Introduction to IT - Practice Exam B
Which department supports day-to-day technology needs of an organization? Management IT Marketing Finance
IT
Which is NOT part of the history of the computer? Abacus Leibniz Punch cards Abracadabra
Abracadabra
The name, address, and telephone number of each individual patient in Dr. Alan's office is known as a: Record File Key field Database
Record
Which statement describes the role of a systems administrator? Systems administrators are responsible for designing and developing software that makes hardware and software systems work. Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users. Systems administrators are responsible for the installation and maintenance of the resources of an organization's network.
Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user? A desktop is more usable. A desktop has more processing power. A handheld is more usable. A handheld has more processing power.
A desktop has more processing power.
Which of the following describes the knowledge stage in the DIKW model? Number of hours worked by an employee. A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions. Average number of hours worked by department. Report on employee attendance.
A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.
During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system? Logical Design Physical Design Implementation Analysis
Analysis
A ________ translates source code into machine language and translates the entire program, creating an executable program which can be run at a later time. Interpreter COBOL program Compiler High level language
Compiler
Which statement is NOT true of compilers and interpreters? All errors must be debugged before a compiler can compile the source code. Interpreters translate and execute one line of source code at a time. Perl and Python are examples of programming languages that use an interpreter. Compilers do not translate source code into machine code.
Compilers do not translate source code into machine code.
Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law. Electronic Communication Privacy Act Computer Fraud and Abuse Act Federal Information Security Management Act Anticybersquatting Consumer Protection Act
Computer Fraud and Abuse Act
Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working? Wisdom Information Knowledge Data
Data
What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as? Database Key field Record Sheet
Database
________ is defined as a code of moral conduct or a set of principles that govern behavior? Morals Ethics Obligations Principles
Ethics
Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast. True False
False
_____________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Waterfall Prototyping Extreme programming Agile methods
Agile methods
What is a tree-like structure of records in a database referred to as? Flat file Relational database structure Hierarchical database structure Field
Hierarchical database structure
A monitor is a peripheral device for what system? I/O Storage
I/O
SQL (Structured Query Language), a query for databases, was invented by? Linux Cisco HP IBM
IBM
Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere. Paas (Platform as a Service) SaaS (Software as a Service) IaaS (Infrastructure as a Service)
IaaS (Infrastructure as a Service)
A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following? Image Backups Data Mirroring Backup Media Incremental Backups
Image Backups
The business case, feasibility study, and stakeholder input are 3 key elements of which project phase? Closing Initiation Executing Planning
Initiation
What does the acronym IPOS stand for? Identify, process, outcome, summary Input, prepare, overview, save Input, process, output, storage Identify, post, optimize, storage
Input, process, output, storage
Teachers complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Marcus uses the funding to purchase new software games that require less memory. Marcus plans on buying each school a new monitor to replace the older models. Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.
Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.
Which of the following technologies was introduced in the fourth generation of computers? Magnetic Core Memory Microprocessors Disk Drives Integrated Circuits
Microprocessors
Which of the following statements describes why network protocols are necessary. Network protocols are necessary for a home computer that is not connected to the Internet or any other device. Network protocols prevent computer hacking. Network protocols are required by international laws. Network protocols are necessary for computers to communicate with each other.
Network protocols are necessary for computers to communicate with each other.
Project managers work with project scope, the management plan, and SMART frameworks in this project phase? Closing Initiation Executing Planning
Planning
Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk? Public Private Top secret Confidential
Public
Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier? Hierarchical Database Flat-File Database Management System Relational Database Data Management
Relational Database
What is one probable advantage of outsourcing? More control can be exercised over IT processing. Reliance can be placed on the expertise of outsourcing vendors. Employee satisfaction may increase. The organization can transfer its accountability in terms of privacy laws.
Reliance can be placed on the expertise of outsourcing vendors.
Which of these is NOT a category of risk in a project? Risks in execution Risks in integration Risks in deployment Risks of the unknown
Risks in deployment
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)? Router Server Switch ISP
Router
Thru this CLOUD computing function, businesses can access and use software through the Internet? PaaS (Platform as a Service) SaaS (Software as a Service) IaaS (Infrastructure as a Service)
SaaS (Software as a Service)
Which factors should Mike NOT consider when choosing a file organization system? Hierarchy Scalability Security Data retrieval speed
Scalability
Which one of these is NOT a operation for database queries? Union Serve Product Join
Serve
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards? Hard drives Bays Ports Slots
Slots
Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system? Microsoft Power Point Application Server System
System
What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system? Utility Software Device Drivers System Services Kernel
System Services
Which of the following statements best defines the ALU? The ALU is responsible for storing data as it is processed. The ALU retrieves the instructions of a computer program and the raw data that is input. The ALU contains circuitry that performs operations on data such as addition and subtration. The ALU controls the speed at which instructions are retrieved and processed in the computer.
