Introduction to the Business of IT

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What does SMART goal stand for?

Specific, Measurable, Attainable, Realistic, Timely

Connect devices with LANs, use MAC addresses to connect devices.

Switches

Smart devices and connect two devices to one.

Switches

Good for 20 years from filing. Protect the creation and the idea behind the creation.

Patent

Which functions would Mei be completing in her network administrator role? (Select all that apply.) a. Connecting two or more computers together so they can communicate b. Training employees to use the billing applications c. Giving new users access to various databases d. Managing the telephone system network

A. Connecting computers together to communicate D. Managing the telephone system

What are the core components of information technology?

Hardware, Software, People

Uses a vocabulary and a set of rules for instructing a computer to perform certain tasks. a. PHP b. TCl c. JavaScript d. Phython e. C++

C++

What does CLEAR goal stand for?

Collaborative, Limited, Emotional, Appreciable, Refinable

C, C++, C#, and Java programs need ____to execute.

Compilers

Connect devices within WANs, use IP addresses to connect devices.

Routers

Good for 70 years after the death of the author. Protect the actual creation.

Copyright

Not so smart devices, connect by broadcasting.

Hubs

____ combines people with computing resources, software, data, and computer networks.

IT

Name the scripting languages.

JavaScript ASP, JSP PHP, Perl Tel Phython

T or F: Information systems are technology neutral. Information systems can be fully functioning without using technology. For example, the files behind reception at the dentist.

True

True or False are examples of what type of data? a. Boolean values b. character strings c. floating point numbers d. integers e. characters

a. Boolean values

What does the acronym CIA stand for in cybersecurity? a. Confidentiality, integrity, and availability b. Central Intelligence Agency c. Confidentiality, intelligence, accessibility d. Cybersecurity, internet, accessibility

a. Confidentiality, integrity, and availability

This is typically called the main memory. a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices

a. DRAM Dynamic RAM

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information? a. Data and business intelligence b. Structured query language (SQL) c. Database information processing d. none of the above

a. Data and business intelligence

Which of the following would be a disadvantage of an ethical code of conduct? (Select all that apply.) a. It is entirely voluntary. b. It has no legal impact. c. It may not apply to new issues. d. It is legally binding.

a. It is entirely voluntary. b. It has no legal impact. c. It may not apply to new issues.

This high-level programming language is an all-purpose language that is especially suitable for web development. a. PHP b. TCl c. JavaScript d. Phython e. C++

a. PHP

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person? a. Phishing b. Buffer overflow c. Packet sniffing d. Black hat

a. Phishing

Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe? a. Requirements analysis b. Design c. Testing d. Implementation

a. Requirements analysis

Renting software. Office 365 is an example of what type of cloud service? a. SAAS b. IAAS c. PAAS

a. SAAS

Which factors should Mei consider when choosing a file organization system? (Select all that apply.) a. Scalability b. Data retrieval speed c. Security d. Hierarchy

a. Scalability b. Data retrieval speed c. Security

1942, US. Binary, electronic, nonprogrammable. a. Zuse Z3 b. Colossus Mark 1 c. Atanasoft-Berry d. Zuse e. Colossus Mark 2 f. Harvard (Mark 1)

c. Atanasoft-Berry

Basic Input Output System a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices f. ROM g. RAM

c. BIOS

Basic input output system. a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices f. ROM g. RAM

c. BIOS

As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's: a. Information security plan b. Risk management plan c. Business plan d. Business continuity plan

c. Business plan

Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe? a. Requirements analysis b. Testing c. Design d. Implementation

c. Design

Federal law that protects the privacy of student education records. Gives parents certain rights to their child's education records. a. HIPPA b. SHERPA c. FERPA d. SEAL

c. FERPA 1974

What is the tool used to encode a document while focusing on appearance known as? a. DNS b. HTTP c. HTML d. URL

c. HTML

Series of numbers that indicate a specific internet location. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

