1st pre assessment
In which generation were silicon chips first used in computers? First generation Second generation Third generation Fourth generation
C
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario? Your Answer Correct Answer Answer Choices Data Information Knowledge Wisdom
a
How can an organization assist employees with the ethical use of information technology? Your Answer Correct Answer Answer Choices By developing policies for information usage By monitoring network throughput By ensuring databases are backed up By establishing optimal server performance
a
What indicates a specific Internet location? Your Answer Correct Answer Answer Choices The IP address The interrupt vector The packet Identifier The Media Access Control (MAC)
a
What is the difference between proprietary and open-source software license? Your Answer Correct Answer Answer Choices Proprietary software has a cost whereas open-source software is free. Open-source software lacks technical support whereas proprietary software provides this assistance. Open-source software is purchased from a vendor Proprietary software can be copyrighted by the business that uses it whereas open-source software cannot be copyrighted.
a
What is the purpose of an End User License Agreement for a commercial software package? Your Answer Correct Answer Answer Choices Establishes the customer's right to use the software Establishes the customer's right to resell the software Establishes the customer's right to modify the source code Establishes the customer's right to purchase without paying user fees
a
What is the purpose of an IT department? Your Answer Correct Answer Answer Choices It helps the organization achieve strategic goals. It promotes the firm's products. It hires employees for the organization. It oversees funds flowing through the organization.
a
What is the role of drivers in facilitating communication between applications and databases? Your Answer Correct Answer Answer Choices They allow the application to interact with the database. They allow all the data to be communicated via the network. They allow ODBC to be used for interactions with the database and applications. They allow SQL to manage communications between applications and databases.
a
What step should be taken by a business when a third-party solution is found that will benefit a project? Your Answer Correct Answer Answer Choices Contact the group to arrange a demo of their product Build the software with in-house resources Suggest that the company continues to explore options Begin coding the solution with estimated parameters
a
Which IT position has the responsibility of working with routers and switches? Network administrator Systems administrator Database administrator Website administrator
a
Which component facilitates communication between the other two components in the MVC architecture model? Your Answer Correct Answer Answer Choices Controller View Model Presentation
a
Which data type is used to represent product order code that comprises alphanumeric characters? Your Answer Correct Answer Answer Choices String Fixed-point Floating-point Boolean
a
Which is a type of two-factor authentication? Your Answer Correct Answer Answer Choices Smart card Least privilege Packet sniffing Access right
a
Which risk assessment question is part of the Initiation Phase? Your Answer Correct Answer Answer Choices Could the end users reject the outcome of the project? Was the project completed within budget? What were the strengths of the project? Did the scope change after the induction of the project?
a
Which type of systems conversion involves starting the conversion with a portion of end users? Your Answer Correct Answer Answer Choices Pilot Direct Parallel Phased
a
An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Choose 2 answers Your Answer Correct Answer Answer Choices Printer Monitor Scanner Web camera
a b
What are two necessary elements of business continuity planning? Choose 2 answers Your Answer Correct Answer Answer Choices Assessing key organizational activities Ensuring continuity in the sequence of staffing schedules Identifying risks that may occur Hiring an outside consultant to develop a plan
a c
In what phase of a project does time estimation occur? Your Answer Correct Answer Answer Choices Initiation Planning Executing and Controlling Closing
b
On which tier of an N-Tier architecture model are user interfaces developed? Your Answer Correct Answer Answer Choices Data Presentation Logic Application
b
What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years? Your Answer Correct Answer Answer Choices A patent A copyright A trademark A trade secret
b
What is true about the Linux operating system? Your Answer Correct Answer Answer Choices Linux is another name for Unix. Linux runs on both servers and workstations. Linux was invented by AT&T Bell Laboratories. Linux provides only command line user interface.
b
What statement is true concerning compiled and interpreted computer language? Your Answer Correct Answer Answer Choices Both compiled and interpreted languages are written in binary code. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. A compiled language program is portable and can be run on multiple types of systems, whereas an interpreted program runs on a single type of system. An interpreted language program runs faster than a compiled language program.
b
Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query? Your Answer Correct Answer Answer Choices WHERE FROM HERE SELECT
b
Which action by application programs requires support from an operating system? Your Answer Correct Answer Answer Choices A word processor program edits a file. An Internet browser displays a web page. A photo editing software enhances a picture. A payroll program computes federal tax of an employee.
