IT final exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

System administrator

Responsible for administering the organization's computer system

First Generation (1940-1950)

A computer built with vacuum tubes, a computer that requires programming in machine language, advancement hastened by World War II, The electronic numerical integrator and computer is developed.

Which of the following describes the knowledge stage in the DIKW model?

A management decision regarding how many people to hire after observing current employee levels and upcoming marketing promotions.

Susan is the IT Administrator for her school district. She is designing a new training for teachers to learn to use and integrate iPads in their classrooms. She is planning to send out a mass e-mail to all of the middle school math teachers. She needs to ensure that she has the most ____________ list for her mailing.

Accurate. It is important that all middle school math teachers get the e-mail. Susan needs to have an accurate list to ensure this happens.

A system administrator does the following

Administer the computers in an organization; install software; modify/update operating system; create accounts; train users; secure system; troubleshoot system; add hardware.

Which of the following statements describes the difference between information systems and information technology?

An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software.

Which of the following statements are true about an information system? Select two that apply.

An information system is different than Information Technology. An information system does not need to involve technology.

Help Desk Duties

Answering e-mails about software questions. Routes questions to the most appropriate IT professional.

Which of the following would NOT be the responsibility of the system administrator?

Answering e-mails from potential customers.

System level programming: shell scripts to automate processes, manipulating configuration files for system services

Bash, csh scripts, DOS scripts, Ruby scripts, C/C++ programs.

General purpose computer

Can execute any program that can be written for that computer.

The software develop field was a result of computer hardware innovations in the third generation

Computer families made it possible to write programs for multiple computers, so selling software became more viable

Information Technology includes

Computer networks and IT personnel

Which of the following statements is NOT a major development associated with the second generation of computers?

Computers became available for home use. Second generation computers were still expensive and required expert knowledge to use.

Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?

Data

_______ can be obtained from a camera cord, bar code reader, pen tablet, or values entered by the user.

Data

What is data? (DIKW)

Data are the input directly received by the human (or computer). Data typically are thought of as signals received by the senses: sight, sound, smell, taste, feel. For a computer, data might be the values entered by the user when running an application, although in today's computing, data might also be received through camera, microphone, bar code reader, sensor, or pen tablet, to name but a few. The input is generally not usable until it has been converted into a relevant form. For a computer, that would be a binary representation.

DIKW Hierarchy

Data, information, knowledge, wisdom hierarchy

Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively. Which of the following titles most fits Javier's job?

Database Administrator

Which of the following describes the duties of a web administrator?

Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.

A database administrator does the following

Install, configure, and maintain database and database management system; back up database, create accounts; train users.

At the time of its creation, which of the following characteristics was unique to ENIAC?

ENIAC was a general-purpose computer. Other computers at the time were special purpose computers, running programs of a specific type. ENIAC could execute any program written for it

Which of the following descriptions best represents the reliable characteristic of quality data?

Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.

Which of the following statements accurately describe IT certifications?

Earning an IT certificate indicates an IT professional has a thorough understanding in a specific IT area.

Since she was a child, Rebecca has enjoyed taking things apart and putting them back together. She has built her own computer from scratch and loves to find ways to improve its capabilities. Which specialized IT focus would be a good fit for Rebecca?

Engineering

Once an IT professional obtains several certifications within his/her specific administrative role, it is not recommended that further certifications be pursued.

False, it is always important and recommended that IT professionals improve their education and certifications.

Computers in the home were a result of computer hardware innovations in the third generation.

False. Computers were not yet being used in the home at this time.

First generation computers were relatively inexpensive compared to today's computers.

False. Even without accounting for inflation, first generation computers were far more expensive than today's computers

The development of first generation computers was quickened by World War I

False. First generation computers were created by both sides an effort to gain the advantage in World War II

Certain computer programs could only be used on certain types of computers.

False. When manufacturers began focusing on creating families of computers with similar hardware instructions sets, programs could be written one computer and easily used on all other computers in the same family.

All IT programs are closely related to computer science and revolve heavily around programming.

False. While some IT programs at universities are closely related to computer science and revolve heavily around programming, not all programs are.

Second generation (1959-1965)

First mainframe computers, a computer built with transistors, first computers to use boolean operators, computers first used magnetic core memory

Duties of IT personnel

Gathering data and processing it into information, Maintenance of computers, networks, and operating systems, and writing software programs

Fourth Generation (1974-today)

Graphic user interfaces are introduced, IBM makes a single chip processor, the mark 8 (the first personal computer appears. Graphical interfaces and a variety of new software increased computer usage.

Bob lives in Arizona and works for a large company with employees located around the world. Bob responds to phone calls and e-mails sent by employees to a dedicated IT support address. He answers questions and is able to log in remotely to view information on an employee's computer. When he is not able to solve a problem, he routes the issue to another IT professional who can provide the necessary support.

Help desk

An IT degree may differ from a computer science degree in which of the following ways?

IT degrees may require less math than computer science degrees.

Which of the following was NOT a cause of the first generation of computers being unreliable?

Inexpensive materials. Materials for first generation computers were expensive, but the price did not affect the reliability of the machines

As a new sales manager, Sylvia is studying the sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working?