c. IP address

Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe? a. Requirements analysis b. Design c. Implementation d. Testing

c. Implementation

_____ is a programming language designed to enable user engagement with dynamic elements on web pages. a. PHP b. TCl c. JavaScript d. Phython e. C++

c. JavaScript

Mei's database administration function includes: a. Application programming b. Data access planning c. Managing user access to resources d. All of the above

c. Managing user access to resources

The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? (Select all that apply.) a. Mei should only follow HIPAA guidelines and disclose information about A.J. to law enforcement. b. Mei should follow the protocol advised by the medical council of her state. c. Mei should follow both HIPAA and state privacy protocols. d. Mei can disclose information about A.J. only with a warrant.

c. Mei should follow both HIPAA and state privacy protocols.

Renting hardware & software. GoDaddy is a good example of what type of cloud service a. SAAS b. IAAS c. PAAS

c. PAAS

Which tool resides between the client and server to protect the client from adverse actions of the server? a. Antivirus software b. Router c. Proxy server d. Auditing software

c. Proxy server

Amends the Bank Protection Act of 1968 to allow digital signatures. a. HIPPA b. SHERPA c. FERPA d. SEAL

c. SEAL 1998

Specified instructions using words. a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

c. assembly language

In this type of network devices are connected along a single cable. a. ring network b. mesh network c. bus network d. star network

c. bus network

Focus is on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis and troubleshooting as with the other administrative areas. a. web administrator b. security administrator c. database administrator d. network administrator

c. database administrator

9.5, 45.5, 1.7 are examples of what type of data? a. Boolean values b. character strings c. floating point numbers d. integers e. characters

c. floating point numbers

The most common structure for databases. It has multiple tables with interrelated fields. a. flat file database b. hierarchical database c. relational database d. Structured Query Language (SQL)

c. relational database

______ are used on LANs to reduce network traffic by management of network messages. Older devices would broadcast all messages to all devices on the LAN. For example, on a 100-device network a ____ would only send one message to the destination device. This management example would create 99% less traffic. a. repeaters b. bridges c. switches d. routers

c. switches

Control the outward-facing content on an organization's website and intranets and ensure that the sites function and integrate with back-end systems, such as supporting databases. a. network administrators b. systems administrators c. web administrators d. database administrators e. cybersecurity analysts f. technical support specialists

c. web administrators

This type of language translates the entire program, creating an executable program, which can be run at a later time.

compiled language

Which data type uses a constructor that accepts no parameters? a. String b. Auto-number c. Floating point d. Boolean

d. Boolean

Which statement is NOT true of compilers and interpreters? a. All errors must be debugged before a compiler can compile the source code. b. Perl and Python are examples of programming languages that use an interpreter. c. Interpreters translate and execute one line of source code at a time. d. Compilers do not translate source code into machine code.

d. Compilers do not translate source code into machine code.

Requires Federal agencies to enter into written agreements with other agencies or non-Federal entities before disclosing records for use in computer matching programs. a. Family Educational Rights Act 1974 (FERPA) b. Electronic Communication Privacy Act 1986 c. Digital Signature Act of 1998 (SEAL) d. Computer Matching and Privacy Protection Act of 1988 e. Health Insurance Portability and Accountability Act 1996

d. Computer Matching and Privacy Protection Act of 1988

What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as? a. Key field b. File c. Record d. Database

d. Database

Federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without patient's consent. a. HIPPA b. SHERPA c. FERPA d. SEAL

d. HIPPA 1996

An easy to use programming language that does not require a compiler for debugging. a. PHP b. TCl c. JavaScript d. Phython e. C++

d. Phython

The name, address, and account balance of each individual patient in Mei's office is known as a: a. Key field b. Database c. File d. Record

d. Record

Giving rights to new users so they can access various databases is a very common task database administrators perform. Mei's medical office has outsourced IT support services. What is one probable advantage of outsourcing? a. Employee satisfaction may increase. b. More control can be exercised over IT processing. c. The organization can transfer its accountability in terms of privacy laws. d. Reliance can be placed on the expertise of outsourcing vendors.

d. Reliance can be placed on the expertise of outsourcing vendors.