b
Which low-level language corresponds one-to-one with assembly? Your Answer Correct Answer Answer Choices Translator language Machine language Compiler language Programming language
b
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen? Your Answer Correct Answer Answer Choices Computer Matching and Primary Protection Act of 1988 Security Breach Notification laws The Electronic Communication Privacy Act of 1986 Digital Signature and Electronic Authorization laws
b
Which system requirement is an example of considering user needs in the design of an information system? Your Answer Correct Answer Answer Choices Including an eye-tracking device for an input device Allowing easy access to customer account information Ensuring that insertions into the buffer are limited in size Incorporating a program that can translate text into spoken words
b
In which category of the DIKW hierarchy would business intelligence be located? Your Answer Correct Answer Answer Choices Data Information Knowledge Wisdom
c
What is a role of the systems administrator? Your Answer Correct Answer Answer Choices To install and maintain the website To design networks To install and maintain network resources To develop and maintain the websites on the company web server
c
What is another term for a formula that outlines how to execute a task? Your Answer Correct Answer Answer Choices Process User-defined function Algorithm Pseudocode
c
What type of information processing allows input data to be accepted as a set of records and processed as a unit? Your Answer Correct Answer Answer Choices Real-time Event-driven Batch Just in time
c
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territories/regions? Your Answer Correct Answer Answer Choices Supporting the continuation of the current infrastructure Scheduling their own internal meetings to discuss department goals Expanding the infrastructure to support additional locations Working independently from business management to achieve company goals
c
Which is a characteristic of high-level languages? Your Answer Correct Answer Answer Choices Language translator programs are required. Code is more difficult to write than low-level language. They use object-oriented programs. Zeros and ones are used to produce the code.
c
Which service allows users to use a software application installed on a remote server? Your Answer Correct Answer Answer Choices laaS RFID SaaS Paas
c
Which term is defined as a collection of information used to support management of an organization? Your Answer Correct Answer Answer Choices Information Technology Information Security Information System Information Archiving
c
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? Your Answer Correct Answer Answer Choices Beta Alpha User Acceptance Analysis
c
Which two are parts of an information system? Choose 2 answers Your Answer Correct Answer Answer Choices Oscilloscope Customers Networks Databases
c d
Which two languages have traditionally been used for automation rather than software development? Choose 2 answers Your Answer Correct Answer Answer Choices C++ COBOL TCL Python
c d
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? Your Answer Correct Answer Answer Choices Numeric integer Floating point Boolean String data
d
How does a compiler work? Your Answer Correct Answer Answer Choices It relies on a session to complete its task. It allows a programmer to easily test out changes to code. It takes the most recent instructions and translates them into machine language. It requires the components of the software to be defined from the onset.
d
What is the definition of information technology (IT)? A It is a system of dependent parts working separately to accomplish information goals. B It is a system indirectly used to support and improve particular aspects of a department. C It is the technology used to create data, configure servers, and construct buildings. D It is the technology used to create, maintain, and make information accessible.
d
What type of software permits free temporary use followed by long-term activation for a fee? Your Answer Correct Answer Answer Choices Proprietary Public Domain Open Source Shareware
d
Which characteristic identifies application software that is cloud-based? Your Answer Correct Answer Answer Choices Hosted on an individual computer Hosted in the internal business network Provided by servers in the internal business network Provided by third-party providers
d
Which communication medium is typically used when sending data transmissions over very long distances? Your Answer Correct Answer Answer Choices Coaxial cable Twisted pair cable Optical fiber Radio signals
d
Which is true of databases and the applications that interact with them? Your Answer Correct Answer Answer Choices The database can support at most one application. The database determines the application classes. Applications store data in their own files. Applications are interdependent with the database.
d
Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? Your Answer Correct Answer Answer Choices Protocol IP address Domain name Resource path ID
d
Which statement correctly describes the operating system? Your Answer Correct Answer Answer Choices Consists of programs that end users run to accomplish some tasks and is sometimes referred to as horizontal software Works with hardware to provide a network service that can be distributed across several machines on the network Requires the user to have specialized training concerning specific commands that must be entered with proper syntax Allows the user to control the actions of the software, and through the software, to access hardware
d
Why is it important to ensure that data support business goals? Your Answer Correct Answer Answer Choices To provide opportunities for communication To ensure raw data is captured To establish needs of users To aid in making strategic decisions
d