intro practice test E
Hot storage allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe. Hot storage solutions typically involve the latest and greatest storage equipment and the fastest protocols. In addition, hot storage is typically located close to the client or in multiple locations to ensure fast access. Please provide an example of this type of storage.
AWS
_________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Scrum and extreme programming are both examples of these methodologies. Scrum is a hands-on system consisting of simple steps: The system owner makes a prioritized wish list. The scrum team selects an item toward the top of the wish list and plans the implementation during an event called "sprint." The team completes the list of objectives while assessing progress in daily meetings called scrums. The sprint ends with the system ready to be released. A new sprint starts, using another item on the wish list. This process continues until the prioritized wish list is clear.
Agile method
Select the type of programming that best matches each code example. Elena is tired of programming her homemade robots through typing long strings of 1s and 0s. So, she creates a program that translates commands she can type in for her robots such as Stop, Go, and Turn, into strings of 0s and 1s
Assembly Language Programming Elena is using a form of basic programming that is translated directly into the proper machine language.
First City Bank is preparing to roll out a new online banking system for its customers. Installing the new hardware and software has taken longer than expected, but the manager is confident customers will be thrilled with the new service. On the day of the launch, a seemingly minor programming error causes the system to shutdown and reboot each time the clock reaches a new hour. It takes about ten minutes for it to be up and running again. Which security goal is at risk?
Availability.
Mary works for a large school district. Her responsibility is to monitor the site containing student attendance records. Mary has created an elaborate security system with unique identification numbers for each student. She has built in a number of security controls and is continually monitoring for unauthorized users. Each day, Mary takes two 10-minute breaks at exactly 10 a.m. and 3 p.m. Since she is gone such a short time she leaves whatever project she is working on up on on her computer screen for anyone to see. Which security goal is at risk?
Confidentiality.
The term ___________ refers to the processes of ensuring the cleanliness of data (i.e., that the data is relatively error-free). Dirty data can be caused by things such as duplicate records, incomplete or outdated data, and mistakes introduced as data is entered, stored, and managed. Data quality is crucial to operational and transactional processes within an organization and to the reliability of analytical reporting.
Data hygiene
___________ the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated. Typically, the process involves updating, standardizing, and de-duplicating records to create a single view of the data, even if it is stored in multiple systems.
Data scrubbing
Big Data requires structures that enable the capture, processing and storage of large quantities of data necessary that enable companies like Evolv to do HR analysis and for individuals like Nate Silver to predict political outcomes. Since the data used for these types of systems will usually reside across multiple systems what structure would be most commonly used to capture, store and process the data?
Data warehouse.
Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively. Which of the following titles most fits Javier's job?
Database Administrator
Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively.Which of the following titles most fits Javier's job?
Database Administrator.
Dante manages the inventory and ordering systems for a large auto parts manufacturing plant. He must make sure that part orders are in the company system and are updated if a client changes their order. Additionally, in order to plan production to meet the needs of upcoming or potential future orders, Dante must analyze patterns in ordering and recommend production rates to the plant manager. Choose the appropriate server.
Database Server
Zak makes a chart of how much of the development each person will have to do in order to meet the deadline. He makes a note that the club championship race may make it difficult to get the video done on time. He also notes that, depending on the video's file size, the club may need to pay an additional fee to purchase additional server space from the website hosting service.
Estimate time and cost.
A compiler translates source code into assembly language. A compiler checks source code for errors before translating it into object code. If the source code is found to have errors, the compiler specifies the errors. Errors must be resolved (also known as debugged) before the compiler can successfully recompile the source code. C, C++, C#, and Java programs need compilers to execute. true or false
False
Your organization has a policy prohibiting people from using their work computers to access Facebook during working hours. As you were walking by Fred's desk, you notice that Fred, who works under you, is using Facebook on his work computer during work hours, sharing information about an upcoming out-of-town trip he is planning to take. You are good friends with Fred and you figure no harm was done. Besides, he always gets his work done. You are making the best ethical decision based on the situation. true or false
False.
This generation of computers relied on machine languages, the lowest-level programming languages understood by computers. They could run one program at a time and it took a long time, sometimes weeks, to set up a different program. Punched cards were used for input, and the computers printed out the outputs.
First Generation
A graduate student gathering data for her dissertation research creates a survey using WebMonkey that uses a Likert-scale (values of 1-5) where participants indicate their agreement with questions by selecting a value. She also includes three questions for students to answer such as, "What words would you use to describe this course?" The graduate student needs to be able to capture this data in a database and then export the data into a data analysis software application. What type of database format would best meet her needs?
