Intro to it

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of computer peripheral is used only as an input device? · External hard drive · Monitor · Docking station · Keyboard

A keyboard is a peripheral that is only an input device.

Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe? · Implementation · Requirements analysis · Testing · Design

Before designing and developing a new software application, Mei and her team must gather and analyze the requirements of those who will be using the application.

Which type of transmission media can broadcast in baseband mode? · Twisted pair cable · Optical wire · Wireless transmission · Coax cable

Coax cable can broadcast in both baseband and broadband modes.

Which statement is not true of compilers? · All errors must be debugged before a compiler can compile the source code. · Compilers do not translate source code into machine code. · Interpreters translate and execute one line of source code at a time. · Perl and Python are examples of programming languages that use an interpreter.

Compilers translate source code into machine code.

Which statement describes the role of a network administrator? · Network administrators are responsible for maintaining websites. · Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network. · Network administrators are accountable for the installation and maintenance of the resources on a network. · Network administrators have a long list of essential responsibilities but mostly focus on the design development and support of database management systems.

Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.

Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario? · Availability · Confidentiality · Integrity · None of the above

The data is no longer available (A).

Which statement about the systems analyst role is accurate? · The role includes choosing appropriate network hardware. · The role includes securing an organization's network. · The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements. · The role includes planning the allocation of network addresses across an organization.

The systems analyst role requires both business and technical knowledge, relying on effective communication to understand clients' requirements.

Which role is responsible for maintaining websites? · Data analyst · Network engineer · Cloud architect · Web administrator

The web administrator is responsible for maintaining websites the web administrator installs, configures, maintains, secures, and troubleshoots the webserver.

What is another title for a web administrator? Choose 2 answers. · Web developer · Cybersecurity specialist · Web server administrator · Webmaster

The web administrator, also known as a webmaster but more precisely referred to as a web server administrator, is responsible for maintaining websites.

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information? · Structured query language (SQL) · Database information processing · Data and business intelligence

This tool allows you to analyze specific categories of historical information and make decisions based on that information. Example: How many holiday lights do I need to have available at Store XYZ for the upcoming season? What sold more in Store A or Store B? Are there regional differences?

What is a primary difference between a modern handheld computer and a modern desktop computer? · A desktop has more processing power. · A handheld is more usable. · A desktop is more usable. · A handheld has more processing power.

Typically, a desktop has more processing power than a handheld computer.

A _____________ plan specifies how a business will resume after an event to continue its operations.

A disaster recovery plan outlines how a business will resume its operations after an event.

Which type of computer peripheral is used only as an input device? · Monitor · External hard drive · Keyboard · Docking station

A keyboard is a peripheral that is only an input device.

Which type of network is used to interconnect devices in a single office or building? · WAN · PAN · SAN · LAN

A local area network (LAN) consists of a collection of computers in a single office or building.

Which functions would Mei be completing in her network administrator role? Choose 2 answers. · Connecting two or more computers together so they can communicate · Training employees to use the billing applications · Managing the telephone system network · Giving new users access to various databases

As a network administrator, Mei would be responsible for connecting multiple computers together so they can communicate information, and also managing the telephone system network.

Which of the following describes a computer support specialist's responsibilities? · Choose 3 answers. · Working the help desk · Training help-desk personnel · Overseeing help-desk personnel · Using statistical and other quantitative methods to gain insights that support the organization's decision-making

Computer support specialist troubleshooting might involve working the help desk, training help-desk personnel, and overseeing the help desk personnel.

What is the primary duty of a computer support specialist? · The computer support specialist is mainly responsible for allowing an organization to take full control of its data. · The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients. · The computer support specialist primarily operates as a trainer and troubleshooter. · The computer support specialist primarily identifies and helps clients adopt IT services or technologies.

Computer support specialists train users to work with new computer hardware or software, such as printers, word-processing software, and email, and ask end-users questions to properly set up, diagnose, and repair computer equipment and related devices.

Which part of the CIA triad addresses rules that restrict access to only those who need to know? · Integrity · Availability · Confidentiality

Confidentiality deals with the rules that restrict access to only those who need to know.

Facts gathered from observations or from a clock that measures time are examples of data. What is not an example of data? · On/off · It is cold outside · 9:30 a.m. · 18:30

Data are measurements or statistics used as a basis for reasoning, discussion, or calculation. Data includes raw facts or observations.

