C182 - Quizes

Ace your homework & exams now with Quizwiz!

______ is a threat that targets users.

Social engineering

boolean data types

true/false, yes/no it has two states - 0 and 1

What are records (rows) referred to in a database?

tuples

Malware

"malicious" software. There are different types of malware, but usually this refers to two types: viruses or worms virus - A virus is software that attaches itself to another legitimate (or seemingly legitimate) software application. (ex, trojan horse, spyware) worms - self-contained programs and do not need other programs to propagate across computers and computer networks

Which software consists of daemons?

System

User

Those who use a computer.

Email Protocols

- IMAP - POP3 - SMTP - HTTP - MAPI - MIME

Compiler

- Requires that the components of the software all be defined form the outset - the code is more efficient

The most common forms of network connection used today

- UTP (Unshielded twisted pair) - fiber optic cable

Types of cable that transmits information using electromagnetic waves voltage

- coaxial - twisted pair (utp)

Server

- dedicated computer used to provide a service - software that is run on the machine, includes print service, ftp server, web server, email, db, file - collection of hardware, software and data that together constitutes the server

What were significant factors in the need for development of operating systems?

- development of language translators - increased number of users - improved speed of hardware

Bus network

- devices are connected along a single cable. he cable is the network, and it carries one message at a time - Devices connect to the bus through T-connections. Each device would plug into a T-connector that would plug into two cables, each leading to the next device and T-connector. Each end connected to a terminator. - all devices listen to any communications over the single cable and ignore all messages that are not intended for them.

Transistor components

- favored over vacuum tubes - introduced around 1959 - cheaper and could be mass produced - could last up to 50 years - used less power - 2nd generation

What do broadcast devices consist of?

- hubs - switches - routers

Grey Hat Hacking

Engage in both kinds of hacking for good and bad.

Silicon chips or Integrated Circuits (ICs)

- known as printed circuits or integrated circuits (ICs) - could incorporate dozens of transistors - took up less space replaced both bulkier transistors and magnetic core memories - could be used for both computation and storage minicomputers

Benefits of magnetic core memory

- larger main memory sizes - size of computer reduced bc of reduction in size of the hardware - because they were smaller and less distance for electrical current to travel between components computers were faster

FTP server

- like a webserver in that it hosts files and allows clients to access those files. However, with FTP, access is in the form of uploading files and downloading files.

point to point network

- the simplest network topology - there is a dedicated link between two resources - not often used because it limits how devices can communicate with each other - example would be a connection between the monitor and the motherboard within a computer

Proxy server

- used to act as a giant cache of web pages that anyone in the organization has recently retrieved - provide a degree of anonymity - block certain content from being returned; for example, rejecting requests going to specific servers (e.g., Facebook) and rejecting responses that contain certain content (e.g., the word "porn") - Squid is the most commonly used proxy server

A computer network supports a business's ecosystem by?

-Improving efficiency -Reducing costs -Improving comminication

What are the peripheral devices used by Storage in the IPOS cycle stage?

1. CD, DVD 2. Flash Drive 3. External hardrive

Which of the following components represent the basic structure of the computer system?

1. CPU 2. memory 3. I/O subsystem 4. bus

What are the steps in Strategic Analysis?

1. Identify information assets. 2. Identify vulnerabilities of assets. 3. Determine threats based on vulnerabilities. 4. Prioritize risks. 5. Develop and enact policies as necessary.

Steps to Strategic Risk Analysis

1. Identify the organization's assets 2. Identify vulnerabilities 3. Determine threats 3. Prioritize risks 4. Enact policies to reduce these risks

Strategic Risk Analysis

1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats

Strategic Risk Analysis

1. Identify the organization's information assets (computers, network, people, products, data) 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats

What is the correct order of project phases?

1. Initiation 2. Planning 3. Executing & controlling 4. Closing

What four operations does a computer perform?

1. Input 2. Processing 3. Output 4. Storage

The following are examples of operating systems used today?

1. Linux 2. Mac OS 3. Unix 4. Windows

What are the 3 main categories of databases?

1. relational (most popular) 2. flat file 3. hierarchical

Data Integrity Efforts

1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked

When was magnetic core memory introduced?

2nd gen

Intranet

A LAN that uses the Internet Protocol

What is the definition of a Platform as a Service (PaaS)?

A Platform as a Service is the ability to quickly and consistently develop and deliver applications.

Relational Database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables

Servers

A dedicated computer used to provide a service. High performance computers with large hard disk drives. Commonly a stand-alone computer.

What is the difference between a handheld and a desktop?

A desktop has more external storage

Primary Key

A field in the relations that contains a unique value

Structured Query Language (SQL)

A standard query language that is used to communicate in many DBMSs

Structured Query Language (SQL)

A standard query language that is used to communicate in may DBMSs

Information Technology

A system composed of hardware, software and people all working towards a common goal.

Social Engineering

A threat that targets users. The idea is that a user is a weak link who can be tricked, and often fairly easily.

Windows Server

A version of Windows that has been specifically designed and configured for server use.

Virtual Machines

A virtual machine (VM) is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

Internet

A worldwide network of computers that can share information

what are two common forms of character representation?

ASCII (American standard code for information exchange) Unicode

Character Representation

ASCII and Unicode

________ requires that the program is accessible to all users including the visually impaired.

Accessibility

Batch processing

Accumulating transaction records into groups or batches for processing at a regular interval such as daily or weekly. The records are usually sorted into some sequence (such as numerically or alphabetically) before processing.

Proxy Server

Acts as a giant cache of web pages that anyone in the organization has recently retrieved

During the implementation stage, which testing method uses simulated data and is assisted by system developers?

Alpha Testing

Which of the following are characteristics of a packet-switched network?

B. The choice of pathway is based on network availability and amount of message traffic. C. The route is established one branch at a time.

Which two are both types of high-level programming languages?

BASIC and Ada

What kind of numbering system is binary?

Base 2

______ it is the "basic" operating system that runs when a computer is first turned on. It runs tests of memory and the CPU, and initializes hardware components so that the actual Operating System can be loaded from the hard disk.

Basic Input Output System (BIOS)

BETWEEN

Between an inclusive range

_________ is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.

Business intelligence

Computer Security

CIA - Confidentiality, Integrity, Availability

What high-level programming languages was created to be business-oriented?

COBOL

Which of the following high-level programming languages was created to be business-oriented?

COBOL

Which of the following high-level programming languages was created to be business-oriented?

COBOL (Common Business Oriented Language)

Executes instructions and commands computer components

CPU

Which describes an algorithm?

Clear

One computer will request information from another computer, which responds with requested information.

Client-server

What is the last project phase?

Closing

Reporting of the Projects success and any obstacles is during this phase of the project?

Closing (Phase)

Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?

Cloud computing

Attributes

Columns of the relation

Though currently related to the federal government, which act if extended to business organizations could prevent the profiling that would allow a company like Amazon to be able to send you products before you even ordered them?

Computer Matching and Privacy Protection Act of 1988

Remote computer

Computer being accessed over the network

To what degree will employee actions be monitored?

Control

Which two components are parts of a central processing unit?

Control Unit (CU)

In order to translate from an IP alias to an IP address, which of the following is used?

DNS

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?

Data

Phased Conversion

Deploys a subset of the system first, rather than deploying the whole system at once

A _______ allows a laptop or tablet to function like a desktop unit.

Docking Station

At the time of its creation, which of the following characteristics was unique to ENIAC?

ENIAC performed decimal calculations.

Redundancy

Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline

Developed for mathematical/scientific computing

FORTRAN

Which sql clause is used to inform the database management system which table should be interrograted by the query?

FROM

All operating systems have graphical representations that can be clicked for an easier user experience. True or False?

False

First generation computers were relatively inexpensive compared to today's computers. True or False?

False

Many of today's operating systems require the user to have specialized training concerning specific commands needed to instruct the operating system to perform different functions. True or False?

False

Manages Capital

Finance

_____ translate the organization's philosophy into specific, measurable outcomes the organization plans to achieve.

Goals

>

Greater than

The following are examples of what code type? 1. number system that represents binary in a shortened way. 2. Base 16 3. i.e. ( 3C8 ) 4. Is created by converting 4-bit binary numbers.

Hexadecimal

www.google.com is an example of a(n)?

IP alias

Which cloud service provides all the resources (servers, data storage) tha an IT dept needs ouside of the org making them accessible by anyone, anywhere

IaaS or Infrastructure as a Service

ODBC (Open Database Connectivity)

Interacts with a database via a database driver

The ______ is a global network of networks.

Internet

Types of devices that can connect to the Internet

Internet of Things (IoT)

In which category of the DIKW hierarchy would business intelligence be located?

Knowledge

All of the following are parts of a URL except for:

LAN

A ______ is a network that requires a router in order to communicate with the Internet.

LAN - Local Area Networks

What is a disadvantage of a compiled language?

Lack of portability

What two inventions have allowed programmers to avoid writing programs in machine language?

Language Translators and High Level Programming Languages

Data is ______ structured than information

Less

What is a disadvantage of outsourcing?

Less control over the subject

<

Less than

<=

Less than or equal

FTP Server

Like web server or file server in that requests are for files and responses are the files

The End User License Agreement for proprietary software

Limits modifying the software

Which operating system uses the point-and-click GUI?

Linux

Logical design

Logical models are revised to ensure that the new system will meet the user requirements identified in the first step

Has a standard set of menus always listed along the top of the desktop. Each application software adds to the menu selections.

Mac OS

A program written in a high-level language must be converted into _____ to be executed by the computer.

Machine Code

This is an example of which type of language? 1111 00000000000000001

Machine Language

0000 1001 0110 0100 1101 1111 1010 0011 is an example of what?

Machine Language Programing

System Administrator

Maintains all aspects of the system including hardware, software, and programming.

What sped the need to build better faster computers?

Needed to assist in computing rocket trajectories after World War II

What is a collection of computers and resources connected by various media so they can communicate with each other?

Network

Which IT position has the responsibillity of working with routers and switches?

Network Administrator

Which IT role is responsible for installation and maintenance of the resources of the computer network?

Network Administrator

The following are examples of ______? 1. typically started automatically 2. Directly supports the computer system

OS (Operating System)

Is used to make machine language easier to read and uses base 8.

Octal

This software was created in the Open Source Community and made freely available as source code. You may obtain the software for free; you may enhance the software; you may distribute the software. However, you have to abide by the copyright provided with the software. Most are made available using the GNUs Public License, and some are made available with what is known as a copyleft instead of a copyright.

Open Source software

Project Planning

Organize activities, time estimation, cost estimation

There is a period of time in which both systems (the old and the new) are operating concurrently. This is done so that the output of the new system can be compared with the output of the old system. Once it is confirmed that everything is working as expected, the old system is shut down and the new system continues to operate.

Parallel Conversion

What will prevent others from making, selling, or using an invention for 20 years?

Patent

Creating a model of the database design. Modeling the hardware for the system. are examples of which model?

Physical Modeling

Hardware

Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.

Cold Site

Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have

Common Steps in SDLC

Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance

The term _____ is another form of query that returns all of the records from the relation, but only select attributes or fields.

Projection

_______ or commercial, software is purchased from a vendor. Such software may be produced by a company that commercially markets software (usually referred to as a software house), by a company that produces its own in-house software, or by a consultant (or consultant company) hired to produce software.

Proprietary Software

Temporarily stores data before it is processed and sent to your screen or printer.

RAM

Volitile memory that disappears when the computer is turned off or loses power.

RAM

Unnecessary Requirements

Requirements that are not actually needed but are "nice to have"

Which device permits packet switching so that a message can be routed to the next link in a network?

Router

Which device permits packet switching so that a message can be routed to the next link in a network?

Router A router is a device that permits packet switching in order to send messages to the next link in the network.

Moving a message onto the appropriate network is an example of what?

Routing

Used to move traffic from one network to another network is an example of what?

Routing

White Hat Hacking

Security professionals and hack for "good purposes" to find vulnerabilities and fix or protect against them.

Anti-viral Software

Seeks out malware

What programming languages first introduced the concept of object-oriented programming?

Simula

Simula

Simulation Language

4th Generation of Computers

Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use

World Wide Web

Sits on top of the internet. Network of linked files.

Insert modem cards, wireless-access cards, and other PC cards (such as camera cards).

Slots

Script

Sometimes uses to refer to a small program that have been traditionally used for automation

Sort

Sorting records based on some field(s) such as ascending order by last name

All of the following are input systems except:

Speaker

Which two software application packages would be classified as productivity software?

Spreadsheet program and word processor

Power connectors are responsible for which of the following?

Taking current from external wall outlets.

Also known as the chassis or cabinet.

The case of a computer

Users

The people who use the computer system

What is the role of the systems administrator?

To install and maintain network resources.

What is the database administrator's role in security?

To institute protocols to protect the databases from external threats

Domain Name Parts

Top level domain (TLD) name and Host name

A type of malware that attacks an individual computer by masquerading as an application.

Trojan Horse

Sara identifies the problem, diagnoses its cause, and finds a solution

Troubleshooting problem solving

True or False - Integrated circuit boards could now be used for both computation and memory.

True

The abbreviation "URL" indicates:

Uniform Resource Locator

URL

Uniform Resource Locator

_______ is used to modify the data that already exists in a table within a database

Update

Public-key encryption

Uses two keys, a public and private key

Which IT role is responsible for maintaining websites?

Web Administrator

Yes or No - Software tells the computer how to execute commands whereas hardware is the physical devices that make up a computer system.

Yes

sometimes referred to as root or superuser

administrator account

Most commonly used web server

apache

What is the focus of the list of responsibilities for database administrators?

design development and DBMS support

computer with the most amount of performance capability

desktop

The _____ is an electronic component used to store instructions, programs, data, and information for future use.

hard drive

Packet Sniffing

is a means of obtaining a password; in reality, in addition to passwords, packet sniffing allows you to obtain anything being sent over the network if the data being transmitted is sent without encryption.

Type of transmission of fiber optic cable

light pulses

fiber optic cable

light pulses

software stored on an individual computer

local application

If a company decides for security reasons they want to limit access to certain documents the best implementation of this would be _____________.

local applications

The ______ is attached to the motherboard and consists of electronic components that store instructions and data.

memory module

A _____ is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers.

network hub

This device normally broadcasts messages to all ports.

network hub

sensitive information

not considered a threat to a persons privacy

Delivering processed data (i.e., information) to the outside world via a monitor, printed pages, or speakers, for example.

output

The computer prints out a bill for the meal what operation is this?

output

Computer Hardware

physical components of a computer system which include the system unit and its components (motherboard, fan, disk drives, CPU, memory chips) and peripheral devices, such as a keyboard, printer, or monitor

The fetch-execute cycle is performed in an overlapped fashion on several instructions.

pipelines cpu

On which tier of the n tier architecture model are user interfaces developed?

presentation

N-tier architecture

presentation tier logic tier data tier

Information can be defined as _______ data.

processed

Projection and Join are examples of what _______?

queries

A ________ is a search of data in the relation that fit specific parameters.

query

Which is the most economical technology to provide a communication path over long distances?

radio and cellphone towers

Which technology is best to provide a communication path over long distances?

radio and cellphone towers

Type of transmission of radio and cell towers

radio waves

Evolv captures large quantities of data with over 488 million data points. What is the most likely type of database structure that is used for this data?

relational database

which characteristic of quality data requires data being used to be applied directly to the decision being made.

relevance

The ______ is a device that receives a message and sends the message on to the next location in the network.

router

This device connects multiple networks together.

router

what device permits packet switching so that a message can be routed to the next link in a network?

router

Which of the following devices is used to connect one network to another network?

router Routers are the main means of connection between one network and another.

works with hardware to provide a network service, types of software includes web servers, email servers, and database servers

server software

Operating system programs that start when the operating system is loaded but run in the background and do not take up any CPU time until it is called.

services

Example of how Networks allow hardware to be shared between software

sharing a printer, mail server

What do integrated circuits need to function?

silicon chip

Logic Tier

sits between the user interface and the data. As such the logic tier is a conduit through which the data flows to the user from the databases as well as how data input from the user is used to update the underlying records in the database. resides on the server where the processing occurs the level where data processing occurs

can insert modem cards, wireless access cards, and other PC cards such as camera cards

slots

Program languages outlining instructions for the computer are written and then implemented as _______.

software

_______ refers to the programs that we run on a computer.

software

proprietary software produced by a company that commercially markets software

software house

Freeware

software that is provided without charge

private information

something that could be a threat to privacy such a social security number

What does the GOTO statement create?

spaghetti code

SNOBOL

string maipulations

A ________ is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the IP address on the message.

switch

progams that make up the operating system and directly supports the computer system itself.

system software

ENIAC

the first general-purpose electronic computer

a requirment of all computers to communicate over the internet

transmission control protocol/ internet protocol or TCP/IP

Software used by select groups with an organization or to a specific discipline such as music sequencers, samplers, and digital recorders for muscians.

vertical software

A ______ is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

virtual machine

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing mutiple computers.

virtual machines

Presentation Tier

where the user interface for the system is developed. translates the final results into a user friendly format

what is a join query

withdraws information from multiple relations.

