C182 - Quizes
______ is a threat that targets users.
Social engineering
boolean data types
true/false, yes/no it has two states - 0 and 1
What are records (rows) referred to in a database?
tuples
Malware
"malicious" software. There are different types of malware, but usually this refers to two types: viruses or worms virus - A virus is software that attaches itself to another legitimate (or seemingly legitimate) software application. (ex, trojan horse, spyware) worms - self-contained programs and do not need other programs to propagate across computers and computer networks
Which software consists of daemons?
System
User
Those who use a computer.
Email Protocols
- IMAP - POP3 - SMTP - HTTP - MAPI - MIME
Compiler
- Requires that the components of the software all be defined form the outset - the code is more efficient
The most common forms of network connection used today
- UTP (Unshielded twisted pair) - fiber optic cable
Types of cable that transmits information using electromagnetic waves voltage
- coaxial - twisted pair (utp)
Server
- dedicated computer used to provide a service - software that is run on the machine, includes print service, ftp server, web server, email, db, file - collection of hardware, software and data that together constitutes the server
What were significant factors in the need for development of operating systems?
- development of language translators - increased number of users - improved speed of hardware
Bus network
- devices are connected along a single cable. he cable is the network, and it carries one message at a time - Devices connect to the bus through T-connections. Each device would plug into a T-connector that would plug into two cables, each leading to the next device and T-connector. Each end connected to a terminator. - all devices listen to any communications over the single cable and ignore all messages that are not intended for them.
Transistor components
- favored over vacuum tubes - introduced around 1959 - cheaper and could be mass produced - could last up to 50 years - used less power - 2nd generation
What do broadcast devices consist of?
- hubs - switches - routers
Grey Hat Hacking
Engage in both kinds of hacking for good and bad.
Silicon chips or Integrated Circuits (ICs)
- known as printed circuits or integrated circuits (ICs) - could incorporate dozens of transistors - took up less space replaced both bulkier transistors and magnetic core memories - could be used for both computation and storage minicomputers
Benefits of magnetic core memory
- larger main memory sizes - size of computer reduced bc of reduction in size of the hardware - because they were smaller and less distance for electrical current to travel between components computers were faster
FTP server
- like a webserver in that it hosts files and allows clients to access those files. However, with FTP, access is in the form of uploading files and downloading files.
point to point network
- the simplest network topology - there is a dedicated link between two resources - not often used because it limits how devices can communicate with each other - example would be a connection between the monitor and the motherboard within a computer
Proxy server
- used to act as a giant cache of web pages that anyone in the organization has recently retrieved - provide a degree of anonymity - block certain content from being returned; for example, rejecting requests going to specific servers (e.g., Facebook) and rejecting responses that contain certain content (e.g., the word "porn") - Squid is the most commonly used proxy server
A computer network supports a business's ecosystem by?
-Improving efficiency -Reducing costs -Improving comminication
What are the peripheral devices used by Storage in the IPOS cycle stage?
1. CD, DVD 2. Flash Drive 3. External hardrive
Which of the following components represent the basic structure of the computer system?
1. CPU 2. memory 3. I/O subsystem 4. bus
What are the steps in Strategic Analysis?
1. Identify information assets. 2. Identify vulnerabilities of assets. 3. Determine threats based on vulnerabilities. 4. Prioritize risks. 5. Develop and enact policies as necessary.
Steps to Strategic Risk Analysis
1. Identify the organization's assets 2. Identify vulnerabilities 3. Determine threats 3. Prioritize risks 4. Enact policies to reduce these risks
Strategic Risk Analysis
1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats
Strategic Risk Analysis
1. Identify the organization's information assets (computers, network, people, products, data) 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats
What is the correct order of project phases?
1. Initiation 2. Planning 3. Executing & controlling 4. Closing
What four operations does a computer perform?
1. Input 2. Processing 3. Output 4. Storage
The following are examples of operating systems used today?
1. Linux 2. Mac OS 3. Unix 4. Windows
What are the 3 main categories of databases?
1. relational (most popular) 2. flat file 3. hierarchical
Data Integrity Efforts
1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked
When was magnetic core memory introduced?
2nd gen
Intranet
A LAN that uses the Internet Protocol
What is the definition of a Platform as a Service (PaaS)?