The ALU contains circuitry that performs operations on data such as addition and subtraction.
A Web page's URL (Uniform Resource Locator) has three main parts: URL, Network, IP Address The protocol, the domain name, and the resource or file name. Computer networks allow individuals to share hardware such as printers, but not software. Computer networks allow individuals to share many types of resources.
The protocol, the domain name, and the resource or file name.
for a System Administrator? This individual is in charge of ensuring that the network is working properly. include connecting devices using cable, configuring individual employee computers, working with the network hardware, and troubleshooting. This individual has responsibility for all aspects databases and database management systems. This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
There are how many tiers of ISPs? One Two Three Four
Three
What is the purpose of a business continuity plan? To assess risks for key processes in the event of man-made disasters To enable an organization to continue offering critical services in the event of disruptions To develop plans for continued business operations regardless of the circumstances Feedback:Unit 7 Module 23 Pg 137 To identify who is responsible for permanent growth of the business in the event of natural disasters
To develop plans for continued business operations regardless of the circumstances
Which is not a common operating system used today? Windows Top Hat Mac Linux
Top Hat
IT functions cover these five different domains: communication data collection and management information security management consumer relationship management process improvement True False
True
In the SDLC implementation phase, the design goes to the programmers who translate it into code to execute the plan. True False
True
In the design phase of the SDLC, architects think about the components they would need to solve the problem or implement the plan. True False
True
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off? True False
True
The selection operation takes rows from one table and creates a new table? True False
True
Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files. True False
True
The abbreviation "URL" indicates: Unified Reader Link Uniform Resource Locator United Rendering Lists Underdetermined Resource Location
Uniform Resource Locator
Which data format is not in an easily usable format and takes greater effort to extract? Structured Unstructured
Unstructured
Which type of systems testing includes having developers test internal structures of software? White-box Beta User acceptance Analysis
White-box
Which of the following type of transmission is paired correctly with the given media? fiber optic cable - light impulses coaxial cable - radio waves coaxial cable - light impulses fiber optic cable - electricity
fiber optic cable - light impulses
While hardware is ______, software is ______ intangible - tangible tangible - everlasting tangible - intangible free - shareware
tangible - intangible
A service portfolio is simply a list of the services the IT department offers. True False
true
The four computers based on size and processing speed are supercomputers, workstation, mainframe, and microcomputer. True False
true
A petabytes consists of how many terabytes? 100 10000 1500 1000
1000
A typical database application has how many layers? 2 4 6 Infinite
2
best definition of a computer network? A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software. A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources. A computer network consists of a number of computers connected to connect to the Internet.
A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
What is a primary difference between a modern handheld computer and a modern desktop computer? A handheld has more processing power. A desktop is more usable. A desktop has more processing power. A handheld is more usable.
A desktop has more processing power.
______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use? Algorithms Database Management Systems Big Data Relational Databases
Big Data
As a part of effective IT governance, the IT plan should be consistent with the organization's what? Information security plan Business continuity plan Business plan Risk management plan
Business plan
Javier starts the day by checking his e-mails. In the afternoon, performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, brief presentation on the new database system Database administrator Network administrator System administrator Security administrator
Database administrator
Which answer most accurately describes the timeline of computer development? First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced. First, Graphical User Interface systems are introduced. Next, limited use of computers by large organizations. Next, computers built and programmed by engineers. Lastly, introduction of the personal computer.
First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.
Which of the following database categories is the most similar to a spreadsheet or MS Excel document? Hierarchical Isolated Flat file Relational
Flat file
What two types of software licenses are free? Open source and Proprietary Proprietary and Shareware Freeware and Open source Shareware and Freeware
Freeware and Open source
What does GUI stand for? Graphic User Interchange Graphic Utility Interface Graphical User Interface Graphical User Interchange
Graphical User Interface
What is NOT part of data hygiene? Data is valid Lots of data Free from malicious or inadvertent tampering Data is good
Lots of data