Intro to IT Pre-Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which statement is true concerning compiled and interpreted computer language?

A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.

What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?

A copyright.

Which is true of databases and the applications that interact with them?

Applications are interdependent with the database.

What are two necessary elements of business continuity planning?

Assessing key organizational activities. Identifying risks that may occur.

Which goal of Information Assurance and Security (IAS) requires the information is accessible when needed?

Availability.

What type of information processing a while's input data to be excepted as a set of records and processed as a unit?

Batch.

Which technique uses all possible combinations of letters and numbers to crack a password?

Brute force.

How can an organization assistant employees with the ethical use of information technology?

By developing policies for information usage.

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Data mirroring.

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. Which characteristic of valuable data is the manager considering?

Data.

Which category of computer has a next ternal flatscreen monitor, optical disc drive, and a large capacity hard drive?

Desktop.

On which tier of an N-Tier architecture model are user interface is developed?

Presentation.

Which field must contain a unique value in order for relational database table to function?

Primary key.

An employee needs to edit the contract and prepare a hard copy for the project team. Which two peripheral devices should be used?

Printer. Monitor.

What is the difference between processing in storage?

Processing involves temporary information, while storage involves permit information.

What is the difference between proprietary and open-source software license?

Proprietary software has cost whereas open-source software is free.

Which characteristic identifies application software that is cloud-based?

Provided by third-party providers.

The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need?

Proxy server.

Which communication medium is typically used when sending data transmissions over very long distances?

Radio signals.

Which action would support confidentiality?

Enabling file encryption.

Match each action with the corresponding category.

Engages in best practices for information systems. -Part of the role of an IT professional association. Writes laws dealing with information technology. -Outside of the role of an IT professional association. Provides professional standards for ethical behavior. -Part of the role of an IT professional association.

What is the purpose of an End User License Agreement for commercial software package?

Establishes the customers right to use the software.

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territory/regions?

Expanding the infrastructure to support additional locations.

Which tube computer peripherals or connected to the computer through a port?

External Microphone USB flash drive

Which SQL clause is used to inform the database management system (DBMS) which table should be interrogated by the query?

FROM

Which item is a storage device?

Flash drive.

What are the three main categories of databases?

Flat file, relational, hierarchal.

Which motherboard component helps cool the CPU?

Heat Sink.

Which term is defined as a collection of information used to support management of an organization?

Information system.

Which is one of IT's roles in globalization?

It allows companies to reach a wider customer base.

What is the purpose of an IT department?

It helps organization achieve strategic goals.

What effect does scope creep have on a project?

It impacts the allocation of resources for the project.

What is the definition of information technology (IT)?

It is the technology used to create, maintain, and make information accessible.

How does a compiler work?

It requires the components of the software to be defined from the onset.

Match each description with the type of computing ecosystem it describes.

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. -Virtual Machines Each computer is roughly equal to every other computer. -Peer-to-peer. One computer will request information from another computer, which responds with requesting information. -Client-server

What is another term for a formula that outlines how to execute a task?

Algorithm.

Which system requirement is an example of considering user needs in the design of an information system?

Allowing easy access to customer account information.

Which statement correctly describes the operating system?

Allows the user to control the actions of the software, and through the software, to access hardware.

Which action by application programs require support from an operating system?

And Internet browser display the webpage.

What steps should be taken by a business when a third-party solution is found that will benefit a project?

Contacted the group to arrange a demo of their product.

Which two components are part of a central processing unit (CPU)?

Control unit (CU). Arithmetic logic unit (ALU).

Which component facilitates communication between the other two components in the MVC architecture model?

Controller.

Which benefit is provided by a computer network in a business?

Cost for hardware resources are decreased.

Which risk assessment question is part of the initiation phase?

Could the end-users reject the outcome of the project?

In which category of the DIKW hierarchy would business intelligence be located?

Knowledge.

What is true about the Linux operating system?

Linux runs on both servers and workstations.

Which low-level language corresponds one-to-one with assembly?

Machine language.

In which type of network topology is each networked device directly connected to every other network device?

Mesh.

Which IT position has the responsibility of working with routers and switches?

Network administrator.

Which two are parts of an information system?

Networks. Databases.

Which type of systems conversion involve starting the conversation with a portion of end-users?

Pilot.

In what phase of our project us time estimation occur?

Planning.

Which part of the uniform resource locator (URL) identifies the location of the document on the server?

Resource path ID.

Which service allows users to use the software application installed on the remote server?

SaaS

Which regulation governs the actions of a company in the case of data records been compromised, lost, or stolen?

Security breach notification laws.

What type of software permits free temporary use followed by a long-term activation for a fee?

Shareware.

Which is a type of two-factor authentication?

Smart card.

Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database?

String data.

Which data type is used to represent product order code that comprises alphanumeric characters?

String.

Which two languages have traditionally been used for automation rather than software development?

TCL Python

What indicates a specific Internet location?

The IP address.

Which description explains the role of a domain name system (DNS)?

Translate human-readable aliases into IP address is.

What is the role of drivers in facilitating communication between applications and databases?

They allow the application to interact with the database.

Which is a characteristic of high-level languages?

They use object-oriented programs.

In which generation or silicon chips first used in computers?

Third generation.

A department manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next you're have to be made. Which characteristic of valuable data is the manager considering?

Timely.

Why is it important to ensure that data support business goals?

To aid in making strategic decisions.

What is the role of the systems administrator?

To install and maintain network resources.

What is the database administrators your role in security?

To institute protocols to protect the databases from external threats.

Which two software application packages would be classified as productivity software?

Word Processor Spreadsheet Program


संबंधित स्टडी सेट्स

Chapter 8: Developing Your Interpersonal Skills

View Set

Chemistry Chapter 6 Mixed Review

View Set

NClex / Basic Physical Care 2nd set

View Set

Intro to Psychology Final Study Guide

View Set

Chapter 1 - Introduction to Networks

View Set