A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
Relational Database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables
Servers
A dedicated computer used to provide a service. High performance computers with large hard disk drives. Commonly a stand-alone computer.
What is the difference between a handheld and a desktop?
A desktop has more external storage
Primary Key
A field in the relations that contains a unique value
Structured Query Language (SQL)
A standard query language that is used to communicate in many DBMSs
Structured Query Language (SQL)
A standard query language that is used to communicate in may DBMSs
Information Technology
A system composed of hardware, software and people all working towards a common goal.
Social Engineering
A threat that targets users. The idea is that a user is a weak link who can be tricked, and often fairly easily.
Windows Server
A version of Windows that has been specifically designed and configured for server use.
Virtual Machines
A virtual machine (VM) is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
Internet
A worldwide network of computers that can share information
what are two common forms of character representation?
ASCII (American standard code for information exchange) Unicode
Character Representation
ASCII and Unicode
________ requires that the program is accessible to all users including the visually impaired.
Accessibility
Batch processing
Accumulating transaction records into groups or batches for processing at a regular interval such as daily or weekly. The records are usually sorted into some sequence (such as numerically or alphabetically) before processing.
Proxy Server
Acts as a giant cache of web pages that anyone in the organization has recently retrieved
During the implementation stage, which testing method uses simulated data and is assisted by system developers?
Alpha Testing
Which of the following are characteristics of a packet-switched network?
B. The choice of pathway is based on network availability and amount of message traffic. C. The route is established one branch at a time.
Which two are both types of high-level programming languages?
BASIC and Ada
What kind of numbering system is binary?
Base 2
______ it is the "basic" operating system that runs when a computer is first turned on. It runs tests of memory and the CPU, and initializes hardware components so that the actual Operating System can be loaded from the hard disk.
Basic Input Output System (BIOS)
BETWEEN
Between an inclusive range
_________ is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
Business intelligence
Computer Security
CIA - Confidentiality, Integrity, Availability
What high-level programming languages was created to be business-oriented?
COBOL
Which of the following high-level programming languages was created to be business-oriented?
COBOL
Which of the following high-level programming languages was created to be business-oriented?
COBOL (Common Business Oriented Language)
Executes instructions and commands computer components
CPU
Which describes an algorithm?
Clear
One computer will request information from another computer, which responds with requested information.
Client-server
What is the last project phase?
Closing
Reporting of the Projects success and any obstacles is during this phase of the project?
Closing (Phase)
Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?
Cloud computing
Attributes
Columns of the relation
Though currently related to the federal government, which act if extended to business organizations could prevent the profiling that would allow a company like Amazon to be able to send you products before you even ordered them?
Computer Matching and Privacy Protection Act of 1988
Remote computer
Computer being accessed over the network
To what degree will employee actions be monitored?
Control
Which two components are parts of a central processing unit?
Control Unit (CU)
In order to translate from an IP alias to an IP address, which of the following is used?
DNS
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?
Data
Phased Conversion
Deploys a subset of the system first, rather than deploying the whole system at once
A _______ allows a laptop or tablet to function like a desktop unit.
Docking Station
At the time of its creation, which of the following characteristics was unique to ENIAC?
ENIAC performed decimal calculations.
Redundancy
Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline
Developed for mathematical/scientific computing
FORTRAN
Which sql clause is used to inform the database management system which table should be interrograted by the query?
FROM
All operating systems have graphical representations that can be clicked for an easier user experience. True or False?
False
First generation computers were relatively inexpensive compared to today's computers. True or False?
False
Many of today's operating systems require the user to have specialized training concerning specific commands needed to instruct the operating system to perform different functions. True or False?
False
Manages Capital
Finance
_____ translate the organization's philosophy into specific, measurable outcomes the organization plans to achieve.
Goals
>
Greater than
The following are examples of what code type? 1. number system that represents binary in a shortened way. 2. Base 16 3. i.e. ( 3C8 ) 4. Is created by converting 4-bit binary numbers.
Hexadecimal
www.google.com is an example of a(n)?
IP alias
Which cloud service provides all the resources (servers, data storage) tha an IT dept needs ouside of the org making them accessible by anyone, anywhere
IaaS or Infrastructure as a Service
ODBC (Open Database Connectivity)
Interacts with a database via a database driver
The ______ is a global network of networks.
