Introduction to IT full course
Switch
A network switch extends the network by using packet switching to forward data to the intended hard-wired devices.
Scientific =Manage the process of doing scientific research
LabVIEW MATLAB
Entertainment =Entertain a specific audience
Spotify iTunes Netflix YouTube Sling
Collaboration software Online workplace =Provide an online environment for running cloud-based services and applications
Office Online Microsoft SharePoint Google Docs
What are two necessary elements of business continuity planning?Choose 2 answers
Assessing key organizational activities Identifying risks that may occur
Invalid data
Attributes not conforming to standardization
Which technique uses all possible combinations of letters and numbers to crack a password?
Brute force
Which characteristic identifies application software that is cloud-based?
Provided by third-party providers
Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern?
Contract risk
Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?
Costs for hardware resources are decreased
Which risk assessment question is part of the Initiation Phase?
Could the end users reject the outcome of the project?
Phases of Project Management Initiation
Define the project Begin with a business case and feasibility study Develop project charter
Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe?
Design
Database software =Store and manage data, develop data-driven reports, and provide electronic filing
Microsoft Access Microsoft SQL Server MySQL
Email software =Send and receive email messages
Microsoft Outlook Gmail
In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?
Knowledge
Which statement describes the role of a systems administrator?
Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.
Which language is often used for rapid prototyping and the creation of GUIs?
TCL
What is the primary duty of a computer support specialist?
The computer support specialist primarily operates as a trainer and troubleshooter.
Conflicting data
The same records with differing attributes
What is the purpose of a business continuity plan?
To enable an organization to continue offering critical services in the event of disruptions
What is a role of the systems administrator?
To install and maintain network resources
Internet
Toward the end of the twentieth century, the ability to connect individual computers in a world-wide system called the internet was revolutionizing communication. The British scientist Tim Bernes-Lee proposed a system by which documents stored on computers throughout the internet could be linked together producing a system of linked information called the World Wide Web. In order to make web pages more accessible to users, search engines (i.e. Bing and Google) and browsers (i.e. Edge and Chrome) were developed. Search engines use technologies to index and tag pages so users can quickly search for resources based on keywords.
Which description explains the role of a domain name system (DNS)?
Translates human-readable aliases into IP addresses
True or False Most of the data stored today are unstructured and include things such as text, blogs, clickstreams, tweets, and audio. This data is not organized in a way that allows for analysis.
True
Duplicate data
Two or more identical records
Which action would support confidentiality?
Updating security software
Which type of systems conversion involves starting the conversion with a portion of end users?
User Acceptance
WAN (Wide Area Network)
WANs (wide area networks) link systems over a greater distance, including machines on the opposite sides of the world.
IP addresses are traditionally written in _____________ notation.
dotted decimal
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario?
Data
Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information?
Data and business intelligence
What is the definition of information technology (IT)?
It is the technology used to create, maintain, and make information accessible.
True or False Data breaches are easy to detect.
False
Execution
Hold a kick-off meeting Develop the project team Develop and complete project deliverables Monitor the project timetable Observe project performance
Memory data register (MDR)
Holds data that is being transferred to or from memory
Accumulator (AC)
Holds the ALU results
What is the primary difference between a modern handheld computer and a modern desktop computer?
A desktop has more processing power.
Firewall
A firewall monitors network traffic and blocks traffic that triggers its safety rules, providing a barrier between a trusted private network and an untrusted network like the internet.
Which network topology best handles downed links without losing connectivity between devices?
Mesh
Graphic Design =Create and edit drawings and other artwork
Adobe PhotoShop
What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore';
All records from the Patient table where the patient's last name is "Moore"
Incomplete data
Missing attributes
Which of the following systems are examples of database applications in Mei's medical office? (Select all that apply.)
Patient scheduling system Billing system Equipment inventory system Accounting system
What is the role of the CPU in a computing system?
Performing instructions of computer programs
Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?
Radio signals
Multimedia software =Display audio, video, image, and text content
Real Player VLC Player Media Player
The name, address, and account balance of each individual patient in Mei's office is known as a:
Record
Application Software are
Spreadsheet • Web browser • Accounting
Which data type uses a constructor that accepts no parameters?
boolean
Unstructured data refers to data that is_____________. (Select all that apply.)
more complex possibly stored in a format that is not easily decoded more time consuming to parse through to retrieve the essential information
Match each action with the corresponding category. Answer options may be used more than once or not at all.