Sever software

works with hardware to provide a network service

Fair use

An exception to copyright that allows nonprofits or education institutions to use the copyrighted work

Database Administrator

An individual who is responsible for the maintenance and security of an organization's database resources and data.

Which of the following statements describes the difference between information systems and information technology?

An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software.

Which of the following statements are true about an information system? Select all that apply.

An information system does not need to involve technology. An information system is different than Information Technology.

Incremental backup

An initial full backup is completed and then subsequent backups only capture the changes since the last backup

IP addresses

- 32 bits in size - have English like name aliases - A series of numbers that indicates a specific internet location

Interpreter

- Allows you to test out an idea - relies on a session - allow for programs to be written and run in small pieces - it is easier to make changes and see results with

Backup Strategies

- Image backups (create a copy of everything that is on a hard drive: operating system, programs, configuration files, data, and so on. If necessary, the image can then be copied onto a new hard drive and used in place of the original) - data mirroring (the operating system writes data (and changes to the data) to multiple hard drives at the same time. As a result, if something happens to one hard drive, another hard drive should be available to hasten data recovery.) - offsite storage (hot site, cold site, or site sharing)

DNS

- It is a server with a table that contains IP addresses and aliases. - It translates Internet aliases to IP addresses. - Sends requests to other DNS servers when it cannot locate an IP alias. - stores an IP address for a particular alias in its local DNS server table after receiving it from a higher-level DNS so that it is available for later use

Functions of Business Intelligence systems (BI)

- Used to help a company make long-term decisions - Provides historical, current, and predictive views of business operations - Provides high-level information for decision makers - integrate information from various systems into one location - improve the quality of information obtained through multiple database systems. - best used to make strategic decisions, like whether or not a company should expand.

database server

- a structured data repository - permits database access across a network - perform such tasks as data analysis, data manipulation, security, and archiving - MySQL is popular open source

Risks of cloud computing

- adverse effect on internal IT employees - concerns about data ownership and compliance issues - security issues

Key components to business continuity plan (BCP)

- assess critical organization activities - how quickly an d activity must be restarted - testing the plan Business continuity planning helps an organization ensure that in the event of a disaster critical business functions will be available.

what are the elements of planning? (second phase)

- objectives and activities (concrete objectives and activities - step by step process) - organize activities ( which are dependent of others) - time estimation (use tools like program evaluation and review technique (PERT) and GANTT charts to determine on long it will take) - cost estimation (costs associated with each element of the project and as a whole)

What are the 3 technologies that glue together the internet?

- packet switching - routers - IP addresses

FORTRAN

- primarily intended for mathematical/scientific computing - the control statements similar to assembly language, but the rest would read like english and math

what are the 3 key elements of project initiation? (first phase)

- problem definition (lays the foundation for determining the project scope - resource allocation (time and capital) - risk assessment (determine if benefits outweigh the risks)

What are the 3 main parts to the web pages URL

- protocol (http://) - domain name (www.cnn.com) - resource ID (name of file accessing)

Benefits of Cloud Computing

- reduced costs - increased speed of development for projects - ability to quickly and easily scale operations - less reliance on internal IT expertise

reports used for monitoring and controlling for project management

- variance reports (differences between planned resources and actual resources - status reports (state of project) - resource allocation reports (how time and capital have been used thus far for the project)

Shell

An interface for the user, often personalized for that given user, that provides access to the kernel.

Which action by application programs requires support from an operating system?

An internet browser displays a web page.

What is the main difference between a compiled language and an interpreted language?

An interpreted language runs inside of a special environment called the interpreter.

OLAP is used to

-used to find the relevant information when looking at a database. - takes the information from a data warehouse and makes it easier to sift through. - Looking at data in a more granular fashion; examining the details of the data.

What are the elements of a computer system?

1. CPU 2. users 3. keyboard 4. memory 5. Monitor 6. operating system 7. mouse

What are the four components of computer systems?

1. CPU - ALU, control Unit, Registers 2. Memory - SCRAM, DRAM, ROM 3. Input/Output (I/O) subsystem 4. The bus

Computer Network Advantages

1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication

What is required to verify authenticity of the recipient?

1. Encryption 2. Digital signatures 3. Certificates

What are the peripheral devices used by Input the IPOS cycle stage?

1. Keyboard 2. Mouse 3. Scanner 4. Microphone 5. Stylus

What are the peripheral devices used by Output in the IPOS cycle stage?

1. Monitor 2. Headphones 3. Printer 4. Speaker 5. projector

What are hardware components in a computer system?

1. Monitor 2. printer 3. internal fan 4. disk drives

What are the steps of SDLC

1. Preliminary investigation 2. analysis 3. logical design 4. physical design 5. implementation 6. maintenance

Software Architecture (N-Tier)

1. Presentation Tier where the user interface for the system is developed 2. Logic Tier sits between the interface and the data 3. Data Tier resides on the organization's servers and on a separate database server

What are the types of computer storage hardware in the order that they were developed?

1. Punch Cards 2. Magnetic tape 3. Hard Disk 4. Floppy disks 5. Optical discs 6. Flash memory 7. Cloud storage

What are the three main categories in a database?

1. Relational 2. Flat file 3. Hierarchical

What are the 5 characteristics of quality data?

1. Relevance 2. Timely 3. Thorough 4. Accurate 5. Reliable

System Deployment

1. System Conversion 2. Final Documentation 3. End User Training

What are the 2 categories of software?

1. Systems software, includes the OS and all the utilities that enable the computer to function 2. Applications software, includes programs that do real work for users. example word processors, spreadsheets, db management

Layers of computer system

1. User 2. applications 3. OS utilities 3. Services 4. shells 5. OS kernel 6. software device drivers 7. OM BIOS drivers 8. hardware

What are three operations used to alter data within a relation of a database?

1. delete 2. insert 3. update

Which era was it when the user would specify a program, send it off to the computer to run, and return later for the output?

1940s and 1950s

During which generation did computers begin to see widespread use in business?

3rd generation

When did computer companies start producing families of computers

3rd generation

When was the emergence of the software dev field?

3rd generation

When was the silicon chip introduced?

3rd generation

when was the emergence of computer networks?

3rd generation

Security Breach Notification Laws

47 states plus DC require employers to notify employees of potential or real security breaches that involve personally identifiable information (PII) (Hawaii: Yes)

When was the single chip processor (or microprocessor) produced?

4th generation

How many bits are in a byte?

8

Byte

8 bits; a single character of text in a computer

A stand alone entity that would be programmed to handle its own internal methods as well as messages received from other objects.

An object

_________ The team determines the user requirements for the new system and develops logical models of the system (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes).

Analysis

COBOL

A business-oriented language (common business oriented language)

Which of the following operating systems is for mobile devices?

Android

Ethics

A code of moral conduct or a set of principles that govern behavior.

Computer System

A collection of components that work together to meet the needs of the user

Computer System

A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.

What is the definition of a computer system?

A collection of computer hardware, software, users and networks

Computer Network

A collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

Network

A collection of computers and resources connected by various media so that they can communicate with each other.

Network

A collection of computers and resources connected by various media so they can communicate with each other

Information Systems

A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.

Data Warehouse

A collection of organized databases

what is a data warehouse

A collection of organized databases

Protocol Stack

A collection of protocols. TCP/IP is an example.

Remote Computer

A computer being accessed over the network

Which statement accurately describes memory?

A computer can only run programs if it has a sufficient amount of memory.

NOT the responsibility of the system admin?

Answering emails from potential customers.

Which of the following is the best definition of a computer network?

A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

Proxy Server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.

Which of the following is an accurate definition of a computer system?

A computer system is a collection of hardware and software components that work together to meet the needs of the user.

Web Server

A computer that runs special software to serve up Web content by responding to requests.

_______ software attempts to identify if a file contains a virus or, more generally, some form of malware. The software can be run on demand, or you can set it up so that all incoming messages are scanned. Unfortunately, it will not necessarily catch every piece of malware.

Anti-viral

Shareware

A copyrighted software that can be sampled before it is purchased.

Hub

A device that connects multiple computers together. Broadcasts the transmission as it sends the data to every device in the network.

Router

A device that connects multiple networks together. Routers can be used to directly connect computers but are typically used instead in specific locations in a network so that messages can be routed to other networks. A router contains programming router tables and at least one input that comes from another network.

The following are examples of ________? 1. Spreadsheet software 2. database software 3. programs users will run to accomplish a task.

Application

Which software is run by the end user?

Application

Which type of software includes programs such as Microsoft Word and PowerPoint?

Application

Which is true of databases and the application that interact with them?

Applications are interdependent with the database.

Family Educational Rights and Privacy Act (FERPA)

A federal law that governs student confidentiality in schools. It requires that schools not divulge, reveal or share any personally identifiable information about a student or his/her family, unless it is with another school employee who needs the information to work with the student. An exception is the publishing of student directory information.

Primary Key

A field int he relations that contains a unique value

Algorithm

A formula or procedure for solving a problem

Algorithms

A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process

Heirarchical Databases

A hierarchical database format organizes data using a tree-like or organizational chart type structure

The ordering of packets is done by

A higher-level TCP protocol.

The _____ does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen.

Arithmetic Logic Unit (ALU)

This is an example of which type of language? Load #1

Assembly Language

Elena is tired of programming her homemade robots through typing long strings of 1s and 0s. So, she creates a program that translates commands she can type in for her robots such as Stop, Go, and Turn, into strings of 0s and 1s.

Assembly Language Programming

Move.1 #$2000030c, d0 ; Initialize DACR0 is an example of what?

Assembly Language Programming

Preliminary investigation

Assesses the feasibility of the proposed project and selects a development methodology

What is the first step in creating a BCP plan?

Assessing critical operational activities

Which of the following describes the knowledge stage in the DIKW model?

A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.

Packet Switched Network

A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic

Structured Programming

A method of programming which follows rules about selection, sequence, and iteration control structures.

Anti-viral Software

Attempts to identify if a file contains a virus or some form of malware

Specific characteristics or properties of a record.

Attribute Record

Verifies that the information or data is genuine.

Authenticity

Network Switch

A more functional connection than a network hub. It records and recognizes the local network addresses (Media Access Control (MAC) addresses) of all computers connected to the switch. Internally the switch has more hardware including storage for MAC addresses than a hub.

Client-Server Network

A network that contains one or more servers. Servers are more expensive as they require greater hard disk storage and faster response time. In a client-server network, software enables access to remote servers. This allows different parts of a business ecosystem to interact.

Strategic Risk Analysis

A number of practices that define an organization's information assets, the vulnerabilities of those assets, the threats that can damage those assets, and the policies to protect the assets.

Octal Number System

A number system that has a base of 8; digits from 0 to 7 are used to express an octal number.

Obtaining data from computers all over the organization is an example of

Availability

Obtaining data from computers all over the organization is an example of?

Availability

Requires that information is available when needed. This seems like an obvious requirement, but it conflicts to some extent with both confidentiality and integrity.

Availability

When one user is accessing some data and others are shut out of accessing that data, this is a problem for?

Availability

Which goal of information Assurance (IA) requires that information is accessible when needed?

Availability

The basic operating system that runs when a computer is first turned on. It runs test of memory and the cpu,and initilizes hardware components so that the actual Operating system can be loaded from the hard disk.

BIOS ROM

BIOS ROM

BIOS stands for Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software not hardware, ("basic" operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can't choose the amount or contents.

Peer to Peer Network

A peer means that each computer is roughly equal to every other computer. Cheaper.

peer to peer network

A peer means that each computer is roughly equal to every other computer. This differentiates a peer-to-peer network from that of a client-server model

System Development Life Cycle (SDLC)

A process for planning, creating, testing, and deploying information systems, including hardware and software

Public Domain software

A program distributed for free without a copyright.

Language Translators

A program that takes one program, written in a high level language, and creates a machine language program as output

High Level Language

A programming language that is designed to be easy for humans to read and write.

Smalltalk

A programming language that pioneered object-oriented programming. Not popularly used in Web development.

_____ is the transfer rate in bits per second and is influenced by the type of media.

Bandwidth

Projection

A query that returns all of the records from the relation, but only select attributes or fields

router

A router connects multiple computer networks. A router will relay messages to computers with appropriate IP addresses.

Routing Decision

A routing decision is the destination network that a message is placed onto. This decision is generally left up to a routing table stored in the router's memory.

What does BIOS stand for

Basic input output system

What type of information processing allows input data to be accepted as a set of records and processed as a unit?

Batch processing

House CDs and DVDs. They are typically on the front of the system unit for easy access.

Bays

What peripheral component houses CDs and DVD?

Bays

______(external openings) and ports that connect peripherals

Bays

Query

A search of data in the relation or relations that fit specific parameters

Off-Site Storage

A secure location for storing backup media

What are the external components that allow peripherals to be connected to the system unit?

Bays (CDs, DVDs), slots (wireless-access cards, camera cards), ports (input, output, storage, communication devices)

e-mail server

A server whose sole function is to process and deliver incoming and outgoing e-mail.

PaaS - platform as a service

A service model in which various platforms are provided virtually, enabling developers to build and test applications within virtual, online environments tailored to the specific needs of a project.

Why would it be desirable to use a switch as opposed to a hub in a network?

Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub.

Script

A small program

Virtual Machine (VM)

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.

Business Intelligence

A specific information system to help an organization reach its strategic goals

When must a software license agreement be accepted when using proprietary software?

Before purchasing the software

Virtual Machines

A virtual machine is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. - Permits multiple platforms and multiple users - Provide a secure remote environment. - Lower costs and improved collaboration. - Ability to communicate with different OSs.

Implementation

Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users

Less reliance on internal IT expertise.

Benefits of cloud computing

During implementation, which testing method uses actual data without the assistance from developers? End users test the system without help from developers; using actual data.

Beta testing

wireless access point

A wireless access point can be connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable. it is commonly used on a router

Refers to data sets that are so enormous and multifaceted that they will require more sophisticated database management/processing tools than we currently use.

Big Data

To whom does the responsibility of accuracy fall, specific employees or all employees? To what extent does the company work to ensure that potential errors in data are eliminated?

Accuracy

Scope Creep

Adding to the scope of the project; can impact the allocation of resources.

IT Professional Roles

Administration and Support

Adding/deleting user accounts is the role of which account?

Administrator

Which account is also referred to as root or superuser also has the option to add/delete user accounts?

Administrator

Which account is also referred to as root or superuser?

Administrator

Which account typically has greater authority to write to or execute programs?

Administrator

A computer program is an ________ that executes a task. A set of instructions to follow for example, building a swing-set.

Algorithm

What is another term for a formula that outlines how to execute a task?

Algorithm

The following are examples of ______? Improving competitive advantage. Looking for relationships in collected data. Determining customers purchasing preferences and patterns.

Big data Analytics

The following are examples of what code type? 1. i.e. ( 111100010000) 2. number system that computers use. 3. Base 2 4. Is the foundation for machine language.

Binary

Which of the following statements is not part of the path a message takes from one computer to another?

All messages require a response from the destination machine to the sending device.