Internet
Types of devices that can connect to the Internet
Internet of Things (IoT)
In which category of the DIKW hierarchy would business intelligence be located?
Knowledge
All of the following are parts of a URL except for:
LAN
A ______ is a network that requires a router in order to communicate with the Internet.
LAN - Local Area Networks
What is a disadvantage of a compiled language?
Lack of portability
What two inventions have allowed programmers to avoid writing programs in machine language?
Language Translators and High Level Programming Languages
Data is ______ structured than information
Less
What is a disadvantage of outsourcing?
Less control over the subject
<
Less than
<=
Less than or equal
FTP Server
Like web server or file server in that requests are for files and responses are the files
The End User License Agreement for proprietary software
Limits modifying the software
Which operating system uses the point-and-click GUI?
Linux
Logical design
Logical models are revised to ensure that the new system will meet the user requirements identified in the first step
Has a standard set of menus always listed along the top of the desktop. Each application software adds to the menu selections.
Mac OS
A program written in a high-level language must be converted into _____ to be executed by the computer.
Machine Code
This is an example of which type of language? 1111 00000000000000001
Machine Language
0000 1001 0110 0100 1101 1111 1010 0011 is an example of what?
Machine Language Programing
System Administrator
Maintains all aspects of the system including hardware, software, and programming.
What sped the need to build better faster computers?
Needed to assist in computing rocket trajectories after World War II
What is a collection of computers and resources connected by various media so they can communicate with each other?
Network
Which IT position has the responsibillity of working with routers and switches?
Network Administrator
Which IT role is responsible for installation and maintenance of the resources of the computer network?
Network Administrator
The following are examples of ______? 1. typically started automatically 2. Directly supports the computer system
OS (Operating System)
Is used to make machine language easier to read and uses base 8.
Octal
This software was created in the Open Source Community and made freely available as source code. You may obtain the software for free; you may enhance the software; you may distribute the software. However, you have to abide by the copyright provided with the software. Most are made available using the GNUs Public License, and some are made available with what is known as a copyleft instead of a copyright.
Open Source software
Project Planning
Organize activities, time estimation, cost estimation
There is a period of time in which both systems (the old and the new) are operating concurrently. This is done so that the output of the new system can be compared with the output of the old system. Once it is confirmed that everything is working as expected, the old system is shut down and the new system continues to operate.
Parallel Conversion
What will prevent others from making, selling, or using an invention for 20 years?
Patent
Creating a model of the database design. Modeling the hardware for the system. are examples of which model?
Physical Modeling
Hardware
Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.
Cold Site
Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have
Common Steps in SDLC
Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance
The term _____ is another form of query that returns all of the records from the relation, but only select attributes or fields.
Projection
_______ or commercial, software is purchased from a vendor. Such software may be produced by a company that commercially markets software (usually referred to as a software house), by a company that produces its own in-house software, or by a consultant (or consultant company) hired to produce software.
Proprietary Software
Temporarily stores data before it is processed and sent to your screen or printer.
RAM
Volitile memory that disappears when the computer is turned off or loses power.
RAM
Unnecessary Requirements
Requirements that are not actually needed but are "nice to have"
Which device permits packet switching so that a message can be routed to the next link in a network?
Router
Which device permits packet switching so that a message can be routed to the next link in a network?
Router A router is a device that permits packet switching in order to send messages to the next link in the network.
Moving a message onto the appropriate network is an example of what?
Routing
Used to move traffic from one network to another network is an example of what?
Routing
White Hat Hacking
Security professionals and hack for "good purposes" to find vulnerabilities and fix or protect against them.
Anti-viral Software
Seeks out malware
What programming languages first introduced the concept of object-oriented programming?
Simula
Simula
Simulation Language
4th Generation of Computers
Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use
World Wide Web
Sits on top of the internet. Network of linked files.
Insert modem cards, wireless-access cards, and other PC cards (such as camera cards).
Slots
Script
Sometimes uses to refer to a small program that have been traditionally used for automation
Sort
Sorting records based on some field(s) such as ascending order by last name
All of the following are input systems except:
Speaker
Which two software application packages would be classified as productivity software?
Spreadsheet program and word processor
Power connectors are responsible for which of the following?