In general, uses the following format for interacting with data contained within a database: SELECT fields FROM tables WHERE filed from tables match criteria. a. flat file database b. hierarchical database c. relational database d. Structured Query Language (SQL)

d. Structured Query Language (SQL)

What is the purpose of a business continuity plan? a. To develop plans for continued business operations regardless of the circumstances b. To identify who is responsible for permanent growth of the business in the event of natural disasters c. To assess risks for key processes in the event of man-made disasters d. To enable an organization to continue offering critical services in the event of disruptions

d. To enable an organization to continue offering critical services in the event of disruptions

1945, German. Binary floating point, electromechanical, programmable. a. Zuse Z3 b. Colossus Mark 1 c. Atanasoft-Berry d. Zuse e. Colossus Mark 2 f. Harvard (Mark 1)

d. Zuse

Configure and troubleshoot an organization's data repositories. a. network administrators b. systems administrators c. web administrators d. database administrators e. cybersecurity analysts f. technical support specialists

d. database administrators

This stores data even when the computer is turned off. a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices f. ROM g. RAM

d. hard drive

4,34,394850 are examples of what type of data? a. Boolean values b. character strings c. floating point numbers d. integers e. characters

d. integers

Runs inside of a special environment called the interpreter, the interpreter converts that command to machine language and executes it. a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

d. interpreted language

Runs inside of a special environment called the interpreter, the interpreter converts that command to machine language and executes it. a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

d. interpreted language

Which network topology best handles downed links without losing connectivity between devices? a. bus b. ring c. star d. mesh

d. mesh

This position oversees all aspects of the computer network. Duties include physically laying down cable, making connections, and working with the network hardware, ex. routers and switches. a. web administrator b. security administrator c. database administrator d. network administrator

d. network administrator

Provide access to networks, over long distances. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

d. radio waves

_____ are the device that makes the internet possible. ____ connected to your LAN acts as gateway to the internet. (This device on your LAN can be also be called a Gateway.) It manages network traffic by having a table of know devices. a. repeaters b. bridges c. switches d. routers

d. routers

In this network, a single machine serves as a central point to which all others are connected. a. ring network b. mesh network c. bus network d. star network

d. star network

1944, UK. Binary, electronic, programmable. a. Zuse Z3 b. Colossus Mark 1 c. Atanasoft-Berry d. Zuse e. Colossus Mark 2 f. Harvard (Mark 1)

e. Colossus Mark 2

The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? (Select all that apply.) a. Mei should ask a colleague to sit in on the interview with Mary's daughter. b. Mei should ask a colleague to interview Mary's daughter. c. Mei should not discuss the job with Mary. d. Mei should use the same selection criteria for all candidates. e. all of the above

e. all of the above

Which of the following systems are examples of database applications in Mei's medical office? (Select all that apply.) a. Equipment inventory system b. Accounting system c. Billing system d. Patient scheduling system e. all of the above

e. all of the above

Transfer rate permissible over the media, described as bits per second (bps). a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

e. bandwidth

f, l, # are examples of what type of data? a. Boolean values b. character strings c. floating point numbers d. integers e. characters

e. characters

Requires that the components of the software all be defined before compilation can begin. a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

e. compiler

Monitor the behaviors of the system components for anomalies and malicious attacks. They also put measures in place to deter, detect, and mitigate internal and external threats. a. network administrators b. systems administrators c. web administrators d. database administrators e. cybersecurity analysts f. technical support specialists

e. cybersecurity analysts

Components that are located outside the systems unit yet are connected physically or wirelessly to it. a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices

e. peripheral devices

1944, US. Decimal, electromechanical, programmable. a. Zuse Z3 b. Colossus Mark 1 c. Atanasoft-Berry d. Zuse e. Colossus Mark 2 f. Harvard (Mark 1)

f. Harvard (Mark 1)