I/O Subsystem

All peripheral devices where long term storage devices are used.

Which system requirement is an example of considering user needs in the design of an information system?

Allowing easy access to customer account information.

Docking Station

Allows a notebook or tablet to function like a desktop

A local area network (LAN)

Allows hardware sharing within one office

Packet Sniffing

Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted

Packet Sniffing

Allows you to obtain anything being sent over the network if the data being transmitted is sent without encryption

How have computer users changed over the last 75 years?

Almost anyone can be a computer user today whereas in the past only computer scientists and those with specialized training used computers.

Types of Data

Alphaneumeric, Number Integer, Date / Time, Boolean / Logical

String Data

Alphanumeric or text character

Biometrics

Biometrics pertains to a personal physical characteristic such as a fingerprint.

________ are individuals with malicious intent who violate security in order to commit crimes or acts of terrorism.

Black-hat hackers

What is an example of a non-computer scenario that represents an algorithm? Select all that apply.

Building a swing-set Making a sandwich Solving a math problem

A collection of wires, cables, optical fiber, or printed circuits that allow multiple hardware components to communicate with each other.

Bus

The _____ can have many wires, each of which can transmit 1 bit of information. These bits can be combined to create more complex data.

Bus

This component facilitates the flow of information / communication between components and peripheral devices.

Bus

A company's ability to recover after a disaster is directly related to which of the following?

Business continuity plan

How can an organization assist employees with the ethical use of information technology?

By developing policies for information usage.

Over the years, the number of transisters that can be placed on a chip has increased by how much?

By orders of maginitude rather than linearly

The ____ is the device that not only executes your programs' instructions, but also commands the various components in the computer.

CPU

This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.

CPU

What are the main components in a computer?

CPU

Which of the following carries out the instructions of a computer program and is often referred to as the "chip"?

CPU

also referred to as "the chip"

CPU

Components of a Computer

CPU, Memory and Storage, Peripheral Devices

Which of the following components represent the basic structure of the computer system?

CPU, memory, I/O subsystem, and bus.

Computer Program

Can be characterized as an elaborate algorithm. The instructions must be clear so the rules are unambiguous, and there must be a distinct stopping point.

Wireless Access Point

Can be connected to a hub, switch or router. This device sends out a wireless signal so computers on the network connect without a cable. Many routers today act as a wireless access point.

Wireless Access Point

Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable

Firewalls

Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked

The Model

Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application

Internal Components of the System Unit

Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards

single-chip processor

Also known as a microprocessor. Ushered in the fourth generation of computers

Which of the following carries out the instructions of a computer program and is often referred to as the "chip"?

Central Processing Unit

CPU

Central Processing Unit. Executes programs instructions and commands various components of the computer. Consists of two parts. The Control Unit (CU) and the Arthmatic Log Unit (ALU) The two parts of the CPU do the computer's main work of accepting data and converting it to information.

______ is used to modify an existing table.

Alter

TLD(Top Level Domain) Name

Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page

Computer Matching and Privacy Protection Act of 1988

Amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases. Without this act, one agency could potentially access data from other agencies to build a profile on a particular individual

SQL Injection

An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database

______ can be accessed by anyone at anytime in anyplace.

Cloud computing

Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?

Cloud computing.

A ______ site is an off-site storage shell that can be used for operations should a need arise.

Cold

COBOL

Common Business Oriented Language

Sara asks James questions about what he is experiencing, describes actions he can take to clarify what the issue is, and explains how to fix the problem.

Communication

IS or IS NOT

Compare to null (missing data)

Which of the language can create an executable program faster?

Compiled language

If an entire program is used as input to create executable code, the translator is a/an ________.

Compiler

The following characteristics are examples of _______? 1. Requires that the components of the software all be defined from the outset. 2. The code is more efficient.

Compiler

When the entire program is translated it is converted into machine code that works with a specific type of computer.

Compiler

Which of the following are types of language translators?

Compiler and interpreter

The first time this occurred everything was copied.

Complete backup

Peripheral Devices

Components that are located outside the system unit, yet are connected physically or wirelessly to it Typical peripheral devices for input include a keyboard, mouse, scanner, digital/web/video camera, and microphone.

What are peripheral devices?

Components that are located outside the system unit, yet are connected physically or wirelessly to it. Examples, keyboard, mouse, speakers, monitor

A list of instructions that tells the computer what to do is an example of?

Computer Software

Documenting the system and training users for this massive PPACA undertaking.

Computer Support Specialist

__________ allow individuals to share many types of resources.

Computer networks

Which of the following statements is true of computer networks?

Computer networks allow individuals to share many types of resources.

Information Technology includes:

Computer networks and IT personnel

Software

Computer programs that tell the computer what to do--how to execute commands and process information

Select the statement that best describes the difference between software and hardware.

Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.

Server

Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network

Indicate the security classification for Project Plan for a new IT rollout.

Confidential

What is the Security Classification for Building specifications for new product?

Confidential

Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.

Confidentiality

Using a unique identifier to allow access to sensitive information is an example of

Confidentiality

Using a unique identifier to allow access to sensitive information is an example of?

Confidentiality

What part of information assurance and security (IAS) requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized individuals?

Confidentiality

CIA

Confidentiality, Integrity, Accuracy

CIA

Confidentiality, Integrity, Availability

Ports

Connect additional input, output, storage, and communication devices

Network Hub

Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network

Router

Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses

Application Software

Consists of programs that end users run to accomplish tasks

System Software

Consists of programs that make up the OS; software that directly supports the computer system itself

System software

Consists of the programs that control or maintain the operations of the computer and its devices. - consists of daemons

Project Execution

Consists of those processes performed to complete the work defined in the project management plan to satisfy the project specifications.

What step should be taken by a business when a third-party solution is found that will benefit a project?

Contact the group to arrange a demo of their product.

Client-server Network

Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers

Field

Contains the data of an attribute for a record within a relation

The ______ does as its name indicates—it retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU.

Control Unit (CU)

Parts of the CPU

Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen

Retrieves instructions and raw data (input) and manages the transmission of the instructions and data to the alu.

Control unit

System Clock

Controls the speed at which instructions are processed.

System Clock

Controls the speed at which instructions are processed. Clock speed is measured in GHz.

These are examples of what should be considered during the ______ process. Integration of the new system with other systems. Reaction of the end-users to the new system. Training end-users to use the new system.

Conversion Process

______, is a play-on-words of copyright: instead of using rights to limit users (as proprietary software does), it promotes freedom and flexibility of use.

Copyleft

Protects an original work (in its tangible, expressed form), but not the ideas behind the work. Has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.

Copyright

What will protect the original work but not the creation of the inventive concepts?

Copyright

Kernel

Core components of the OS that is loaded when the computer is first booted.

During the planning phase, it is also important to estimate the costs associated with each activity. This allows the team to consider potential costs associated with each element of the project, as well as the cost of the project as a whole.

Cost Estimation

Which benefit is provided by a computer network in a business?

Cost for hardware resources are decreased.

What are advantages of a network?

Cost savings

Which benefit is provided by a computer network in a business?

Costs for hardware resources are decreased

Which risk assessment question is part of the initiation phase?

Could the end users reject the outcome of the project?

Image backups

Create a copy of everything that is on a hard drive

Open Source

Created in the Open Source Community and made freely available as source code

Slicing

Creates a subset of the data by reducing the data from multiple dimensions to one dimension

Workstations

Creates and maintains client network connections to remote servers

System Unit

Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.

System Unit

Critical component of all computer-based systems. Consists of most of the hardware the computer needs in order to run. Core feature of notebooks, tablets, smartphones and other types of computers.

Sometimes when a project is underway, team members may realize that the time or capital allotted for the project will not be sufficient. When this happens, the team may try to cut corners to save time or money. For example, an IT manager may decide to purchase a server that does not meet the original specifications of the project in order to reduce costs. Later, the team may discover that the server cannot keep up with the demand placed on it, which puts the success of the project at risk.

Cutting Corners

These are characteristics of an ______? 1.It is a server with a table that contains IP addresses and aliases. 2. It translates Internet aliases to IP addresses. 3. Sends requests to other DNS servers when it cannot locate an IP alias.

DNS sever

In the ______ attack, one or more attackers attempts to flood a server with so many incoming messages that the server is unable to handle legitimate business. One of the simplest ways to perform a attack is to submit thousands or millions (or more) HTTP requests.

DOS attack

Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?

Data

_____, can be obtained from a: camera card, bar code reader, pen tablet, or values entered by the user.

Data

An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?

Data Mirroring

_______ is when data cannot be changed/manipulated while it resides on a host or travels across a network, or if it is changed, manipulated, then the change can be detected.

Data integrity

Integrity

Data is correct. 1. Data gathering must be accurate 2. Data must be entered into the system correctly 3. Data modification must be tracked

Data

Data is less structured than information

Database Information Processing (OLAP)

Data is processed through a suite of analysis software tools

Each server has two hard drives and every time anything is changed on one an immediate copy is made to the other hard drive.

Data mirroring

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Data mirrorring

Data is stored, Data is retrieved and, Data is updated are examples of how data is used in a ________.

Data tier

DIKW

Data, Information, Knowledge, Wisdom

DIKW Hierarchy

Data, Information, Knowledge, Wisdom

Design development and DBMS support are responsibilities of which IT professional?

Database Administrator

Read the following scenario, and then select the job title that most accurately depicts the descriptions. Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively. The titles most fit Javier's job?

Database Administrator

Structuring and organizing the enormous amount of data that is utilized as consumers review insurance options and determine what the cost of the policy will be as well as any subsidy that may be available.

Database Administrator

Respond to client queries, responds mainly to local clients, generate reports

Database server

Flat File Database

Database which consists of just one table.

Which two are parts of an information system?

Databases and Networks.

What type of information is this? Date of the order: 10/11/13

Date

Online Data Processing (OLDP)

Deals with data in real time

The following are examples of what code type? 1. number system that people use in everyday life. 2. i.e. ( 968 ) 3. Base 10

Decimal

Which number system is read and used by humans every day?

Decimal

Physical Level of a Network

Defined as how information is carried over the network

DIKW Hierarchy

Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)

Object-Oriented Programming (OOP)

Designing a program by discovering objects, their properties, and their relationships

What device does not have peripherals permanently attached to the system unit?

Desktop

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?

Desktop

Which computer has a system unit that is easily distinguished from the peripherals?

Desktop

Which computer has the most performance capability?

Desktop

A certain computer has the following components and capabilities: peripherals include an external flatscreen monitor and an optical disk drive large capacity hard drive this is an example of what?

Desktop computer

In the strategic risk analysis, prioritizing risks is before which step?

Determine threats

Analysis

Determines the user requirements for the new system and develops logical models of the system

In strategic risk analysis, what is the final step?

Develop and enact policies against threats

In the strategic risk analysis, prioritizing risks is before which step?

Develop and enact policies against threats

When to call the Help Desk

Developing a email list Using programs

Provide specific interfaces between the OS running a computer and hardware.

Device Drivers

Device Drivers

Device drivers provide specific interfaces between the OS running a computer and hardware

Bus Network

Devices connected along a single cable. Size of network is restricted.

Bus Network

Devices connected along a single cable. Size of network is restricted.

Makes it illegal to violate copyrights of text, sound, video, or program code by transmitting them via the Internet."

Digital Millennium Copyright Act of 1998 (DMCA)

Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures. This was followed 2 years later with the Electronic Signatures in Global and National Commerce Act.

Digital Signature and Electronic Authentication Law of 1998 (SEAL)

High or Low

Digital data is represented as electrical current in a computer. High means their is noticeable current flowing through the component, and low means there is no current

The old system is "turned off" and the new system is "turned on" at a specific date and time. After the conversion, the old system is no longer available to end users.

Direct Conversion

MS-DOS

Disk operating system

Identifies the server on which a web page can be found.

Domain Name

Identifies the server on which the web page can be found? For example: abank.com

Domain Name

Moore's Law

Doubling of transistor count roughly every 18 - 24 months (exponential increase); observation, not physical law

Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs).

Drivers Privacy Protection Act of 1994

_______ is used to delete a table (be careful with this one).

Drop

SDLC - Logical Design

During this step,the logical models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step. logical diagrams

Which of the following describes the duties of a web administrator?

Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.

______ is typically called main memory.

Dynamic RAM (DRAM)

Types of RAM

Dynamic RAM (DRAM) - typically called main memory Static RAM (SRAM) - cache memory and registers

What was the first digital, general-purpose, programmable computer?

ENIAC (Electronic Numerical Integrator and Computer) first known to the public in February of 1946 - data input was performed by punch cards - output was produced using an offline accounting machine - performed decimal computations - vacuum tubes for storage - transistors and other electronics for computation - programming was in machine language This ended all interest in analog computers

what is the typical process used by data warehouse

ETL (Extract, Transform, Load)

Ring Network

Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.

Star Network

Each device is connected to a central devices such as a hub or switch.

Which of the following descriptions best represents the reliable characteristic of quality data?

Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.

Which of the following statements accurately describe IT certifications?

Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.

Assembly Language

Easier than machine but still required detailed, precise low level instructions

Buffer overflow, a technique used to attack computer systems is, _________.

Easily preventable

Learning about social engineering and how to protect passwords is ___.

Education

Establishes regulations over electronic wiretapping

Electronic Communication Privacy Act of 1986

Phishing

Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information

User Acceptance Testing

Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user

Emily is working on the company database of employees. She has been asked to create a birthday list. What information would she need?

Employee name and date of birth.

How does a network enhance the business ecosystem? Select all that apply.

Employees in different locations can share hardware and software. Team members can review files on the shared drive synchronously.

What is required to verify authenticity of the recipient? Select all that apply.

Encryption

The agreement is a contract between the software company and the purchaser.

End User License Agreement, or Software License Agreement

The ______ is a contract between the Licensor and the purchaser that gives the purchaser the right to use the software.

End User License Agreements

Grey Hat Hacker

Engage in both white and black hat types of hacking activities

Information Systems Audit and Control Association (ISACA)

Engages in the development, adoption and use of globally-accepted, industry-leading knowledge and practices for information systems

Select the IT education that would be most appropriate for the individual in the following scenario. Since she was a child, Rebecca has enjoyed taking things apart and putting them back together. She has built her own computer from scratch and loves to find ways to improve its capabilities. Which specialized IT focus would be a good fit for Rebecca?

Engineering

Because IP addresses consist of numbers, they have ______ aliases to make it easier for individuals to remember an address - such as CNN.com versus http://157.166.226.26.

English-like name

Role-based Access Control

Ensures that the user gains access only to the resources that the user should be able to access

Data Validation

Ensuring that users enter the correct data type

=

Equal to

IN

Equal to one of multiple possible values

Electronic Communication Privacy Act of 1986

Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping)

What is the purpose of the End User License Agreement for a commercial software package?

Establishes the customer's right tot use the software.

Project managers use Program Evaluation and Review (PERT) and GANTT charts to?

Estimate time for each activity

Mesh Network

Every device is connected directly to every other device in the network.

Binary numbering system

Every value is represented with some combination of 2 digits (0,1) - base 2

Octal

Every value is represented with some combination of 8 digits (0 - 7)

Full backup

Everything on the hard drive is copied each and every time a backup is performed

CPU

Executes programs' instructions and commands various components in the computer. Referred to as the "chip".

The project manager uses the information from initiation and planning to ensure the project stays on track in terms of time, capital, and scope in which project phase?

Executing & Controlling

Project managers use variance reports, status reports, and resource allocation reports in which project phase?

Executing & Controlling (Phase)

Training Material are used at this phase of the project

Executing the Plan

When integrating a new system within an organization, what will it interact with?

Existing systems in the organization

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?

Expanding the infrasturcture to support additional locations.

_________, like a sound card or graphics card, are plugged into expansion slots and enhance the performance of a computer.

Expansion cards

Which of the following best describes the purpose of expansion slots in modern computers?

Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.

Which of the following is NOT a characteristic of a bus network topology?

Expensive compared to other topologies.

Which two computer peripherals are connected to the computer through a port?