Taking current from external wall outlets.
Also known as the chassis or cabinet.
The case of a computer
Users
The people who use the computer system
What is the role of the systems administrator?
To install and maintain network resources.
What is the database administrator's role in security?
To institute protocols to protect the databases from external threats
Domain Name Parts
Top level domain (TLD) name and Host name
A type of malware that attacks an individual computer by masquerading as an application.
Trojan Horse
Sara identifies the problem, diagnoses its cause, and finds a solution
Troubleshooting problem solving
True or False - Integrated circuit boards could now be used for both computation and memory.
True
The abbreviation "URL" indicates:
Uniform Resource Locator
URL
Uniform Resource Locator
_______ is used to modify the data that already exists in a table within a database
Update
Public-key encryption
Uses two keys, a public and private key
Which IT role is responsible for maintaining websites?
Web Administrator
Yes or No - Software tells the computer how to execute commands whereas hardware is the physical devices that make up a computer system.
Yes
sometimes referred to as root or superuser
administrator account
Most commonly used web server
apache
What is the focus of the list of responsibilities for database administrators?
design development and DBMS support
computer with the most amount of performance capability
desktop
The _____ is an electronic component used to store instructions, programs, data, and information for future use.
hard drive
Packet Sniffing
is a means of obtaining a password; in reality, in addition to passwords, packet sniffing allows you to obtain anything being sent over the network if the data being transmitted is sent without encryption.
Type of transmission of fiber optic cable
light pulses
fiber optic cable
light pulses
software stored on an individual computer
local application
If a company decides for security reasons they want to limit access to certain documents the best implementation of this would be _____________.
local applications
The ______ is attached to the motherboard and consists of electronic components that store instructions and data.
memory module
A _____ is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers.
network hub
This device normally broadcasts messages to all ports.
network hub
sensitive information
not considered a threat to a persons privacy
Delivering processed data (i.e., information) to the outside world via a monitor, printed pages, or speakers, for example.
output
The computer prints out a bill for the meal what operation is this?
output
Computer Hardware
physical components of a computer system which include the system unit and its components (motherboard, fan, disk drives, CPU, memory chips) and peripheral devices, such as a keyboard, printer, or monitor
The fetch-execute cycle is performed in an overlapped fashion on several instructions.
pipelines cpu
On which tier of the n tier architecture model are user interfaces developed?
presentation
N-tier architecture
presentation tier logic tier data tier
Information can be defined as _______ data.
processed
Projection and Join are examples of what _______?
queries
A ________ is a search of data in the relation that fit specific parameters.
query
Which is the most economical technology to provide a communication path over long distances?
radio and cellphone towers
Which technology is best to provide a communication path over long distances?
radio and cellphone towers
Type of transmission of radio and cell towers
radio waves
Evolv captures large quantities of data with over 488 million data points. What is the most likely type of database structure that is used for this data?
relational database
which characteristic of quality data requires data being used to be applied directly to the decision being made.
relevance
The ______ is a device that receives a message and sends the message on to the next location in the network.
router
This device connects multiple networks together.
router
what device permits packet switching so that a message can be routed to the next link in a network?
router
Which of the following devices is used to connect one network to another network?
router Routers are the main means of connection between one network and another.
works with hardware to provide a network service, types of software includes web servers, email servers, and database servers
server software
Operating system programs that start when the operating system is loaded but run in the background and do not take up any CPU time until it is called.
services
Example of how Networks allow hardware to be shared between software
sharing a printer, mail server
What do integrated circuits need to function?
silicon chip
Logic Tier
sits between the user interface and the data. As such the logic tier is a conduit through which the data flows to the user from the databases as well as how data input from the user is used to update the underlying records in the database. resides on the server where the processing occurs the level where data processing occurs
can insert modem cards, wireless access cards, and other PC cards such as camera cards
slots
Program languages outlining instructions for the computer are written and then implemented as _______.
software
_______ refers to the programs that we run on a computer.
software
proprietary software produced by a company that commercially markets software
software house
Freeware
software that is provided without charge
private information
something that could be a threat to privacy such a social security number
What does the GOTO statement create?
spaghetti code
SNOBOL
string maipulations
A ________ is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the IP address on the message.
switch
progams that make up the operating system and directly supports the computer system itself.
system software
ENIAC
the first general-purpose electronic computer
a requirment of all computers to communicate over the internet
transmission control protocol/ internet protocol or TCP/IP
Software used by select groups with an organization or to a specific discipline such as music sequencers, samplers, and digital recorders for muscians.
vertical software
A ______ is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
virtual machine
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing mutiple computers.
virtual machines
Presentation Tier
where the user interface for the system is developed. translates the final results into a user friendly format
what is a join query
withdraws information from multiple relations.
