Introduction to IT
Which two are parts of an information system? Choose 2 answers. -Oscilloscope -Customers -Networks -Databases
-Networks -Databases
An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Choose 2 answers. -Printer -Monitor -Scanner -Web camera
-Printer -Monitor
What are two necessary elements of business continuity planning? Choose 2 answers -Assessing key organizational activities. -Ensuring continuity in the sequence of staffing schedules. -Identifying risks that may occur. -Hiring an outside consultant to develop a plan
-Assessing key organizational activities -Identifying risks that may occur
Each computer is roughly equal to every other computer.
Peer-to-peer
A ____________ plan specifies how the business will keep providing products and services and generate revenue after an event. A. Disaster Recovery B. Business Continuity C. Disaster Reconciliation D. Business Reconciliation
Business Continuity
What is the minimum grade of network cable required to transmit 1 Gpbs? A. CAT3 B. CAT5e C. CAT2 D. CAT5
CAT5e
Giving rights to new users so they can access various databases is a very common task database administrators perform. Mei's medical office has outsourced IT support services. What is one probable advantage of outsourcing? A. Employee satisfaction may increase. B. Reliance can be placed on the expertise of outsourcing vendors. C. The organization can transfer its accountability in terms of privacy laws. D. More control can be exercised over IT processing.
Reliance can be placed on the expertise of outsourcing vendors.
Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Implementation D. Requirements analysis
Requirements analysis
Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern? A. Resource risk B. Contract risk C. Resistance to change D. Project dependencies
Resistance to change
Which statement is not true of compilers and interpreters? A. All errors must be debugged before a compiler can compile the source code. B. Compilers do not translate source code into machine code. C. Interpreters translate and execute one line of source code at a time. D. Perl and Python are examples of programming languages that use an interpreter.
Compilers do not translate source code into machine code.
What is a cloud model that delivers third-party software such as email or games through the internet? A. Iaas B. SaaS C. RFID D. PaaS
SaaS
Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern? A. Budget risk B. Scope creep C. Resistance to change D. Project dependencies
Scope creep
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive? A. Handheld B. Laptop C. Desktop D. Mainframe
Desktop
Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query? A. WHERE B. FROM C. HERE D. SELECT
FROM
Which item is a storage device? A. Scanner B. Printer C. Flash Drive D. Monitor
Flash Drive
Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Implementation D. Requirements analysis
Implementation
Which IT position has the responsibility of working with routers and switches? A. Network administrator B. Systems administrator C. Database administrator D. Website administrator
Network administrator
Which statement describes the role of a network administrator? A. Network administrators are responsible for maintaining websites. B. Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network. C. Network administrators are accountable for the installation and maintenance of the resources on a network. D. Network administrators have a long list of essential responsibilities but mostly focus on the design, development, and support of database management systems.
Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.
Reflect for a moment about ethics, then respond to the following question. As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct? -It provides a legal mechanism for prosecuting unethical people. -It outlines what is not acceptable use of computers. -It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people. -It can be used by companies to train professionals how to act.
It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people.
Facts gathered from observations or from a clock that measures time are examples of data. What is not an example of data? A. On/off B. It is cold outside C. 9:30 a.m. D. 18:30
It is cold outside
What is the definition of information technology (IT)? A. It is a system of dependent parts working separately to accomplish information goals. B. It is a system indirectly used to support and improve particular aspects of a department. C. It is the technology used to create data, configure servers, and construct buildings. D. It is the technology used to create, maintain, and make information accessible.
It is the technology used to create, maintain, and make information accessible.
How does a compiler work? A. It relies on a session to complete its task. B. It allows a programmer to easily test out changes to code. C. It takes the most recent instructions and translates them into machine language. D. It interprets instructions into pseudo code.
It takes the most recent instructions and translates them into machine language.