External microphone and USB flash drive

__________data comes from various sources. These sources must be identified, understood, and tapped.

Extract data

Define ETL (Extract, Transform, Load)

Extract data—data comes from various sources. These sources must be identified and understood. Transform data—given that the data come from different sources, it is likely that the data are not organized using the same collection of attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This will include altering data to relations or objects (or whichever format is preferred), recognizing the unique identifier(s), and selecting the appropriate attributes (fields). Load data—into the storage facility, that is, the transformed data must be stored in the data warehouse using the appropriate representation format.

The development of first generation computers was quickened by World War I. True or False?

False

True or False - Database management software is an example of system software.

False Database management software is an example of application software; it is not an operating system.

True or False - Computer memory is not considered hardware.

False Memory is part of a computer's hardware.

True or False - Database management software is an example of system software.

False - DB management software is an example of application software; it is not an operating system

A data value of a record's attribute.

Field

The following characteristics are examples of which generation computer? 1. Advancement hastened by world WAR II 2. A computer the requires programming in machine language. 3. A computer built with vacuum tubes. 4. The Electronic numerical Integrator and Computer (ENIAC) is developed

First Generation (1940's - 1950's)

Evolution of Users

First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.

Which of the following database categories is the most similar to a spreadsheet or MS Excel document?

Flat File Database

A _______ database has records that are separated by a delimiter.

Flat file database

One large single table without relations between tables. A single workbook within a spreadsheet program uses this format.

Flat file dtabase

What are the three main categories of databases?

Flat file, relational, and hierarchal

What type of information is this? Price of the product: $14.75

Floating-point

Database Administrators

Focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas

Database Administrator

Focuses on the design, development, and support of database management systems (DBMSs).

Projection

Form of query used to return all of the records from the relation but only select attributes or fields.

The following characteristics are examples of which generation computer? 1. GUI are introduced. 2. IBM makes a single-chip processor. 3. The Mark 8, the first personal computer, appears.

Fourth Generation (1974 - today)

Which two types of software licenses are free?

Freeware and Open source

______, is usually software that has become obsolete because a newer software has replaced it, or is software that the original producer (whether an individual or a company) no longer wishes to maintain and provide support for.

Freeware software

Language Translator Programs

Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer

What is the measurement unit used to identify "Clock Speed" on today's computers?

GHz

What is the measurement unit used to identify clock speed on today's computers?

GHz

Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?

GOTO

Complete the sentence: Dragging, pointing, clicking, and double clicking with the mouse are examples of _______.

GUI

The introduction of ______ made the process of interaction with computers much less complicated.

GUIs (Graphical User Interface)

Your site's Internet point of presence is called a _______.

Gateway

End User License Agreement (EULA)

Gives the purchaser the right to use the software

>=

Greater than or equal

_____ is when an individual obtains unauthorized access to a host.

Hacking

What will store data even when the computer is turned off but may lose data and should be backed up?

Hard Drive

What is the the physical components of the computer?

Hardware

Relational Database

Has multiple tables (relations) with interrelated fields; most common structure for databases

What does a JDBC driver allow a user to do?

Have an application interact with any database when developing in Java. a standard application programming interface (API) for accessing database management systems (DBMS).

Information in DIKW

Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.

Site Sharing

Having multiple data centers located in disparate regions; typically used by large organizations.

Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition).

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Who are some of the professional individuals mentioned that would be involved in finding ways to administer and collect useful information from large amounts of data?

Healthcare. Media/advertising. Financial sector.

Bob lives in Arizona and works for a large company with employees located around the world. Bob responds to phone calls and e-mails sent by employees to a dedicated IT support address. He answers questions and is able to log in remotely to view information on an employee's computer. When he is not able to solve a problem, he routes the issue to another IT professional who can provide the necessary support.

Help Desk

The following are ________ ? 1. Answering e-mails about software questions 2. Routes questions to the most appropriate IT professional.

Help Desk duties

Support IT Professionals

Help desk and training.

Sub-tables contain data related to a single main data point.

Hierarchical database

The following are characteristics of a __________? Parent-child relationships A tree like structure

Hierarchical database

Function get_all_factors(number) is an example of what?

High-level Language Programming

Jessica works for a company that builds training simulations for fire fighters. To build each training scenario, Jessica programs the behavior of the virtual fire fighter agents in the scenario using a language developed for the simulator. She can program the virtual fire fighter agents to enter the building, search for building occupants, and perform other common tasks based on simulated conditions.

High-level Language Programming

Which accurately describes the advantages of high-level programming languages over low-level programming languages?

High-level languages use English words.

A business intelligence system is used by which of the following groups of people?

High-level management

This is an example of which type of language? int a =1,b=5,c;

High-level programming language

With a ______ an organization can shift operations to a different location with little to no delay.

Hot site

Bays

House CDs and DVDs. They are typically on the front of the system unit for easy access.

Contains peripheral devices used for input, output, and long-term storage

I/O subsystem

The _______ includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape).

I/O subsystem

________, consist of four numbers, where each number is between 0 and 255.

IP addresses

Once words, numbers or images are entered, a computer processes the data into usable information that can then be accessed to answer questions or meet specific needs. This is a description of how a computer uses the __________?

IPOS cycle

Supports day-to-day technology needs

IT

Which department will work with the management department to achieve strategic goals by developing applications and databases?

IT

Supports day-to-day technology needs of an organization. Make sure the company's website can handle e-commerce transactions. There are functions of which department?

IT Department

IT personnel who understand both the technical IT infrastructure and management of the business fill which role?

IT Management

Establishing deadlines, Hiring and firing staff members, Being a project manager, these are examples of what IT professional?

IT Manager

The following are examples of _______? IT provides improved local and global communication. IT has enabled world-wide tracking of shipments. IT has facilitated global expansion for some organizations.

IT globalization

All the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.

IaaS

Which of the following demonstrate an information system? Select all that apply.

Ian is making updates to the company website to include the latest product information. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees.

Encryption

Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information

Host Name

Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored

Which is part of the definition of Domain Name?

Identifies the server on which a web page can be found.

Domain Name

Identifies the server on which the web page can be found

In strategic risk analysis, what is the first step?

Identify information assets

In strategic risk analysis, what is the first step?

Identify vulnerabilities

What are two necessary elements of business continutiy planning?

Identifying risks that may occur

A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?

Image

A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?

Image backup

Donald has written a script that copies everything from the server (data, programs, scripts, configuration files, etc.) onto DVDs.

Image backup

________ Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users.

Implementation

Which step involves the development of software while converting the models in the SDLC?

Implementation (step)

Digital Millennium Copyright Act of 1998 (DMCA)

Implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer

During project planning, the organization may not realize that they do not have staff members with the correct skill sets to complete the project. For example, the team may feel confident that their experienced software programmers can handle a project, but if the project involves new technologies that they are not familiar with, the project can take longer than expected or remain incomplete.

Improper Skill Sets

Complier

Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient

Network Administrator

In charge of all aspects of the computer network

Why do high-level programming languages need to be translated?

In order for the computer to understand the code.

ASCII

In place of the character, we have the binary sequence. For instance, 'a' is stored as the decimal value 97, or the hexadecimal value 61. Using either decimal to binary or hexadecimal to binary, you will see that 'a' is 01100001. Compare this to 'A', which is decimal 65 (hexadecimal 41), which is 01000001.

I/O Subsystem

Includes all peripheral devices (input, output, storage, network) where storage consists of long-term storage devices (disk drives, tape).

Now only those items which have changed from the previous day are copied.

Incremental backup

Resource/Filename ID

Indicates the name of the file you are accessing, or the location of the document on the server

Black Hat Hacker

Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism

Black Hat Hacking

Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism

As a new sales manager, Sylvia is studying the sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working?

Information

IAS

Information Assurance & Security. Concerned primarily with the protection of IT.

The definition of _________ does include the people who support Information Technology systems and who enable the processing of data.

Information Technology

________ enables the processing of data. It also provides a means for the information to be disseminated and refers to the people who facilitate the process.

Information Technology

Availability

Information is available when needed.

What is information?

Information is data that has processed. The output of some process.

Output

Information is output so user can see results.

Which term is defined as a collection of information used to support management of an organization?

Information system

Knowledge in DIKW

Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.

White Hat Hacker

Informs companies of potential problems with software so companies can fix

IaaS

Infrastructure as a Service

Makes it possible to have all of your businesses IT departments needs sited outside of the organization and available to anyone, wherever.

Infrastructure as a Service (IaaS)

IaaS

Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.

LaaS

Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.

Object Oriented Programming

Initially introduced in Smalltalk in 1970's and early 80's

Problem definition, resource allocation, and risk assessment are 3 key elements of which project phase?

Initiation

What is the first project phase?

Initiation

A risk assessment is completed during which phase of the project?

Initiation ( Phase)

Project phases

Initiation, planning, execution, monitor and control, and closure

Abigail enters the method of payment into the computer system what operation is this?

Input

Abigail types the meal order into the computer system this is an example of what operation?

Input

The process of taking data (e.g., words, numbers, images, sounds) from outside the computer and bringing it into the computer.

Input

A computer performs four operations

Input Processing Output Storage (IPOS)

What are the 4 operations a computer performs?

Input, Processing, Output, Storage Referred to as IPOS

What does the acronym IPOS stand for?

Input, process, output, and storage

What does the acronym IPOS stand for?

Input, process, output, storage.

Slots

Insert wireless-access cards, and other PC cards (such as camera cards).

System Administrator

Install and configure operating systems on the organization's machines, install new hardware, perform software upgrades and maintenance, and handle user administration

Web Administrator

Install, configure, maintain, secure, and troubleshoot the web server.

Which of the following is a role of IT personnel?

Installing, testing, and updating software. Processing data into information. Developing faster computer chips.

Security Administrator

Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.

Web Administrator

Installs, configures, maintains, secures, and troubleshoots web severs.

Entering data into the system accurately is an example of

Integrity

Entering data into the system accurately is an example of?

Integrity

Requires that data are correct. This requires at a minimum three different efforts. First, data gathering must include a component that ensures the accuracy of the collected data. Second, data must be entered into the system accurately. But most importantly, data modification must be tracked.

Integrity

What part of information assurance and security (IAS) requires that data are correct, data gathering ensures the accuracy of the data, data must be entered into the system accurately, and data modification must be tracked.

Integrity

What part of information assurance and security (IAS) requires that data is correct, data gathering ensures the accuracy of the data, data must be entered into the system accurately, and data modification must be tracked.

Integrity

The ______ refers to the countless kinds of devices that can and will be connected to the Internet in the next few years.

Internet of things

What is another term that defines a script?

Interpreted program

The ______ takes the most recently entered instruction, translates it into machine language, and executes it.

Interpreter

The following characteristics are examples of _______? 1. Relies on a session. 2. Allows you to test out and idea.

Interpreter

Pilot Conversion

Involves starting the conversation with a portion of end users

Which of the following describes local computers only?

Is a computer that a person is physically at.

Model-View-Controller (MVC)

Is a development technique used in the implementation of user interfaces

What is one of IT's role in golobalization?

It allows companies to reach a wider customer base.

What does the ALU do?

It does the actual processing of the data

What effect does scope creep have on a project?

It increases unplanned costs for the project.

What is the definition of information technology?

It is the technology used to create, maintain, and make information accessible.

how does a compiler work?

It requires the components of the software to be defined from the onset.

What does the CU do?

It retrieves the instructions and raw input data and sends that data for processing

Developers using Java can use ______ in conjunction with ODBC to have an application interact with any database.

JDBC- Java Database Connectivity

Point-to-Point Network

Link between two resources. Simplest for of a network. Limits how devices can communicate with each other

Point-to-Point Network

Link between two resources. Simplest for of a network. Limits how devices can communicate with each other.

What is true about the Linux operating system?

Linux runs on both servers and workstations

_______ into the storage facility, that is, the transformed data must be stored in the data warehouse using the appropriate representation format.

Load data

Which of the following would NOT require the use of a network?

Loading a statistical program on your personal computer.

LAN

Local Area Network which is a network within one location/site such as one room, one floor, one building.

The level where data processing occurs

Logic tier

Using diagrams to describe to the end-users how the system will work. Modifying the model design while still in the diagram phase to better fit the end-users' needs. Are examples of which Model type?

Logical Modeling

________ During this step, the logical models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step.

Logical design

Which step occurs after the analysis step and before the physical design step in the SDLC?

Logical design Step

Physical design

Logical models are converted into physical models

Jeremy is building a small electronic toy bug in his home garage. He wants to program the toy bug to walk forward and backward when the switch is turned on directly through the internal chip in the toy by adjusting the electrical currents on the chip.

Machine Language Programing

Which of the following statements applies to an open source software license?

Made freely available as a source code to enhance and distribute the software.

During this step, modifications or corrections to the system are made.

Maintenance

Malware

Malicious software usually in the form of a worm or virus.

______ is the term given to "evil" software.

Malware

Sets goals and evaluates progress toward those goals.

Management

Which of the following is a role of an administrator account?

Manipulate system files

OLAP (online analytical processing)

Manipulation of information to create business intelligence in support of strategic decision making

Read the following scenario and determine the best hardware or software solution for the situation. Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.

Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.

Individuals who are part of an IT department?

Maria is designing a new online form for the company so they can more quickly input sales data. Emily is working on a cost analysis to justify the need for a new server. Aiko is testing a new network that is connecting the main office with satellite offices in the area.

Which of the following employees would be considered IT personnel?

Maria, a computer engineer who designs computer chips.

Promotes products or services

Marketing

LIKE

Match a character pattern

What is the typical bandwidth of today's networks

Mbps to Gbps

What is the typical bandwidth of today's networks?

Mbps to Gbps (Mbps stands for megabits or millions of bits per second and Gbps stands for gigabits or billions of bits per second)

Stores programs being executed and data that the programs use

Memory

______ stores the program(s) being executed and the data that each program is using.

Memory

______ contain electronic components that store instructions and data

Memory slots

Which of the following best describes the differences between memory slots and expansion slots?

Memory slots contain electronic components that store instructions and data; whereas expansion slots may hold adapter cards, video cards, or wireless network cards.

Which of the following best describes the differences between memory and the hard drive?

Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.

In which type of network topology is each networked device directly connectd to every other networked device?

Mesh

Which of the following technologies was introduced in the fourth generation of computers?

Microprocessors

_______ identifies the reason the organization exists, including the people it serves and the principles and standards of practice that should guide everyday operations.

Mission

The following are examples of _______? 1. Android 2. iOS 3. Chrome

Mobile Device Operating System

Complete the following sentence: Android, Chrome, and iOS are operating systems for

Mobile devices

The ability to use a smartphone or tablet would make it easier for a consumer to access the healthcare.gov website from wherever they were.

Mobile technology

What does M-V-C stand for?

Model-View-Controller

Maintenance

Modifications or corrections to the system are made

Which of the following include only elements of a computer system? Select all that apply.

Monitor, print drivers, operating system, and mouse CPU, users, keyboard, and memory

Print Server

Monitors print jobs

Print Server

Monitors print jobs and replies with acknowledgement when print job has been completed.

What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?

Moore's law

_____ is considered to be an observation that may or may not hold true in the coming years.

Moore's law

Network Switch

More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it

The use of IT has allowed businesses to have __________.

More tools for communicating

The ______ connects or stores all of the components in a computer.

Motherboard

Which input peripherals are now integrated in the laptop?

Mouse, keyboard, and webcam

What is a relational database?

Multiple tables with interrelated fields can be queried to generate reports and provide information to users.

Which other model is the M-V-C model similar to?

N-tier model

What are the means for devices and networks to communicate with each other and connect to devices in other networks.

Network hub, router, switch

What is TCP/IP

Network protocol stack TCP/IP is made up of a collection of protocols referred to as a protocol stack.

Which of the following statements describes why network protocols are necessary.

Network protocols are necessary for computers to communicate with each other.

Malicious attack on an entire network?

Network worm

Yes or No - Software is tangible, like computer hardware.

No Software is intangible; it is a set of instructions written in a programming language.

Yes or No - Software programming language instructions can be general and fairly broad.

No Software programming language instructions are descriptive and break tasks down into definable steps.

The ability to verify that an e-commerce contract is valid.

