intro to IT study guide
Which of the following operators is used to select all of a certain data? 1 point * = <> LIKE
*
During analysis, which system requirement ensures that the system is accessible to all users?
ACCESSIBILITY
Which of the following statements is not part of the path a message takes from one computer to another? 1 point All packets of the same message are combined together as they arrive. A message is divided into one or more packets. The packet(s) are given the final destination address. All messages require a response from the destination machine to the sending device.
All messages require a response from the destination machine to the sending device.
A local area network (LAN) 1 point Allows hardware sharing between two offices Allows software sharing between two offices Allows hardware sharing within one office Allows hardware sharing between offices in geographically dispersed locations
Allows hardware sharing within one office
During implementation, how is alpha testing different from beta testing? 1 point Beta testing is assisted by system developers Alpha testing uses actual data Beta testing uses simulated data Alpha testing uses simulated data
Alpha testing uses simulated data
Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer. 1 point I/O subsystem CPU Memory Bus
CPU
Which of the following carries out the instructions of a computer program and is often referred to as the "chip"? 1 point System clock Arithmetic Logic Unit RAM Central Processing Unit
Central Processing Unit
Select the statement that best describes the difference between software and hardware. 0/1 Computer software consists of drivers and their associated devices whereas computer hardware includes only internal system devices. Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives. Computer software consists of applications such as word processing and spreadsheet programs whereas computer hardware includes the operating system. Computer programming language instructions can be very broad and general whereas computer hardware specifications must be very specific.
Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
Which of the following are the three main categories of databases?
Hierarchical , Flat File, Relational
What is another term that defines a script? 1 point Pascal Compiler Machine code Interpreted program
Interpreted program
A program written in a high-level language must be converted into __________ code to be executed by the computer. * 1 point JavaScript Machine High Level Language C++
MACHINE
The scope of the project is? 1 point Determined in the closing phase Always accurately identified in the initiation phase The work that needs to be done Not at any risk
WORK THAT NEEDS TO BE DONE
__________ software works with hardware to provide a network service 1 point Application Windows Operating System Database Management System Windows Server
Windows Server
Which of the following is a role for an system administrator? *
create new user accounts and delete obsolete user accounts
What is the focus of the list of responsibilities for database administrators?
design, development, and DBMS support
Which statement accurately describes memory?
A computer can only run programs if it has a sufficient amount of memory.
Which of the following is the best definition of a computer network?
A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Which of the following is an example of a relational database? A database that is broken up so that one part of a record is in one location in the database and another part is in a different branch. A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system. Records in the database are separated by some delimiter, such as comma or a line.
A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.
Which two are both types of scripting languages? 1 point ASP and Python C++ and Pascal Python and C++ Pascal and ASP
ASP and Python
Which of the following would NOT be the responsibility of the system administrator? Providing support to users Creating new user accounts Installing new file server hardware and software Answering e-mails from potential customers.
Answering e-mails from potential customers.
In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released. 1 point Alpha Beta End User User Agreement
BETA
______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use
BIG DATA
What is IT management responsible for? 1 point Being the project manager Installation and maintenance Developing databases Maintaining websites
Being the project manager
What is the definition of business intelligence? 1 point Business intelligence is a term used to depict a network structure that allows greater communication among different parts of an organization. Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources. Business intelligence refers to a specific type of server used to gather data that can be analyzed by an organization. Business intelligence refers to a specific software application businesses can use to gather data from their competitors.
Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply. 1 point By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The developer can determine which data types would help fulfill the purpose. The number of fields in the database determines the cost of that database, so if careful planning doesn't occur, money can be wasted.
By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The developer can determine which data types would help fulfill the purpose.
Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?
CLOUD COMPUTING
Which of the following high-level programming languages was created to be business-oriented? 1 point SNOBOL FORTRAN COBOL LISP
COBOL
This software protection will protect an individuals original work (tangible form)for the authors life + 70 years 1 point GNUs Public License Patent Fair Use Copyright
COPYRIGHT
When does system conversion (direct, parallel, pilot, or phased) occur?
