intro to IT study guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following operators is used to select all of a certain data? 1 point * = <> LIKE

*

During analysis, which system requirement ensures that the system is accessible to all users?

ACCESSIBILITY

Which of the following statements is not part of the path a message takes from one computer to another? 1 point All packets of the same message are combined together as they arrive. A message is divided into one or more packets. The packet(s) are given the final destination address. All messages require a response from the destination machine to the sending device.

All messages require a response from the destination machine to the sending device.

A local area network (LAN) 1 point Allows hardware sharing between two offices Allows software sharing between two offices Allows hardware sharing within one office Allows hardware sharing between offices in geographically dispersed locations

Allows hardware sharing within one office

During implementation, how is alpha testing different from beta testing? 1 point Beta testing is assisted by system developers Alpha testing uses actual data Beta testing uses simulated data Alpha testing uses simulated data

Alpha testing uses simulated data

Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer. 1 point I/O subsystem CPU Memory Bus

CPU

Which of the following carries out the instructions of a computer program and is often referred to as the "chip"? 1 point System clock Arithmetic Logic Unit RAM Central Processing Unit

Central Processing Unit

Select the statement that best describes the difference between software and hardware. 0/1 Computer software consists of drivers and their associated devices whereas computer hardware includes only internal system devices. Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives. Computer software consists of applications such as word processing and spreadsheet programs whereas computer hardware includes the operating system. Computer programming language instructions can be very broad and general whereas computer hardware specifications must be very specific.

Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.

Which of the following are the three main categories of databases?

Hierarchical , Flat File, Relational

What is another term that defines a script? 1 point Pascal Compiler Machine code Interpreted program

Interpreted program

A program written in a high-level language must be converted into __________ code to be executed by the computer. * 1 point JavaScript Machine High Level Language C++

MACHINE

The scope of the project is? 1 point Determined in the closing phase Always accurately identified in the initiation phase The work that needs to be done Not at any risk

WORK THAT NEEDS TO BE DONE

__________ software works with hardware to provide a network service 1 point Application Windows Operating System Database Management System Windows Server

Windows Server

Which of the following is a role for an system administrator? *

create new user accounts and delete obsolete user accounts

What is the focus of the list of responsibilities for database administrators?

design, development, and DBMS support

Which statement accurately describes memory?

A computer can only run programs if it has a sufficient amount of memory.

Which of the following is the best definition of a computer network?

A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

Which of the following is an example of a relational database? A database that is broken up so that one part of a record is in one location in the database and another part is in a different branch. A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system. Records in the database are separated by some delimiter, such as comma or a line.

A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.

Which two are both types of scripting languages? 1 point ASP and Python C++ and Pascal Python and C++ Pascal and ASP

ASP and Python

Which of the following would NOT be the responsibility of the system administrator? Providing support to users Creating new user accounts Installing new file server hardware and software Answering e-mails from potential customers.

Answering e-mails from potential customers.

In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released. 1 point Alpha Beta End User User Agreement

BETA

______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use

BIG DATA

What is IT management responsible for? 1 point Being the project manager Installation and maintenance Developing databases Maintaining websites

Being the project manager

What is the definition of business intelligence? 1 point Business intelligence is a term used to depict a network structure that allows greater communication among different parts of an organization. Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources. Business intelligence refers to a specific type of server used to gather data that can be analyzed by an organization. Business intelligence refers to a specific software application businesses can use to gather data from their competitors.

Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.

Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply. 1 point By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The developer can determine which data types would help fulfill the purpose. The number of fields in the database determines the cost of that database, so if careful planning doesn't occur, money can be wasted.

By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The developer can determine which data types would help fulfill the purpose.

Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?

CLOUD COMPUTING

Which of the following high-level programming languages was created to be business-oriented? 1 point SNOBOL FORTRAN COBOL LISP

COBOL

This software protection will protect an individuals original work (tangible form)for the authors life + 70 years 1 point GNUs Public License Patent Fair Use Copyright

COPYRIGHT

When does system conversion (direct, parallel, pilot, or phased) occur?

