IT intro quizzes
What is the role of the CPU in a computing system?
Performing instructions of computer programs
Which type of transmission media can broadcast in baseband mode?
Coax cable
Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern?
Scope creep
Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe?
Design
Who is primarily responsible for IT governance in Mei's medical office?
The board of directors
What is the primary duty of a computer support specialist
The computer support specialist primarily operates as a trainer and troubleshooter.
How does a compiler translate programming language into the specific instruction set of the target CPU?
The program is compiled and converted into machine language.
While cookies record previous activity on a site, they allow
website to respond to the user as an individual.
What is the purpose of a business continuity plan?
To enable an organization to continue offering critical services in the event of disruptions
what plan specifies how the business will keep providing products and services and generate revenue after an event.
business continuity
What does the acronym CIA stand for in cybersecurity?
confidentiality integrity availability
A local area network (LAN)
consists of a collection of computers in a single office or building.
Data breaches are easy to detect.
false
Example of fact
it is cold outside
Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern?
Contract risk
Which network topology best handles downed links without losing connectivity between devices?
Mesh
Which statement is not true of compilers and interpreters?
Compilers do not translate source code into machine code.
Which functions would Mei be completing in her network administrator role? (Select all that apply.)
Connecting two or more computers together so they can communicate Managing the telephone system network
What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as?
Database
What is a tree-like structure of records in a database referred to as?
Hierarchical database structure
Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe?
Implementation
Which type of systems testing includes having developers test internal structures of software?
Alpha
A database administrator's tasks include
Integrating data from legacy systems to newer systems and playing a role in application design and development
As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct?
It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people.
How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary?
Mei should ask a colleague to interview Mary's daughter. Mei should use the same selection criteria for all candidates. Mei should not discuss the job with Mary. Mei should ask a colleague to sit in on the interview with Mary's daughter.
The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant?
Mei should follow both HIPAA and state privacy protocols. Mei should follow the protocol advised by the medical council of her state
Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?
Phishing
Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk?
Public
The name, address, and account balance of each individual patient in Mei's office is known as a:
Record
What is one probable advantage of outsourcing?
Reliance can be placed on the expertise of outsourcing vendors.
Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe?
Requirements analysis
Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern?
Resistance to change
could Mei and Tom do to avoid possible conflicts of interest
Tom and Mei should not discuss details of the contract outside official channels. Mei should not disclose details of offers by any respondents to the RFP. Both Tom and Mei should disclose the conflict of interest.
not true of Windows and Linux?
Windows uses the forward slash (/) to express directory paths.
primary difference between a modern handheld computer and a modern desktop computer?
desktop has more processing power.
what plan specifies how a business will resume after an event to continue its operations.
disaster recovery
IP addresses are traditionally written in _____________ notation.
dotted decimal
web administrator
in charge of maintaining websites
Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern?
project dependencies
Which tool resides between the client and server to protect the client from adverse actions of th
proxy server
Which factors should Mei consider when choosing a file organization system?
security, data retrieval and scalability
Which are examples of structured data?
telephone number date of birth/transaction first and last name
Network administrators are responsible for
the installation and maintenance of hardware and software that make up a computer network.
Systems administrators are responsible for
the installation and maintenance of the resources of an organization's network.
Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs).
true
Data includes raw facts or observations and given context, becomes information.
true
what other titles is a web administrator known
web server administrator web master
What is the role of a firewall? (S
Block outgoing messages to specified destinations Block incoming messages from untrustworthy sources
Which data type uses a constructor that accepts no parameters?
Boolean
Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost.
Budget risk
As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's:
Business plan
What is the minimum grade of network cable required to transmit 1 Gpbs?
CAT5e
Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information?
Database information processing
Which function would Mei be completing in her database administrator role?
Giving new users access to various databases
What is the tool used to encode a document while focusing on appearance known as?
HTML
disadvantage of an ethical code of conduct
It may not apply to new issues. It has no legal impact. It is entirely voluntary.
Which of the following contains the basic functions of the operating system?
Kernel
Which actions might be used to support the hardening of the systems you work with?
Maintain an antivirus system Use random password generator install security patches
Mei's database administration function includes:
Managing user access to resources
system analyst role does not include
both business and technical knowledge and relies on effective communication to understand clients' requirements.