-Engages in best practices for information systems =Part of the role of an IT professional association -Writes laws dealing with information technology =Outside of the role of an IT professional association -Provides professional standards for ethical behavior= Part of the role of an IT professional association
Which actions might be used to support the hardening of the systems you work with? (Select all that apply.)
-Maintain an antivirus system -Use a random password generator and change your passwords frequently -Install security patches as they become available
Which functions would Mei be completing in her network administrator role? (Select all that apply.)
-Managing the telephone system network -Connecting two or more computers together so they can communicate
The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? (Select all that apply.)
-Mei should ask a colleague to sit in on the interview with Mary's daughter. -Mei should use the same selection criteria for all candidates. -Mei should not discuss the job with Mary. -Mei should ask a colleague to interview Mary's daughter.
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?
A desktop has more processing power.
Network Elements Laptop
A laptop computer is a portable personal computer with a folding design. It includes an integrated flat screen, a keyboard with a mouse, and usually, a battery. It can also contain a CDROM, DVD-ROM, as well as various other devices such as SD card readers, Wi-Fi, Bluetooth, etcetera. Laptops typically connect to networks via Wi-Fi or Ethernet.
Desktop Computer
A major step in the popularization of computer systems was the development of desktop computers. Steve Jobs and Stephen Wozniak built the first viable home computer and established Apple Computer, Inc. (now Apple, Inc.) in 1976 to mass-produce their garage-built, home computer. Other companies such as Commodore offered similar solutions, but these smaller computers were not widely adopted by businesses who continued to use the wellestablished mainframe computers.
Modem
A modem bridges between the customer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet.
Server
A server is a computer that provides services, such as website hosting and routing, for other devices.
Match each description with the type of computing ecosystem it describes. Answer options may be used more than once or not all. Select your answer from the pull-down list.
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. =Virtual machines Each computer is roughly equal to every other computer. = Peer-to-peer One computer will request information from another computer, which response with the requested information. = Client-server
Tablet Computer
A tablet computer is a portable computer typically with touchscreen display and a rechargeable battery in a thin and flat design. Typically, it connects to a network via Wi-Fi.
Which action by application programs requires support from a networked operating system?
An Internet browser displays a web page.
specialized Software Computer-aided design =Create blueprints and 3D renderings of buildings and products
AutoCAD
Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario?
Availability
Which goal of Information Assurance (IA) requires that information is accessible when needed?
Availability
Cold storage
Cold storage offers less frequent access and is maintained on minimal equipment that is considered lower performance. Returning to normal operations after a disaster is slower with cold storage. Some examples of cold storage include tape backup, offline cloud storage, and even some online services such as Amazon Glacier and Google Coldline. One significant advantage of cold storage, however, is that it is less expensive than hot storage.
Which statement is not true of compilers and interpreters?
Compilers do not translate source code into machine code.
Computer Support Specialist?
Computer support specialist is somewhat of an umbrella term. Some of the roles of the support specialist could be a responsibility of a systems administrator. The support specialist primarily operates as a trainer and troubleshooter. Training tasks may include the production of material such as technical manuals, documentation, and training scripts. Training may take on numerous forms including group training, individual training, training videos, and the production of training videos and software. Troubleshooting might involve working the help desk, training help desk personnel, and overseeing the help desk personnel.
Which part of the CIA triad addresses rules that restrict access to only those who need to know?
Confidentiality
What does the acronym CIA stand for in cybersecurity?
Confidentiality, integrity, and availability
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product
Which two components are parts of a central processing unit (CPU)?Choose 2 answers
Control unit (CU) Arithmetic logic unit (ALU)
In 2015, Target, a retail store with an online presence, experienced a security breach that resulted in the loss of data affecting approximately 40 million customers. If you are not familiar with this security breach, read more about it in this article, then answer the following question. Which types of data were stolen during the Target credit card hack?
Customer names Credit and debit card numbers Card verification values (CVVs) *All of the above is the answer
what are the differences between Data vs Information
Data 18:23 45 mph 15% humidity Phoenix information It's hot outside. The time is 3:05 am. The customer's name is Mike. The price of the item is $4.25.
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
Data mirroring
Unsynchronized data
Data not appropriately shared between two systems
What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as?
Database
Electromechanical Machine
Examples of this progress include the electromechanical machine of George Stibitz completed in 1940 at Bell Laboratories and Mark 1 completed in 1944 at Harvard University by Howard Aiken and a team of IBM engineers. These machines made heavy use of electronically controlled mechanical relays.
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?
