Intro To Information Technology Last Unit Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A computer program that enables users to create and work with files and folders is called what? a web browser a file manager a user interface a file reader

a file manager

What is the HIPAA Privacy rule, and why does it affect IT professionals? a law that prevents doctors from keeping patient records, which protects the medical rights of IT professionals a law that explains how passwords should be protected, which must be followed by IT professionals a law that mandates that medical records be kept electronically, which will be managed by IT professionals a law that protects patient records, which states they can only be viewed by certified IT professionals

a law that mandates that medical records be kept electronically, which will be managed by IT professionals

What is the main benefit of a Wiki website? online sharing of large documents collaborative content authoring finding people with similar interests communication using text in real time

collaborative content authoring

Which behavior demonstrates courtesy toward others in the workplace? working long hours to complete a work assignment solving complex technical problems to get a project schedule back on track asking a coworker about his or her annual review results consulting with a coworker before intervening in one of his or her projects

consulting with a coworker before intervening in one of his or her projects

If you had an idea for a new software company, what would be the best approach to help make it a successful business? develop a business plan to describe how to maintain and grow revenues go back to school to get a degree in IT business administration hire employees who understand the software development industry seek out financial support for venture capital, angel investors and grants

develop a business plan to describe how to maintain and grow revenues

What are the four basic operating principles of the information processing cycle? information, storage, input, processing gathering, input, output, processing input, gathering, software, output input, processing, output, storage

input, processing, output, storage

What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links visit the pages with hyperlinks visit all pages that appear on the navigation menu

visit every page and verify all links

Which documents might an employer expect to find in a career portfolio? school assignments, report cards, and athletic awards writing samples, national test scores, and letters of recommendation reverse chronological resume, functional resume, and drafts of cover letters lists of target employers, candidate strengths, and weaknesses and job applications

writing samples, national test scores, and letters of recommendation

A large hospital is having a hard time keeping track of patients' needs as they move among doctors, pharmacies, blood labs, and nursing stations. What is the best solution an IT professional could recommend to help? Have medical professionals use cell phones to keep in touch with one another. Give patients RFID tags to identify their medical records. Ask patients to keep their medical records on their tablets. Have patients stay connected to the Internet with smartphones.

Give patients RFID tags to identify their medical records.

What is the main difference between HTML and XML? XML is display markup, while HTML is semantic markup. HTML uses tages while XML does not. XML uses tags while HTML does not. HTML is display markup, while XML is semantic markup.

HTML is display markup, while XML is semantic markup.

What happens when a basic text file without any HTML code is opened in a web browser? The text will be shown without any formatting. The web page will appear to be blank. The browser will show an error message. The file will open only if it has the extension .html.

The text will be shown without any formatting.

What is a patch? a software update that contains fixes for bugs or security issues a software update that completely replaces the software with a new, free update a system that migrates software programs from one server to another server a system that keeps track of the version numbers of a software program

a software update that contains fixes for bugs or security issues

Which item best describes the World Wide Web Consortium (W3C)? the group that owns the Internet a web content rating organization the group that invented the Internet a web standards organization

a web standards organization

An organization that offers server space for making websites accessible via the Internet is called what? a web server a network administrator a domain name registry a website host

a website host

IT professionals should help to protect users' personal information, such as bank account information or Social Security numbers, to prevent software piracy. identity theft. moonlighting. corporate espionage.

identity theft

Look at the tag below, and then answer the question. <img src="square.png" /> In order for the image tag <img src="square.png" /> in an HTML file to function properly, the file named square.png must be located where? in a folder named "images" in any folder on the web server at a URL available on the Internet in the same folder as the HTML file

in the same folder as the HTML file

Which two factors most influenced the growth of the Internet during the 1970s? increase in the power of DARPA and increased interest in beating the Russians in the Space Race increase in the power of public universities and increased appreciation for a liberal arts education increase in the power of computer hardware and increased funding from the National Science Foundation increase in the power of electrical power supplies and increased availability of alternating current power supplies

increase in the power of computer hardware and increased funding from the National Science Foundation

If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card? into a slot in the computer into a network with another computer into a bus in the motherboard into a port on the outside of the computer

into a slot in the computer

Which best describes the significance of ARPANET? It was the first WAN. It was the largest LAN. It was the first wireless network. It was the first cloud computing.

it was the first WAN

Which of the following is the best way to prevent poor user orientation in a website? avoiding multiple competing navigation menus labeling all pages with meaningful titles including a search feature on large sites including a comprehensive site map

labeling all pages with meaningful titles

Which of the following is the best way to prevent poor user orientation in a website? avoiding multiple competing navigation menus labeling all pages with meaningful titles including a search feature on large sites including a comprehensive site map

labelling all pages with meaningful titles

Read the following scenario, and then answer the question below. Two of the computers at work suddenly can't go online or print over the network. The computers may be trying to share the same IP address. Which strategy is most likely to solve the problem? rebooting the network server reconfiguring the network hubs installing network gateway hardware logging off one of the computers, and then logging back on

logging off one of the computers, and then logging back on

A software engineer with a detail oriented personality has the patience and aptitude for writing thoughtful emails about software that never have any typos. looking through many lines of code for errors that cause bugs. long meetings with the development team to decide on software requirements. working long hours on difficult, technical problems.

looking through many lines of code for errors that cause bugs.

