WGU C182 FInal Exam Study Set, Intro to IT practice Test A and B , INTRO TO IT PRACTICE QUIZ
Which of the following statements best describes the difference between information systems and information technology?
An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.
Which action by application programs requires support from an operating system?
An internet browser displays a web page.
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?
Data
What is the definition of information technology (IT)?
It is the technology used to create, maintain, and make information accessible.
What is the definition of information technology?
It is the technology used to create, maintain, and make information accessible.
In a SQL query, the __________ operation combines two tables together?
JOIN
SQL (Structured Query Language), a query for databases, was invented by?
IBM
With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere.
IaaS (Infrastructure as a Service)
Which of the following best describes the differences between memory and the hard drive?
Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
What is another term for a formula that outlines how to execute a task?
Algorithm
Which system requirement is an example of considering user needs in the design of an information system?
Allowing secure access to customer account information
A local area network (LAN)
Allows hardware sharing within one office
Writes laws dealing with information technology
Outside of the role of an IT professional association
This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications
PaaS(Platform as a Service)
which form of cloud computing enables teams of developers to quickly and reliably develop and deliver applications by accessing the same environment in real-time.
Paas or Platform as a Service
Engages in best practices for information systems
Part of the role of an IT professional association
Provides professional standards for ethical behavior
Part of the role of an IT professional association
Each computer is roughly equal to every other computer.
Peer-to-peer
What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?
Ports
Which characteristic identifies application software that is cloud-based?
Provided by third-party providers
What is part of the role of an It professional assocation?
Provides professional standards for ethical behavior.
Temporarily stores data before it is processed and sent to your screen or printer.
RAM
Volitile memory that disappears when the computer is turned off or loses power.
RAM
Which is found on the motherboard and stores information, but the information is not permanent?
RAM
________________ is a general term that describes any attack that takes advantage of humans' trusting nature.
Social engineering
Which two software application packages would be classified as productivity software?
Spreadsheet program and word processor
Which data type is used to represent product order code that comprises alphanumeric characters?
String data
The device that permits information to move between each component.
The bus
During which generation did computers begin to see widespread use in business?
Third generation
In which generation were silicon chips first used in computers?
Third generation
What is the database administrators role in security?
To institute protocols to protect the databases from external threats.
A service portfolio is simply a list of the services the department offers?
True
The selection operation takes rows from one table and creates a new table?
True
The abbreviation "URL" indicates:
Uniform Resource Locator
Which type of systems testing includes having developers test internal structures of software?
White box
Which component facilitates communication between the other two components in the MVC architecture model?
controller
What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?
copyright
Which item is a storage device?
flash drive
Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.
high level language
What does http stand for?
hypertext transfer protocol
Android, Chrom, and iOS are common operating systems for which type of computer?
mobile devices
The name, address, and telephone number of each individual patient in Dr. Alan's office is known as a:
record
the programs and other operating information used by the computer
software
proprietary software produced by a company that commercially markets software
software house
what type of computer still uses silicon chips?
tablet
While hardware is ______, software is ______
tangible and intangible
Which data format is not in an easily usable format and takes greater effort to extract?
unstructured
The people who use the computer system
users
What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system?
utility software
Which of the following would NOT be considered hardware?
word processor
Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply.
-By knowing the purpose, the developer can determine how many fields are needed in the database. -The purpose determines the structure of the database. -The developer can determine which data types would help fulfill the purpose.
Which of the following describes the knowledge stage in the DIKW model? Number of hours worked by an employee. A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions. Average number of hours worked by department. Report on employee attendance.
A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.
Which action by application programs requires support from a networked operating system?
An Internet browser displays a web page.
What is the main difference between a compiled language and an interpreted language?
An interpreted language runs inside of a special environment called the interpreter.
A stand alone entity that would be programmed to handle its own internal methods as well as messages received from other objects.
An object
What are two necessary elements of business continuity planning?
Assessing key organizational activities. Identifying risks that may occur
Which goal of information Assurance (IA) requires that information is accessible when needed?
Availability
The basic operating system that runs when a computer is first turned on. It runs test of memory and the cpu,and initilizes hardware components so that the actual Operating system can be loaded from the hard disk.
BIOS ROM
What type of information processing allows input data to be accepted as a set of records and processed as a unit?
Batch processing
Less reliance on internal IT expertise.
