Introduction to Information Technology - sophia.org

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

ENIAC, which stands for Electronic Numerical Integrator and Computer, is an example of a _______________ computer. personal microprocessor mainframe mini

mainframe

Cristina sends a brief email message to wish her aunt a happy birthday. How much storage space is necessary for Cristina's email? 1 kilobyte 1 megabyte 1 byte 1 gigabyte

1 kilobyte

Which of the following can be controlled by copyright? A lip-sync video of a popular song posted to YouTube A new cancer medication approved by the FDA The name of a publicly-traded company The logo of the Oklahoma City Thunder professional basketball team

A lip-sync video of a popular song posted to YouTube

Select the true statement about network protocols. A protocol is not required for all data transmissions. A protocol determines how the sending device notifies the receiving device that there is data to be sent. A protocol determines how it will be executed on every networked device. A protocol determines how the sending computer notifies the receiving computer about the presence of compressed data.

A protocol determines how the sending device notifies the receiving device that there is data to be sent.

Which technology enables information to be synced, shared, and accessed at any time by a device connected to the Internet? Social media Cloud computing Autonomous technology Artificial intelligence

Cloud computing

Haitham works for a government agency. He is in charge of a team that develops algorithms and models that guide the function of software applications. What is Haitham's role in his organization? Computer Scientist Programming Language Specialist Database Administrator Network Engineer

Computer Scientist

Which of the following statements about the relationship between hardware and software is FALSE? Both hardware and software are needed for the computer to function effectively. Computer hardware controls the computer's software by telling it what to do. Computer hardware cannot be used without an operating system Computer hardware can be physically touched, while computer software is intangible.

Computer hardware controls the computer's software by telling it what to do.

Brad launches a program in order to see all of his files, folders, and programs in one place. Which element of the Microsoft Windows operating system is Brad using? Windows Shell Security and Maintenance File Explorer (formerly Windows Explorer) Taskbar

File Explorer (formerly Windows Explorer)

__________________, which was created by OpenOffice, enables users to create slideshow presentations. Pages Impress Presentation Keynote

Impress

Kamal manages his organization's enterprise management system. Which IT role is Kamal most likely performing? Network development and maintenance Infrastructure and equipment management Data management Information technology support

Infrastructure and equipment management

Select the true statement about CIPA. All schools are required to adopt it. It is enforced by the federal E-rate program. It can restrict a minor's access to harmful content. Parental consent is required if a child wants to use a site.

It can restrict a minor's access to harmful content.

Select the true statement about the CPU It transfers data from the hard disk for processing. It permits the exchange of electrical signals between computer components. It provides a central connection for computer components. It executes commands sent by program software.

It executes commands sent by program software.

Paul wants to present information about a new product at the upcoming national sales meeting. Which productivity software should Paul use? OpenOffice Impress Microsoft Excel Google Docs IBM DB2

OpenOffice Impress

Alexis received an email message from an unknown sender that included an attachment. If she opens the attachment, what kind of malicious software might be activated, and what are the consequences? Opening the attachment would release a worm, which would release a worm, which would infect her system with spyware Opening the attachment would release a passive worm, which would infect her system with adware. Opening the attachment would release a worm, which would infect her system with a virus. Opening the attachment would release an active worm, which would infect her system with adware.

Opening the attachment would release a worm, which would infect her system with a virus.

Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly. Which type of network is best for Shayne? WAN PAN MAN LAN

PAN

Tyler works with a software development team at a large healthcare organization. His job is to identify the aspects of the software that must be tested, develop appropriate tests, run those tests, and evaluate the results. What is Tyler's role in the organization? Quality Assurance Software Project Manager Software Developer Analyst

Quality Assurance

All of the following are examples of integrated computer systems, EXCEPT: Taking a self-driving car to work Storing a group project on "the cloud" Re-setting a home security system using a tablet computer Using a watch to get directions during a morning run

Storing a group project on "the cloud"

Reesa works for a large real-estate company. She is responsible for installing and supporting the company's internet systems, including the LAN and WAN. Reesa routinely monitors network performance, and performs network maintenance. Computer Engineer Database Administrator Systems Analyst System Administrator

System Administrator

Brenda has a laptop that is more than six years old. Since she upgraded the Windows operating system to the latest version, her machine crashes when she starts it up. To solve the issue, Brenda should try _______________. Defragment System Configuration Disc Cleanup System Restore

System Restore

Which task is suitable for an automates process? Kanta's company requires human review to identify and correct errors. Mai's company has a limited testing budget. Tanya plans to modify her software, and will retest it many times. Astor plans to test her software only twice.

Tanya plans to modify her software, and will retest it many times.

______________ is a social media and micro-blogging site that enables users to post multimedia content to a short-form blog. QQ WhatsApp Instagram Tumblr

Tumblr

Which productivity software is used to create written memos or reports? Excel Access PowerPoint Word

Word

Josephine recently bought an item online. The next time she visited the seller's website, a list of items related to her recent purchase were conspicuously displayed. Josephine is experiencing an example of automation known as ________________. online software application advertising and marketing importing/exporting data automated billing

advertising and marketing

James is a college student who us writing a research paper. Because he clicked the command to save his work, he knows that after he turns his computer off, his work will be there for when he turns it on again. James saves his work in a type of computer storage known as the _______________. hard drive microchip RAM CPU

hard drive

When Beth touches the screen of her smartphone to launch an application, the operating system's _____________ enables her to access her software and files. memory welcome screen hardware user interface

user interface


Ensembles d'études connexes

OB - chapter 19 Nursing Management of Pregnancy at Risk: Pregnancy-Related Complications

View Set

Module 7 Male Reproductive System

View Set

Financial advisor simulation #1-20

View Set

15.1 Fertilization and Embryonic Development

View Set

DONE Income Tax - Test 1 - Chapters 1 - 4 and 5 (CH 4 5 PENDING)

View Set