Which nonverbal communication technique is the best way to let customers know that you are honest? making eye contact holding a neutral facial expression taking written notes using expressive gestures

making eye contact

Which of the components of the box model is transparent and does not take a background color? content padding border margin

margin

In order to come up with a realistic schedule, a manager wants to know how long it usually takes an employee to complete a task. Which statistical measurement is the manager most likely to use? mean mediam mode sum

mean

Which are the most important tasks for project planning? finishing up old projects, scheduling meetings, and updating spreadsheets assigning resources to tasks, creating a timeline, and making a budget updating the schedule, adjusting the budget, and communicating with the team assessing the final project, prioritizing tasks, and distributing resources

assigning resources to tasks, creating a timeline, and making a budget

What is the best way to protect against the loss of important files? firewalls antivirus software backup files secure passwords

backup files

Computer files have names that consist of which two parts? base file name and file name prefix long file name and short file name base file name and file creation date base file name and file name extension

base file name and file name extension

If you wanted to keep track of your favorite links and your logins for certain web pages, which two web browser features are you most likely to use? back and forward buttons and bookmarking bookmarking and password manager smart location bar and address bar address bar and password manager

bookmarking and password manager

In a network, servers receive requests from which of the following? clients, which are the networked computers that request data. other networked computers, which use encrypted messages. ISPs, which control the type of data that can be sent on the network. routers, which direct the data to the correct destination.

clients, which are the networked computers that request data.

What type of major application has most changed the way people interact in their daily lives? spreadsheet programs like Excel communication programs like Gmail word processing programs like Microsoft Word multimedia presentation programs like PowerPoint

communication programs like Gmail

Which is the best definition of a network? one computer that runs software used by many people in an office computers owned by the same office that run the same software computers and hardware connected so that they can share data computers and hardware within less than one mile of each other

computers and hardware connected so that they can share data

What capability do smartphones have that telephones with earlier technology lacked? wireless technology data services mobility voice transmissions

data services

Cloud computing helps to address meteorology questions. data storage problems internet access speeds. modern software needs.

data storage problems

The term "protected classes" refers to protection from: working in hazardous jobs. discrimination in hiring and firing. engaging in collective bargaining. following health and safety guidelines.

discrimination in hiring and firing.

What are two types of organizational structures designed to help an organization achieve its goals and objectives? entrepreneurial and organizational entrepreneurial and bureaucratic bureaucratic and organizational bureaucratic and foundational

entrepreneurial and bureaucratic

What are the two parts of the platform used to run application software? GUI and HCI hardware and operating system kernel and software configuration application base and operating system

hardware and operating system

Which technological device or application best enables people to communicate with others anywhere in the world? cloud storage social media file systems word processing

social media

Which of the following best describes professional behavior in the IT field? teaching others about technology in order to increase IT knowledge in the community discouraging others from pursuing an IT career to secure your own job avoiding professional organizations and events to protect sensitive information using computer jargon when talking to a non-technical audience to show your knowledge

teaching others about technology in order to increase IT knowledge in the community

Which of these situations in which an employee uses e-mail will most likely create a problem or misunderstanding? sending your boss files with information he or she requested including a quote from a vendor in a reply e-mail to the vendor telling your boss you have a serious problem with a coworker informing other employees of a specific meeting time and place

telling your boss you have a serious problem with a coworker

When you would like to send an e-mail to your coworkers about planned maintenance on the network, where is the best place in the e-mail to first use the phrase "planned maintenance on the network? the Subject field the Cc field the body the To field

the Subject Field

When you would like to send an e-mail to your coworkers about planned maintenance on the network, where is the best place in the e-mail to first use the phrase "planned maintenance on the network? the Subject field the Cc field the body the To field

the Subject field

Network administration is concerned with which tasks? the installation and maintenance of network hardware and software the installation and maintenance of computer operating systems the diagnosis and repair of some types of computer hardware the monitoring of users' activity on a social networking site

the installation and maintenance of network hardware and software

What is median? the sum of values in a set of data multiplied by the number of values in the set the sum of values in a set of data divided by the number of values in the set the middle value in a data set when the values are put in order the value that occurs most often in a data set

the middle value in a data set when the values are put in order

What is the part of a CSS declaration that describes the HTML tag? the selector the pointer the value the property

the selector

What does a file association specify? the software needed to open a file the file's author the file's directory path a list of related files

the software needed to open a file

Business ethics are an individual's personal set of values in the workplace. the way a company interacts with employees and customers. are universal principles that govern how people behave in life. subject to expensive fines and legal prosecution.

the way a company interacts with employees and customers.