Which language is often used for rapid prototyping and the creation of GUIs? A. TCL B. C++ C. COBOL D. Python
TCL
What is the primary duty of a computer support specialist? A. The computer support specialist is mainly responsible for allowing an organization to take full control of its data. B. The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients. C. The computer support specialist primarily operates as a trainer and troubleshooter. D. The computer support specialist primarily identifies and helps clients adopt IT services or technologies.
The computer support specialist primarily operates as a trainer and troubleshooter.
What is the role of drivers in facilitating communication between applications and databases? A. What is the role of drivers in facilitating communication between applications and databases? B. They allow all the data to be communicated via the network. C. They allow ODBC to be used for interactions with the database and applications. D. They allow SQL to manage communications between applications and databases.
They allow the application to interact with the database.
Most of the data stored today are unstructured and include things such as text, blogs, clickstreams, tweets, and audio. This data is not organized in a way that allows for analysis. True or False
True
Which role is responsible for maintaining websites? A. Data analyst B. Network engineer C. Cloud architect D. Web administrator
Web administrator
IP addresses are traditionally written in _____________ notation. A. encrypted B. binary C. mnemonic D. dotted decimal
dotted decimal
Which functions would Mei be completing in her network administrator role? Choose 2 answers. -Connecting two or more computers together so they can communicate -Training employees to use the billing applications -Managing the telephone system network -Giving new users access to various databases
-Connecting two or more computers together so they can communicate -Managing the telephone system network
Which two components are parts of a central processing unit (CPU)? Choose 2 answers. -Control unit (CU) -Read only memory (ROM) -Arithmetic logic unit (ALU) -Random access memory (RAM)
-Control unit (CU) -Arithmetic logic unit (ALU)
Which two computer peripherals are connected to the computer through a port? Choose two answers. -DVD -PC Card -External Microphone -Camera Card -USB Flash Drive
-External Microphone -USB Flash Drive
Which of the following would be a disadvantage of an ethical code of conduct? Choose 3 answers. -It has no legal impact. -It is entirely voluntary. -It is legally binding. -It may not apply to new issues.
-It has no legal impact. -It is entirely voluntary. -It may not apply to new issues.
The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? Choose 2 answers. -Mei can disclose information about A.J. only with a warrant. -Mei should only follow HIPAA guidelines and disclose information about A.J. to law enforcement. -Mei should follow the protocol advised by the medical council of her state. -Mei should follow both HIPAA and state privacy protocols.
-Mei should follow the protocol advised by the medical council of her state. -Mei should follow both HIPAA and state privacy protocols.
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user? A. A handheld is more usable. B. A desktop has more processing power. C. A handheld has more processing power. D. A desktop is more usable.
A desktop has more processing power.
Which action by application programs requires support from a networked operating system? A. A word processor program edits texts within a file. B. An Internet browser displays a web page. C. A photo editing software enhances a picture. D. A payroll program computes federal tax of an employee.
An Internet browser displays a web page.
Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario? A. Integrity B. Availability C. Confidentiality D. None of the above
Availability
The level of assurance that data will be available to people who need it, when they need it, is referred to as _____________. A. Integrity B. Availability C. Confidentiality
Availability
Which goal of Information Assurance (IA) requires that information is accessible when needed? A. Confidentiality B. Availability C. Integrity D. Stability
Availability
What type of information processing allows input data to be accepted as a set of records and processed as a unit? A. Real-time B. Event-driven C. Batch D. Just in time
Batch
Which part of the CIA triad addresses rules that restrict access to only those who need to know? A. Integrity B. Availability C. Confidentiality
Confidentiality
What step should be taken by a business when a third-party solution is found that will benefit a project? A. Contact the group to arrange a demo of their product B. Build the software with in-house resources C. Suggest that the company continues to explore options D. Begin coding the solution with estimated parameters
Contact the group to arrange a demo of their product
Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern? A. Scope creep B. Resource risk C. Contract risk D. Project dependencies
Contract risk
Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers? A. Costs for hardware resources are decreased B. Security of information is increased. C. Data integrity is increased D. Internet usage by employees for non-business tasks is decreased
Costs for hardware resources are decreased
Which risk assessment question is part of the Initiation Phase? A. Could the end users reject the outcome of the project? B. Was the project completed within budget? C. What were the strengths of the project? D. Did the scope change after the induction of the project?