Expanding the infrastructure to support additional locations
Which two computer peripherals are connected to the computer through a port? Choose 2 answers
External microphone USB flash drive
Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?
FROM
What is another term for a formula that outlines how to execute a task?
Algorithm
What is a tree-like structure of records in a database referred to as?
Hierarchical database structure
Program counter (PC)
Holds the address of the next program instruction to be executed
Current instruction register (CIR)
Holds the current instruction during processing
Memory address register (MAR)
Holds the memory location of data that needs to be accessed
Business Continuity and Disaster Recovery Hot storage
Hot storage allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe. Hot storage solutions typically involve the latest and greatest storage equipment and the fastest protocols. In addition, hot storage is typically located close to the client or in multiple locations to ensure fast access. Some hot data storage solutions include Microsoft's Azure Hot Blobs and Amazon's AWS service, but these premium solutions can be quite expensive because of the high-performing resources and protocols involved.
Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe?
Implementation
Personal Computer
In 1981, IBM introduced its first desktop computer called the personal computer, or PC, whose underlying software was developed by a newly formed company known as Microsoft. The term PC is now widely used to refer to all machines that evolved from IBM's personal computer product, including desktops and laptops.
Which system requirement is an example of considering user needs in the design of an information system?
Allowing secure access to customer account information
Which statement correctly describes the operating system?
Allows the user to control the actions of the software, and through the software, to access hardware
Fully Electronic Computer
In parallel to electromechanical machine efforts, the use of vacuum tubes gave way to fully electronic computers, such as the Atanasoff-Berry machine constructed at Iowa State College between 1937 and 1941, and Colossus built in England to decode German messages during the latter part of World War 2. Other more flexible machines, such as ENIAC (Electronic Numerical Integrator and Calculator) developed at Pennsylvania State University, soon followed.
Which term is defined as a collection of information used to support management of an organization?
Information System
Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario?
Integrity
Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10. Which part of the CIA triad has been broken in this scenario?
Integrity
Which part of the CIA triad addresses the level of assurance that can be given as to how accurate and trustworthy data is?
Integrity
What is one of IT's roles in globalization?
It allows companies to reach a wider customer base.
Reflect for a moment about ethics, then respond to the following question. As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct?
It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people.
Which of the following would be a disadvantage of an ethical code of conduct? (Select all that apply.)
It has no legal impact. -t may not apply to new issues. -It is entirely voluntary.
What is the purpose of an IT department?
It helps the organization achieve strategic goals.
What effect does scope creep have on a project?
It increases unplanned costs for the project.
Facts gathered from observations or from a clock that measures time are examples of data. What is not an example of data?
It is cold outside
Medical =Provide reference to medical professionals; manage medical practice, including patient data, scheduling, and medical records
MedClarity Kareo
The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? (Select all that apply.)
Mei should follow the protocol advised by the medical council of her state. Mei should follow both HIPAA and state privacy protocols.
Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? (Select all that apply.)
Mei should not disclose details of offers by any respondents to the RFP. -Both Tom and Mei should disclose the conflict of interest. -Tom and Mei should not discuss details of the contract outside official channels.
In which type of network topology is each networked device directly connected to every other networked device?
Mesh
Spreadsheet software =Create worksheets that perform calculations on financial and statistical data; generating charts, graphs, data visualizations, simple databases, grade books, and invoices
Microsoft Excel OpenOffice Calc Google Sheets
Document storage =Provide private or shareable file storage via cloud-based services
Microsoft OneDrive Google Drive Dropbox
Personal information managers =Manage contracts, calendars, tasks, notes, and reminders
Microsoft Outlook Google Calendar
Presentation software =Create slides using graphs and simple animations to support presentations
Microsoft PowerPoint OpenOffice Impress Google Slides
System Software are
Microsoft Windows • Linux • Mac OS X • DOS
Productivity Software Word processing software =Create business and personal documents such as letters, memos, newsletters, posters, and reports
Microsoft Word Google Docs OpenOffice Writer
Which IT position has the responsibility of working with routers and switches?
Network administrator
Which statement describes the role of a network administrator?
Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.
Network Administrator?
Network administrators are responsible for the installation and maintenance of hardware and software that makes up a computer network. Network administrators may also be required to secure the network; this task may be accomplished in conjunction with other IT personnel such as systems administrators. High-level network administration positions, sometimes referred to as network architects or network engineers, are often responsible for designing networks that meet the performance and capacity needs of an organization
Which two are parts of an information system? Choose 2 answers
Networks Databases
Which of the following describes a computer support specialist's responsibilities? (Select all that apply.)