Benefits of cloud computing
Which statement is NOT true of compilers and interpreters? All errors must be debugged before a compiler can compile the source code. Interpreters translate and execute one line of source code at a time. Perl and Python are examples of programming languages that use an interpreter. Compilers do not translate source code into machine code.
Compilers do not translate source code into machine code. A
Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law.
Computer Fraud and Abuse Act
Select the statement that best describes the difference between software and hardware.
Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product.
Which two components are parts of a central processing unit?
Control Unit (CU)
Retrieves instructions and raw data (input) and manages the transmission of the instructions and data to the alu.
Control unit
Which two components are parts of a central processing unit (CPU)?
Control unit (CU) Arithmetic logic unit (ALU)
Which benefit is provided by a computer network in a business?
Cost for hardware resources are decreased.
What is an advantage of outsourcing?
Cost-effective if time is constrained
Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?
Costs for hardware resources are decreased
Which risk assessment question is part of the Initiation Phase?
Could the end users reject the outcome of the project?
Which risk assessment question is part of the initiation phase?
Could the end users reject the outcome of the project?
Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?
Data
Which of the following best describes a hierarchical database format?
Data are modeled using parent-child relationships.
An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?
Data mirroring
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
Data mirroring
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
Data mirrorring
What is the purpose of the End User License Agreement for a commercial software package?
Establishes the customer's right tot use the software.
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?
Expanding the infrasturcture to support additional locations.
Which of the following best describes the purpose of expansion slots in modern computers?
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
Which two computer peripherals are connected to the computer through a port?
External microphone and USB flash drive
The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.
FROM
Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?
FROM
Which sql clause is used to inform the database management system which table should be interrograted by the query?
FROM
Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast.
False
The four computers based on size and processing speed are supercomputers, workstation, mainframe, and microcomputer.
False
_____________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Waterfall Prototyping Extreme programming Agile methods
Agile methods
Which of the following statements represents the relevant characteristic of quality data? Select all that apply. The data used applies to the question being answered. The data has been gathered using consistent, detailed collection processes. The data has been inputted correctly and is accurate for its intended use. The data is current enough to still serve its purpose for being accessed.
All of the above
Which of the following are the three main categories of databases?
Hierarchical , Flat File, Relational
What is a tree-like structure of records in a database referred to as?
Hierarchical database structure
A monitor is a peripheral device for what system?
I/O (input/output)
A scanner is a peripheral device for what system?
I/O (input/output)
What indicates a specific Internet location?
IP address
Which department supports day-to-day technology needs of an organization?
IT
Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere
IaaS (Infrastructure as a Service)
Which cloud service provides all the resources (servers, data storage) tha an IT dept needs ouside of the org making them accessible by anyone, anywhere
IaaS or Infrastructure as a Service
What are two necessary elements of business continutiy planning?
Identifying risks that may occur
A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following?
Image backups
Which system requirement is an example of considering user needs in the design of an information system?
Allowing easy access to customer account information.
Which statement correctly describes the operating system?
Allows the user to control the actions of the software, and through the software, to access hardware
Which term is defined as a collection of information used to support management of an organization?
Information system
What is the correct order of project phase for Project Management?
Initiation, Planning, Executing, Closing
What does the acronym IPOS stand for?
Input, process, output, storage. (IPOS) represent the different tasks of computers.
What is another term that defines a script?
Interpreted program
What is one of IT's role in golobalization?
It allows companies to reach a wider customer base.
What is one of IT's roles in globalization?
It allows companies to reach a wider customer base.
What is the purpose of an IT department?
It helps the organization achieve strategic goals.
What effect does scope creep have on a project?
It increases unplanned costs for the project.
Read the following scenario and determine the best hardware or software solution for the situation. Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.
Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.
In which type of network topology is each networked device directly connectd to every other networked device?
Mesh
In which type of network topology is each networked device directly connected to every other networked device?
Mesh
Which of the following technologies was introduced in the fourth generation of computers?
Microprocessors
What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?
Moore's law
Which IT position has the responsibillity of working with routers and switches?
Network Administrator
Which of the following statements describes why network protocols are necessary.
Network protocols are necessary for computers to communicate with each other.
Which of the following is/are true of the IPOS cycle?
Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.
What is the difference between proprietary and open-source software license?
Open-source software can be freely modified whereas proprietary software cannot be modified.