Flat file format.
Photomagnet is a software company that has released many versions of popular image editing software over the past ten years. Now in their sixth version of editing software, Photomagnet has decided that they will no longer support their very first basic image editing software program, because there are now several programs like it on the market and it is too basic to compete with their newer software versions. So, they have made it free to download for anyone wishing to use it for personal image editing. Choose the appropriate license.
Freeware.
Select the type of programming that best matches each code example. Jessica works for a company that builds training simulations for fire fighters. To build each training scenario, Jessica programs the behavior of the virtual fire fighter agents in the scenario using a language developed for the simulator. She can program the virtual fire fighter agents to enter the building, search for building occupants, and perform other common tasks based on simulated conditions.
High-level Language Programming. Jessica is using a high level programming language to create and program the virtual firefighters for her simulations.
Match the type of cloud computing service that best supports the organization in the scenario below.Technology Trends Today is a mid-size company with a limited hardware and software budget. They have often struggled with down-time which is hurting their customer service and ultimately company growth. Which cloud computing service would best support their needs?
IaaS.
In the DIKW hierarchy, what is processed to be useful; provides answers to "who", "what", "where", and "when" questions. This has been given meaning by way of relational connection. This "meaning" can be useful, but does not have to be. In computer parlance, a relational database makes information from the data stored within it. It is a meaningful message created by interpreting and analyzing items.
Information
Randy runs a small consulting firm and keeps all of his business contacts in a computer database. When Randy turns on his computer on Monday morning, he gets a weird error message. He calls in his IT specialist who determines their system has been infected with a virus. After hours of work, they think they have the customer database cleaned up, but occasionally, over the next few weeks, small errors still are being found. Which security goal is at risk?
Integrity
________ is one of the most popular programming languages. It runs on billions of devices worldwide, be it your car, television, laptop, or systems running on the cloud. However, it has limitations in the way it accesses and manages resources, which makes it challenging for the programmer. This is designed to run on many platforms, but it is certainly not optimized for any of them.
Java
Joe works as an Information Technology professional for a large pharmaceutical research company. As a part of his job, he maintains databases and electronic files on many drugs currently being researched by the company. The progress on research is confidential company information. As a part of his database maintenance, he sees that one of the drugs the company has been researching for years as a potential treatment for pancreatic cancer has been placed under inactive status. This is in spite of promising results based on a profit analysis of the treatment indicating that it wouldn't be a profitable drug for the company. Joe is very disappointed that the company would abandon research of a drug that potentially could help many people only because it doesn't seem profitable. Joe wonders whether it is his ethical duty to let people know about this research, which could save lives. However, Joe also signed a non-disclosure statement for the company that said he would not share any company information publicly.What would be the ethical course of action for Joe to take
Joe has an obligation to abide by his non-disclosure statement and say nothing.
An understanding of a specific subject, through experience (or education). Typically, knowledge is used in terms of a persons skill or expertise in a given area. Knowledge typically reflects an empirical, rather than intuitive, understanding. Plato referenced it as ""justified true belief."
Knowledge
Cold storage offers less frequent access and is maintained on minimal equipment that is considered lower performance. Returning to normal operations after a disaster is slower with cold storage. Many companies may try to use this type of storage for many reasons. What is the primary reason a company would pick cold over hot?
Less expensive
Select the type of programming that best matches each code example. Jeremy is building a small electronic toy bug in his home garage. He wants to program the toy bug to walk forward and backward when the switch is turned on directly through the internal chip in the toy by adjusting the electrical currents on the chip.
Machine Learning Programming. Jeremy is programming his toy directly at the lowest level to respond to changes in current created by the switch.
For the following scenario, which of the ISACA Code of Professional Ethics standards listed below is being violated?Ian has been asked to create a complicated database for the marketing department, which will be vital to the success of an upcoming product launch. Previously, Ian has only designed very basic databases and then only with help; however, he doesn't want to come across as incompetent, so he agrees to the complete the task by the end of the following week. He figures he can research and find the necessary information to create the database.
Maintain competency in their respective fields and agree to undertake only those activities they can reasonably expect to complete with the necessary skills, knowledge, and competence.
Matt was recently hired by Today's Technology Solutions as the _____________. During his second week on the job, Loise came to him because her computer was not connecting to the Internet. In addition, her colleague in the next cubicle was not able to get online either or to access the shared file server. What is the appropriate job title?