Overseeing help desk personnel Working the help desk Training help desk personnel
Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?
Phishing
Which type of systems conversion involves starting the conversion with a portion of end users?
Pilot
Which field must contain a unique value in order for a relational database table to function?
Primary key
An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used?Choose 2 answers
Printer Monitor
What is the difference between processing and storage?
Processing collects and translates data into useful information, while storage places the translated data in specific locations.
Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern?
Project dependencies
The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need?
Proxy server
Which tool resides between the client and server to protect the client from adverse actions of the server?
Proxy server
Financial =Track and manage financial information
Quicken TurboTax
Giving rights to new users so they can access various databases is a very common task database administrators perform. Mei's medical office has outsourced IT support services. What is one probable advantage of outsourcing?
Reliance can be placed on the expertise of outsourcing vendors.
Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe?
Requirements analysis
Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern?
Resistance to change
Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?
Resource path ID
Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern?
Resource risk
Router
Routers are special-purpose computers that forward messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine.
What is a cloud model that delivers third-party software such as email or games through the internet?
SaaS
Which factors should Mei consider when choosing a file organization system? (Select all that apply.)
Scalability Security Data retrieval speed
Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern?
Scope creep
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen
Security Breach Notification laws
Which data type is used to represent product order code that comprises alphanumeric characters?
String
Systems Administrator?
Systems administrators are accountable for the installation and maintenance of the resources on that network. The systems administrator will, at a minimum, be required to install and configure operating systems on the organization's machines, install new hardware, perform software upgrades and maintenance, and handle user administration. Other duties include performing backup and recovery, system monitoring, performance tuning, and troubleshooting. The systems administrator may also be involved with application development and deployment, system security and reliability, and work with networked file systems.
Which are examples of structured data?
Telephone number Date of birth or transaction First and last name *All of the above is answer
Leibniz Machine
The Leibniz machine was designed to perform basic arithmetic operations, and the algorithm for addition was embedded into the structure of the hardware itself. Babbage's Analytical Engine (which was never constructed) was designed to read instructions in the form of holes on paper cards. Babbage's Analytical Engine was programmable. Ada Lovelace, who showed in a publication that the Analytical Engine is indeed programmable, is considered to be the world's first programmer.
Abacus
The abacus was first used in China and then by the early Greek and Roman civilizations. The abacus consists of strings of beads strung on rods which are mounted on a rectangular frame. As the beads are moved back and forth on the rod, their positions represent stored values. To carry out calculations, the abacus needs a human operator. Thus, the abacus must combine with a human to form a system whose purpose is carrying out additions.
Computing System
The development of computer systems largely depended on advancement in technology such as the invention of the transistor. Later the invention of complete circuits allowed for integration of multiple circuits on one piece of semiconductor material such as silicon. These integrated circuits reduced the size of the early computing systems of the 1940s from roomsized machines, to the size of a single cabinet. Processing power began to double every two years.
Punched Cards
The idea of communicating instructions with punched cards originated in 1801 in a system specifying the steps of the weaving process. Different patterns of holes resulted in different woven designs. Herman Hollerith used punched cards to speed up the tabulation process in the 1890 US census. Punched cards were heavily used for a variety of computing systems until the mid-1970s.
Which statement about the systems analyst role is accurate?
The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements
Which is a characteristic of high-level languages?
The source code has to be complied.
Web Administrator?
The web administrator, also known as the webmaster, but more precisely referred to as a web server administrator, is responsible for maintaining websites. This differs from the development of websites. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. The web administrator may or may not be responsible for the hardware. Typically, the web administrator is not a systems administrator on those computers. herefore, the web administrator will have to work with the systems administrator on some aspects of installation and configuration.
What is the role of drivers in facilitating communication between applications and databases?
They allow the application to interact with the database.
In which generation were silicon chips first used in computers?
Third generation
Internet
This term is often confusing. To ensure the proper meaning of the term, pay attention to whether or not it is capitalized. The Internet (with a capital I) generally refers to the worldwide Internet and is most often what non-technical people are referring to when they speak of the Internet. However, an internet is simply a network of networks. Often, when IT professionals refer to the internet, they are referring to a network of networks.
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering?