Non-repudiation

Hard Drive is ______ meaning, the purpose of a hard drive is to store data even when the computer is turned off. However, hard drives can develop problems involving the loss of data and should therefore be backed up.

Nonvolatile

Read-Only Memory (ROM) is ________, meaning ROM memory is a form of permanent storage for instructions that the computer needs to boot up or start.

Nonvolatile

<>

Not equal to (most DBMS also accept != instead of )

Hexidecimal number system

Number system that has 16 digits 0 - 9 and A - F.

Floating-point

Number with a decimal point

A _____ is an application that interfaces with databases.

OBDC- Open Database Connectivity

The combination of analyzed data from various databases into a meaningful report. Looking at data in a more granular fashion; examining the details of the data.

OLAP - Online Analytical Processing

______ is real time data.

OLDP- online data processing

The team may ask, What are our goals for the project? And how can we achieve them? In Phase 2, they break down the project into a step-by-step process consisting of manageable activities.

Objectives and Activities

Cloud Computing

Offers, as a service, the ability to offload computation and storage from your local computer

Spyware

Often downloaded unknown to the user when accessing websites. The spyware might spy on your browsing behavior at a minimum, or report back to a website sensitive information such as a credit card number that you entered into a web form.

Relation

Often presented as a table

N-tier Development

Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects

Direct Conversion

Old system is turned off and the new system is turned on at a specific data and time

Buffer Overflow

Oldest and well-known forms of software exploit. The buffer is a specific address in a computer's memory where a variable is stored. The buffer is of limited size. If the software does not ensure that insertions into the buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount so that the memory locations after the array are filled as well.

Sara has received training for other software programs, but she has never worked with the program James is using. She looks up information about the program to understand similarities and differences that may affect how she approaches this situation.

On-going learning

Which of the following is/are true of the IPOS cycle?

Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.

What is a flat file database?

One large single table without relations between tables. A single workbook within a spreadsheet program uses this format.

Flat File Database

One large single table; used if the amount of data that is being recorded is fairly minimal

Denial of Service (DOS)

One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business

Denial of Service (DOS)

One or more attackers attempts to flood a server with so many incoming messages that the server is unable to handle legitimate business.

Complete the sentence: Public key encryption uses __________.

One public key & one private key

Computer Support Specialist

Operates as a trainer and troubleshooter. Training tasks may include the production of material such as technical manuals, documentation, and training scripts. Training may take on numerous forms including group training, individual training, training videos, and the production of training videos and software.

What is a program that will allow a computer to easily access the hardware and software of the computer system?

Operating system

What are the risks of cloud computing?

Org becomes dependent on the reliability and performance of a third party vendor.

Once all the activities have been identified, the team needs to organize the activities in a useful order.

Organize Activities

Hierarchical Database

Organizes data using a tree like or organizational chart type structure

Services

Os programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.

This is one of the most frequently cited problems in project management. Often, the individuals who estimate the time needs of a project are not in sync with those who assign individuals to work on the project or those who have firsthand knowledge of how long it will take to complete an activity.

Overly Optimistic Time Frame

Project Monitor and Control

Oversees all the tasks and metrics necessary to ensure that the approved and authorized project is within scope, on time, and on budget so that the project proceeds with minimal risk. Monitoring and Controlling process is continuously performed throughout the life of the project.

Who owns the data accumulated and the products produced by the organization?

Ownership

Is to be able to quickly and reliably develop and deliver applications. Now, teams of developers located around the world can collaborate on the development of an app by accessing the same environment in real-time. This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers.

PaaS

which form of cloud computing enables teams of developers to quickly and reliably develop and deliver applications by accessing the same environment in real-time.

Paas or Platform as a Service

_______ will obtain passwords if the data being transmitted is sent without encryption.

Packet sniffing

________ is a digital communications method that breaks down communication into small packets of data.

Packet switching

Packets

Packets are relatively small. If the message is short, it can fit in one packet. As an example, the request http://www.google.com/ will be short, but an e-mail message could be thousands to millions of bytes long so it might be placed into multiple packets. Each packet is given the destination address (an IP alias). A checksum is computed from other data contained within the IP packet and stored as part of the IP packet. When the IP packet arrives at its destination, the checksum is re-computed and the two are compared. If they are the same, the integrity of the message is assured.

What will protect the original work and the creation of inventive concepts also prevents others from making, selling, or using an invention for 20 years?

Patent

What will protect the original work and the creation of inventive concepts?

Patent

Packet Switched Network

Pathway is only established as it is sent. When a message is received at one location, if it is not the destination location, then the message is forwarded on to another location. The choice of pathway is based on network availability and amount of message traffic. Most computer networks are packet switched.

Each computer is roughly equal to every other computer.

Peer-to-peer

Beta Testing

Performed by the end user without any assistance from the system developers; live data in a real working environment is used.

Bus

Permits information to move between each component; electrical channels that enable communication among the electronic components

Digital Signature and Electronic Authentication Law of 1998 (SEAL)

Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms

The team deploys a subset of the system first, rather than deploying the whole system at once. The old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively.

Phased conversion

All of the following are authentication except:

Phishing

_______ involves e-mails to people to redirect them to a website to perform some operation.

Phishing

Logical models are converted into physical models. These physical models are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system.

Physical design

Hot Site

Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.

Which step develops models of how the system will be physically laid out after charts and diagrams have been created and reviewed by the users?

Physical modeling step

Which type of systems conversion involves starting the conversion with a portion of end users?

Pilot

This involves starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization. The team can roll this out using either the direct approach, or the parallel approach.

Pilot Conversion

Which OLAP operation involves viewing the data using a different filter first?

Pivoting

Buffer Overflow

Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code

In what phase of a project does time estimation occur?

Planning

Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?

Planning

A GANTT Chart is typically used during this phase of the project?

Planning (Phase)

What does PaaS stand for?

Platform as a Service

PaaS

Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.

Connect additional input, output, storage, and communication devices.

Ports

What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?

Ports

These connectors provide the _____ to make the PC work.

Power

__________: SDLC begins when an organization discovers a problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology.

Preliminary investigation

What is the correct order of steps in the System Development Life Cycle?

Preliminary investigation analysis logical & physical design implementation maintenance

Translates the final result into a user-friendly format

Presentation tier

Trojan Horse

Pretends to be one kind of software but is another.

Firewalls

Prevent certain types of messages from coming into or out of the network

Operating Systems

Primary task is to allow a computer user to easily access the hardware and software of a computer system

All of the following are storage systems except:

Printer

Under what circumstances should an administrator view other people's files? Under what circumstances should a company use the data accumulated about its customers?

Privacy

______ the earliest piece of legislation that pertains to the collection and usage of personal data, this act limits actions of the federal government. The act states that: No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with prior written consent of, the individual to whom the record pertains. The act also states that federal agencies must publicly make available the data that they are collecting, the reason for the collection of the data, and the ability for any individual to consult the data collected on them to ensure its integrity.

Privacy Act of 1974

Administrator Ethics

Privacy, Ownership, Control, Accuracy, Security

Indicate the security classification for Student Id Number.

Private

What is the Security Classification for a person's Banking account number?

Private

What type of information can present a threat if disclosed such as social security numbers?

Private information

During this phase, the team defines the problem or opportunity that the project is expected to address. This lays the foundation for determining the project scope (i.e., the work that needs to be completed to achieve the desired outcome).

Problem Definition

In which element of the project initiation phase is the scope of a project determined?

Problem definition

Project Initiation

Problem definition, resource allocation, risk assessment

SDLC - Preliminary Investigation

Problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology surveys, research, task force, committees, leadership request, strategic planning

Information

Processed data.

Storage

Processed information is stored for permanent record.

What is the difference between processing and storage?

Processing involves temporary information, while storage involves permenant information.

Batch Processing

Processing large amounts of data all in one batch when the computer system is not busy

The ______ is a part of the motherboard and carries out the basic instructions that operate the PC.

Processor

________, software includes the word processor, presentation software (e.g., PowerPoint), spreadsheet program, database management systems, calendar program, address book, and data organizer.

Productivity

open source software

Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products. Most open source software is made available using the GNUs Public License, and some are made available with what is known as a copyleft instead of a copyright. users have to abide by the copyright provided

Structured Programming

Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements

Utility Programs

Programs that allow the user to monitor and improve system performance.

Driver's Privacy Protection Act (1994)

Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs)

An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the?

Project

What is the difference between proprietary and open-source software license?

Proprietary software has a cost whereas open-source software is free.

Copyrights

Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author's life plus 70 years.

Patents

Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date

Defense in Depth

Protecting every layer that surrounds data

defense in depth

Protecting every layer that surrounds data

The set of rules by which the resource is transmitted? For example https://

Protocol

Parts of URL (Uniform Resource Locator)

Protocol, Domain name, Resource/Filename

Device Drivers

Provide specific interfaces between the OS running a computer and hardware devices.

Wisdom in DIKW

Provides a social setting to knowledge; an understanding of the "why". Can only come by having both knowledge and experience.

Shareware

Provides a trial version of the software.

What is part of the role of an It professional assocation?

Provides professional standards for ethical behavior.

Authentication

Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)

Which server will cache web pages and block certain content?

Proxy

Indicate the security classification for Online list of Company Board of Directors.

Public

What is the Security Classification for a person's First and Last Name?

Public

Information Security Classifications

Public - available through public sources; includes names and addresses Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses Private - information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential - information that an organization will keep secret; includes patentable information and business plans

________, software, on the other hand, is software that has been moved into the public domain.

Public domain software

Encryption that uses two keys, a public and private key is known as what _______?

Public-key

Evolution of Storage

Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage

Which of the following statements applies to a proprietary software license?

Purchased from a vendor and gives you the right to use the software but is not yours to own.

Which two are both types of scripting languages?

Python and ASP

Where possible, data should be captured once only, although it may have multiple uses. Accuracy is most likely to be secured if data is captured as close to the point of activity as possible.

Quality data is Accurate

If information is needed about a customer's purchase history, in order to better serve the customer's needs, it is relevant to collect data on prior business transactions with the specific customer.

Quality data is Relevance

Data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer-based systems, or a combination. Managers and stakeholders should be confident that changes in performance targets reflect real changes rather than variations in data collection approaches or methods.

Quality data is Reliable

_______________ means that the data must be complete. Data that is not like this might contain errors or lapses of data.

Quality data is Thorough

When there is a delay in data, it may no longer be of use or properly serve its purpose. Data must be efficient and must be provided in a timely manner so that companies can utilize it in their business. Consider a company attempting to set a budget for the new fiscal year. Ideally, they would have access to financial data from the most recent year and possibly several years prior in order to evaluate trends in spending, then create the budget accordingly.

Quality data is Timely

Which is found on the motherboard and stores information but the information is not permanent?

RAM

Which of the following statements accurately describes random access memory (RAM)?

RAM is short-term memory.

The following statements accurately describes RAM except:

RAM runs tests of memory and the CPU, and initializes hardware components.

Which of the following statements accurately describes read only memory (ROM)?

ROM is long-term memory.

What does RFID stand for?

Radio frequency identification device

Which communication medium is typically used when sending data transmissions over very long distances?

Radio signals

______ use radio signals that are bounced off of satellites and therefore can be used over very long distances.

Radio towers

What does RFID stand for?

Radio-frequency identification

Short-term storage is most commonly known as

Random Access Memory (RAM)

What is RAM

Random access memory - short term storage made up of DRAM - dynamic RAM called the main memory and SRAM static RAM the cache memory and registers. RAM temporarily stores data before it is processed and sent to your screen or printer. RAM storage is in the 1-8 GB range.

Input

Raw data is entered by the user.

Processing

Raw data is organized or structured for usefulness.

_______ is memory that retains its contents indefinitely.

Read Only Memory (ROM)

What is ROM

Read only memory - it holds the instructions the computer needs to boot

All of the data listed for a single person or entity.

Record or Tuple

What will ensure proper storage so that data are available even when storage devices are damaged or offline?

Redundancy

Big Data

Refers to data sets that are so large and complex that they will require more advanced database management/processing tools.

The Internet of Things (IoT)

Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.

A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system. This is an example of what type of database?

Relational database

Multiple tables with interrelated fields can be queried to generate reports and provide information to users.

Relational database

Characteristics of Quality Data

Relevance - the data being used must apply directly to the decision being made Timely - data must be efficient and must be provided in a timely manner Thorough - the data must be complete Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible. Reliable - data should reflect stable and consistent data collection processes across collections points and over time

a dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?

Reliable

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition). Similar to FERPA, HIPAA prohibits agencies from disseminating health care information of an individual without that individual's consent. This is one reason why going to the doctor today requires first filling out paperwork dealing with privacy issues.

Circuit Switched Network

Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission

circuit switched network

Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission Because the path exists during the entire conversation, communication in either direction can occur simultaneously

Circuit Switched Network

Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission

Circuit Switched Routing

Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission.

Confidentiality

Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.

Confidentiality

Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users

Integrity

Requires that data is correct

Availability

Requires that information is available when needed

Encoding / Decoding

Requires translating the individual bits in the message from the form stored in the computer to the form that the network requires

The team must also determine what resources are available to meet the needs of the project. Resources are commonly thought of in terms of time and capital.

Resource Allocation

________ indicate how time and capital have been used thus far for the project. This report, which is tied to the budget, keeps everyone informed of where the project is in relation to the resources originally allocated for the project.

Resource Allocation Reports

Indicates the name of the file you are accessing or the location of the document on the server? For example: /checking

Resource ID

In which element of the project initiation phase does the team determine the time and capital needed for the project?

Resource allocation

Which part of a Uniform Resource Locator identifies the location of the document on the server?

Resource path id

Database Server

Responds to client database queries with responses pulled from the database. Additionally, the server may generate reports from data obtained from the database management system.

Database Server

Responds to queries by pulling from the database. Typically only to local clients.

Network Administrator

Responsible for the installation and maintenance of hardware and software that make up a computer network.

New devices can be easily added, however message transmission time may be longer based on the number of devices on the network.

Ring network

During this phase, the team must identify risks associated with the project. This assessment is used to determine whether or not the benefits of undertaking the project outweigh the risks.

Risk Assessment

In which element of the project initiation phase does the team determine any challenges the project might encounter?

Risk Assessment

Pivot

Rotates data to view the data from a different perspective

Influences the path a message will take: direct or indirect is an example of what?

Routing and Switching

Tuples

Rows of a relation

Protocol

Rules provided by which networks communicate with each other.

Interpreted Code

Runs inside a special environment; is better for testing

Database Interacting Format

SELECT fields FROM tables WHERE fields from tables match criteria

A GUI translating mouse motions into opening a file.

SHELL

Developed for string manipulations

SNOBOL

The following examples are examples of what? 1. SELECT 2. INSERT 3. DROP

SQL (standard query language) command

In a ________, an attacker issues an SQL command to a web server. The web server might pass the SQL command onto the database, and the command could delete and change records.

SQL injection

two popular forms of software exploits

SQL injections and butter overflows

Makes it possible for businesses to access and use software through the Internet.

SaaS

What allows an organization to use software through the internet?

Saas or Software as a Service

what cloud service provides access and use of software to businesses through the internet?

Saas or software as a service

Dicing

Same as slicing except that the result can be in multiple dimensions

At the beginning of a project, the team must determine what work needs to be done to create the desired result (e.g., a new service or product with the specified features and functions). It is often difficult for a team to identify accurately the scope of a project before work has been initiated.

Scope Creep

The work that needs to be completed?

Scope of a project

ASP and Python are both examples of ______________.

Scripting language and high-level programming languages

The following characteristics are examples of which generation computer? 1. First mainframe computers. 2. Computers first used magnetic core memory. 3. First computers to use Boolean operators. 4. A computer built with transistors.

Second Generation (1959 - 1965)

To what extent does the company ensure the integrity of its data and systems?

Security

________ involves keeping data confidential and preventing unauthorized users from accessing the data.

Security

Continually monitor the safety and security of the date stored on a computer system

Security Administrator

Since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both unencrypted and compromised.

Security Breach Notification Laws

Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?