This retains its contents indefinitely. a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices f. ROM g. RAM

f. ROM

FORTRAN (FORmula TRANslation) and COBOL (Common Business-Oriented Language) a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

f. high-level language

Device that connects multiple networks together. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

f. network hub

Provide end-user training and help users resolve issues accessing resources and systems. a. network administrators b. systems administrators c. web administrators d. database administrators e. cybersecurity analysts f. technical support specialists

f. technical support specialists

More functional connection than a hub, its purpose is to only send transmissions to a specific, intended computer. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

g. network switch

Connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

i. wireless access point

This type of language takes the most recently entered instruction, translates it into machine language, and executes it.

interpreted language

This is a formula or procedure for solving a problem.

Algorithm

This position is in charge of some portion of the IT infrastructure. a. web administrator b. security administrator c. database administrator d. security administrator e. administration

E. Administration

What are the 4 phases of project management lifecycle?

Initiation, Planning, Executing, Closure

Perl and Python execute using _____.

Interpreters

Often used in rapid prototyping and the creation of GUIs, ____ is a simple and compact language but is also very powerful. a. PHP b. TCl c. JavaScript d. Phython e. C++

Tcl

Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? (Select all that apply.) a. Tom and Mei should not discuss details of the contract outside official channels. b. Both Tom and Mei should disclose the conflict of interest. c. Mei should not disclose details of offers by any respondents to the RFP. d. Tom should resign from the software production company. e. all of the above

a. Tom and Mei should not discuss details of the contract outside official channels. b. Both Tom and Mei should disclose the conflict of interest. c. Mei should not disclose details of offers by any respondents to the RFP.

Which actions might be used to support the hardening of the systems you work with? (Select all that apply.) a. Use a random password generator and change your passwords frequently b. Expect your system administrator will take care of the security of all systems c. Maintain an antivirus system d. Click on links in an email from a person you do not know e. Install security patches as they become available

a. Use a random password generator and change your passwords frequently c. Maintain an antivirus system e. Install security patches as they become available

German, 1941. Binary floating point, electromechanical, programmable, describes which of the early computers? a. Zuse Z3 b. Colossus Mark 1 c. Atanasoft-Berry d. Zuse e. Colossus Mark 2 f. Harvard (Mark 1)

a. Zuse Z3

Collection of computers and computer resources (e. printers, file servers) connected in such a way that the computers can communicate with each other and their resources. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

a. computer network

Used if the amount of data that is being recorded is minimal. It is one large single table without the relations between tables that a relational format provides. a. flat file database b. hierarchical database c. relational database d. Structured Query Language (SQL)

a. flat file database

Set up, maintain, and monitor the hardware and software that support the networking components of the computer systems. a. network administrators b. systems administrators c. web administrators d. database administrators e. cybersecurity analysts f. technical support specialists

a. network administrators

____ extend the range of cabling types so connections can be made by increasing the strength of the network signal. For example, if two twisted pair cabling networks are 500 feet apart, it can be used to extend the 300 feet range of twisted pair cabling to 500 feet. Can also be used on fiber and coaxial also. a. repeaters b. bridges c. switches d. routers

a. repeaters

In this network, each device is connected directly to its neighbor and messages are forwarded from device to device until the proper destination is reached. a. ring network b. mesh network c. bus network d. star network

a. ring network

Perl, pho, ruby, python, and asp. a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

a. scripting languages

Also known as webmaster. This role is responsible for maintaining web storage, which differs from the development of web storages. They install, configure, maintain, secure and troubleshoot the web server. a. web administrator b. security administrator c. database administrator d. network administrator

a. web administrator

Responsible for installing, configuring, and administering appropriate firewall security to protect the organization's systems and to work proactively against such intrusions. a. web administrator b. security administrator c. database administrator d. network administrator

