Intro to IT

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system

1. Which of the description of duties below would be for a System Administrator? *

Almost anyone can be a computer user today whereas in the past only computer scientists and those with specialized training used computers.

10. How have computer users changed over the last 75 years? *

Scripting Language

100. Cassandra is developing a method to register conference attendees by extracting the attendee's information and saving it to a database. The information is obtained from the conference website and once they click submit the information is saved to the database and a new confirmation webpage is generated showing the attendees specific information.

*

100. Which of the following operators is used to select all of a certain data? 1/1

Network protocols are necessary for computers to communicate with each other.

11. Which of the following statements describes why network protocols are necessary. *

SYSTEM

13. Which software consists of programs such as daemons and a scheduler? *

are easier to use

14. Today's operating systems *

shell

17. Which layer of the operating system provides access to the kernel? *

create new user accounts and delete obsolete user accounts

18. Which of the following is a role for an system administrator? *

Common Knowledge

20. Which of the following is NOT a common security classification?

The protocol, the domain name, and the resource or file name.

21. A Web page's URL (Uniform Resource Locator) has three main parts: *

A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

22. Which of the following is the best definition of a computer network?

fiber optic cable - light impulses

23. Which of the following type of transmission is paired correctly with the given media?

router

24. Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network

The role of the server is to take requests from the client and send back the requested information.

26. In a client-server network, what is the role of the server? *

web server

27. Which of the following servers responds to HTTP requests on the Internet?

proprietary

28. What software can be purchased from a vendor (from a company or a consultant) and gives you the right to use the software but is not yours to own?

script

29. These are typically fairly short and the instructions are relatively simple (as compared to applications or systems software). Have traditionally been used more for automation than for software development. *

Utility Programs

30. What is a program that allows the user to monitor and improve system performance?

Freeware and Open source

31. Which two types of software licenses are free?

patents

34. Which of the below prevents others from making, selling, or using the invention for 20 years from the application filing date.

Relational Database

36. A database structure containing multiple tables (relations) with interrelated fields

A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.

37. Which of the following is an example of a relational database? *

compiler

38. A ________ translates the entire program into machine language. *

Takes the most recently entered instruction, translates it into machine language, and executes it.

39. Which of the following is the correct function of the interpreter?

A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.

4. Which of the following describes the knowledge stage in the DIKW model? *

Preliminary Investigation

40. During this phase of the SDLC (system development life cycle) expected costs and benefits of the new system are estimated to see if it makes sense for the organization to proceed with the new system

Compiler and interpreter

41. Which of the following are types of language translators?

C and Pascal

42. Identify two high-level compiled programming languages?

Analysis

43. During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system

SaaS (Software as a Service)

44. Thru this CLOUD computing function, businesses can access and use software through the Internet

IaaS (Infrastructure as a Service)

45. Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.

select

46. The _______ keyword of SQL is used to inform the DBMS what fields or attributes are of interest and where they are located

SELECT First Name, Last Name FROM Students WHERE Major = "CIT";

47. If YOU wanted to determine and have the names of students who are were CIT majors the query would look like:

relational

47. This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations). *

update

48. The SQL command _______ is used to modify the data that already exists in a table within a database

big data

49. ______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use

Information

5. Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working? *

Cost savings

51. What are advantages of a network?

dns

52. In order to translate from an IP alias to an IP address, which of the following is used?

Social engineering

52. ________________ is a general term that describes any attack that takes advantage of humans' trusting nature.

Identifies the server on which a web page can be found.

53. Which is part of the definition of Domain Name?

Uniform Resource Locator

54. The abbreviation "URL" indicates:

router

54. Which device permits packet switching so that a message can be routed to the next link in a network?

Mbps to Gbps

55. What is the typical bandwidth of today's networks?

All messages require a response from the destination machine to the sending device.

57. Which of the following statements is not part of the path a message takes from one computer to another?

Specific, measurable outcomes the organization plans to achieve

58. Which of the following defines the organization's goals?

gateway

58. Your site's Internet point of presence is called a:

Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.