Security Breach Notification laws

Worms

Self contained programs that do not need other programs to propagate across computers and computer networks

File Server

Sends files over the network at the request of clients

File Server

Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files.

What information is not public and will not be considered a threat to a person's privacy if others learned of it?

Sensitive information

Multi-tier Development

Separation of different aspect of a system

The following are examples of _______? 1. Windows Server 2. Unix

Server Operating System

______ are computers that typically have greater hard disk storage and faster response time and are used to respond to requests from other computers in a network.

Servers

Operating system programs that start when the operating system is loaded but run in the background and do not take up any CPU time until it is called.

Services

Which layer of the operating system run in the background and will handle an event?

Services

Services

Services, or daemons, are operating system programs that are usually started when the operating system is loaded and initialized, but they run in the background

Larger hard disk drives for more storage, faster response time, more expensive are all characteristics of a _______ ?

Sever

The following are examples of _______? 1. Web servers 2. email servers 3. works with hardware to provide a network service

Sever

What type of software permits free temporary use followed by long term activation for a fee?

Shareware

________, usually provides you a trial version of the software. Companies provide it as a way to entice users to purchase the software. The trial version will usually have some limitation(s) such as a set number of uses, a set number of days, or restrictions on the features. If you install the software, you can often easily upgrade it to the full version by purchasing a registration license.

Shareware software

An interface for the user that gives access to the kernel.

Shell

Which layer of the operating system run in the background and will handle an event?

Shell

Drilling up and down

Shifts the view of the data; down provides more detail, up provides summarized data

________ could replace transmitters and interfaced faster with the magnetic memory cores.

Silicon chips

3rd Generation of Computers

Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals

Rolling up

Similar to drilling up but it collapses the data from multiple items into a single value

What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless-access cards, and other PC cards?

Slots

Shell Scripting

Small programs that place Linux commands or DOS batch files into a file

Which of the following programming languages first introduced the concept of object-oriented programming?

Smalltalk

Why is it best to keep the data independent from the application? Select all that apply.

So the data can not be seen or changed

What are the programs and other operating information used by the computer called?

Software

______ tells the computer how to execute commands

Software

________ is intangible; it is a set of instructions written in a programming language.

Software

When you purchase proprietary software, you will be given a?

Software License Agreement

What does SaaS stand for?

Software as a Service

SaaS

Software as a Service. Can access and use software through the Internet.

Which of the following is an accurate statement about the software in a computer system? Select all that apply.

Software must be part of the computer system in order for the system to be useful. The software in a computer system may be shared if the system is a part of a network. A computer system needs software to be able to communicate with users as well as other computers.

____________ instructions are descriptive and break tasks down into definable steps.

Software programming language

Proprietary Software

Software purchased from a vendor; also known as commercial

Server Software

Software run on a server. Includes print service, ftp server, web server, email server, database server and file server. The software must be installed, configured and managed.

Virus

Software that attaches itself to another legitimate software application

Public Domain

Software that has been moved into the public domain; can be used however you feel

Local Applications

Software that is stored on an individual computer

Local applications

Software that is stored on an individual computer

Downloaded to a computer while the user is viewing a website to track usage.

Spyware

_______ is often downloaded unknown to the user when accessing websites. It might spy on your browsing behavior at a minimum, or report back to a website sensitive information such as a credit card number that you entered into a web form.

Spyware

SQL stands for?

Standard Query Language

Software Architecture (MVC)

Stands for Model-View-Controller and is a development technique used in the implementation of user interfaces. Model - Can take on different forms depending on the complexity of the application. In certain instances, the model is an actual object that is an actual implementation of the application. View - Part of the application that represents the user interface Controller - The part of an application that interacts with the user (via the view) and passes along the user requests to the model

RAM

Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power). You can choose the amount of RAM your computer has.

_______ which is cache memory and registers.

Static RAM (SRAM)

__________ indicate the state of the project. It provides specific information on the achievement of objectives and completion of activities. It is critical to track such progress, particularly for those activities that are dependent on other activities.

Status Reports

A scanner is a peripheral device for what system?

Storage

Read/write disks, thumb drives, external hard drives, and cloud storage are peripheral devices for what system?

Storage

Saving information for later use.

Storage

The computer saves the meal and payment information so that the information can be used for future earnings reports what operation is this?

Storage

Recall the IPOS (Input-Processing-Output-Storage) cycle. Which two steps of the IPOS cycle deal exclusively with binary representations of data?

Storage and Processing

Web Server

Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.

Memory

Stores the programs being executed and the data that each program is using. Used for short-term and long-term storage. The two main forms of RAM are dynamic RAM (DRAM) which is typically called main memory, and static RAM (SRAM) Another form of memory is read-only memory (ROM), which retains its contents indefinitely

Memory

Stores the programs being executed and the data they are using.

What type of information is this? Customer Name: Janet Jones

String

What type of information is this? Product ordered (code): 10357924

String

Which data type is used to represent product order code that comprises alphanumeric characters?

String data

Which of the following is NOT an important characteristic of an IT professional?

Strong math background and programming skills

Which of the following types of information present a threat to someone's privacy?

Student ID and credit card numbers

What is a hierarchical database

Sub-tables contain data related to a single main data point. Data is modeled using parent child relationships.

ISACA Code of Professional Ethics

Support the implementation of, and encourage compliance with, appropriate standards and procedures for the effective governance and management of enterprise information systems and technology, including: audit, control, security, and risk management. Perform their duties with objectivity, due diligence, and professional care, in accordance with professional standards. Serve in the interest of stakeholders in a lawful manner, while maintaining high standards of conduct and character, and not discrediting their profession or the Association. Maintain the privacy and confidentiality of information obtained in the course of their activities unless disclosure is required by legal authority. Such information shall not be used for personal benefit or released to inappropriate parties. Maintain competency in their respective fields and agree to undertake only those activities they can reasonably expect to complete with the necessary skills, knowledge and competence. Inform appropriate parties of the results of work performed including the disclosure of all significant facts known to them that, if not disclosed, may distort the reporting of the results. Support the professional education of stakeholders in enhancing their understanding of the governance and management of enterprise information systems and technology, including: audit, control, security, and risk management.

What does an IT department do?

Supports the day-to-day technology needs of an organization. Charged with helping an organization achieve its strategic goals. Provide leadership, advising management about how the organization could use technology to create a competitive advantage

What do you use to change to the user account?

Switch user (su) with the username

______ encryption uses the same key for performing the encryption and decryption.

Symmetric key

Which software consists of programs such as daemons and a scheduler?

System

Which software consists of programs that make up the operating system and directly supports the computer system?

System

Which software is run automatically rather than by the end user?

System

_______, software consists of programs that make up the operating system.

System

__________ are responsible for the installation and maintenance of the resources residing on the network.

System Administrators

SDLC stands for?

System Development Life Cycle

Which type of administrator would not deal directly with the installation and maintenance of database applications, performance tuning parameters, account creation, and procedures associated with DBMS?

System administrators and web administrators

When does system conversion (direct, parallel, pilot, or phased) occur?

System deployment

Alpha Testing

System developers assist end users as they interact with new system; simulated data is used

Utility Programs

System utilities are programs that allow the user to monitor and improve system performance

Utility Programs

System utilities are programs that allow the user to monitor and improve system performance. Utilities greatly range in function. For example, utilities exist to defragment the hard disk and to scan files for viruses and other forms of malware.

Software Categories

Systems Software and Applications Software

Which two languages have traditionally been used for automation rather than software development?

TCL and Python because they are scripting languages

Along with a notebook, which computer will use a docking station to function like a desktop?

Tablet

Interpreted Language

Takes the most recently entered instruction, translates it into machine language, and executes it

Interpreted Language

Takes the most recently entered instruction, translates it into machine language, and executes it. Portable. Some have the option to be compiled.

what is the final step in creating a BCP plan?

Testing the Plan

Association of Information Technology Professionals (AITP)

That I have an obligation to management, therefore, I shall promote the understanding of information processing methods and procedures to management using every resource at my command. That I have an obligation to my fellow members, therefore, I shall uphold the high ideals of AITP as outlined in the Association Bylaws. Further, I shall cooperate with my fellow members and shall treat them with honesty and respect at all times. That I have an obligation to society and will participate to the best of my ability in the dissemination of knowledge pertaining to the general development and understanding of information processing. Further, I shall not use knowledge of a confidential nature to further my personal interest, nor shall I violate the privacy and confidentiality of information entrusted to me or to which I may gain access. That I have an obligation to my College or University, therefore, I shall uphold its ethical and moral principles. That I have an obligation to my employer whose trust I hold, therefore, I shall endeavor to discharge this obligation to the best of my ability, to guard my employer's interests, and to advise him or her wisely and honestly. That I have an obligation to my country, therefore, in my personal, business, and social contacts, I shall uphold my nation and shall honor the chosen way of life of my fellow citizens. I accept these obligations as a personal responsibility and as a member of this Association. I shall actively discharge these obligations and I dedicate myself to that end.

Which of the following statements best defines the ALU?

The ALU controls the speed at which instructions are retrieved and processed in the computer.

Arithmetic Log Unit (ALU)

The ALU does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen

Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.

The CPU executes instructions for programs in addition to controlling all of the components in a computer.

Which of the following statements best defines the CU?

The CU retrieves the instructions of a computer program and the raw data that is input.

The ____ (also known as the chassis or cabinet) is the most visible part of any computer.

The Case

Gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization.

The Family Educational Rights and Privacy Act of 1974 (FERPA)

IPOS

The Input-Processing-Output-Storage Cycle

IPOS

The Input-Procession-Output-Storage Cycle

The need for professionals and businesses to have a better way to communicate over a distance led to IT professionals first developing ______.

The Internet

Which of the following best describes the Internet?

The Internet is a global network of networks.

MVC

The MVC model is one application where the various design logic (input, business, and interface) are logically separated. This differs from the N-tier development model where each tier is a separate application.

Data mirroring

The OS writes data (and changes to data) to multiple hard drives at the same time.

Privacy Act of 1974

The Privacy Act requires that agencies give the public notice of their systems of records by publication in the Federal Register. The Privacy Act prohibits the disclosure of information from a system of records absent the written consent of the subject individual, unless the disclosure is pursuant to one of twelve statutory exceptions.

Business Continuity

The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.

Media Bandwidth

The amount of data that can be transmitted over a unit of time such as bits per second.

binary

The binary number system is base 2, using only bits 0 and 1.

The device that permits information to move between each component.

The bus

MVC - The model

The business logic is designed here. it is used to retrieve information about the "product" to add new product information or to update product information.

Internal Components of the System Unit

The case, which is a protective covering, Internal bays and slots that grip the internal components, Buses, which are the circuitry and electrical channels that enable communication among the electronic components, Bays (external openings) and ports that connect peripherals, and Lights and indicators that show the computer is turned on.

_________ or processor is the component in a computer that executes programs.

The central processing unit (CPU)

The metal or plastic case that houses and protects the internal electronic components of the computer.

The chassis

Local computer

The computer that the user is using

Local Computer

The computer that the user is using; physically present with

Kernel

The core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources, such as devices, programs, apps, data, and information.

Which of the following statements best represents the relevant characteristic of quality data?

The data used applies to the question being answered.

Which statements about the history of computer development are correct? Select all that apply.

The development of new hardware and software requires special training. The capabilities and complexities of computers have grown substantially, but the ease of use has also made them user friendly. The following are examples of Graphical User Interface systems: GPS systems, ATM machines, and tablets and smart phones.

I/O Bus

The device that permits information to move between each component. The size or width of a bus indicates how much data can be transferred at one time.

what is the domain name

The domain name identifies the server on which the web page can be found. Domain names usually start with the prefix 'www'. The domain name can be considered in two parts: the host name, and the top-level domain name - DNS, connects the domain name with the IP

Domain Name

The domain name identifies the server on which the web page can be found. Domain names usually start with the prefix 'www'. The domain name can be considered in two parts: the host name, and the top-level domain name.

FORTRAN

The first mainstream high-level language

Reception

The first step a network performs when receiving a message.

Encryption

The idea of obfuscating the information that resides on a computer or is sent over a network so that if it is intercepted the hacker will be unable to use the information

Data in DIKW

The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.

MVC - The controller

The input logic is designed here. The controller is the part of an application that interacts with the user (via the view) and passes along the user requests to the model.

What indicates a specific internet location?

The ip address

Machine Language (Machine Code)

The language made up of binary-coded instructions that is used directly by the computer

Transmission

The last step that a network performs when sending a message.

SDLC - Physical design

The logical models are converted into physical models. These physical models are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system. physical diagrams

What were the two new pieces of hardware that symbolized the second generation computers?

The magnetic core memory and the transistor.

UTP (Unshielded Twisted Wire Pair)

The most common form of network connection used today and fiber optic cable. UTP is cheap and because so much of it is already in place.

What is one way the n-tier model differs from the M-V-C model?

The n-tier model has tiers that are each separate applications.

Which factor contributed to the development of the first generation of computers?

The need to easily calculate missile trajectories

Which factor contributed to the development of the first generation of computers?

The need to easily calculate missile trajectories.

What is Moore's law?

The number of transistors doubles over each time period, indicating an exponential increase

Allows the user to control the actions of the software and through the software, to access hardware.

The operating system

The Controller

The part of an application that interacts with the user and passes the user requests to the model

The View

The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model

Difference between a desktop PC system and a notebook/laptop computer?

The peripherals and system unit of a notebook/laptop are sold as a single unit.

Cloud Computing

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Phishing

The process of targeting a specific individual, usually via email, under the guise of a reputable or trustworthy entity to reveal private or personal details such as usernames or password.

The [blank] is a part of the motherboard and carries out the basic instructions that operate the PC.

The processor

Software

The programs and other operating information used by the computer

What is a protocol?

The protocol reflects the set of rules by which the resource is transmitted. Web pages use HyperText Transfer Protocol (HTTP), so http is standard secure protocol uses https

Protocol

The protocol reflects the set of rules by which the resource is transmitted. Web pages use HyperText Transfer Protocol (HTTP), so http is standard. The protocol is followed by a colon (:) and two forward slashes (//). With today's more modern browsers, you can usually leave out the http:// portion when you are typing a URL.

Hard Drive

The purpose of the hard drive is to store data even when the computer is turned off. It is typically referred to as memory or primary memory, while disk storage is sometimes referred to as secondary memory.

Resource ID

The resource ID indicates the name of the file you are accessing, or the location of the document on the server.

What rights does the End User License Agreement for proprietary software typically give to purchasers?

The right to use the software

In a client-server network, what is the role of the server?

The role of the server is to take requests from the client and send back the requested information.

How do a router and switch differ when handling a message?

The router will purposefully drop messages if message traffic exceeds its capacity.

Shell

The shell is an interface for the user, often personalized for that given user

Privacy

The state or condition of being free from being observed or disturbed by other people.

Router in a Packet Switched Network

The switch and router use the message's destination address to select the line to route the incoming message to. A router has additional decision-making capabilities. For instance, if message traffic exceeds its capacity, the router may have to purposefully drop messages. Additionally, when there are multiple incoming messages, the router must select which to forward first. A routing decision is the destination network that a message is placed onto. This decision is generally left up to a routing table stored in the router's memory.

controls the speed at which instructions are processed.

The system clock

SDLC - Analysis

The team determines the user requirements for the new system and develops logical models of the system (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes). Documentation,interviews, questionnaires, requirements gathering, meetings

Information Technology

The technology used in creating, maintaining, and making information accessible.

MVC - The view

The user interface logic is designed here. it is the part of the application that represents the user interface. it is used to capture input form the user to be passed on view the controller to the model.

Parallel Conversion

There is a period of time in which both systems are operating concurrently

What is the role of drivers in facilitating communication between application and databases?

They allow the ODBC to be used for interactions with the database and applications.

What is the role of drivers in facilitating communication between applications and databases?

They allow the application to interact with the database.

The following characteristics are examples of which generation computer? 1. Integrated circuits are first used for computation and storage. 2. minicomputers are available for as little as $16,000.00 3. The first silicon Chips are used in computers. 4. Computer networks are introduced.