DEPLOYMENT

Which of the following descriptions best represents the reliable characteristic of quality data? *

Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.

Which of the following statements accurately describe IT certifications? IT certificates are generally not standardized and often not recognized by major companies. There are no specific IT certificates available for web administrators. Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area. IT certificates are easy to earn and don't require specialized training.

Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.

Which of the following best describes the purpose of expansion slots in modern computers? 1 point Expansion slots can be used to store programs and data. Expansion slots allow additional processors to be connected to the motherboard. Expansion slots can be used to connect additional peripheral devices such as an external hard drive or monitor. Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.

Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.

The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined. 1 point INTO WHERE SELECT FROM

FROM

A business intelligence system is used by which of the following groups of people?

HIGH LEVEL MANAGEMENT

45. Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.

IAAS

Which project phase defines the problem or opportunity that the project is expected to address?

INITIATION

Which of the following aligns IT goals and organization goals? 1 point Breaking organization goals into smaller goals will not relate to IT activities Improving IT infrastructure to support rapid expansion to capture less market share IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly Ensuring privacy and security of data shared by customers using cloud computing

IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly

During this phase of Project Management, the projects scope and requirements are defined 1 point Executing and Controlling Initiation phase Planning phase Closing phase

Initiation phase

What is the correct order of project phase for Project Management? 1 point Planning, Executing & Controlling, Closing, Initiation Executing & Controlling, Closing, Initiation, Planning Initiation, Planning, Executing, Closing

Initiation, Planning, Executing, Closing

In a SQL query, the __________ operation combines two tables together? JOIN MERGE COMBINE SELECT

JOIN

All of the following are compiled languages except for: 0/1 Javascript BASIC Java C++

Javascript

As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working? Wisdom Knowledge Information Data

KNOWLEDGE

in a __________ shell forward slash (/) is used to express directory paths;? 1 point Mac Windows Linux Other:

LINUX

What is the typical bandwidth of today's networks?

Mbps to Gbps

What is a disadvantage of buying a solution from another company?

Meeting the company's specific needs

Which of the following is/are true of the IPOS cycle? 1 point If there will be no future need for certain information, a user can go straight from the input stage to the output stage without going through the processing and storage stages. Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs. As long as the data is entered correctly, there is no need to store it. The reason for storage is to be able to prove what has been entered. The steps of the IPOS cycle can occur in any order.

Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.

What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices? 1 point Hard drives Bays Ports Slots

PORTS

Which is found on the motherboard and stores information but the information is not permanent? 1 point CPU RAM Bus ROM

RAM

Which of the following statements accurately describes random access memory (RAM)? 1 point RAM can be read but not written to. RAM is short-term memory. RAM is found in the ROM chip on the motherboard. RAM is storage for instructions that the computer needs to boot up.

RAM is short-term memory.

This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations). * Flat File Hierarchal Relational

RELATIONAL

Which of the following statements accurately describes read only memory (ROM)?

ROM IS LONG TERM MEMORY

Which device permits packet switching so that a message can be routed to the next link in a network? 1 point Router DNS LAN IP Address

ROUTER

Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network

ROUTER

If YOU wanted to determine and have the names of students who are were CIT majors the query would look like:

SELECT First Name, Last Name FROM Students WHERE Major = "CIT";

What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless-access cards, and other PC cards?

SLOTS

Which software is run automatically rather than by the end user?

SYSTEM

Adding/deleting user accounts is the role of which account?

SYSTEM ADMIN

Which software is run automatically rather than by the end user? Productivity Software Microsoft Office Software System Software

SYSTEM SOFTWARE

Which of the following is NOT an important characteristic of an IT professional? Strong math background and programming skills Ability to troubleshoot Desire to continually learn. Good communication skills - both oral and written

Strong math background and programming skills

Which of the following types of information present a threat to someone's privacy? * 1 point Secret business plans Names and addresses in the phone book Student ID and credit card numbers Phone numbers and e-mail addresses

Student ID and credit card numbers

Which of the following statements best defines the ALU?

The ALU processes the raw computer data, including mathematical calculations and logical operations.

