various databases C. Connecting two or more computers together so they can communicate D. Training employees to use the billing applications

B

Which of the following is not true of Windows and Linux? A. Linux is case-sensitive. B. Windows uses the forward slash (/) to express directory paths. C. Linux places the home directory within the /home/. D. Windows' root directory is referred to by a letter.

B

Which part of the CIA triad addresses the level of assurance that can be given as to how accurate and trustworthy data is? A. Availability B. Integrity D. Confidentiality

B

Which task describes the role of a database administrator? A. Creating, documenting, executing, and manually creating test plans and procedures relating to system anomalies B. Integrating data from legacy systems to newer systems and playing a role in application design and development C. Working with organizations to keep their information systems secure and ensuring integrity, confidentiality, and availability of data D. Organizing people, time, and other resources to make sure projects meet requirements and are completed on time and within budget

B

Which type of computer peripheral is used only as an input device? A. Monitor B. Keyboard C. Docking station D. External hard drive

B

Which functions would someone be completing in their network administrator role? (Select all that apply.) A. Training employees to use the billing applications B. Connecting two or more computers together so they can communicate C. Giving new users access to various databases D. Managing the telephone system network

B, C

Unstructured data refers to data that is_____________. (Select all that apply.) A. coded in a way that makes it easy to convert into a form usable for analysis B. possibly stored in a format that is not easily decoded C. more complex D. more time consuming to parse through to retrieve the essential information

B, C, D

Which of the following would be a disadvantage of an ethical code of conduct? (Select all that apply.) A. It is legally binding. B. It may not apply to new issues. C. It is entirely voluntary. D. It has no legal impact.

B, C, D

Which role is responsible for maintaining websites? A. Data analyst B. Network engineer C. Web administrator D. Cloud architect

C

Which statement about the systems analyst role is accurate? A. The role includes choosing appropriate network hardware. B. The role includes planning the allocation of network addresses across an organization. C. The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements. D. The role includes securing an organization's network

C

Which statement describes the role of a network administrator? A. Network administrators have a long list of essential responsibilities but mostly focus on the design, development, and support of database management systems. B. Network administrators are accountable for the installation and maintenance of the resources on a network. C. Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network. D. Network administrators are responsible for maintaining websites

C

Which statement is not true of compilers? A. All errors must be debugged before a compiler can compile the source code. B. Perl and Python are examples of programming languages that use an interpreter. C. Compilers do not translate source code into machine code. D. Interpreters translate and execute one line of source code at a time.

C

Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario? A. Confidentiality B. None of the above C. Availability D. Integrity

D

Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern? A. Scope creep B. Resistance to change C. Resource risk D. Project dependencies

D

Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern? A. Scope creep B. Project dependencies C. Contract risk D. Resource risk

D

Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern? A. Resource risk B. Scope creep C. Project dependencies D. Contract risk

D

Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario? A. Confidentiality B. None of the above C. Integrity D. Availability

D

The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? (Select all that apply.) A. Mei should use the same selection criteria for all candidates. B. Mei should ask a colleague to sit in on the interview with Mary's daughter. C. Mei should ask a colleague to interview Mary's daughter. D. Mei should not discuss the job with Mary.

A, B, C, D

Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? (Select all that apply.) A. Both Tom and Mei should disclose the conflict of interest. B. Tom and Mei should not discuss details of the contract outside official channels. C. Tom should resign from the software production company. D. Mei should not disclose details of offers by any respondents to the RFP.

A, B, D

The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? (Select all that apply.) A. Mei should follow both HIPAA and state privacy protocols. B. Mei should only follow HIPAA guidelines and disclose information about A.J. to law enforcement. C. Mei should follow the protocol advised by the medical council of her state. D. Mei can disclose information about A.J. only with a warrant.

A, C

Which actions might be used to support the hardening of the systems you work with? (Select all that apply.) A. Use a random password generator and change your passwords frequently B. Expect your system administrator will take care of the security of all systems C. Maintain an antivirus system D. Click on links in an email from a person you do not know E. Install security patches as they become available

A, C, E

What is another title for a web administrator? (Select all that apply). A. Web server administrator B. Cybersecurity specialist C. Web developer D. Webmaster

A, D

True or False Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information

True

True or False Data includes raw facts or observations, and given context, becomes information

True

True or False Most of the data stored today are unstructured and include things such as text, blogs, clickstreams, tweets, and audio. This data is not organized in a way that allows for analysis

True

What is the tool used to encode a document while focusing on appearance known as? A. URL B. HTTP C. HTML D. DNS

C

When you visit Mei's office's website, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other previous activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers? A. No, patient information could be leaked B. No, they impede the user interaction with the website. C. Yes, as long as the patient regularly clears cookies from their machine. D. Yes, the cookies allow a web application to respond to the user as an individual.

D

Which are examples of structured data? A. Telephone number B. Date of birth or transaction C. First and last name D. All of the above

D

Which tool resides between the client and server to protect the client from adverse actions of the server? A. Router B. Antivirus software C. Auditing software D. Proxy server

D

Which type of systems testing includes having developers test internal structures of software? A. Beta B. User acceptance C. Analysis D. White-box

D

Why is merging unstructured and structured data essential? A. Both types of data contain essential information. B. Most of the data stored today is unstructured. C. Better insights and discovery of hidden connections in data sets help strengthen decision-making. D. All of the above

D

True or False Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs)

.True

As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's: A. Business plan B. Information security plan C. Risk management plan D. Business continuity plan

A

As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct? A. It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people. B. It outlines what is not acceptable use of computers. C. It provides a legal mechanism for prosecuting unethical people. D. It can be used by companies to train professionals how to act.

A

Facts gathered from observations or from a clock that measures time are examples of data. What is not an example of data? A. It is cold outside B. 18:30 C. On/off D. 9:30 a.m

A

Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Requirements analysis D. Implementation

A

Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern? A. Budget risk B. Scope creep C. Resource risk D. Contract risk

A

Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern? A. Budget risk B. Project dependencies C. Scope creep D. Resistance to change

C

What does the acronym CIA stand for in cybersecurity? A. Central Intelligence Agency B. Confidentiality, intelligence, accessibility C. Confidentiality, integrity, and availability D. Cybersecurity, internet, accessibility

C


Conjuntos de estudio relacionados

Jahreszahlen - Urgeschichte bis zur Gegenwart - MIT Erklärung

View Set

Computer Output Quiz for Exam 1-CGS2060

View Set

PEDs Chapt 25 Nursing Care of the Child with a Hematologic Disorder

View Set

ABDwall & Diaphragm & Peritoneal Cavity (WB)

View Set

GROWTH & DEVELOPMEMT CH. 6 REVIEW

View Set

Unit 3 - Ch. 18: Planning Nursing Care

View Set

compensation administration chapter 17

View Set

Physics Chapter 18 Direct Current Circuits

View Set