Third Generation (1965 - 1974)

During which generation did computers begin to see widespread use in business?

Third generation

In which generation were silicon chips first used in computers?

Third generation

Description of duties for a Systems Admin?

This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.

Scripting language

This term is also used to describe coding that is for a specific environment. Often interpreted. JavaScript ASP JSP PHP Perl Tcl Python

The 10 Commandments of Computer Ethics

Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people's computer resources without authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use computers in ways that ensure consideration and respect for fellow humans.

Which of the following is an example of what 1 GB would store?

Thousands of books

Logic Tier

Tier that sits between the user interface and the data.

Data Tier

Tier where data is stored, retrieved and updated from database tables

Presentation Tier

Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures

During this phase, project managers estimate how much time is required to fulfill each activity and consider other factors that influence when each activity can be completed. For example, if it is expected that an activity can be completed in 40 hours but the individual who will be completing the activity works only 20 hours per week and can only devote 50% of her time to the project, it will take 4 weeks to complete the activity.

Time Estimation

Scope creep can impact the allocation of which resources?

Time and capital

Why is it important to ensure that data support business goals?

To aid in making strategic decisions.

What is the database administrators role in security?

To institute protocols to protect the databases from external threats.

Veronica is leading a company-wide workshop on how to use a newly adopted software program. She makes a brief presentation to introduce the program, and then walks participants through the steps they are likely to engage in when they use the system. She fields questions and inquires about additional information the participants may need to be able to use the program effectively.

Training

The following are ________ ? 1. Making presentations on new programs. 2. Helps with orientation of new employees on the policies in the employee handbook.

Training duties

Tasks handled by IT personnel

Training new employees on system log-in protocol. Answer general questions about hardware and software use at an organization. Install firewall

Given that the data come from different sources, it is likely that the data are not organized using the same collection of attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This will include altering data to relations or objects (or whichever format is preferred), recognizing the unique identifier(s), and selecting the appropriate attributes (fields).

Transform data

2nd Generation of Computers

Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers

Demodulation

Translates from an analog signal to the original digital signal.

Compiled Language

Translates the entire program, creating an executable program which can be run at a later time

Compiled languages

Translates the entire program, creating an executable program, which can be run at a later time. Not portable. Compiled languages run faster than interpreted.

_______ still requires detailed, basic instructions. Also, will translate source code to a more usable machine language.

Translators

TCP/IP

Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.

A LAN allows hardware and software sharing within one office. True or False?

True

A VM can provide a secure remote environment. True or False?

True

A device can connect wirelessly using either a Wireless access point and/or a Radio tower. True or False?

True

All operating systems give users a means to interact with the computer system hardware and software. True or False?

True

Business intelligence systems are used when making long-term decisions. True or False?

True

Buying a solution is Faster than building one. True or False?

True

Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices true or False ?

True

First generation computers used vacuum tubes for storage. True or False?

True

First generation computers were less reliable than today's computers. True or False?

True

Gordon Moore's original prediction that transistors on a chip will double every year has proven to be inaccurate. True or False?

True

Hubs, switches, and routers are devices that provide points within a network where messages can be relayed to the computers and devices within the network. True or False?

True

IT is the technology used in creating, maintaining, and making information accessible, which includes the software, data, and computer networks. True or False

True

Integrated circuit boards could now be used for both computation and memory. True or False?

True

It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal. True or False?

True

Memory is part of a computer's hardware. True or False?

True

Networks can allow computers to share software when appropriate licenses are purchased or when freeware is being used. True or False?

True

Operating systems are programs. True or False?

True

Second generation computers were still expensive and required expert knowledge to use. True or False?

True

True or False - GUI (Graphical User Interface) operating systems improved the ease of using a computer making computers more accessible to individuals without special training.

True

True or False - Software uses program languages to guide the specific actions of a computer.

True

VMs can communicate with different OSs without needing multiple computers and multiple platforms. True or False?

True

True or False - Cable is used to link computational circuits and memory.

True Before integrated circuits, which combined computation and memory onto a single chip, these two elements were separate and physically linked by cables.

True or False - Gordon Moore's original prediction that transistors on a chip will double every year has proven to be inaccurate.

True In reality, transistors on a chip have doubled roughly every 18 to 24 months

True or False - In the 1940s-1970s, most computer processing did not require user interaction.

True The user would specify a program, send it off to the computer to run, and return later for the output.

True or False - In the 1940s-1970s, most computer processing did not require user interaction.

True - the user would specify a program, send it off to the computer to run, and return later for the output

Boolean/Logical

True/False

Mail Server

Two email servers communicate with each other

Trojan Horse

Type of virus that completely replaces an existing application and takes the name of the taken over file

Mbps to Gbps

Typical bandwidth of today's networks

An operating system will issue commands using the command line prompt by?

Typing in commands.

Sometimes, during the early phases of a project, requirements that are not actually needed are included in the project plan. Often, these requirements are in the form of "nice to have" features, which are mistaken for essentials or included without thought of how this may impact resource allocation.

Unnecessary Requirements

Which action would support confidentiality?

Updating security software.

Radio and Cell towers

Use a transmission type that doesn't need wiring or cable.

Coaxial Cables

Use electrical current to transmit signals

Fiber Optic Cables

Use light pulses to transmit information

The proprietary software license agreement gives the purchaser the right to

Use the software

AS

Used to change the table names when viewing results

Database Management System (DBMS)

Used to create, manipulate, and access the data in a database

WHERE

Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query

SELECT

Used to inform the DBMS what fields or attributes are of interest

FROM

Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined

Domain Name Server (DNS)

Used to translate from an IP alias to an IP address

End users test the system in operational setting to see if it is useful.

User Acceptance

Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?

User Acceptance

The true indication of a project's success is not whether all the deliverables have been achieved, but whether the end users adopt the service or product. By and large, human beings are uncomfortable with change. It is quite common for users to "resist" a new technology or technology-based process.

User Resistance

The presentation tier is where the ______ is developed.

User interface

During analysis, which system requirement includes features that will satisfy end user needs?

User needs

What are the people called who use the computer?

Users

Security Education

Users learn how to protect their passwords and other security measures

Hexadecimal

Uses a base 16

Decimal

Uses base 10 to represent numbers (0 - 9)

Binary

Uses base 2 system (0 and 1)

Event-driven Processing

Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another

Symmetric Key Encryption

Uses the same key for performing the encryption and decryption

Public Key Encryption

Uses two keys, a public and private key for performing encryption and decryption

Transistors Magnetic Cores Magnetic disks

Ushered in the 2nd generation of computers

silicon chip

Ushered in the third generation of computers

What will violate a proprietary software agreement?

Using the software after rejecting the agreement

Freeware

Usually software that has become obsolete; is free

Defragmenting the hard disk or scanning files for viruses?

Utility Programs

Programs that allow the user to monitor and improve system performance.

Utility Programs

1st Generation of Computers

Vacuum tubes, relay switches, the need to program in machine language

____________ indicate differences between planned resources (what has been allocated for each activity or task) and actual resources (what has been used thus far in the project).

Variance Reports

_______ software applies instead to software used by select groups with an organization or to a specific discipline.

Vertical

_____describes future aspirations of the organization.

Vision

Random Access Memory (RAM) is _______, Meaning RAM memory never stores data when the power is off and is designed to be the primary work area of a computer when data is being processed.

Volatile

User Authentication

What you know, what you have, what you are

compiled language

When a high-level language is compiled, the language translator, called a compiler, translates the entire program. This creates an executable program which can be run at a later time.

Hacking

When an individual obtains unauthorized access to a host

client server network

When discussing a network, the client is a computer that will request information from another computer. The server is a computer that takes requests and responds with the requested information. The client-server network then is a network that contains one or more servers - enables access to virtual machines

Modulation

When physical media carries an analog signal rather than a digital signal translation is needed. This is called modulation.

_________ are security professionals and hack for "good purposes" to find vulnerabilities and fix or protect against them. They inform companies of potential problems with software so companies can fix and send out patches, etc.

White-hat hackers

Which of the following will find vulnerabilities and fix or protect against them?

White-hat hacking

Access rights

Will include files that the user can access

No desktop level menu selection. Each software title has its own set of menus.

Windows 7

Which of the following operating systems is for workstations?

Windows 7/8

A gesture-based interface where movements include such operations as swipe, tap, pinch, and reverse pinch, uses the touch screen GUI?

Windows 8

Which of the following operating systems is for servers?

Windows Server

Examples of server operating systems

Windows Server, OS X Server, UNIX, and Linux.

A __________ is commonly connected to a router.

Wireless access point

What is the difference between the FTP server and HTTP?

With FTP, users have access to files in the form of uploading files

Join

Withdraws information from multiple relations

Which of the following would NOT be considered hardware?

Word processor.

Server Software

Works with hardware to provide a network service

The following are examples of _______? 1. Mac OSX 2. Windows 7/8 3. Linux

Workstation Operating System

Complete the following sentence: Windows 7/8, Linux, and Mac OS X are operating systems for

Workstations

_______ are self-contained programs and do not need other programs to propagate across computers and computer networks.

Worms

What is outside of the rold of an IT professional assocation?

Writes laws dealing with information technology

Machine/Low-level Language

Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time

computer network

a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

Information System

a collection of data and information used to support management of an organization

FTP Server

a computer that allows users to upload and/or download files using FTP

network hub

a device that connects multiple computers together. it broadcasts transmissions as it sends the data to every device in the network

What interacts between a database and an application?

a driver

The ordering of packets is done by?

a higher-level TCP protocol

what is packet switching?

a mode of data transmission in which a message is broken into a number of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

Hot site

a physical location where an organization can move its operations. A hot site includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data.

Cold site

a physical location, but unlike a hot site, it is not equipped with hardware, servers, and the full range of items a hot site has. A cold site is more like a shell that can be used for operations should the need arise.

System Development Life Cycle (SDLC)

a process for planning, creating, testing and depolying information systems, including hardware and software sometimes referred to as the waterfall model

A set of rules established to govern how people behave and interact with each other

a protocol

What was the operation system called in the early 1960s?

a resident monitor

Tuple

a row in a table that contains data about a specific item in a database table

Query

a search in a database for data

ODBC application

a standard application programming interface (API) for accessing database management systems (DBMS).

IP Addresses

a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

characteristic of quality data whereas data is captured once only, where possible, and captured as close to the point of activity as possible.

accurate

Scope creep

adding additional features that can impact the allocation of resources and put the project at risk. (time and capital)

IaaS - Infacstructure as a service

all the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere

SQL injections attacks

an attacker issues an SQL command to a web server as part of the URL or as input to a form on a company's website. The web server, which can accept queries as part of the URL, is not expecting an SQL command. If not protected against, the web server might pass the SQL command onto the database. The malicious SQL command could potentially do anything to the database from returning secure records to deleting records to changing the values in the records.

_________ software is based around Internet usage. Software in this class includes the e-mail client, web browser, and FTP client.

application

Database management software is an example of _______; it is not an operating system.

application software

consists of programs that end users run to accomplish tasks. An example of a type of this software includes the email client, web browser, and ftop client

application software

Completes mathematical calculations and logical operations to process the data, converting the input of keyboard text entry to output displayed on the screen.

arithmetic logic unit

An early language translator that would translate an assembly program into machine language.

assemblers

what are the 3 types of language translators?

assembly languages, high level compiled languages and high level interpreted languages assemblers, compilers, interpreters

Each of the different broad categories is known as an ___________?

attribute

Houses CDs and DVDs, typically located on the front of the system unit for easy access.

bays

Refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.

big data

bits

binary digits the digital circuits in the CPU operate on bits and memory stores bits 8 bits are placed in a unit called a byte a byte is the smallest addressable unit of memory

What type of information is this? Shipping status : Shipped

boolean

Which technique uses all possible combination of letters and numbers to crack a password?

brute force

The ________ topology has a simple form where every resource is connected to a single cable, and is also one of the least expensive.

bus network

Saas - software as a service

businesses can access and use software through the Internet. In most cases a subscription model is used

General-purpose computer

can conceivably execute any program that can be written for that computer

system conversion

can occur as: - direct: the old system is "turned off" and new system "turned on" ad specified time/date - parallel: There is a period of time in which both systems (the old and the new) are operating concurrently - pilot: This involves starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization. - phased: The team deploys a subset of the system first, rather than deploying the whole system at once.

What is required to verify authenticity of the recipient?

certificates, digital signatures, encryption

What are attributes?

characteristics which are used to describe a record, and are the column headings of the table.

A _________________ is computed from other data contained within an IP packet and stored as part of the IP packet.

checksum

Which describes an algorithm?

clear

Networks facilitate the _______ between computers and computer networks.

communication

What are the 3 components of the IAS (information assurance and security) model?

communications, hardware, software

Requires that the componenets of the software all be defined from the onset and is considered to have more efficient code.

compiler

What is the difference between a compiled and interpreted computer language?

compiler translates an entire program into executable progam which can be run at a later time, while the interpreter does this incrementally.

checksum

computed from other data contained within an IP packet and stored as part of the IP packet. when it arrives at its destination, the checksum is recomputed and the two are compared

Internal and external hard drives are examples of?

computer hardware

A _________ is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

computer network

A __________ is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

computer network

The need to connect dumb terminals to the organization's main computer led to the rise of ____________.

computer networking

Application software

computer software created to allow the user to perform a specific job or task

What is the collection of computer hardware, software, user(s) and networks.

computer system

The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an example of

confidentiality

What are the 3 goals of IAS?

confidentiality, integrity and availability (CIA)

Certificate Authority

contains both the authentication proof and the encryption information needed to send secure information

Which component facilitates communication between the other two components in the MVC architecture model?

controller

excluse right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.

copyright

protects an original work, but no the ideas behind the work

copyright

Example of how Networks allow software to be shared between hardware

customer database on a central server, email program like Outlook

Pieces of the operating system that run in the background all of the time

daemons or services

in the dikw, what is data?

data is the input directly received by human or computer.

Information is stored here until it needs to be retrieved for a specific application.

data tier

The ___________ is an IT person whose job is to manage the database management system and database(s), and whose duties include software installation, security of data, creation of accounts to access the database, and configuring the database to be accessible over network.

database administrator

Which of the following servers can generate reports from client queries?

database server

permits database access across a network. Performs tasks such as data analysis, data manipulation, security, and archiving.

database server

Provide specific interfaces between the OS running a computer and hardware.

device drivers

a piece of the operating system that provides specific interfaces between the OS running a computer and hardware.

device drivers

consists of long term storage devices

disk drives

DNS

domain name service or domain name server. The DNS is a server that has a table that contains Host IP addresses and aliases. When provided with an Internet alias, the DNS looks the entry up in its own DNS table and returns the corresponding IP address.

Translates human readable aliases into IP addresses

domain name system (DNS)

DNS

domain name system - connects the domain name with the IP Host name: part of the URL that identifies the organizaiton and is reponsible for the info on the page TLD name: The domain name always ends with a period ('.') and a three- or two-letter extension, which signifies the type of organization or country associated with the page. example .com, .org, .edu, .us

software more specific towards artists and graphic designers

drawing software

A _________ interacts between as database and an application.

driver

Users submit messages to the server that are sent to a different server, the servers communicate with each other, recipient server communicates with recipient

e-mail server

ring network

each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.

star network

each device is connected to a central device, such as a hub or switch.

Today's operating systems

easier to use.

Type of transmission for coaxial and twisted pair

electric

coaxial and twisted pair

electric

user acceptance testing

employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user.

Creative Commons (CC) license

enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that he/she has created.

mesh network

every device is connected directly to every other device in the network.

hexadecimal numbering system

every value is represented with some combination of 16 digits (0-9 and A,B,C,D,E,F) - base 16.