Network Admin
Cooper is working on recording audio tracks for his band and wishes that the audio editing software he downloaded had the ability to filter some of the lower frequencies. So, he goes into the program source code and makes some adjustments to the filtering algorithm. Cooper is so pleased with the results that he posts his algorithm on a forum for the software so that other users can implement his algorithm if they are looking for the same functionality. Choose the appropriate license.
Open Source.
Data is a strategic resource for an organization, informing operations and providing insights. While some organizations use data effectively, most entities collect data and do so without properly securing it or effectively using it. A significant portion of the collected data may be sensitive and include ________, such as social security numbers, names, and telephone numbers. When this data is not secure, instead of a strategic resource, data becomes a liability. What is this type of data called?
PII
Match the type of cloud computing service that best supports the organization in the scenario below.Matt works for a mid-size company that develops education apps. One of his team members, Martin, lives in Amsterdam, and another, Ake, lives in Thailand. Each team member brings a unique skill set to the team. Having an environment that allows them to work together in real time facilitates the development process. Which cloud computing service would best support their app development efforts?
PaaS.
For the following scenario, which of the ISACA Code of Professional Ethics standards listed below is being violated?Martina is an IT professional at Leiden Electronics. She is very strict in enforcing the IT Policies within her organization except when it comes to her close friends. Martina and her friends often spend their lunch hour shopping online, sharing the latest new YouTube videos, and making fun of other employees.
Perform their duties with objectivity, due diligence, and professional care, in accordance with professional standards.
Read the scenario below. Select whether the scenario describes a programming language or a scripting language. Vaughn is writing code to create a large multiplayer online game where users can download game code to their home computer and then connect to game servers over an internet connection. Vaughn is designing the game so that players can modify their avatars, explore multiple game environments, communicate with other players, and battle computer-generated monsters.
Programming Language.
3D model wiz is a new computer modeling software that is available for purchase online and through major software retailers. Marty buys a group license for 10 users for his graphics team. Choose the appropriate license.
Proprietary.
Antonio runs the computer lab for River County High School. Many of the teachers at the high school send students to the computer lab to work on research projects or homework assignments. Antonio is looking for a way to speed up access to websites that students commonly access, such as Wikipedia while also blocking certain websites that students shouldn't be on while they are working, like social networking sites. Choose the correct server.
Proxy Server
___________ and __________ manufacturing involves the use of nanoscale (extremely small) tools and nonbiological processes to build structures, devices, and systems at the molecular level. It is a technology based on the ability to build structures to complex, atomic specifications by means of mechanosynthesis, or reaction outcomes determined by the use of mechanical constraints.
Quantum Nanotechnology
QuestionEvolv captures large quantities of data with over 488 million data points. What is the most likely type of database structure that is used for this data?
Relational.
Hot Spot Hosting is a company that provides wireless networks to its customers. Approximately six months ago they sent out a customer satisfaction survey using Web Monkey. Since then, a new General Manager has started and she wants a new survey to be sent out requesting similar information with some changes to the questions. She does not like the Web Monkey tool and wants to use the company's resources to distribute the survey and collect data. She then wants the information from the two surveys combined and to use the results about how to improve their service. Changing the survey tool and instrument may make the data less?
Reliable
Match the element within the project initiation phase to the corresponding scenarios below. Julia has a very small staff that can help her create the interactive activities. Revenue has increased recently from an influx of visitors coming to see the two new lion cubs, and Julie decides to use some of these funds to hire an outside company to take photos of the animals for the website. Julie thinks that if her staff had to produce the artwork while developing the activities, it would take too long, and they might miss the wave of interest in the two cubs.
Resource Allocation.
Match the element within the project initiation phase to the corresponding scenarios below. Julia holds a meeting so that everyone on her team can discuss the pros and cons of the project. Rick worries that the images of the baby lion will quickly become outdated as the lion cubs grow up. Sean wonders whether spending the time updating the activities will delay other updates to the website that have been pending.
Risk Management
Preliminary Investigation: You ascertain that your customers are increasingly accessing your existing eCommerce website using mobile devices at a rate of 40% with the growth of 20% over the last 18 months.Analysis: You survey a subset of your existing customers to determine how they would like to use their mobile devices when ordering gourmet popcorn from your company.Logical Design: After determining user requirements, you begin developing a flowchart and data-flow diagram indicating how the new system is intended to operate.Physical Design: After verifying design based on flowcharts and data-flow diagrams with user groups (internal and external), you move on to design a model of the physical system including additional servers and workstations to handle increased business.Implementation: You begin acquiring the hardware and writing the software for the new system.Maintenance: After the system is rolled out you monitor it for any bugs and correct any that show up. With the increasing number of smartphones and tablets in use today and the decreasing number of laptops, you have been asked to develop a system for your organization that would allow your customers to purchase your product, g
SDLC
Match the type of cloud computing service that best supports the organization in the scenario below.Virtual Vistas is a small start-up marketing company that works with travel agencies around the world. Virtual vistas travels to locations to digitally capture landscapes and points of interest the travel agencies can use for promotions and to inform/engage their customers. Because Virtual Vistas employees travel around the world, their staff are always working remotely. Also, being a start-up, Virtual Vistas doesn't have the resources to have a large IT department. Which cloud computing service would most benefit Virtual Vistas?