Could the end users reject the outcome of the project?
A website logs a timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario? A. Data B. Information C. Knowledge D. Wisdom
Data
Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information? A. Structured query language (SQL) B. Database information processing C. Data and business intelligence
Data and business intelligence
What is the purpose of an End User License Agreement for a commercial software package? A. Establishes the customer's right to use the software B. Establishes the customer's right to resell the software C. Establishes the customer's right to modify the source code D. Establishes the customer's right to purchase without paying user fees
Establishes the customer's right to use the software
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion? A. Supporting the continuation of the current infrastructure B. Scheduling their own internal meetings to discuss department goals C. Expanding the infrastructure to support additional locations D. Working independently from business management to achieve company goals
Expanding the infrastructure to support additional locations
What is another term for a formula that outlines how to execute a task? A. Process B. User-defined function C. Algorithm D. Pseudocode
Algorithm
The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? Select all that apply. -Mei should use the same selection criteria for all candidates. -Mei should not discuss the job with Mary. -Mei should ask a colleague to interview Mary's daughter. -Mei should ask a colleague to sit in on the interview with Mary's daughter.
All of the above
What are examples of structured data? A. Telephone number B. Date of birth or transaction C. First and last name D. All of the above
All of the above
Why is merging unstructured and structured data essential? A. Both types of data contain essential information. B. Most of the data stored today is unstructured. C. Better insights and discovery of hidden connections in data sets help strengthen decision-making. D. All of the above
All of the above
What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore'; A. All records from the Patient table where the patient's last name is not "Moore" B. All records from the SQL table C. All records from the Patient table where the patient's last name is "Moore" D. All records from the Patient table
All records from the Patient table where the patient's last name is "Moore"
Which system requirement is an example of considering user needs in the design of an information system? A. Including an eye-tracking device for an input device B. Allowing secure access to customer account information C. Ensuring that insertions into the buffer are limited in size D. Incorporating a program that can translate text into spoken words
Allowing secure access to customer account information
Which statement correctly describes the operating system? A. Consists of programs that end users run to accomplish some tasks and is sometimes referred to as horizontal software B. Works with hardware to provide a network service that can be distributed across several machines on the network C. Requires the user to have specialized training concerning specific commands that must be entered with proper syntax D. Allows the user to control the actions of the software, and through the software, to access hardware
Allows the user to control the actions of the software, and through the software, to access hardware
Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario? A. Integrity B. Availability C. Confidentiality D. None of the above
Integrity
Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10. Which part of the CIA triad has been broken in this scenario? A. Integrity B. Availability C. Confidentiality D. None of the above
Integrity
What is one of IT's roles in globalisation? A. It provides support for JIT manufacturing. B. It allows companies to achieve ISO 9001:2008 certification. C. It provides tax havens for companies. D. It allows companies to reach a wider customer base.
It allows companies to reach a wider customer base.
What is the purpose of an IT department? A. It helps the organization achieve strategic goals. B. It promotes the firm's products. C. It hires employees for the organization. D. It oversees funds flowing through the organization.
It helps the organization achieve strategic goals.
What effect does scope creep have on a project? A. It provides additional control to the project. B. It increases unplanned costs for the project. C. It includes unqualified team members on the project. D. It adds non-essential features to the project.
It increases unplanned costs for the project.
Which network topology best handles downed links without losing connectivity between devices? A. Bus B. Ring C. Mesh D. Star
Mesh
What is the difference between proprietary and open-source software license? A. Proprietary software has a cost whereas open-source software is free. B. Open-source software lacks technical support whereas proprietary software provides this assistance. C. Open-source software can be freely modified whereas proprietary software cannot be modified. D. Proprietary software can be copyrighted by the business that uses it whereas open-source software cannot be copyrighted.