Information

____ is the output of some process.

Information

What is information? (DIKW)

Information is the second level and is often defined in the hierarchy as having been inferred from data. The term inferred (or inference) means that one or more processes have been applied to the data to transform it into a more useful form. Implicit in any process applied is that the resulting information is more structured and more relevant than the data by itself. The idea is here is that tend to be too low level for humans to make use of directly. A list of numbers, for instance, may not itself be useful in decision making, whereas the same list of numbers processed through statistical analysis may provide for us the mean, median, standard deviation, and variance, which could tell us something more significant.

Third Generation (1965-1974)

Integrated circuits are first used for computation and storage, computer networks are introduced, the first silicon chips are used in computers, minicomputers are available for as little as $16,000

What is knowledge? (DIKW)

Knowledge is the third level and a more vague concept tan either information or data. Knowledge is sometimes defined as information that has been put to use. In other cases, knowledge is a synthesis of several different sources of information. One way to think of knowledge is that it is information placed into a context, perhaps the result of experience gained from using information. Additionally, we might think of knowledge as being refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed. As an example, one may learn how to solve algebraic problems by studying algebraic laws. The laws represent information, whereas the practice of selecting the proper law to apply in a given situation is knowledge.

Data is ________ structured than information

Less

Which of the following tasks are commonly performed by a system administrator?

Maintaining the operating system of computers and other devices.

Which of the following employees would be considered IT personnel?

Maria, a computer programmer who debugs software issues for company users.

What is relevance? (Quality data)

Means that the data being used must apply directly to the decision being made. For instance, if information is needed about a customer's purchase history, in order to better serve the customer's needs, it is relevant to collect data on prior business transactions with the specific customer.

What is thoroughness? (quality data)

Means that the data must be compete. Data that is not thorough might contain errors or lapses of data. For example, a customer makes a purchase through the sales department at an electronics company that is to be delivered to their apartment. However, the customer does not provide

Elise needs to quickly prepare an inventory report for items that need to be reordered. To save time, she only checks the inventory for items used during the past week even though the order will be for supplies to last a month.

No, this is not quality data.

Mae is inputting data on new customers. She fails to check her work, which has a number of typos. The data will be used for an upcoming e-mail campaign.

No, this is not quality data.

Troubleshooting problem solving: detect a problem, diagnose its cause, find a solution

Poor processor performance, disk space full, virus or Trojan horse infection.

Which of the following is a role of IT personnel?

Processing data into information; installing, testing, and updating software; developing faster computer chips

Amazon tracks customers' purchases and then sends e-mails suggesting other items of a similar nature that might be of interest to the customer. This is an example of ___________

Relevant. The information from previous purchases is used to determine the types of products that may be relevant to that customer.

Hot Spot Hosting is a company that provides wireless networks to its customers. Approximately six months ago they sent out a customer satisfaction survey using Web Monkey. Since then, a new General Manager has started and she wants a new survey to be sent out requesting similar information with some changes to the questions. She does not like the Web Monkey tool and wants to use the company's resources to distribute the survey and collect data. She then wants the information from the two surveys combined and to use the results about how to improve their service. Changing the survey tool and instrument may make the data less ____________

Reliable. Since information is from two different survey sources and surveys are taken at different times from different customers, there would be a question as to the reliability of the information

Hardware: installing and configuring new hardware, troubleshooting, replacing or repairing defective hardware

Replacing CPUS and disk drives, connecting network cables to network hubs, switches, and routers

Database Administrator

Responsible for managing the organization's database management system and various databases. Additional duties include ensuring the security of data, creation of accounts to access the database, and configuring the database to be accessible over the organization's network.

Network Administrator

Responsible for the installation, configuration, maintenance, securing, and troubleshooting of the organization's computer network

Which of the following demonstrates an information system?

Shania is creating a printed handbook of company policies for new employees. Ahmad is installing new software to improve the ease of accessing the database. Ian is making updates to the company website to include the latest product information.

In which of the following scenarios should a user contact a help desk for assistance?

Sophia is having trouble developing an invitation list using her company's email program. She is not sure what she is doing wrong. Horatio is having problems inputting his time using the company's new project management tracking system.

Which of the following is NOT an important characteristic of an IT professional?

Strong math background and programming skills

Information Technology

Technology that enables the processing of data which includes the people who support Information Technology systems and who enable the processing of data. IT used in creating, maintaining, and making information accessible, which includes the software, data, and computer networks.

Which of the following statements best represents the relevant characteristic of quality data?

The data used applies to the question being answered.

Electronic Numerical Integrator and computer (ENIAC)

The first digital, general-purpose, programmable computer, and it ended all interest in analog computers.

An IT professional is expected to understand essential concepts and practices related to which of the following?

Theoretical issues, components that make up a computer system, programming techniques

What is quality data?

There are specific characteristics that can be used to evaluate the quality of a piece of data which include the following: Relevance, timeliness, thoroughness, accuracy, reliability

Which of the description of duties below would be for a System Administrator?

This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system

Which of the following tasks would be handled by IT support personnel? Select all that apply.