DEPLOYMENT
Which of the following descriptions best represents the reliable characteristic of quality data? *
Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.
Which of the following statements accurately describe IT certifications? IT certificates are generally not standardized and often not recognized by major companies. There are no specific IT certificates available for web administrators. Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area. IT certificates are easy to earn and don't require specialized training.
Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.
Which of the following best describes the purpose of expansion slots in modern computers? 1 point Expansion slots can be used to store programs and data. Expansion slots allow additional processors to be connected to the motherboard. Expansion slots can be used to connect additional peripheral devices such as an external hard drive or monitor. Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined. 1 point INTO WHERE SELECT FROM
FROM
A business intelligence system is used by which of the following groups of people?
HIGH LEVEL MANAGEMENT
45. Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.
IAAS
Which project phase defines the problem or opportunity that the project is expected to address?
INITIATION
Which of the following aligns IT goals and organization goals? 1 point Breaking organization goals into smaller goals will not relate to IT activities Improving IT infrastructure to support rapid expansion to capture less market share IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly Ensuring privacy and security of data shared by customers using cloud computing
IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly
During this phase of Project Management, the projects scope and requirements are defined 1 point Executing and Controlling Initiation phase Planning phase Closing phase
Initiation phase
What is the correct order of project phase for Project Management? 1 point Planning, Executing & Controlling, Closing, Initiation Executing & Controlling, Closing, Initiation, Planning Initiation, Planning, Executing, Closing
Initiation, Planning, Executing, Closing
In a SQL query, the __________ operation combines two tables together? JOIN MERGE COMBINE SELECT
JOIN
All of the following are compiled languages except for: 0/1 Javascript BASIC Java C++
Javascript
As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working? Wisdom Knowledge Information Data
KNOWLEDGE
in a __________ shell forward slash (/) is used to express directory paths;? 1 point Mac Windows Linux Other:
LINUX
What is the typical bandwidth of today's networks?
Mbps to Gbps
What is a disadvantage of buying a solution from another company?
Meeting the company's specific needs
Which of the following is/are true of the IPOS cycle? 1 point If there will be no future need for certain information, a user can go straight from the input stage to the output stage without going through the processing and storage stages. Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs. As long as the data is entered correctly, there is no need to store it. The reason for storage is to be able to prove what has been entered. The steps of the IPOS cycle can occur in any order.
Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.
What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices? 1 point Hard drives Bays Ports Slots
PORTS
Which is found on the motherboard and stores information but the information is not permanent? 1 point CPU RAM Bus ROM
RAM
Which of the following statements accurately describes random access memory (RAM)? 1 point RAM can be read but not written to. RAM is short-term memory. RAM is found in the ROM chip on the motherboard. RAM is storage for instructions that the computer needs to boot up.
RAM is short-term memory.
This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations). * Flat File Hierarchal Relational
RELATIONAL
Which of the following statements accurately describes read only memory (ROM)?
ROM IS LONG TERM MEMORY
Which device permits packet switching so that a message can be routed to the next link in a network? 1 point Router DNS LAN IP Address
ROUTER
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network
ROUTER
If YOU wanted to determine and have the names of students who are were CIT majors the query would look like:
SELECT First Name, Last Name FROM Students WHERE Major = "CIT";
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless-access cards, and other PC cards?
SLOTS
Which software is run automatically rather than by the end user?
SYSTEM
Adding/deleting user accounts is the role of which account?
SYSTEM ADMIN
Which software is run automatically rather than by the end user? Productivity Software Microsoft Office Software System Software
SYSTEM SOFTWARE
Which of the following is NOT an important characteristic of an IT professional? Strong math background and programming skills Ability to troubleshoot Desire to continually learn. Good communication skills - both oral and written
Strong math background and programming skills
Which of the following types of information present a threat to someone's privacy? * 1 point Secret business plans Names and addresses in the phone book Student ID and credit card numbers Phone numbers and e-mail addresses
Student ID and credit card numbers
Which of the following statements best defines the ALU?