Open-source software can be freely modified whereas proprietary software cannot be modified.
Writes laws dealing with information technology. Outside of IT or Part of IT
Outside of the role of an IT professional association
Engages in best practices for information systems. Outside of IT or Part of IT
Part of the role of an IT professional association
Provides professional standards for ethical behavior. Outside of IT or Part of IT
Part of the role of an IT professional association
What is the role of the CPU in a computing system? A. Permanently storing all data and programs on the computer B. Performing instructions of computer programs C. Distributing signals between all the parts in the computer D. Temporarily storing activities before transferring them to the hard disk
Performing instructions of computer programs
What is the difference between processing and storage? A. Information is received by processing, while data is received by storage. B. Processing handles data and information, while storage is restricted to handling data. C. Processing collects and translates data into useful information, while storage places the translated data in specific locations. D. Users are responsible for processing, while computers are responsible for storage
Processing collects and translates data into useful information, while storage places the translated data in specific locations.
Which characteristic identifies application software that is cloud-based? A. Hosted on an individual computer B. Hosted in the internal business network C. Provided by servers in the internal business network D. Provided by servers in the internal business network
Provided by servers in the internal business network
The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need? A. Web server B. Proxy server C. Database server D. File server
Proxy server
Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? A. Protocol B. IP address C. Domain name D. Resource path ID
Resource path ID
Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern? A. Scope creep B. Project dependencies C. Contract risk D. Resource risk
Resource risk
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen? A. Computer Matching and Primary Protection Act of 1988 B. Security Breach Notification laws C. The Electronic Communication Privacy Act of 1986 D. Digital Signature and Electronic Authorization laws
Security Breach Notification laws
What type of software permits free temporary use followed by long-term activation for a fee? A. Proprietary B. Public Domain C. Open Source D. Shareware
Shareware
Which is a type of two-factor authentication? A. Smart card B. Least privilege C. Packet sniffing D. Access right
Smart card
Which data type is used to represent product order code that comprises alphanumeric characters? A. String B. Fixed-point C. Floating-point D. Boolean
String
Which statement describes the role of a systems administrator? A. Systems administrators are responsible for monitoring an organization's network for security breaches. B. Systems administrators are responsible for the installation and maintenance of the resources of an organization's network. C. Systems administrators are responsible for designing and developing software that makes hardware and software systems work. D. Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
What indicates a specific Internet location? A. The IP address B. The interrupt vector C. The packet Identifier D. The Media Access Control (MAC)
The IP address
Which statement about the systems analyst role is accurate? A. The role includes choosing appropriate network hardware. B. The role includes securing an organization's network. C. The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements. D. The role includes planning the allocation of network addresses across an organization.
The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements.
Which is a characteristic of high-level languages? A. They are machine dependent. B. Code is more difficult to write than low-level language. C. The source code has to be complied. D. The instructions interact directly with registers and memory.
The source code has to be complied.