__________ uses the concept of reflection of light through a core made up of glass or plastic.
Optical wire
What are the risks of cloud computing?
Org becomes dependent on the reliability and performance of a third party vendor.
Which type of systems conversion involves starting the conversion with a portion of end users?
Pilot
In what phase of a project does time estimation occur?
Planning
What is the difference between processing and storage?
Processing collects and translates data into useful information, while storage places the translated data in specific locations.
What is the difference between processing and storage?
Processing involves temporary information, while storage involves permenant information.
What is the difference between proprietary and open-source software license?
Proprietary software has a cost whereas open-source software is free.
___________ is ephemeral, meaning data stored is lost when the computer is powered off.
RAM
What does RFID stand for?
Radio frequency identification device
Which communication medium is typically used when sending data transmissions over very long distances?
Radio signals
Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?
Radio signals
a dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?
Reliable
What is one probable advantage of outsourcing?
Reliance can be placed on the expertise of outsourcing vendors.
Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?
Resource path ID
Which part of a Uniform Resource Locator identifies the location of the document on the server?
Resource path id
Which of these is NOT a category of risk in a project Risks in execution Risks in integration Risks in deployment Risks of the unknown
Risks in deployment
Which device permits packet switching so that a message can be routed to the next link in a network?
Router A router is a device that permits packet switching in order to send messages to the next link in the network.
Which two are both types of scripting languages?
Ruby and Python
The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in).
SELECT
Thru this CLOUD computing function, businesses can access and use software through the Internet?
SaaS (Software as a Service)
What is a cloud model that delivers third-party software such as email or games through the internet?
SaaS (Software as a Service)
What allows an organization to use software through the internet?
Saas or Software as a Service
what cloud service provides access and use of software to businesses through the internet?
Saas or software as a service
Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?
Security Breach Notification laws
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?
Security Breach Notification laws
What type of software permits free temporary use followed by long term activation for a fee?
Shareware
What type of software permits free temporary use followed by long-term activation for a fee?
Shareware
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards?
Slots. Incorrect answers: Hard drives. Bays. Ports.
Which of the following types of information present a threat to someone's privacy?
Student ID and credit card numbers
Which statement describes the role of a systems administrator?
Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
Which language is often used for rapid prototyping and the creation of GUIs?
TCL
Which two languages have traditionally been used for automation rather than software development?
TCL and Python because they are scripting languages
Which of the following statements best defines the ALU?
The ALU processes the raw computer data, including mathematical calculations and logical operations.
Which of the following statements best defines the CPU?
The CPU controls the speed at which instructions are retrieved and processed in the computer.
Which of the following best describes the Internet?
The Internet is a global network of networks.
Also known as the chassis or cabinet.
The case of a computer
What indicates a specific internet location?
The ip address
Allows the user to control the actions of the software and through the software, to access hardware.
The operating system
controls the speed at which instructions are processed.
The system clock
What is the role of drivers in facilitating communication between application and databases?
They allow the ODBC to be used for interactions with the database and applications.
What is the role of drivers in facilitating communication between applications and databases?
They allow the application to interact with the database.
Which of the description of duties below would be for a System Administrator? This individual has responsibility for developing new software applications to improve the functionality of an organization's information technology. This individual is in charge of ensuring that the network is working properly. Duties may include connecting devices using cable, configuring individual employee computers, working with the network hardware, and troubleshooting. This individual has responsibility for all aspects of an organization's databases and database management systems. This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system
Why is it important to ensure that data support business goals?
To aid in making strategic decisions
Why is it important to ensure that data support business goals?
To aid in making strategic decisions.
What is the purpose of a business continuity plan?
To enable an organization to continue offering critical services in the event of disruptions
What is a role of the systems administrator?
To install and maintain network resources
What is the role of the systems administrator?
To install and maintain network resources.
What is the database administrator's role in security?
To institute protocols to protect the databases from external threats
Which is not a common operating system used today? Windows Top Hat Mac Linux
Top Hat
Which description explains the role of a domain name system (DNS)?
Translates human-readable aliases into IP addresses
A service portfolio is simply a list of the services the IT department offers.
True
IT functions cover these five different domains: communication data collection and management information security management consumer relationship management process improvement
True
In the SDLC implementation phase, the design goes to the programmers who translate it into code to execute the plan.
True
In the design phase of the SDLC, architects think about the components they would need to solve the problem or implement the plan.