Which factors should Mei consider when choosing a file organization system? Choose 3 answers. · Data retrieval speed · Hierarchy · Scalability · Security

Data retrieval speed impacts the experience of the user when interacting with the database. Scalability allows the organization to expand the system's capacity as needed. Security focuses on the confidentiality, integrity, and accessibility of the data kept in the database.

Which of the following would be a disadvantage of an ethical code of conduct? Choose 3 answers. · It has no legal impact. · It is entirely voluntary. · It is legally binding. · It may not apply to new issues.

Ethical codes of conduct are recommendations for behaviors of a group of professionals and are not legally binding.

Unstructured data refers to data that is _____________. Choose 3 answers. · more complex · coded in a way that makes it easy to convert into a form usable for analysis · possibly stored in a format that is not easily decoded · more time-consuming to parse through to retrieve the essential information

Examples of unstructured data include data stored in text or video format, comments on a web page, text messages, and videos of presentations or conferences.

Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe? · Testing · Requirements analysis · Design · Implementation

After gathering and analyzing requirements for the new software application, Mei and her team have moved into the design phase, during which they create the necessary supporting diagrams.

Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern? · Scope creep · Project dependencies · Contract risk · Resource risk

Having enough resources to complete a project is a risk that must be managed by the project manager. Resource risk is a key concern for Mei.

What is the tool used to encode a document while focusing on appearance known as? · HTML · HTTP · DNS · URL

Hypertext markup language (HTML) is used to encode documents and focuses on the document's appearance.

IP addresses are traditionally written in _____________ notation. · encrypted · binary · mnemonic · dotted decimal

IP addresses such as 192.168.1.1 are written in dotted decimal notation.

Which of the following systems are examples of database applications in Mei's medical office? Select all that apply. · Patient scheduling system · Billing system · Equipment inventory system · Accounting system

All of these systems collect, store, and manipulate data that support a business function within Mei's medical office. The patient scheduling system, for example, stores the patients' data and their scheduled appointments. The system allows the creation of records for new appointments, changes to existing records, and the deletion of records when patients cancel.

Mei's database administration function includes: · managing user access to resources. · application programming. · data access planning. · All of the above

In an organization, it is typically the responsibility of the database administrator to manage the access rights of users to various data resources.

What does the acronym CIA stand for in cybersecurity? · Central Intelligence Agency · Confidentiality integrity and availability · Confidentiality intelligence accessibility · Cybersecurity internet accessibility

In cybersecurity, the acronym CIA stands for confidentiality, integrity, and availability.

What is a tree-like structure of records in a database referred to as? · Hierarchical database structure · Flat file · Field · Relational database structure

In hierarchical databases, data is organized in a tree structure, much like an organizational chart.

Which part of the CIA triad addresses the level of assurance that can be given as to how accurate and trustworthy data is? · Integrity · Confidentiality · Availability

Integrity addresses the level of assurance that can be given as to how accurate and trustworthy data is.

Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern? · Budget risk · Scope creep · Resistance to change · Project dependencies

Mei's concern that the project task list will remain unchanged refers to potential scope creep. Project scope specifically relates to the tasks that must be completed as part of a particular task.

The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix. · True · False

New and innovative ways of doing business are redefining how companies collect and use data.

Why is merging unstructured and structured data essential? · Both types of data contain essential information. · Most of the data stored today is unstructured. · Better insights and discovery of hidden connections in data sets help strengthen decision-making. · All of the above

One of the most significant revolutions in today's business world has been the development of analytical tools to study unstructured data. Combining unstructured data with structured data creates opportunities to analyze customer experiences, model customers, and align product offerings to specific customers' characteristics for strategic advantage.

Which technique allows someone to obtain sensitive information such as usernames and passwords by pretending to be a trustworthy person? · Buffer overflow · Black hat · Packet sniffing · Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising the source as a trustworthy entity.

Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern? · Scope creep · Resource risk · Contract risk · Project dependencies

Relying on a vendor to complete planned deliverables is a risk that must be managed by the project manager. This type of risk is referred to as a contract risk.

What are examples of structured data? · Telephone number · Date of birth or transaction · First and last name · All of the above

Structured data is coded in a way that makes it easy to convert into a form usable for analysis.

Which statement describes the role of a systems administrator? · Systems administrators are responsible for monitoring an organization's network for security breaches. · Systems administrators are responsible for the installation and maintenance of the resources of an organization's network. · Systems administrators are responsible for designing and developing software that makes hardware and software systems work. · Systems administrators are responsible for supporting monitoring and maintaining workplace technology and end users.

Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore' · All records from the Patient table where the patient's last name is not "Moore" · All records from the SQL table · All records from the Patient table where the patient's last name is "Moore" · All records from the Patient table

The SELECT * FROM Patient statement identifies that all records from the table Patient have been queried. The WHERE LastName = 'Moore' statement identifies the specific patient's last name being requested.

Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information. · True · False

The amount of collected data continues to grow exponentially. Some estimates are that 90% of all data ever collected has been generated in the past couple of years. Data helps us make better decisions.

Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800 but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario? · Confidentiality · Integrity · Availability · None of the above

The integrity of the data (I) has been compromised.

The level of assurance that data will be available to people who need it when they need it is referred to as _____________. Availability refers to data being available to the people who need it when they need it. Mei is buying equipment from an online retail site and she finds that she is able to change the price of the equipment from $1000 to $10. Which part of the CIA triad has been broken in this scenario? · Confidentiality · Availability · Integrity · None of the above

The integrity of the data (I) has been compromised.

Which network topology best handles downed links without losing connectivity between devices? · Bus · Ring · Mesh · Star

The mesh network's redundancy from multiple links allows connectivity even when a link is out of service.

What are the name address and account balance of each individual patient in Mei's office known as? · Key field · Record · Database · File

The name, address, and account balance of each individual patient of the office forms a record of the patient. A collection of records forms a database.

What is the purpose of a business continuity plan? · To develop plans for continued business operations regardless of the circumstances · To identify who is responsible for permanent growth of the business in the event of natural disasters · To assess risks for key processes in the event of man-made disasters · To enable an organization to continue offering critical services in the event of disruptions

The purpose of a business continuity plan is to enable an organization to continue offering critical services in the event of disruptions.

Giving rights to new users so they can access various databases is a very common task database administrators perform. Mei's medical office has outsourced IT support services. What is one probable advantage of outsourcing? · Employee satisfaction may increase. · Reliance can be placed on the expertise of outsourcing vendors. · The organization can transfer its accountability in terms of privacy laws. · More control can be exercised over IT processing.

Through an outsourcing arrangement, the service of an expert can be obtained in the absence of in-house expertise. It is important to note here that, while it might tempt some, no organization can transfer its accountability through outsourcing.

As a part of effective IT governance the IT plan in Mei's office should be consistent with the organization's: · business plan. · business continuity plan. · risk management plan. · information security plan.

To govern IT effectively, IT and business should be moving in the same direction, requiring that the IT plans be aligned with the organization's business plans. Information security, business continuity, and risk management should be considered while developing the IT plan, but all this will add value only if the IT plan is in line with the organization's business plan.

Which statement is correct given that usability is very subjective and handheld and desktop computers may be more or less usable based on the demands of the user? · A handheld is more usable. · A desktop has more processing power. · A handheld has more processing power. · A desktop is more usable.

Typically, a desktop has more processing power than a handheld computer.

Most of the data stored today are unstructured and include things such as text blogs clickstreams tweets and audio. This data is not organized in a way that allows for analysis. · True · False

Unstructured data refers to data that is more complex and possibly stored in a format that is not easily decoded, such as social media and mobile device communications.

Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern? · Resource risk · Resistance to change · Project dependencies · Scope creep

When one deliverable cannot begin until another has been completed, it is referred to as a project dependency. Mei is concerned about project dependencies because they could cause a delay in her overall project schedule.

Which of the following is not true of Windows and Linux? · Linux is case-sensitive. · Linux places the home directory within the /home/. · Windows uses the forward slash (/) to express directory paths. · Windows' root directory is referred to by a letter.

Windows uses the backward slash(\), while Linux uses the forward slash (/) to express directory paths.

In 2013 Target a retail store with an online presence experienced a security breach that resulted in the loss of data affecting approximately 40 million customers. If you are not familiar with this security breach read more about it in this article (opens in a new window) then answer the following question. Which types of data were stolen during the Target credit card hack? · Customer names · Credit and debit card numbers · Card verification values (CVVs) · All of the above

According to the article referenced, customer names, credit and debit card numbers, expiration dates, and CVVs were all part of the theft.

Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe? · Design · Testing · Implementation · Requirements analysis

During the implementation phase, Mei and her team are able to bring to life the application for which they have already analyzed requirements and created a design.

Data includes raw facts or observations and given context becomes information. · True · False

Information is a collection of processed data from a variety of sources.

The medical office treated A.J. three days ago. Today the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? Choose 2 answers. · Mei can disclose information about A.J. only with a warrant. · Mei should only follow HIPAA guidelines and disclose information about A.J. to law enforcement. · Mei should follow the protocol advised by the medical council of her state. · Mei should follow both HIPAA and state privacy protocols.