The ALU processes the raw computer data, including mathematical calculations and logical operations.
Which factor contributed to the development of the first generation of computers?
The need to easily calculate missile trajectories
Which of the description of duties below would be for a System Administrator?
This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system
During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system
analysis
This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols) 1 point Web Server eMail server FTP server File Server
eMail server
Which of the following type of transmission is paired correctly with the given media?
fiber optic cable - light impulses
Which project phase assesses the risks and benefits of a project?
initiation
During this phase of the SDLC (system development life cycle) expected costs and benefits of the new system are estimated to see if it makes sense for the organization to proceed with the new system
preliminary investigation
Dhe name, address, and telephone number of each individual patient in Alan's office is known as a
record
Cassandra is developing a method to register conference attendees by extracting the attendee's information and saving it to a database. The information is obtained from the conference website and once they click submit the information is saved to the database and a new confirmation webpage is generated showing the attendees specific information. 0/1
scripting language
Which layer of the operating system provides access to the kernel?
shell
Which of the following are operations used to alter the data within a relation of a database? 1 point update , Delete , Insert Delete, Join, Insert join , Insert, Update insert , Join, Update
update , Delete , Insert
What is the definition of a Platform as a Service (PaaS)? 1 point A Platform as a Service is the ability to store data and aid communication for remote teams. A Platform as a Service makes it possible for businesses to access and use software through the Internet. A Platform as a Service is the ability to quickly and consistently develop and deliver applications. A Platform as a Service makes it possible to have all of your businesses IT departments needs sited outside of the organization and available to anyone, wherever
A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
Which of the following statements describes the difference between information systems and information technology? There is no difference between information systems and Information Technology. An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software. Information Technology is a broader concept and information systems provide the infrastructure for information technology. An information system requires the use of computer hardware and software; whereas information technology refers only to networks and tools that facilitate communication.
An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.
What peripheral component houses CDs and DVD? 1 point Hard drives Bays Ports Slots
BAYS
Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working? Data Information Knowledge Wisdom
DATA
In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan. 1 point Analysis Design Testing Maintenance Planning
DESIGN
Which of the following best describes a hierarchical database format? Data are modeled using parent-child relationships. The database format is one of the most commonly used today. Database records that do not have relationships with other tables.
Data are modeled using parent-child relationships.
An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following? 1 point Backup media Image backups Data mirroring Incremental backups
Data mirroring
A ____________ is also known as a datasheet. * 1 point Database System Database Record Database Table Database Field
Database Table
Which of the following describes the duties of a web administrator? Ensures firewalls are up to date, researches current security threats, and designs websites. Duties include connecting devices on an organization's network, configuring individual machines to access the network, working with the network hardware, and troubleshooting. Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server. Designs databases, maintains databases, provides database access to users, selects and supports database management systems.
Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.
Learning about social engineering and how to protect passwords is ___. 1 point Education Access control Authentication Authorization
EDUCATION
Project managers use variance reports, status reports, and resource allocation reports in which project phase?
EXECUTING AND CONTROLLING
__________ uses the concept of reflection of light through a core made up of glass or plastic. 1 point Chain link cable Ethernet cable Coaxial cable Optical wire
FIBER OPTICAL WIRE
Your site's Internet point of presence is called a: 1 point Gateway Router IP packet DNS server table
GATEWAY
A scanner is a peripheral device for what system? 1 point I/O Storage
I/O
Which of the four main components of a computer is described by this statement: This component facilitates the flow of information / communication between components and peripheral devices.
I/O SUBSYSTEMS
With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere 1 point SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service)
IAAS
A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?
IMAGE BACKUPS
Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?
INFORMATION
Determining the project scope or the work that needs to be completed is in what project phase? 1 point Initiation Planning Executing & Controlling Closing
INITIATION
Takes the most recently entered instruction, translates it into machine language, and executes it.