True
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off?
True
Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files.
True
The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document.
URL
Which of the following are operations used to alter the data within a relation of a database?
Update, Delete, Insert
Which action would support confidentiality?
Updating security software.
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
User Acceptance
During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders.
User Acceptance Testing
The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.
WHERE clause
What is outside of the rold of an IT professional assocation?
Writes laws dealing with information technology
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario?
data
Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?
data
in the dikw, what is data?
data is the input directly received by human or computer.
What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as?
database
permits database access across a network. Performs tasks such as data analysis, data manipulation, security, and archiving.
database server
A ____________ is also known as a datasheet.
database table
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
desktop
computer with the most amount of performance capability
desktop
________, sometimes referred to as middleware, facilitate the communication of hardware and software.
device driver
a piece of the operating system that provides specific interfaces between the OS running a computer and hardware.
device drivers
consists of long term storage devices
disk drives
Translates human readable aliases into IP addresses
domain name system (DNS)
software more specific towards artists and graphic designers
drawing software
This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME?
email server
________ is defined as a code of moral conduct or a set of principles that govern behavior?
ethics
Which of the following type of transmission is paired correctly with the given media?
fiber optic cable - light impulses
a computer with a large hard disk storing files that any or many users of the network may wish to access.
file server
What generation used vacuum tubes in computers?
first generation
software free from purchase, but not necessarily free in how you use it.
freeware
what types of software is ususally software that has become obsolete because a new software has replaced it, or is software that the original producer no longer wants to maintain and provide support for?
freeware
How long has Moore's law continued to be a trend?
from 1965 to the present
like a web server, this server host files and allows clients to access those files. However, it instead provides access in the form of uploading and downloading files.
ftp server
computer that has the least amount of performance
handheld
The physical components of a computer
hardware
in dikw, what is wisdom?
having both knowledge and experience
Which motherboard component helps cool the CPU?
heat sink
Which motherboard component helps cool the cpu?
heat sink
This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure).
hierarchal
Which factors should Mike NOT consider when choosing a file organization system? Hierarchy Scalability Security Data retrieval speed
hierarchy
Includes all peripheral devices for input, output, storage and network.
i/o subsystem
a location beacon that uses bluetooth technology and can be embedded in any location aware mobile device.
iBeacons
data that has been processed
information
in dikw, what is information?
information is inferred from data, meaning that one or many processes have been applied to the data to tranform it into a more useful form.
Which term is defined as a collection of information used to support management of an organization?
information system
The business case, feasibility study, and stakeholder input are 3 key elements of which project phase?
initiation
What four operations does a computer perform?
input
what does ipos stand for?
input, process, output, storage
Relies on a session and allows you to test out an idea because they are executed as they're written.
interpreter
loaded when the computer is first booted, included components that handle process mgmt, resource mgmt, and memory mgmt
kernel
As a new sales manager, Edgar is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Edgar working?
knowledge
In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?
knowledge
which is a characterisc of high level languages?
language translator programs are required.
computer that has the mid amount of performance capability
laptop
software stored on an individual computer
local application
What is NOT part of data hygiene? Data is valid Lots of data Free from malicious or inadvertent tampering Data is good
lots of data
A program written in a high-level language must be converted into __________ code to be executed by the computer.
machine
Which low-level language corresponds one to one with assembly?
machine language
Which low-level language corresponds one-to-one with assembly?
machine language
a programming language that is a lengthy list of 1s and 0s.
machine language
A single chip process developed in 1974 by IBM
microprocessor
a collection of computers and resources connected by various media so they can communicate with each other.
network
Which IT position has the responsibility of working with routers and switches?
network administrator
Is moore's law an observation or a physical law?
observation
software created in the open source community and made freely available as source code
open source
This type of software is made freely available as source code.
open source software
What is a program that will allow a computer to easily access the hardware and software of the computer system?
operating system
Each computer is roughly equal to every other computer.
peer-to-peer
Which type of systems conversion involves starting the conversion with a portion of end users?
pilot
The fetch-execute cycle is performed in an overlapped fashion on several instructions.
pipelines cpu
In what phase of a project does time estimation occur?
planning
Project managers work with project scope, the management plan, and SMART frameworks in this project phase?
planning
Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?