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering? A. Timely B. Thorough C. Accurate D. Reliable
Timely
Why is it important to ensure that data support business goals? A. To provide opportunities for communication B. To ensure raw data is captured C. To establish needs of users D. To aid in making strategic decisions
To aid in making strategic decisions
What is the purpose of a business continuity plan? A. To develop plans for continued business operations regardless of the circumstances B. To identify who is responsible for permanent growth of the business in the event of natural disasters C. To assess risks for key processes in the event of man-made disasters D. To enable an organization to continue offering critical services in the event of disruptions
To enable an organization to continue offering critical services in the event of disruptions
What is a role of the systems administrator? A. To install and maintain the website B. To design networks C. To install and maintain network resources D. To develop and maintain the websites on the company web server
To install and maintain network resources
What is the database administrator's role in security? A. To eliminate data redundancy when integrating old with new systems B. To create a redundant server architecture C. To institute protocols to protect the databases from external threats D. To set ports on the router to secure the transport of data
To institute protocols to protect the databases from external threats
Which description explains the role of a domain name system (DNS)? A. Decodes packet addresses B. Transforms network nodes into URLs C. Renders host responses as sender directions D. Translates human-readable aliases into IP addresses
Translates human-readable aliases into IP addresses
Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs). True or False
True
Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information. True or False
True
Data includes raw facts or observations and, given context, becomes information. True or False
True
The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix. True or False
True
Which action would support confidentiality? A. Checking that data is correct B. Making sure data is available when needed C. Updating security software D. Ensuring that software is properly licensed
Updating security software
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? A. Beta B. Alpha C. User Acceptance D. Analysis
User Acceptance
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
Virtual machines
Which of the following is not true of Windows and Linux? A. Linux is case-sensitive. B. Linux places the home directory within the /home/. C. Windows uses the forward slash (/) to express directory paths. D. Windows' root directory is referred to by a letter.
Windows uses the forward slash (/) to express directory paths
What is another title for a web administrator? Choose 2 answers. - Web developer - Cybersecurity specialist - Web server administrator - Webmaster
-Web server administrator -Webmaster
Which disaster recovery strategy is used to save information to multiple hard drives at the same time? A. Cold site storage B. Data mirroring C. Storing tape backups D. Site sharing
Data mirroring
Which term is defined as a collection of information used to support management of an organization? A. Information Technology B. Information Security C. Information System D. Information Archiving
Information System
Which task describes the role of a database administrator? A. Working with organizations to keep their information systems secure and ensuring integrity, confidentiality, and availability of data B. Creating, documenting, executing, and manually creating test plans and procedures relating to system anomalies C. Integrating data from legacy systems to newer systems and playing a role in application design and development D. Organizing people, time, and other resources to make sure projects meet requirements and are completed on time and within budget
Integrating data from legacy systems to newer systems and playing a role in application design and development
Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person? A. Buffer overflow B. Black hat C. Packet sniffing D. Phishing
Phishing
Which type of systems conversion involves starting the conversion with a portion of end users? A. Pilot B. Direct C. Parallel D. Phased
Pilot
In what phase of a project does time estimation occur? A. Initiation B. Planning C. Executing and Controlling D. Closing
Planning
Which field must contain a unique value in order for a relational database table to function? A. Record number B. ID number C. Primary key D. Name
Primary key
Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern? A. Resource risk B. Resistance to change C. Project dependencies D. Scope creep
Project dependencies
Which type of systems testing includes having developers test internal structures of software? A. White-box B. Analysis C. User acceptance D. Beta
White-box
Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? Choose 3 answers. -Tom should resign from the software production company. -Tom and Mei should not discuss details of the contract outside official channels. -Mei should not disclose details of offers by any respondents to the RFP. -Both Tom and Mei should disclose the conflict of interest.
-Tom and Mei should not discuss details of the contract outside official channels. -Mei should not disclose details of offers by any respondents to the RFP. -Both Tom and Mei should disclose the conflict of interest.
Which two software application packages would be classified as productivity software? Choose two answers. -E-Mail -Word Processor -Spreadsheet Program -FTP Client
-Word Processor -Spreadsheet Program
Which of the following describes a computer support specialist's responsibilities? Choose 3 answers. - Working the help desk -Training help-desk personnel -Overseeing help-desk personnel -Using statistical and other quantitative methods to gain insights that support the organization's decision-making
-Working the help desk -Training help-desk personnel -Overseeing help-desk personnel
Unstructured data refers to data that is _____________. Choose 3 answers. -more complex -coded in a way that makes it easy to convert into a form usable for analysis -possibly stored in a format that is not easily decoded -more time-consuming to parse through to retrieve the essential information
-more complex -possibly stored in a format that is not easily decoded -more time-consuming to parse through to retrieve the essential information
In which generation were silicon chips first used in computers? A. 1st B. 2nd C. 3rd D. 4th
3rd Generation
What statement is true concerning compiled and interpreted computer language? A. Both compiled and interpreted languages are written in binary code. B. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. C. A compiled language program is portable and can be run on multiple types of systems, whereas an interpreted program runs on a single type of system. D. An interpreted language program runs faster than a compiled language program.