INTERPRETER
IT personnel who understand both the technical IT infrastructure and management of the business fill which role? 1 point Board of Directors IT entry-level IT management IT specialists
IT management
Which of the following best describes the differences between memory and the hard drive? 1 point Memory is an internal component that directly or indirectly connects computer components; whereas the hard drive is an external storage device. Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time. Memory carries out basic instructions that operate a computer; whereas the hard drive is a long-term storage device. Memory is an electronic component used to store instructions for future use; whereas a hard drive is attached to the motherboard and enables the communication between components.
Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
The use of IT has allowed businesses to have __________. 1 point More tools for communicating Fewer privacy and security concerns Small customer bases Local reach
More tools for communicating
Which computer will use a docking station to function like a desktop? 0/1 Handheld Notebook Smartphone Tablet
NOTEBOOK
Which of the following statements describes why network protocols are necessary.
Network protocols are necessary for computers to communicate with each other.
This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications 1 point SaaS (Software as a Service) IaaS (Infrastructure as a Service) PaaS (Platform as a Service)
PAAS
This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing * 1 point Hardware License Software License Copyright Patent Other:
PATENT
___________ is ephemeral, meaning data stored is lost when the computer is powered off. ROM RAM BIOS CMOS
RAM
Thru this CLOUD computing function, businesses can access and use software through the Internet
SAAS
The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in). * 1 point FROM SELECT WHERE
SELECT
Which of the following programming languages first introduced the concept of object-oriented programming?
SMALLTALK
________________ is a general term that describes any attack that takes advantage of humans' trusting nature. 1 point Special Tactics Brute Force Social engineering Access Control Clear selection
SOCIAL ENGINEERING
Which of the following is an scripting interface between a database and the application?
SQL
In this network topology ALL devices have a single point-to-point connection with a central device 1 point RING network BUS network STAR network
STAR
During which generation did computers begin to see widespread use in business? 1 point Fourth generation First generation Third generation Second generation
THIRD GEN
Which of the following is an example of what 1 GB would store? 1 point A large text file An mp3 file of a song A library of movies Thousands of books
THOUSANDS OF BOOKS
Which account is also referred to as root or superuser? The Users Account The Administrator Account The Security Account The Network Accoutnt
The Administrator Account
Which of the following statements best defines the CPU? 1 point The CPU outputs the raw computer data, including mathematical calculations and logical operations. The CPU controls the speed at which instructions are retrieved and processed in the computer. The CPU is responsible for storing data as it is being processed. The CPU retrieves the instructions of a computer program and the raw data that is input. Clear selection
The CPU controls the speed at which instructions are retrieved and processed in the computer.
Which of the following statements best represents the relevant characteristic of quality data? 0/1 The data used applies to the question being answered. The data has been gathered using consistent, detailed collection processes. The data has been inputted correctly and is accurate for its intended use. The data is current enough to still serve its purpose for being accessed.
The data used applies to the question being answered.
Which of the following is the correct function of the compiler? 1 point Every instruction is translated first and then executed and this must be done every time the program is run. Takes the most recently entered instruction, translates it into machine language, and executes it. Translates the entire program, creating an executable program, which can be run at a later time. Allows programmers to more easily write programs.
Translates the entire program, creating an executable program, which can be run at a later time
In order for a database to work, at least one of the fields has to contain unique values. What is the name of this field?
UNIQUE IDENTIFIER
The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document. 1 point TCP URL HTTP SSL
URL
During implementation, which testing assesses whether the system functions and is useful? 1 point Deployment Alpha User Acceptance Beta
USER ACCEPTANCE
What is a program that allows the user to monitor and improve system performance?
UTILITY PROGRAMS
During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders. End-User Testing Alpha Testing User Acceptance Testing Beta Testing
User Acceptance Testing
The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP 1 point print server file server web server FTP server
WEB SERVER
The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query. 1 point SELECT clause FROM clause WHERE clause
WHERE CLAUSE