planning
During this phase of Project Management, the projects scope and project management plan are defined
planning phase
Can connect additional input, output, storage, and communication devices
ports
On which tier of the n tier architecture model are user interfaces developed?
presentation
Which field must contain a unique value in order for a relational database table to function?
primary key
An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?
printer
An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used?
printer, monitor
also referred to as horizontal software
productivity software
consists of applications that are usefule to everyone such as word processor, presentation software, spreadsheet program, database mgmt systems, calendar program, address book, and data organizer.
productivity software
commercial software purchased from a vendor
proprietary
Which characteristic identifies application sotware that is cloud based?
provided by third party providers
The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need?
proxy server
Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.
proxy server
what type of server has the capability of blocking specific servers and rejecting responses that contain certain content?
proxy server
Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk?
public
software that has been moved into the public domain and are made available as executables.
public domain
in dikw, what is knowledge?
refined information that hte user of the knowledge is able to call forth only relevant portions of information when needed.
This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables.
relational
Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier?
relational database
which characteristic of quality data requires data being used to be applied directly to the decision being made.
relevance
characteristic of quality data whereas data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer based systems or a combination.
reliable
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?
router
perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?
scripting languages
What generation of computers began to use transistors?
second
Which one of these is NOT a operation for database queries? Union Serve Product Join
serve
dedicated computers within a network whose function is to respond to network requests and provide a network service
server
works with hardware to provide a network service, types of software includes web servers, email servers, and database servers
server software
What do integrated circuits need to function?
silicon chip
can insert modem cards, wireless access cards, and other PC cards such as camera cards
slots
Which is a type of two-factor authentication?
smart card
What does the GOTO statement create?
spaghetti code
In this network topology ALL devices have a single point-to-point connection with a central device.
star network
Which data type is used to represent product order code that comprises alphanumeric characters?
string
What replaced the GOTO statement with high level control constructs such as while loops, and if-else statements, and is not allowed to use the GOTO statement?
structured programming
Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system?
system
Which software is run automatically rather than by the end user?
system software
progams that make up the operating system and directly supports the computer system itself.
system software
programs that allow the user to monitor and improve system performance
system utilities
A collection of protocols that is sometimes referred to as a protocol stack
tcp/ip
The circuitry and electrical channels that enable communication among the electronic components.
the bus
The myriad of types of devices that can and will be connected to the internet in the next few years.
the internet of things (IoT)
When a programmer enters a command, what converts that command to machine language and executes it?
the interpreter
sits on top of the hardware and is the interface between hardware and software
the kernel
the printed circuit board that houses the cpu, memory chips, and expansion cards in any computer.
the motherboard
What generation of computers introduced operating systems?
third
what generation of computers introduced the silicon chip?
third
In which generation were silicon chips first used in computers?
third generation
characteristic of quality data whereas data must be complete and not contain errors or lapses of data.
thorough
There are how many tiers of ISPs?
three
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering?
timely
characateristic of quality data where data is provided efficiently and on time so that companies can utilize it in their business.
timely
hat is the role of a web server
to respond to HTTP requests
a requirment of all computers to communicate over the internet
transmission control protocol/ internet protocol or TCP/IP
the ability to have computation anywhere at any time
ubiquitous computing
Software used by select groups with an organization or to a specific discipline such as music sequencers, samplers, and digital recorders for muscians.
vertical software
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
virtual machines
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing mutiple computers.
virtual machines
The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP
web server
The scope of the project is considered what?
work that needs to be done
Learning about social engineering and how to protect passwords is ___.
Education
Pieces of the operating system that run in the background all of the time
daemons or services
What does BIOS stand for
Basic input output system
Which is a characteristic of high-level languages?
The source code has to be complied.
an interface for the user that provides access to the kernel
the shell
A petabytes consists of how many terabytes?
1000
A typical database application has how many layers?
2
Which is true of databases and the application that interact with them?
Applications are interdependent with the database.
What is the definition of a Platform as a Service (PaaS)?
A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
What statement is true concerning compiled and interpreted computer language?
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
Which of the following is the best definition of a computer network?
A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Which of the following is an accurate definition of a computer system?
A computer system is a collection of hardware and software components that work together to meet the needs of the user.
Which of the following is an example of a relational database?
A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.
What is a primary difference between a modern handheld computer and a modern desktop computer?
A desktop has more processing power.
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?
A desktop has more processing power.