Mei must follow all industry and state regulations regarding patient privacy and patient records.

The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied including the daughter of the office's receptionist Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? Select all that apply. · Mei should use the same selection criteria for all candidates. · Mei should not discuss the job with Mary. · Mei should ask a colleague to interview Mary's daughter. · Mei should ask a colleague to sit in on the interview with Mary's daughter.

Mei should outline the selection criteria to be used with all candidates, and not discuss the job with Mary. In addition, Mei should ask a colleague to interview Mary's daughter or ask a colleague to sit in on the interview with Mary's daughter.

Mei is unsure that she can control the allocation of costs during the project budget control issues such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern? · Budget risk · Resource risk · Contract risk · Scope creep

Mei's concern about controlling cost refers to budget risk.

Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern? · Resource risk · Contract risk · Resistance to change · Project dependencies

Mei's concern that all company employees will not be using the new system is valid. In almost every instance of change, some resistance can be expected. Change is uncomfortable, but it is a part of growth. As a project manager, Mei may need to help resistant employees see the benefits of the new system in order to get their buy-in.

What is the role of the CPU in a computing system? · Permanently storing all data and programs on the computer · Performing instructions of computer programs · Distributing signals between all the parts in the computer · Temporarily storing activities before transferring them to the hard disk

The CPU or processor is the "brain" of the computer and performs all of the operations that the computer does, from simple encoding of text to complex rendering of video.

Which task describes the role of a database administrator? · Working with organizations to keep their information systems secure and ensuring integrity confidentiality and availability of data · Creating documenting executing and manually creating test plans and procedures relating to system anomalies · Integrating data from legacy systems to newer systems and playing a role in application design and development · Organizing people time and other resources to make sure projects meet requirements and are completed on time and within budget

The database administrator may also be involved with the integration of data from older systems to newer systems. A database administrator is often expected to play a role in application design and development.

Where are the basic functions of the operating system located? · Applications · Kernel · Utility software · File manager

The kernel sits at the core of the operating system and manages basic functions such as file management.

When you visit the website for Mei's office the site (like many other websites) has the capability of recording data called cookies on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers? · Yes as long as the patient regularly clears cookies from their machine. · No patient information could be leaked. · No they impede the user interaction with the website. · Yes the cookies allow a web application to respond to the user as an individual.

While cookies record previous activity on a site, they allow Mei's office's website to respond to the user as an individual. Since users are prompted to accept or deny the use of cookies, users are provided with an opportunity to opt out of such data recording if they prefer.

Which type of systems testing includes having developers test internal structures of software? · White-box · Analysis · User acceptance · Beta

White-box testing includes testing internal structures of software.

A ____________ plan specifies how the business will keep providing products and services and generate revenue after an event

. A business continuity plan specifies how a business will keep providing products and services and generate revenue after an event.

What is the collection of names addresses and account balances of all the patients of Mei's office more technically known as? · File · Key field · Database · Record

A database is a collection of records. The name, address, and account balance of a patient form the patient's record.

What is the minimum grade of network cable required to transmit 1 Gpbs? · CAT3 · CAT5e · CAT2 · CAT5

CAT5e is the minimum grade of cable necessary to reach speeds of 1 Gbps.

Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages? · Cloud database · Data lake · NoSQL databas · Distributed database

Cloud database benefits include the ability to increase resources to accommodate for demands on the system and to be highly available even in the case of local or regional outages.

Although database administrators have many responsibilities their focus is the design development and support of database management systems (DBMSs). · True · False

Database administrators (DBAs) use specialized software to store and organize data with a focus on the design, development, and support of database management systems (DBMSs).

Which function would Mei be completing in her database administrator role? · Managing the telephone system network · Connecting two or more computers together so they can communicate · Training employees to use the billing applications · Giving new users access to various databases

Giving rights to new users so that they can access various databases is a very common task database administrators perform

Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom Mei's brother is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? Choose 3 answers. · Tom should resign from the software production company. · Tom and Mei should not discuss details of the contract outside official channels. · Mei should not disclose details of offers by any respondents to the RFP. · Both Tom and Mei should disclose the conflict of interest.

It is unnecessary for Tom to resign his position with the software production company. However, Tom and Mei should disclose the conflict of interest and refrain from discussing details of the contract outside of official channels, and Mei should not disclose details of offers by any respondents to the RFP.


Ensembles d'études connexes

Food Handler Card Online Final Exam

View Set