Which term below refers to the overall design intended to convey an idea or feeling that is appealing to the site's target audience? theme message purpose template

theme

What is the HTML tag used to define a block of content? <p> .class #id <div>

<div>

Which of the following protects the rights of people with disabilities in the workplace? Americans with Disabilities Act (ADA) Buy American Act (BAA) Individuals with Disabilities Education Act (IDEA) Federal Employment Compensation Act (FECA)

Americans with Disabilities Act (ADA)

Which of the following protects the rights of people with disabilities in the workplace? Americans with Disabilities Act (ADA) Buy American Act (BAA) Individuals with Disabilities Education Act (IDEA) Federal Employment Compensation Act (FECA)

ADA

What can web designers use to control the individual web page layouts for all of the pages on a website? XML CSS JavaScript PHP

CSS

Which reason best demonstrates why flexibility is important in IT work environments? Changing work environments require employees to work together. Changing work environments require employees to adapt quickly to new technology. Changing work environments require employees to work with minimal resources. Changing work environments require employees to rely on their technical training.

Changing work environments require employees to adapt quickly to new technology.

Cloud computing helps to address meteorology questions. data storage problems internet access speeds. modern software needs.

Data Storage Problems

Which question is most important for an office to consider when upgrading to new software? Does the office need to buy other software at this time? Do the office computers have enough RAM to run the program well? Do the office computers need maintenance work at this time? Does the office have enough staff trained to use this new software?

Do the office computers have enough RAM to run the program well?

Which explanation best explains the importance of using encryption? It is important to learn a new language. It is fun and interesting to use codes. Encryption protects sensitive information. Encryption keeps computers running.

Encryption protects sensitive information.

Which of the following is the most reliable way to check the accuracy of a website? Look at the date on the website See who is responsible for the website. Examine the sources cited by the website. Review how the website was written.

Examine the sources cited by the website.

Why is it helpful to include milestones when setting personal performance goals? Including milestones allow one to explore many diverse interests before setting personal performance goals. Including milestones sets a long-term vision of where one wants to be in ten years. Including milestones allows one to use several short-term achieveable tasks to achieve one long-term goal. Including milestones allows one to measure one's performance in miles.

Including milestones allows one to use several short-term achieveable tasks to achieve one long-term goal.

What is the recommended procedure for disconnecting an external hard drive to avoid losing data? Disconnect the hard drive's power supply, then remove the drive. Instruct the operating system to eject the drive before unplugging it. Use the Power button to turn off the computer, then remove the drive. Wait until the drive stops spinning, then remove the drive.

Instruct the operating system to eject the drive before unplugging it.

Which outcome is one of the negative consequences of anonymous communication over the Internet? It can lead to regulatory restrictions. It can lead to harassment and bullying. It can lead to using only the first search results. It can lead to citing information without giving proper credit.

It can lead to harassment and bullying.

Which of the following is most often a barrier to software migration? It's easier to continue using an out-of-date software program as long as possible. It's usually cheaper to upgrade software than it is to purchase a new product. It's difficult to find new software that is secure enough to replace the old software. It's not possible to keep old data when migrating to a new software program.

It's usually cheaper to upgrade software than it is to purchase a new product.

What is the best way to dress at work? Find athletic clothes that demonstrate your workplace energy level. Pick stylish clothes that present your creativity and individuality. Find expensive clothes that show a commitment to your work. Pick neat clothes that present a professional appearance.

Pick neat clothes that present a professional appearance.

Which sequence best describes the evolution of computers? Microcomputers came before mainframes, which led to the development of minicomputers. Minicomputers came before mainframes, which led to the development of microcomputers. Mainframes came before microcomputers, which led to the development of minicomputers. Mainframes came before minicomputers, which led to the development of microcomputers.

Mainframes came before minicomputers, which led to the development of microcomputers.

What statement best describes the Microsoft Windows operating system? Microsoft Windows is a relatively secure operating system. Microsoft Windows is not a secure operating system. Microsoft Windows is usually available for free or at a low cost. Microsoft Windows can only run three applications.

Microsoft Windows is a relatively secure operating system.

What best describes the difference between plagiarism and fair use? Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use. Plagiarism is copying material for profit, while fair use is a limited, non-profit use. Plagiarism is any copying of material without credit to the source, while fair use is unlimited nonprofit use. Plagiarism allows for unlimited, nonprofit use, while fair use is copying material for profit.

Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.

What special certifications do Cisco and Novell offer that can help satisfy job requirements for Information Services and Support and Network System Administration professionals? human interface support network support operating system support software training support

Network Support

Which of the following is a trend in Internet computing? People are shifting back to using desktop computers more than mobile devices. Applications, digital photos, and video games are taking up less storage space. Sending and receiving data over the Internet is taking longer. People are using a greater number and variety of apps to help them do everyday things.

People are using a greater number and variety of apps to help them do everyday things.

What is the correct order of the phases of the software development process? Evaluation, requirements specification, design, development, maintenance Requirements specification, development, design, evaluation, maintenance Design, development, evaluation, maintenance, requirements specification Requirements specification, design, development, evaluation, maintenance

Requirements specification, design, development, evaluation, maintenance

What operating system is a smartphone most likely to use? BSD Mac OS X Symbian Linux

Symbian

What development in operating systems happened between the years 1990 and 2000? Developers stopped creating GUIs. Konrad Zeuse developed the Z1 computer. Batch processing was used for the first time. The Linux operating system was released.

The Linux operating system was released.

In HTML, what is an element? The text browser displays when a user points the mouse pointer to it The tag that tells the web browser what the source of a file is The combination of a start and end tag, not including the tagged content The combination of a start and end tag, together with the tagged content

The combination of a start and end tag, together with the tagged content

Why are human resource professionals best equipped to handle conflict that has escalated? They are paid a salary that is appropriate for this kind of work. They have the training and resources to facilitate a discussion as a neutral third party. They oversee managers in a hierarchical structure and can fire them if necessary. They can recruit new employees if a resolution cannot be reached.

They have the training and resources to facilitate a discussion as a neutral third party.

Why should characters such as / \ " ' * ; - ? [ ] ( ) ~ ! $ { } &lt; > # @ & | space, tab, and newline be avoided in file names? They are not descriptive of a file's contents. They are confusing to users. File names are only permitted to contain letters and numbers. They may have special meaning to the operating system.

They may have special meaning to the operating system.

Which of the following is a disadvantage of using open source software? Users aren't able to customize the software to meet their needs. The software is usually very expensive. Training and help files may be harder to find. The software developer is in control, not the user.

Training and help files may be harder to find.

What reason best explains why complementary colors are important to web page design? Complementary colors show the color behavior of light, which is different from pigment or paint. In web page design, the background should be a dark color and the text should be a light complementary color. The use of complementary colors is an essential element that has to be used with CSS. When complementary colors are near each other, they look brighter and stand out because they contrast.

When complementary colors are near each other, they look brighter and stand out because they contrast.

Why might a business professional choose to use a desktop computer rather than a tablet or laptop at work? a desktop computer cannot be moved a desktop computer is more professional a desktop computer has more internal memory space a desktop computer is portable

a desktop computer has more internal memory space

Read the following scenario, and then answer the question below. Paula is a computer programmer and is very good at her job. The company Paula works for announces that they will be using brand new software tools. None of the current programmers, including Paula, know how to use these new software tools, but the company would like them to try to learn. Which action should Paula choose to best show a positive work ethic? suggest that only a few coworkers learn the new program keep coding only using the tools that she is familiar with offer to learn the new programming software tools wait for her supervisor to ask her to take a training seminar

offer to learn the new programming software tools

When an employee restates a supervisor's comment, using the employee's own words, what is the employee doing? conciseness paraphrasing inappropriate slang focused attention

paraphrasing

The hardware components of a computer system interact with each other by using which of the following? input and output devices internal and external storage ports and system bus read-only memory (ROM)

ports and system bus

What do Dynamic-Link Library (DLL) files do? send out error messages when the operating system finds an error it can't recover from provide operating systems with information about performing specific computing functions save serial numbers and keys in order to avoid software installation issues finds files that aren't being used and then deletes them to create hard drive space

provide operating systems with information about performing specific computing functions

Which of the following uses of the Internet is unethical? purchasing vacation flights online during the evening purchasing vacation flights online during the weekend purchasing vacation flights online during work hours purchasing vacation flights online during a bus ride

purchasing vacation flights online during work hours

Which device is used to direct the flow of data on a computer network? modem network adapter router port

router

What is syntax? rules for using tags correctly in HTML text containing hyperlinks that can go to other hypertext pages information about how an element should be used by a web browser text used to mark text or images on a web page

rules for using tags correctly in HTML


Set pelajaran terkait

Macroeconomics Today Chapter One

View Set

GRE Math Definitions, Formulas and Problems (Algebra)

View Set

MANGT 595 - Final - Quiz Questions

View Set

(6) Events Leading to Secession and War

View Set

Growth and Development of Parent (p373)

View Set