6. Which of the following descriptions best represents the reliable characteristic of quality data? *

Meeting the company's specific needs

60. What is an advantage of building a solution in-house?

Meeting the company's specific needs

61. What is a disadvantage of buying a solution from another company?

Assessing critical operational activities

62. Which of the following is the first step in creating a business continuity plan?

Image backups

63. A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?

Cloud computing

64. Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?

The need to easily calculate missile trajectories

65. Which factor contributed to the development of the first generation of computers?

A Platform as a Service is the ability to quickly and consistently develop and deliver applications.

66. What is the definition of a Platform as a Service (PaaS)?

microprocessors

66. Which of the following technologies was introduced in the fourth generation of computers?

SmallTalk

67. Which of the following programming languages first introduced the concept of object-oriented programming?

cobol

69. Which of the following high-level programming languages was created to be business-oriented?

Input, process, output, storage.

7. What does the acronym IPOS stand for? *

Taking current from external wall outlets.

71. Power connectors are responsible for which of the following?

The ALU processes the raw computer data, including mathematical calculations and logical operations.

72. Which of the following statements best defines the ALU?

A computer can only run programs if it has a sufficient amount of memory.

73. Which statement accurately describes memory?

RAM runs tests of memory and the CPU, and initializes hardware components.

74. The following statements accurately describes RAM except:

The CPU controls the speed at which instructions are retrieved and processed in the computer.

74. Which of the following statements best defines the CPU?

thousands of books

75. Which of the following is an example of what 1 GB would store?

ROM is long-term memory.

75. Which of the following statements accurately describes read only memory (ROM)?

ram

77. Which is found on the motherboard and stores information but the information is not permanent?

Initiation

82. Problem definition, resource allocation, and risk assessment are 3 key elements of which project phase?

Project

83. An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the?

Executing & Controlling

83. Project managers use variance reports, status reports, and resource allocation reports in which project phase?

Initiation

84. Which project phase defines the problem or opportunity that the project is expected to address?

Closing

85. The team will write a final report detailing the processes and outcomes of the project in which project phase?

Initiation

85. Which project phase assesses the risks and benefits of a project?

initiation

86. Which project phase determines what resources are available to meet the project needs?

Initiation

87. Determining the project scope or the work that needs to be completed is in what project phase?

user needs

87. During analysis, which system requirement includes features that will satisfy end user needs?

Accessibility

88. During analysis, which system requirement ensures that the system is accessible to all users?

The work that needs to be done

88. The scope of the project is?

beta

89. During implementation, which testing method is performed by the end user (in a limited fashion) using actual data in the real working environment?

First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.

9. Which answer most accurately describes the timeline of computer development? *

Alpha testing uses simulated data

90. During implementation, how is alpha testing different from beta testing?

Deployment

90. When does system conversion (direct, parallel, pilot, or phased) occur?

user acceptance

91. During implementation, which testing assesses whether the system functions and is useful?

Existing systems in the organization

91. When integrating a new system within an organization, what will it interact with?

Unique identifier

92. In order for a database to work, at least one of the fields has to contain unique values. What is the name of this field?

Flat File

93. Which of the following database categories is the most similar to a spreadsheet or MS Excel document?

By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The developer can determine which data types would help fulfill the purpose.

93. Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply.

design, development, and DBMS support

94. What is the focus of the list of responsibilities for database administrators?

High-level management

95. A business intelligence system is used by which of the following groups of people?

SQL

97. Which of the following is an scripting interface between a database and the application?

linux

97. in a __________ shell forward slash (/) is used to express directory paths;?

compiler

98. Translates the entire program, creating an executable program, which can be run at a later time. *

Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.

98. What is the definition of business intelligence?

Interpreter

99. Takes the most recently entered instruction, translates it into machine language, and executes it.

driver

99. Which of the following interacts between a database and an application?

Compiler

A ________ translates the entire program, creating an executable program which can be run at a later time.

Time and capital

Scope creep can impact the allocation of which resources:

Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.

Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.

tangible - intangible

While hardware is ______, software is ______


Ensembles d'études connexes

Chapter 17 LearnSmart Marketing 021 Ybarra

View Set

Chapter 9 - Data Warehousing and Data Integration

View Set

Office Applications I Unit 1 Quiz 1

View Set