Which factor contributed to the development of the first generation of computers?

The need to easily calculate missile trajectories

Which of the description of duties below would be for a System Administrator?

This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system

During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system

analysis

This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols) 1 point Web Server eMail server FTP server File Server

eMail server

Which of the following type of transmission is paired correctly with the given media?

fiber optic cable - light impulses

Which project phase assesses the risks and benefits of a project?

initiation

During this phase of the SDLC (system development life cycle) expected costs and benefits of the new system are estimated to see if it makes sense for the organization to proceed with the new system

preliminary investigation

Dhe name, address, and telephone number of each individual patient in Alan's office is known as a

record

Cassandra is developing a method to register conference attendees by extracting the attendee's information and saving it to a database. The information is obtained from the conference website and once they click submit the information is saved to the database and a new confirmation webpage is generated showing the attendees specific information. 0/1

scripting language

Which layer of the operating system provides access to the kernel?

shell

Which of the following are operations used to alter the data within a relation of a database? 1 point update , Delete , Insert Delete, Join, Insert join , Insert, Update insert , Join, Update

update , Delete , Insert

What is the definition of a Platform as a Service (PaaS)? 1 point A Platform as a Service is the ability to store data and aid communication for remote teams. A Platform as a Service makes it possible for businesses to access and use software through the Internet. A Platform as a Service is the ability to quickly and consistently develop and deliver applications. A Platform as a Service makes it possible to have all of your businesses IT departments needs sited outside of the organization and available to anyone, wherever

A Platform as a Service is the ability to quickly and consistently develop and deliver applications.

Which of the following statements describes the difference between information systems and information technology? There is no difference between information systems and Information Technology. An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software. Information Technology is a broader concept and information systems provide the infrastructure for information technology. An information system requires the use of computer hardware and software; whereas information technology refers only to networks and tools that facilitate communication.

An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.

What peripheral component houses CDs and DVD? 1 point Hard drives Bays Ports Slots

BAYS

Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working? Data Information Knowledge Wisdom

DATA

In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan. 1 point Analysis Design Testing Maintenance Planning

DESIGN

Which of the following best describes a hierarchical database format? Data are modeled using parent-child relationships. The database format is one of the most commonly used today. Database records that do not have relationships with other tables.

Data are modeled using parent-child relationships.

An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following? 1 point Backup media Image backups Data mirroring Incremental backups

Data mirroring

A ____________ is also known as a datasheet. * 1 point Database System Database Record Database Table Database Field

Database Table

Which of the following describes the duties of a web administrator? Ensures firewalls are up to date, researches current security threats, and designs websites. Duties include connecting devices on an organization's network, configuring individual machines to access the network, working with the network hardware, and troubleshooting. Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server. Designs databases, maintains databases, provides database access to users, selects and supports database management systems.

Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.

Learning about social engineering and how to protect passwords is ___. 1 point Education Access control Authentication Authorization

EDUCATION

Project managers use variance reports, status reports, and resource allocation reports in which project phase?

EXECUTING AND CONTROLLING

__________ uses the concept of reflection of light through a core made up of glass or plastic. 1 point Chain link cable Ethernet cable Coaxial cable Optical wire

FIBER OPTICAL WIRE

Your site's Internet point of presence is called a: 1 point Gateway Router IP packet DNS server table

GATEWAY

A scanner is a peripheral device for what system? 1 point I/O Storage

I/O

Which of the four main components of a computer is described by this statement: This component facilitates the flow of information / communication between components and peripheral devices.

I/O SUBSYSTEMS

With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere 1 point SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service)

IAAS

A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?

IMAGE BACKUPS

Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?

INFORMATION

Determining the project scope or the work that needs to be completed is in what project phase? 1 point Initiation Planning Executing & Controlling Closing

INITIATION

Takes the most recently entered instruction, translates it into machine language, and executes it.