SaaS.
The Central County School District has hired a local website development company to create a new webpage showcasing schools in the district with virtual tours of the school campuses and faculty profiles. As school district officials review the progress being made on their new website, one of their comments is that the faculty profiles should link to classes that each faculty member teaches with sample syllabi and activities so that parents can really get a feel for what academics are like at the school. April, who works for the website development company, knows that this feature is not in the original contract and that it will require a lot more work to collect the content from faculty and organize it into databases for each school. Updating the classes each school year would also be a substantial amount of work.
Scope creep.
Read the scenario below. Select whether the scenario should be completed by using a programming language or a scripting language. Cassandra is writing code to register conference attendees by extracting the attendee's information and saving it to a database. The information is obtained from the conference website and once they click submit the information is saved to the database and a new confirmation webpage is generated showing the attendees specific information.
Scripting Language.
Rick is a programmer who just received some exiting news. He is getting a promotion and will be joining a team of senior programmers using new computers built to use transistors. Rick will be working on the Honeywell 400 and the Univac 1108. Which generation of computers is Rick using?
Second Generation
The Volleyball Academy of Central Florida has grown into a very large organization that has over 1,000 members. They are moving more and more of their processes to online - from handling event registrations to purchasing clothing and sports equipment. Shanteal is the ____________ and has been diligent in ensuring the online portal is securing quality data. She also has made sure the organization's firewalls are up to date and able to withstand new threats. What is the appropriate job title?
Security Admin
Alexis is working on a class project and realizes she needs some screen recording software to complete the video tutorial for her class. She doesn't want to spend money and she isn't really sure what program will be best, so she downloads a 30-day free trial of a popular software program. It works great for 30 days, but then it locks up unless she buys a license. Choose the appropriate license.
Shareware.
In this planning phase, the business typically defines the goals and purposes of new applications or updates to existing applications and briefs Information Technology, or IT, about the plan. In the design phase, architects think about the components they would need to solve the problem or implement the plan. It's akin to looking at a pile of LEGO pieces and deciding which ones you would need to build a model. The design then goes to the programmers who translate it into code to execute the plan during the implementation phase. After the programmers implement the plan, testers validate parts of the code to check if the application is functioning as it should. For example, when you add two and two, do you reliably get four, or do you only sometimes get four? The testers check out normal, day-to-day functions as well as less common things. If the code is unreliable, they try to figure out why. The testers and the programmers work together on iterations and troubleshooting until they develop an application that is workable and stable. During deployment, the application undergoes more testing. For some apps, you release an alpha version for internal testing before going public. Other program
Software Development Life Cycle
The collection of instructions written in a programming language is called _________. This cannot be directly executed by the computer. Rather, this requires a language processor, which is a special-purpose system software used to translate the item into machine code.
Source code
Abigail works as a waitress at a popular local restaurant. When she takes an order from one of her tables, she then types it into the restaurant's computer system. The computer recognizes the menu items that Abigail enters and calculates the cost of the meal. The computer then sends the meal order to the kitchen as a ticket and prints out a bill for Abigail to bring to the table at the end of the meal. Once Abigail's customers have paid the bill, Abigail enters the method of payment into the computer system, which saves the information about the meal and amount paid so that at the end of the evening Abigail's manager can print out a report of how many customers the restaurant served and how much money the restaurant made.Which of the input/output processes is the computer using when it saves the meal and payment information so that the information can be used for future earnings reports.
Storage
Select the programming innovation that would best address the needs expressed in the scenario. Matthew was an early pioneer in computer art. He enjoyed how he could define shapes mathematically, and have the computer produce beautiful geometric designs. However, it became very cumbersome to have to express each line and angle as an equation. Matthew sometimes wished he could just take a pencil and add in details, but instead he had to type in the mathematical equations.
Structured Programming
Ralph is working for Apple and wanting to work on a new GUI for tablets and phones. He wants the interaction to be seamless. He often uses this in rapid prototyping and the creation of GUIs. He is struggling with the various languages and wants to try a simple and compact language but is also very powerful. Which language should he use?