Which of the following would NOT be the responsibility of the system administrator?
Answering e-mails from potential customers.
51. Which is true of databases and the applications that interact with them?
Applications are interdependent of the database
A company's ability to recover after a disaster is directly related to which of the following?
Business continuity plan
What is the definition of business intelligence?
Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage.
Over the years, the number of transisters that can be placed on a chip has increased by how much?
By orders of maginitude rather than linearly
In 2nd generation computers, which of the following high-level programming languages was created to be business-oriented?
COBOL
What are the main components in a computer?
CPU
Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.
CPU
also referred to as "the chip"
CPU
The __________________ is the electronic circuit responsible for executing computer program instructions.
Central Processing Unit
One computer will request information from another computer, which responds with requested information.
Client-server
What is the purpose of an End User License Agreement for a commercial software package?
Establishes the customer's right to use the software
Read the following scenario, and then select the job title that most accurately depicts the descriptions. Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively.
Database Administrator
Which two are parts of an information system?
Databases and Networks.
In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan.
Design
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
Desktop
Which answer most accurately describes the timeline of computer development? First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced. First, Graphical User Interface systems are introduced. Next, limited use of computers by large organizations. Next, computers built and programmed by engineers. Lastly, introduction of the personal computer. First, limited use of computers by large organizations. Next, computers built and programmed by engineers. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced. First, computers built and programmed by engineers. Next, Graphical User Interface systems are introduced. Next, limited use of computers by large organizations. Lastly, introduction of personal computers.
First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.
Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
Flat File Database
What are the three main categories of databases?
Flat file, relational, and hierarchal
What are the three main categories of databases?
Flat file, relational, hierarchal
What two types of software licenses are free?
Freeware and Open source
What is the measurement unit used to identify clock speed on today's computers?
GHz
Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?
GOTO
What does GUI stand for?
GUI stands for Graphical User Interface.
how does a compiler work?
It requires the components of the software to be defined from the onset.
How does an interpreter work?
It takes the most recently entered instructions, converts it into machine language, and executes it.
All of the following are compiled languages except for: Javascript BASIC Java C++
JavaScript
In which category of the DIKW hierarchy would business intelligence be located?
Knowledge
All of the following are parts of a URL except for: LAN Protocol Host name TLD
LAN
In a __________ shell forward slash (/) is used to express directory paths?
Linux
What is true about the Linux operating system?
Linux runs on both servers and workstations
Which of the following would NOT require the use of a network?
Loading a statistical program on your personal computer.
What is the difference between a compiled and interpreted computer language?
compiler translates an entire program into executable progam which can be run at a later time, while the interpreter does this incrementally.
excluse right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.
copyright
A set of rules established to govern how people behave and interact with each other
a protocol
What was the operation system called in the early 1960s?
a resident monitor
Which is NOT part of the history of the computer? Abacus Leibniz Punch cards Abracadabra
abracadabra
characteristic of quality data whereas data is captured once only, where possible, and captured as close to the point of activity as possible.
accurate
sometimes referred to as root or superuser
administrator account
What is another term for a formula that outlines how to execute a task?
algorithm
During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system?
analysis
Which type of software includes programs such as Microsoft Word and PowerPoint?
application
consists of programs that end users run to accomplish tasks. An example of a type of this software includes the email client, web browser, and ftop client
application software
Completes mathematical calculations and logical operations to process the data, converting the input of keyboard text entry to output displayed on the screen.
arithmetic logic unit
An early language translator that would translate an assembly program into machine language.
assemblers
Which goal of Information Assurance (IA) requires that information is accessible when needed?
availability
Houses CDs and DVDs, typically located on the front of the system unit for easy access.
bays
In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released.
beta
Refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.
big data
______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use?
big data
Which technique uses all possible combination of letters and numbers to crack a password?
brute force
Which technique uses all possible combinations of letters and numbers to crack a password?
brute force
As a part of effective IT governance, the IT plan should be consistent with the organization's what?
business plan
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database?
character string
One computer will request information from another computer, which responds with requested information.
client-server
The team will write a final report detailing the processes and outcomes of the project in which project phase?
closing
A ________ translates source code into machine language and translates the entire program, creating an executable program which can be run at a later time.
compiler
Requires that the componenets of the software all be defined from the onset and is considered to have more efficient code.
compiler
protects an original work, but no the ideas behind the work
copyright