INTERPRETER

IT personnel who understand both the technical IT infrastructure and management of the business fill which role? 1 point Board of Directors IT entry-level IT management IT specialists

IT management

Which of the following best describes the differences between memory and the hard drive? 1 point Memory is an internal component that directly or indirectly connects computer components; whereas the hard drive is an external storage device. Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time. Memory carries out basic instructions that operate a computer; whereas the hard drive is a long-term storage device. Memory is an electronic component used to store instructions for future use; whereas a hard drive is attached to the motherboard and enables the communication between components.

Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.

The use of IT has allowed businesses to have __________. 1 point More tools for communicating Fewer privacy and security concerns Small customer bases Local reach

More tools for communicating

Which computer will use a docking station to function like a desktop? 0/1 Handheld Notebook Smartphone Tablet

NOTEBOOK

Which of the following statements describes why network protocols are necessary.

Network protocols are necessary for computers to communicate with each other.

This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications 1 point SaaS (Software as a Service) IaaS (Infrastructure as a Service) PaaS (Platform as a Service)

PAAS

This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing * 1 point Hardware License Software License Copyright Patent Other:

PATENT

___________ is ephemeral, meaning data stored is lost when the computer is powered off. ROM RAM BIOS CMOS

RAM

Thru this CLOUD computing function, businesses can access and use software through the Internet

SAAS

The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in). * 1 point FROM SELECT WHERE

SELECT

Which of the following programming languages first introduced the concept of object-oriented programming?

SMALLTALK

________________ is a general term that describes any attack that takes advantage of humans' trusting nature. 1 point Special Tactics Brute Force Social engineering Access Control Clear selection

SOCIAL ENGINEERING

Which of the following is an scripting interface between a database and the application?

SQL

In this network topology ALL devices have a single point-to-point connection with a central device 1 point RING network BUS network STAR network

STAR

During which generation did computers begin to see widespread use in business? 1 point Fourth generation First generation Third generation Second generation

THIRD GEN

Which of the following is an example of what 1 GB would store? 1 point A large text file An mp3 file of a song A library of movies Thousands of books

THOUSANDS OF BOOKS

Which account is also referred to as root or superuser? The Users Account The Administrator Account The Security Account The Network Accoutnt

The Administrator Account

Which of the following statements best defines the CPU? 1 point The CPU outputs the raw computer data, including mathematical calculations and logical operations. The CPU controls the speed at which instructions are retrieved and processed in the computer. The CPU is responsible for storing data as it is being processed. The CPU retrieves the instructions of a computer program and the raw data that is input. Clear selection

The CPU controls the speed at which instructions are retrieved and processed in the computer.

Which of the following statements best represents the relevant characteristic of quality data? 0/1 The data used applies to the question being answered. The data has been gathered using consistent, detailed collection processes. The data has been inputted correctly and is accurate for its intended use. The data is current enough to still serve its purpose for being accessed.

The data used applies to the question being answered.

Which of the following is the correct function of the compiler? 1 point Every instruction is translated first and then executed and this must be done every time the program is run. Takes the most recently entered instruction, translates it into machine language, and executes it. Translates the entire program, creating an executable program, which can be run at a later time. Allows programmers to more easily write programs.

Translates the entire program, creating an executable program, which can be run at a later time

In order for a database to work, at least one of the fields has to contain unique values. What is the name of this field?

UNIQUE IDENTIFIER

The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document. 1 point TCP URL HTTP SSL

URL

During implementation, which testing assesses whether the system functions and is useful? 1 point Deployment Alpha User Acceptance Beta

USER ACCEPTANCE

What is a program that allows the user to monitor and improve system performance?

UTILITY PROGRAMS

During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders. End-User Testing Alpha Testing User Acceptance Testing Beta Testing

User Acceptance Testing

The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP 1 point print server file server web server FTP server

WEB SERVER

The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query. 1 point SELECT clause FROM clause WHERE clause

WHERE CLAUSE


Set pelajaran terkait

ATI Learning System RN Pharmacology Quiz

View Set

SCMO #84: Submit Superbill and Post Charges and Payments to Ledger for Carl Bowden

View Set

Entrepreneurship - Ch. 12 - PreQuiz & Course Objectives

View Set

Day 1 - Networks, Cables, OSI, and TCP Models

View Set