TCL
The invention of integrated circuits enabled the development of computer systems that werecheaper, faster, smaller, and more reliable. Operating systems made it possible for computersto run multiple applications at the same time and to share memory and other resources. Thecomputational time was reduced from milliseconds to nanoseconds. While integrated circuitsincreased computing power, they were complicated to manufacture, difficult to maintain, andrequired air conditioning to keep the computers cool enough to run. Which generation is this?
Third Generation
Match the scenario with the corresponding characteristic of quality data that is missing. Sarah processes orders for an online business. When examining and fulfilling one batch of orders, she notices the date on four of the orders is three months old. She thinks there must be some mistake; however, in reviewing the records, she finds that these orders are in fact three months old. She is not sure what caused the delay in delivery and reports the problem to her Web Administrator.
Timely
In the IT world, an algorithm is a set of well organized, computer-implemented instructions that often result in a computation or the solution to a problem. These computations can be simple or quite complex, depending on what the need is. Algorithms are even at the very heart of machine learning. true or false
True
Interpreters translate and execute source code into machine language one line at a time. If the interpreter finds an error, the process is terminated at the statement containing the error and displays an error message. The error must be resolved before the interpreter will continue to the next line. Interpreters convert instructions one statement at a time when the program is run. Perl and Python execute using interpreters. true or false
True
Target users of application software fall into one of the following three categories: bespoke, off-the-shelf, and hybrid. Bespoke software is custom made, specifically designed and developed for an organization. Off-the-shelf software provides a general set of features that are useful to a broad range of users. Hybrid software is off-the-shelf software, customized to an organization's needs. true or false?
True
Natalie works for an advertising firm that specializes in web distributed advertising. Natalie needs to report to clients how many potential customers have viewed or traveled to the advertising website and if those potential customers continued to the company website to directly purchase products. Additionally, Natalie must make sure that the company's web advertising remains free from malicious code that could affect potential customer computers. Choose the appropriate server.
Web Server
Jose's organization has recently hired 50 new interns to fulfill positions in a variety of departments. He installed online training software for the new hires and configured the software to be used and will be maintaining the software. His boss also asked him to monitor the activities of the new interns by monitoring the log files that the company also uses for data mining. Jose's role in the IT department is most likely as a _________.
Website Admin
The Pareto principle is based on the theory that 80% of errors come from 20% of the system, meaning most errors can be identified by testing carefully selected groups of samples. Basis path testing is another software testing methodology. Basis path testing develops a set of test data that ensures each instruction in the software is executed at least once. Techniques based on the Pareto principle and basis path testing rely on knowledge of a system's internal components. This is known as glass-box testing, commonly referred to as ____________ , which includes having developers test internal structures of software. Black-box testing does not rely on the tester's knowledge of the system's structure but is focused on the user experience (UX).
White-box testing
In the DKIW hierarchy, this is evaluated understanding. It calls upon all the previous levels of consciousness, and specifically upon special types of human programming (moral, ethical codes, etc.). It beckons to give us understanding about which there has previously been no understanding, and in doing so, goes far beyond understanding itself. It is the essence of philosophical probing. The process by which we also discern, or judge, between right and wrong, good and bad.
Wisdom
Does the scenario below meet the definition of a project? Rita wants to start a summer theater camp for children with physical disabilities which make it difficult to participate in traditional theater summer camps. The camp would run for two weeks during the summer and culminate in a final show, complete with sets and costumes. Rita gains sponsorship from a local non-profit organization and is able to rent a theater space and hire employees for the camp. They help build an accessible stage and sets and help direct and manage the show. yes or no
Yes
Scott is working with a new data analyst. He is trying to impress upon them how critical the new project of migrating an old database to a new one is to ensure the financial department is happy with the completed project. He is stressing that there are 5 items that make quality data. Are there 5 items in quality data? yes or no
Yes
Tony started work at an up and coming software company. He is working in the software development team working on a new artificial intelligence project similar to ChatGPT. He working with several developers who have doing the job for a long time. He recommends a different type of software language to use. They tell him they can only use only high level languages and it needs to have some scripting language compatibility with it as well. Can Tony use Python in this situation? yes or no
Yes
Aaron is working with symbols. It simply exists and has no significance beyond its existence (in and of itself). It can exist in any form, usable or not. It does not have meaning of itself. It can have:-Facts-Pieces of information-A set of values of qualitative or quantitative variablesWith this scenario, where in the DKIW scenario is Aaron working?
Data