Timely
Hand-Held Computers
Tiny computers are embedded in a wide variety of electronic appliances and devices. Because hardware components are continuing to reduce in size, the capabilities of smartphones continue to expand. These hand-held computers are much more than mobile telephones. They are equipped with a wide variety of sensors, including cameras, microphones, compasses, and touch screens, as well as a number of wireless technologies used to communicate with other smartphones and computers.
Why is it important to ensure that data support business goals?
To aid in making strategic decisions
What is the database administrator's role in security?
To institute protocols to protect the databases from external threats
True or False Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs).
True
Desktop Computer
Typically, a tower chassis enclosure which contains the internal components of the computer system, an external display that provides output, and a keyboard and mouse to provide input. Desktops typically connect to a network via Ethernet but can also utilize Wi-Fi.
Which role is responsible for maintaining websites?
Web administrator
What is another title for a web administrator? (Select all that apply).
Webmaster Web server administrator
Which type of systems testing includes having developers test internal structures of software?
White-box
Which of the following is not true of Windows and Linux?
Windows uses the forward slash (/) to express directory paths.
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
Word processor Spreadsheet program
Gaming =Entertain the user
World of Warcraft Candy Crush
When you visit Mei's office's website, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other previous activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers?
Yes, the cookies allow a web application to respond to the user as an individual.
What is one of IT's roles in globalization?
it promotes and increases interactions between different regions and populations around the globe.
Which task describes the role of a database administrator?
ntegrating data from legacy systems to newer systems and playing a role in application design and development
A disaster recovery plan
plan specifies how a business will resume after an event to continue its operations.
A business continuity plan
plan specifies how the business will keep providing products and services and generate revenue after an event.
Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk?
public
True or False Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information.
true
True or False Data includes raw facts or observations, and given context, becomes information.
true
True or False The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix.
true
Video conferencing software =Place and receive video calls among two or more locations
Adobe Connect GoToMeeting WebEx
In what phase of a project does time estimation occur?
Planning
Which is a type of two-factor authentication?
Smart card
What indicates a specific Internet location?
The IP address
Which item is a storage device?
Flash Drive
1 kilobyte (KB) 1 megabytes (MB) 1 gigabytes (GB) 1 terabyte (TB) 1 petabyte (PB)
2^10 or 1,024 bytes 2^20 or 1,048,576 bytes 2^30 or 1,073,741,824 bytes 2^40 or 1,099,511,627,776 bytes 2^50 or 1,125,899,906,842,624 bytes
PAN (Personal Area Network)
A PAN (personal area network) is normally used for short-range communications, within a few feet, such as wireless headphones to a smartphone or a wireless mouse to a PC.
What statement is true concerning compiled and interpreted computer language?
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
Which is true of databases and the applications that interact with them?
Applications are interdependent of the database.
What is the role of a firewall? (Select all that apply.)
Block outgoing messages to specified destinations Block incoming messages from untrustworthy sources
Why is merging unstructured and structured data essential?
Both types of data contain essential information. Most of the data stored today is unstructured. Better insights and discovery of hidden connections in data sets help strengthen decision-making. *All of the above is the answer
Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern?
Budget risk
As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's:
Business plan
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage
What is the minimum grade of network cable required to transmit 1 Gpbs?What is the minimum grade of network cable required to transmit 1 Gpbs?
CAT5e
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database?
Character string
Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages?
Cloud database
Which type of transmission media can broadcast in baseband mode?
Coax cable
Database Administrator?
Database administrators have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, and procedures associated with the DBMS that are separate from those of systems administrators and web administrators.
Closure
Declare the project complete Dissolve the project team Complete the final project documentation Reflect on strengths and areas for improvement
Planning
Develop a roadmap Set the project goals Define the project scope Draft a project management plan
What are the three main categories of databases?
Flat file, relational, hierarchal
Which function would Mei be completing in her database administrator role?
Giving new users access to various databases
Instant messaging software =Enable two or more people to communicate in real time using text
Google Hangouts Cisco Jabber Facebook Messenger
What is the tool used to encode a document while focusing on appearance known as?
HTML
How does a compiler work?
It takes the most recent instructions and translates them into machine language.
Which of the following contains the basic functions of the operating system?
Kernel
Which type of computer peripheral is used only as an input device?
Keyboard
The devices in Mei's office are interconnected in which type of network?
LAN
LAN (Local Area Network)
LANs (local area networks) consist of a collection of computers in a single building or building complex.
Which low-level language corresponds one-to-one with assembly?
Machine language
Mei's database administration function includes:
Managing user access to resources
The level of assurance that data will be available to people who need it, when they need it is referred to as
availability