b. security administrator

Computer that takes requests and responds with requested information. a. computer network b. server c. IP Address d. radio waves e. bandwidth f. network hub g. network switch h. router i. wireless access point

b. server

Set up, maintain, and monitor devices that support business operations. These devices include anything from projectors and smartboards in a training room to the devices in the server room. a. network administrators b. systems administrators c. web administrators d. database administrators e. cybersecurity analysts f. technical support specialists

b. systems administrators

Which type of transmission media can broadcast in baseband mode? a. Wireless transmission b. Coax cable c. Optical wire d. Twisted pair cable

b. Coax cable

UK, 1944. Binary, electronic, programmable, describes which of the early computers? a. Zuse Z3 b. Colossus Mark 1 c. Atanasoft-Berry d. Zuse e. Colossus Mark 2 f. Harvard (Mark 1)

b. Colossus Mark 1

Protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored on computers. The Act applies to email, telephone conversations, and data stored electronically. a. Family Educational Rights Act 1974 (FERPA) b. Electronic Communication Privacy Act 1986 c. Digital Signature Act of 1998 (SEAL) d. Computer Matching and Privacy Protection Act of 1988 e. Health Insurance Portability and Accountability Act 1996

b. Electronic Communication Privacy Act 1986

Which function would Mei be completing in her database administrator role? a. Connecting two or more computers together so they can communicate b. Giving new users access to various databases c. Managing the telephone system network d. Training employees to use the billing applications

b. Giving new users access to various databases

What is a tree-like structure of records in a database referred to as? a. Flat file b. Hierarchical database structure c. Relational database structure d. Field

b. Hierarchical database structure

Renting hardware is what type of cloud service? a. SAAS b. IAAS c. PAAS

b. IAAS

As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct? a. It outlines what is not acceptable use of computers. b. It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people. c. It can be used by companies to train professionals how to act. d. It provides a legal mechanism for prosecuting unethical people.

b. It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people.

The lowest level programming languages understood by computers, representing instructions in binary (0s and 1s). a. scripting languages b. machine language c. assembly language d. interpreted language e. compiler f. high-level language

b. Machine language

Cache memory and registers. a. DRAM b. SRAM c. BIOS d. hard drive e. peripheral devices f. ROM g. RAM

b. SRAM

When you visit Mei's office's website, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other previous activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers? a. No, they impede the user interaction with the website. b. Yes, the cookies allow a web application to respond to the user as an individual. c. Yes, as long as the patient regularly clears cookies from their machine. d. No, patient information could be leaked

b. Yes, the cookies allow a web application to respond to the user as an individual.

_____ are used to connect to different types of network and provide management of the message. For example, it can connect a twisted pair and coaxial network. It analyzes the network message and will only ____ the network if a message is addressed to a device on the other side. a. repeaters b. bridges c. switches d. routers

b. bridges

abc, def456, 3erf78!@ are examples of what type of data? a. Boolean values b. character strings c. floating point numbers d. integers e. characters

b. character strings

This plan specifies how a business will resume after an event to continue its operations. a. business continuity b. disaster recovery c. business disaster d. business reconciliation

b. disaster recovery

IP addresses are traditionally written in _____________ notation. a. mnemonic b. dotted decimal c. encrypted d. binary

b. dotted decimal

Format organizes data using tree-like, or organizational chart-type structures. a. flat file database b. hierarchical database c. relational database d. Structured Query Language (SQL)

b. hierarchical database

In this type of network, every device is connected directly to every other device in the network. a. ring network b. mesh network c. bus network d. star network

b. mesh network


Ensembles d'études connexes

Memory and Cognition: Unit 2 "Memory"

View Set

Laws and/or Policies to Ensure Data Privacy and Patient Confidentiality in the International and Local Setting

View Set

ANTHROPOLOGY.111 EXAM 1 USI W/ DR. DAUER

View Set

Pharmacology- Renal and Cardiovascular (UWORLD)

View Set

Microeconomics Exam #1 Chapters: 1 & 3

View Set