A video card or wireless network card would be located in?

expansion slots

_______ may hold adapter cards, video cards, or wireless network cards.

expansion slots

transmit information using light pulses

fiber optic cable

Which of the following type of transmission is paired correctly with the given media?

fiber optic cable - light impulses

19943-5568 and 63.2% are _______ in a database.

field

A _____________ does the following: Responds to client (computer) requests over the LAN, supports application software, shares data files.

file server

a computer with a large hard disk storing files that any or many users of the network may wish to access.

file server

The ______ software contains a list of rules that describe the types of incoming messages that should either be permitted or blocked from a computer.

firewall

What generation used vacuum tubes in computers?

first generation

Which item is a storage device?

flash drive

What is a projection query

form of query that returns all of the records from the relation, but only select attributes or fields

An algorithm is a ______.

formula

software free from purchase, but not necessarily free in how you use it.

freeware

what types of software is ususally software that has become obsolete because a new software has replaced it, or is software that the original producer no longer wants to maintain and provide support for?

freeware

How long has Moore's law continued to be a trend?

from 1965 to the present

like a web server, this server host files and allows clients to access those files. However, it instead provides access in the form of uploading and downloading files.

ftp server

Your site's Internet point of presence is called a

gateway

There are also _______ who engage in both types of hacking activities.

grey-hat hackers

computer that has the least amount of performance

handheld

The ______ is used for long-term storage and is the component used to save data when the computer is turned off.

hard drive

The physical components of a computer

hardware

_____ is the physical devices that make up a computer system.

hardware

in dikw, what is wisdom?

having both knowledge and experience

Encryption

he idea of obfuscating the information that resides on a computer or is sent over a network so that if it is intercepted the hacker will be unable to use the information. Encryption uses a mathematical algorithm for converting the plain-text information to the encrypted form.

The ______ ensures that the CPU does not overheat and the fan keeps the heat sink cool so it does not overheat.

heat sink

Which motherboard component helps cool the cpu?

heat sink

Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.

high level language

BASIC and Ada are examples of ________?

high-level programming languages

Productivity software is sometimes referred to as _______ software because the software can be used across all divisions within an organization.

horizontal

What does http stand for?

hypertext transfer protocol

Includes all peripheral devices for input, output, storage and network.

i/o subsystem

a location beacon that uses bluetooth technology and can be embedded in any location aware mobile device.

iBeacons

resource ID

indicates the name of the file you are accessing, or the location of the document on the server. the part of the resource ID after the slash is the file name for hte page examples: .html - webpage .jpg - graphic file .pdf - portable document file

Characteristics of ______ include: more structure resulting from a process that has been applied, more relevant, more useful in decision making.

information

Once data has been processed, it becomes _______ ?

information

data that has been processed

information

The first step in a risk assessment is to identify the organization's ___________.

information assets

in dikw, what is information?

information is inferred from data, meaning that one or many processes have been applied to the data to tranform it into a more useful form.

The following are aspects of an __________? 1. A collection of data and information 2. The people who assist with the processing of data 3. The technology that facilitates the processing of data

information system

The following are examples of __________ ? 1. A company's directory 2. A company's customer database 3. A university's course catalog

information system

what are the phases of a project

initiation planning executing monitoring and controlling closing

What four operations does a computer perform?

input

what does ipos stand for?

input, process, output, storage

The ________ are used to connect peripheral devices such as a monitor, speakers, projector, etc.

input/output connections

Entering data into the system accurately is an example of

integrity

Relies on a session and allows you to test out an idea because they are executed as they're written.

interpreter

Your organization needs to maintain its own internal e-mail system, which approach would typically be used.

intranet

network switch

it records and recognizes the local network addresses (MACs) of all computers connected to the switch. Messages are passed to the computer that matches the destination address. Utilizes network bandwidth more efficiently

Examples of scripting languages

javascript ASP JSP PHP Perl Tcl Python

What type of query is used to withdraw information from multiple relations?

join

The core components of the operating system are referred to as the _____. It is loaded when the computer is first booted. Included are the components that handle process management, resource management, and memory management. Without these, you would not be able to start a new program or have that program run efficiently. It sits on top of the hardware and is the interface between hardware and software.

kernel

The core components of the operating system that handle process management, resource management, and memory management.

kernel

Which layer of the operating system will handle process management, resource management, and memory management?

kernel

loaded when the computer is first booted, included components that handle process mgmt, resource mgmt, and memory mgmt

kernel

LISP

language to support artificial intelligence research

which is a characterisc of high level languages?

language translator programs are required.

computer that has the mid amount of performance capability

laptop

Which low-level language corresponds one to one with assembly?

machine language

a programming language that is a lengthy list of 1s and 0s.

machine language

In which type of network topology is each networked device directly connected to every other networked device?

mesh

The _____ network topology includes a point-to-point connect between each device in the network.

mesh network

A single chip process developed in 1974 by IBM

microprocessor

Android, Chrom, and iOS are common operating systems for which type of computer?

mobile devices

Which peripheral device that was previously only an output device became both an input and output device with the advent of the tablet computer?

monitor

The _____ is a thin, flat piece of circuit board, usually green or gold, that directly or indirectly connects all other components and peripherals.

motherboard

Which other model is the M-V-C model similar to?

n-tier

a collection of computers and resources connected by various media so they can communicate with each other.

network

Matt was recently hired by Today's Technology Solutions as the _____________. During his second week on the job, Loise came to him because her computer was not connecting to the Internet. In addition, her colleague in the next cubicle was not able to get online either or to access the shared file server.

network administrator

The __________ is the person responsible for installation, configuration, maintenance, securing, and troubleshooting of the computer network.

network administrator

TCP/IP is a _________ that all computers must use to communicate over the Internet.

network protocol stack

Although ______ provide many benefits, they also create an opportunity for unauthorized communication between computers which can pose serious threats to information security.

networks

The following characteristics are examples of _______? 1. Creation of windowed operating systems. 2. Easier real-world object modeling in programming code. 3. The application of inheritance in program code.

object-oriented programming model

Is moore's law an observation or a physical law?

observation

Alpha testing

occurs where the system will be used. For example, software may be tested by a client or by a specific department within an organization. During alpha testing, system developers often assist end users as they interact with the new system. It is common for simulated data to be used to prevent any damage to a user's actual data.

Which of the following pairs of numbering systems use the least number of digits in machine code?

octal and hexidecimal

how do Bluetooth devices communicate?

on a short-range, ad hoc network called a piconet. When a piconet network is established, one device takes the role of the master while all the other devices act as slaves.

Buffer Overflow attack

one of the oldest and well known forms of software exploit; The buffer is a specific address in a computer's memory where a variable is stored. The buffer is of limited size. If the software does not ensure that insertions into the buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount so that the memory locations after the array are filled as well. Since memory stores both data and code, one could attempt to overflow a buffer with malicious code. Once stored in memory, the processor could potentially execute this code and thus perform the operations inserted by the attacker.

software created in the open source community and made freely available as source code

open source

An ________ issues commands through the GUI and command line prompt.

operating system

The computer sends the meal order to the kitchen as a ticket what operation is this?

output

Communication taking place between the same two computers may reach their destination using different pathways is an example of what?

packet-switched

Most computer networks, including the Internet, are _______.

packet-switched

Protects the creation of inventive concepts as well as the tangible work product. will prevent others from making, selling, or using the invention for 20 years from the application filing date.

patent

Each computer is roughly equal to every other computer

peer-to-peer

Computer hardware also includes?

peripheral devices

Can connect additional input, output, storage, and communication devices

ports

The _______ provides the electrical power needed to make the PC operate.

power supply

Which field must contain a unique value in order for a relational database table to function?

primary key

A _____________ does the following: Does not return files, monitors requests, replies when a request is complete.

print server

Which of the following servers monitors requests, but doesn't send files in return?

print server

An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?

printer

Converting the data into information (a meaningful form)

processing

The computer calculates the cost of the meal items ordered what operation is this?

processing

also referred to as horizontal software

productivity software

consists of applications that are usefule to everyone such as word processor, presentation software, spreadsheet program, database mgmt systems, calendar program, address book, and data organizer.

productivity software

commercial software purchased from a vendor

proprietary

Copyrights

protect an original work (in its tangible, expressed form), but not the ideas behind the work. The copyright holder has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years

Patents

protect the creation of inventive concepts as well as the tangible work product (not just the tangible work, as copyrights do)

device drivers

provide specific interfaces between the OS running a computer and hardware.

Which characteristic identifies application sotware that is cloud based?

provided by third party providers

Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.

proxy server

what type of server has the capability of blocking specific servers and rejecting responses that contain certain content?

proxy server

software that has been moved into the public domain and are made available as executables.

public domain

Security classifications can be public, sensitive, private, or confidential. Information that can be found online or in the phone book is_______.

public information

The End User License Agreements is a contract between the Licensor and the

purchaser

radio and cell towers

radio waves

The following examples are examples of __________. 1. Playing an online multiplayer video game. 2. paying your bills online.

real-time processing

The information across all categories on a single individual is called a ________ ?

record or tuple

Big data

refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use. Big data means more than simply storing enormous amounts of data in databases and data warehouses. We are already doing that. Big data means integrating these vast amounts of data, whether the data is generated internally or externally and finding ways to investigate the relationships that can be discerned from the data.

Site sharing

refers to having multiple data centers located in disparate regions. This approach is typically used by large organizations, which can shift critical functions to other sites when one site is impacted by a disaster.

examples of server software

refers to software that works with hardware to provide a network service print service, ftp server, web server, email server, db server, file server

Internet of Things (IoT)

refers to the countless kinds of devices that can and will be connected to the internet in the next few years

in dikw, what is knowledge?

refined information that hte user of the knowledge is able to call forth only relevant portions of information when needed.

If information is needed about a customer's purchase history, in order to better serve the customer's needs, it is ________ to collect data on prior business transactions with the specific customer.

relevant

characteristic of quality data whereas data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer based systems or a combination.

reliable

In a client-server network, software enables access to ________. This allows different parts of a business ecosystem to interact.

remote servers

Integrity

requires that data are correct 1. must ensure accuracy of collected data 2. must be entered into system accurately 3. data modification must be tracked

Confidentiality

requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users. - who the authorized users of the data are, data storage, and privacy.

Availibility

requires that information is available when needed

Data tier

resides on the organizations server and usually on a separate database server. it is where data are stored retrieved and updated from database tables info is stored here until it needs to be retrieved

User can Manipulate system files?

role of an administrator account

Which of the following communication system hardware devices is commonly used as a wireless access point?

router Routers can be used as a wireless access point.

What skills are needed to assist with application design and development?

schema development and performance tuning

types of risk analysis

scope creep unnecessary requirements cutting corners overly optimistic time frame improper skill sets user resistance

perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?

scripting languages

What generation of computers began to use transistors?

second

The Volleyball Academy of Central Florida has grown into a very large organization that has over 1,000 members. They are moving more and more of their processes to online - from handling event registrations to purchasing clothing and sports equipment. Shanteal is the ____________ and has been diligent in ensuring the online portal is securing quality data. She also has made sure the organization's firewalls are up to date and able to withstand new threats.

security administrator

buffer overflow

security concern addressed during the analysis stage of SDLC The buffer is of limited size. If the software does not ensure that insertions into the buffer are limited to its size, then it is possible to insert into the buffer a sufficient amount so that the memory locations after the array are filled as well. Since memory stores both data and code, one could attempt to overflow a buffer with malicious code.

The role of the _______ is to take requests from the client and send back the requested information.

server

Windows Server 8 is an operating system for type of device?

server

dedicated computers within a network whose function is to respond to network requests and provide a network service

server

the programs and other operating information used by the computer

software

In the ________, all devices have a single point-to-point connection with a central server.

star network

Which of the following types of networks has each device in the network connected in a single point-to-point connection with a central HUB?

star network

IAS combines a number of practices that define an organization's information assets, the vulnerabilities of those assets, the threats that can damage those assets, and the policies to protect the assets. The result of this analysis, known as?

strategic risk analysis

What replaced the GOTO statement with high level control constructs such as while loops, and if-else statements, and is not allowed to use the GOTO statement?

structured programming

Is commonly used to connect multiple computers together in such a way that messages are relayed to computers with the corresponding IP address.

switch

Maintaining the operating system of computers and other devices. These tasks are commonly performed by a _________________.

system administrator

The ________________ is the person in charge of administering a computer system or a collection of computer systems.

system administrator

The _____ controls the speed at which instructions are processed. Processing speed is listed in terms of megahertz (MHz), (millions of processes per second) or gigahertz (GHz) (billions of processes per second), although today's PCs have processing speeds in GHz only.

system clock

The _____ contains various components that enable the PC system to run programs and complete other important functions.

system unit

programs that allow the user to monitor and improve system performance

system utilities

what type of computer still uses silicon chips?

tablet

A collection of protocols that is sometimes referred to as a protocol stack

tcp/ip

Type of circuit switched network

telephone network

Beta testing

tests are performed by the end user without any assistance from the system developers. Beta testing uses actual (i.e., live) data in the real working environment.

The need for professionals and businesses to have a better way to communicate over a distance led to IT professionals first developing

the Internet.

Project management

the application of knowledge, skills, tools, and techniques to project activities to meet the project requirements.

The circuitry and electrical channels that enable communication among the electronic components.

the bus

what is the routers role in the internet?

the device that permists packet switching so that a message can be routed to the next link in the network on the fly. the router receives a message, examines its destination IP address and sends the message on to the next location in the ntwork, usually another router. At the destination network the router routes the messages until they reach a LAN and the LANs router or switch sends the message to that one destination machine

Type of packet switched network

the internet

The myriad of types of devices that can and will be connected to the internet in the next few years.

the internet of things (IoT)

When a programmer enters a command, what converts that command to machine language and executes it?

the interpreter

sits on top of the hardware and is the interface between hardware and software

the kernel

What is machine language?

the most basic set of instructions that a computer can execute directly.

the printed circuit board that houses the cpu, memory chips, and expansion cards in any computer.

the motherboard

Phishing

the process of targeting a specific individual, usually via email, under the guise of a reputable or trustworthy entity to reveal private or personal details such as usernames or password

an interface for the user that provides access to the kernel

the shell

What is bandwidth

the transfer rate permissible over the media, described as some number of bits per second

What generation of computers introduced operating systems?

third

what generation of computers introduced the silicon chip?

third

characteristic of quality data whereas data must be complete and not contain errors or lapses of data.

thorough

characateristic of quality data where data is provided efficiently and on time so that companies can utilize it in their business.

timely

hat is the role of a web server

to respond to HTTP requests

The use of IT has allowed businesses to have __________.

tools for communicating

part of the domain name of a Web page's URL.

top-level domain (TLD)

An operating system will issue commands using the command line prompt by?

typing in commands

the ability to have computation anywhere at any time

ubiquitous computing

In order for a database to work, at least one of the fields has to contain unique values. What is the name of this field?

unique identifier or primary key.

cloud computing

use of web services to perform functions that were traditionally performed with software on an individual computer; i.e. Flickr, Google Docs, etc.

The ________ requirement involves new software that will allow for easy access to account information.

user

Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?

user acceptance

The people who use the computer system

users

Symmetric key encryption

uses the same key for performing the encryption and decryption

Public-key encryption aka asymmetric encyption

uses two keys, a public and private key.

Social Engineering

using deception to obtain unauthorized access to information resources

Programs that allow the user to monitor and improve system performance.

utility programs

A _________ is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. This also provides for improved collaboration because platforms and software are not a limitation.

virtual machine (VM)

A ______ is software that attaches itself to another legitimate (or seemingly legitimate) software application.

virus

A _____________ does the following: Runs server side scripts, logs requests and errors, handles security.

web server

Store data files and programs, respond to client (computer) requests from anywhere, running server side scripts

web server

Which of the following servers responds to HTTP requests on the Internet?

web server

Jose's organization has recently hired 50 new interns to fulfill positions in a variety of departments. He installed online training software for the new hires and configured the software to be used and will be maintaining the software. His boss also asked him to monitor the activities of the new interns by monitoring the log files that the company also uses for data mining. Jose's role in the IT department is most likely as a _________.

website administrator

data integrity

when data cannot be changed/manipulated while it resides on a host or travels across a network, or if it is changed, manipulated, then the change can be detected.


Related study sets

Clinical Concepts Exam 3 Practice Questions

View Set

Chapter 24: Male Genitourinary System

View Set

Chapter 13 Retailing and Wholesaling

View Set