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years? A. A patent B. A copyright C. A trademark D. A trade secret
A copyright
What is a primary difference between a modern handheld computer and a modern desktop computer? A. A desktop has more processing power. B. A handheld is more usable. C. A desktop is more usable. D. A handheld has more processing power.
A desktop has more processing power.
Which is true of databases and the applications that interact with them? A. The database can support at most one application. B. The database determines the application classes C. Applications store data in their own files. D. Applications are interdependent of the database.
Applications are interdependent of the database.
Which technique uses all possible combinations of letters and numbers to crack a password? A. Brute force B. Packet sniffing C. Dictionary attack D. Password generator
Brute force
Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern? A. Budget risk B. Resource risk C. Contract risk D. Scope creep
Budget risk
How can an organization assist employees with the ethical use of information technology? A. By developing policies for information usage B. By monitoring network throughput C. By ensuring databases are backed up D. By establishing optimal server performance
By developing policies for information usage
What does the acronym CIA stand for in cybersecurity? A. Central Intelligence Agency B. Confidentiality, integrity, and availability C. Confidentiality, intelligence, accessibility D. Cybersecurity, internet, accessibility
Central Intelligence Agency
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? A. Numeric integer B. Floating point C. Boolean D. Character string
Character string
One computer will request information from another computer, which responds with requested information.
Client-server
Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages? A. Cloud database B. Data lake C. NoSQL databas D. Distributed database
Cloud database
Which type of transmission media can broadcast in baseband mode? A. Twisted pair cable B. Optical wire C. Wireless transmission D. Coax cable
Coax cable
Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Implementation D. Requirements analysis
Design
A _____________ plan specifies how a business will resume after an event to continue its operations. A. Disaster Recovery B. Business Continuity C. Disaster Reconciliation D. Business Reconciliation
Disaster Recovery
What are the three main categories of databases? A. Relation, join, project B. Flat file, relational, hierarchal C. Spreadsheet, simple, complex D. Table, query, report
Flat file, relational, hierarchal
Which function would Mei be completing in her database administrator role? A. Managing the telephone system network B. Connecting two or more computers together so they can communicate C. Training employees to use the billing applications D. Giving new users access to various databases
Giving new users access to various databases
What is the tool used to encode a document while focusing on appearance known as? A. HTML B. HTTP C. DNS D. URL
HTML
Where are the basic functions of the operating system located? A. Applications B. Kernel C. Utility software D. File manager
Kernel
Which type of computer peripheral is used only as an input device? A. External hard drive B. Monitor C. Docking station D. Keyboard
Keyboard
Which type of computer peripheral is used only as an input device? A. Monitor B. External hard drive C. Keyboard D. Docking station
Keyboard
In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located? A. Data B. Information C. Knowledge D. Wisdom
Knowledge
Which type of network is used to interconnect devices in a single office or building? A. WAN B. PAN C. SAN D. LAN
LAN
Which low-level language corresponds one-to-one with assembly? A. Translator Language B. Machine Language C. Compiler Language D. Programming Language
Machine Language
When you visit the website for Mei's office, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers? A. Yes, as long as the patient regularly clears cookies from their machine. B. No, patient information could be leaked. C. No, they impede the user interaction with the website. D. Yes, the cookies allow a web application to respond to the user as an individual.
Yes, the cookies allow a web application to respond to the user as an individual.
As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's: A. business plan. B. business continuity plan. C. risk management plan. D. information security plan.
business plan.