Train new employees on system log-in protocol. Answer general questions about hardware and software use at an organization.

Veronica is leading a company-wide workshop on how to use a newly adopted software program. She makes a brief presentation to introduce the program, and then walks participants through the steps they are likely to engage in when they use the system. She fields questions and inquires about additional information the participants may need to be able to use the program effectively.

Training

Which of the following statements is NOT accurate in describing the distinctions between first and second generation computers?

Transistors emitted more heat than vacuum tubes so a new type of material had to be used for the computer housing. Heat emission was an issue associated with vacuum tubes that was alleviated by the shift to transistors in second generation computers.

Information management system type programs focus more on application of software as opposed to the programming behind the software.

True, information management system type programs are not based heavily on programming.

First generation computers were less reliable than today's computers

True. Between the relatively short shelf life of vacuum tubes and the difficulty of programming by physically connecting separate pieces of hardware, first generation computers had high failure rates.

IT professionals often acquire certifications to improve their job prospects and opportunities for advancement.

True. Information Technology career certifications are a valuable addition to an IT professional's resume.

Even smaller businesses could now afford a "mini" version of a mainframe computer.

True. Like the transition from the first to the second generation, the switch from the second to the third generation was marked by the adoption of a new technology (integrated circuits) that was both smaller and more cost effective than previous technologies.

Silicon chips replaced transistor.

True. Silicon chips could replace transistors and interface fasted with the magnetic memory cores.

Computer networks are a result of computer hardware innovations in the third generation.

True. The need to connect dumb terminals to the organization's main computer led to the rise of computer networking.

First generation computers used vacuum tubes for storage

True. The use of vacuum tubes for storage was a defining characteristic of first generation computers.

Integrated circuit boards could now be used for both computation and memory.

True. These new chips were able to combine both transistors and memory into much smaller form factor than was previously possible in the second generation

Knowledge of operating systems: Operating system installation, application software installation, user account creation, and system monitor

Versions of Linux, versions of Unix, windows, and Mac OS.

What is timeliness? (Quality data)

When there is a delay in data, it may no longer be of use or properly serve its purpose. Data must be efficient and must be provided in a timely manner so that companies can utilize it in their business. Consider a company attempting to set a budget for the fiscal new year. Ideally, they would have access to financial data from the most recent year and possibly several years prior in order to evaluate trends in spending, then create the budget accordingly.

What is wisdom? (DIKW)

Wisdom is the fourth level and provides a social setting to knowledge. Some refer to wisdom as an understanding of "why" whether this is "why things happened the way they did" or "why people do what they do." Wisdom can only come by having both knowledge and experience. Knowledge, on the other hand, can be learned from others who have it. Wisdom is the ultimate goal for a human in that it improves the person's ability to function in the modern world and to make informed decision that take into account beliefs and values.

A network administrator does the following

Work with routers and switches; physical and software troubleshooting; ensuring all computers can fully utilize the network.

Andrew places a report on his manager's desk containing detailed information on the average yearly cost for computer maintenance and updates for the last five years. His manager is preparing the annual budget for the IT department.

Yes, this is quality data.

Characteristics of ______ include: more structure resulting from a process that has been applied, more relevant, more useful in decision making.

information

What is an information system?

is a collection of data and information used to support management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data, and the delivery of information. Includes hardware, software, networks, and databases that work together to allow an organization to manage data and information.

Define Information technology

is the technology used in creating, maintaining, and making information accessible as well as the people who supply and support the use and integration of Information Technology in an organization.

System security: ensuring proper system security is in place, following or drafting policies for users, monitoring for threats.

keeping up with the latest security patches, configuring a system firewall, installing antiviral/antimalware software, examining log files for evidence of intrusion and system security holes.

The two new pieces of hardware that symbolized the second generation computers included the ____________________ and the _______________________

magnetic core memory and transistor. This is one of the two pieces of hardware. A huge advantage of using transistors over vacuum tubes was that they could be mass produced.

Matt was recently hired by Today's Technology Solutions as the _____________. During his second week on the job, Loise came to him because her computer was not connecting to the Internet. In addition, her colleague in the next cubicle was not able to get online either or to access the shared file server.

network administrator

Information can be defined as

processed data

The Volleyball Academy of Central Florida has grown into a very large organization that has over 1,000 members. They are moving more and more of their processes to online - from handling event registrations to purchasing clothing and sports equipment. Shanteal is the ____________ and has been diligent in ensuring the online portal is securing quality data. She also has made sure the organization's firewalls are up to date and able to withstand new threats.

security administrator

Jose's organization has recently hired 50 new interns to fulfill positions in a variety of departments. He installed online training software for the new hires and configured the software to be used and will be maintaining the software. His boss also asked him to monitor the activities of the new interns by monitoring the log files that the company also uses for data mining. Jose's role in the IT department is most likely as a _________.

website administrator


संबंधित स्टडी सेट्स

Government and Economics Unit 2 lesson 8 How a Bill becomes Law: Part 2

View Set

Mgt 3023 : Personality and Values

View Set

Bones, Location, Articulation, and Markings

View Set

Chapter 61: Caring for Clients Requiring Orthopedic Treatment

View Set