Sever software
works with hardware to provide a network service
Fair use
An exception to copyright that allows nonprofits or education institutions to use the copyrighted work
Database Administrator
An individual who is responsible for the maintenance and security of an organization's database resources and data.
Which of the following statements describes the difference between information systems and information technology?
An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software.
Which of the following statements are true about an information system? Select all that apply.
An information system does not need to involve technology. An information system is different than Information Technology.
Incremental backup
An initial full backup is completed and then subsequent backups only capture the changes since the last backup
IP addresses
- 32 bits in size - have English like name aliases - A series of numbers that indicates a specific internet location
Interpreter
- Allows you to test out an idea - relies on a session - allow for programs to be written and run in small pieces - it is easier to make changes and see results with
Backup Strategies
- Image backups (create a copy of everything that is on a hard drive: operating system, programs, configuration files, data, and so on. If necessary, the image can then be copied onto a new hard drive and used in place of the original) - data mirroring (the operating system writes data (and changes to the data) to multiple hard drives at the same time. As a result, if something happens to one hard drive, another hard drive should be available to hasten data recovery.) - offsite storage (hot site, cold site, or site sharing)
DNS
- It is a server with a table that contains IP addresses and aliases. - It translates Internet aliases to IP addresses. - Sends requests to other DNS servers when it cannot locate an IP alias. - stores an IP address for a particular alias in its local DNS server table after receiving it from a higher-level DNS so that it is available for later use
Functions of Business Intelligence systems (BI)
- Used to help a company make long-term decisions - Provides historical, current, and predictive views of business operations - Provides high-level information for decision makers - integrate information from various systems into one location - improve the quality of information obtained through multiple database systems. - best used to make strategic decisions, like whether or not a company should expand.
database server
- a structured data repository - permits database access across a network - perform such tasks as data analysis, data manipulation, security, and archiving - MySQL is popular open source
Risks of cloud computing
- adverse effect on internal IT employees - concerns about data ownership and compliance issues - security issues
Key components to business continuity plan (BCP)
- assess critical organization activities - how quickly an d activity must be restarted - testing the plan Business continuity planning helps an organization ensure that in the event of a disaster critical business functions will be available.
what are the elements of planning? (second phase)
- objectives and activities (concrete objectives and activities - step by step process) - organize activities ( which are dependent of others) - time estimation (use tools like program evaluation and review technique (PERT) and GANTT charts to determine on long it will take) - cost estimation (costs associated with each element of the project and as a whole)
What are the 3 technologies that glue together the internet?
- packet switching - routers - IP addresses
FORTRAN
- primarily intended for mathematical/scientific computing - the control statements similar to assembly language, but the rest would read like english and math
what are the 3 key elements of project initiation? (first phase)
- problem definition (lays the foundation for determining the project scope - resource allocation (time and capital) - risk assessment (determine if benefits outweigh the risks)
What are the 3 main parts to the web pages URL
- protocol (http://) - domain name (www.cnn.com) - resource ID (name of file accessing)
Benefits of Cloud Computing
- reduced costs - increased speed of development for projects - ability to quickly and easily scale operations - less reliance on internal IT expertise
reports used for monitoring and controlling for project management
- variance reports (differences between planned resources and actual resources - status reports (state of project) - resource allocation reports (how time and capital have been used thus far for the project)
Shell
An interface for the user, often personalized for that given user, that provides access to the kernel.
Which action by application programs requires support from an operating system?
An internet browser displays a web page.
What is the main difference between a compiled language and an interpreted language?
An interpreted language runs inside of a special environment called the interpreter.
OLAP is used to
-used to find the relevant information when looking at a database. - takes the information from a data warehouse and makes it easier to sift through. - Looking at data in a more granular fashion; examining the details of the data.
What are the elements of a computer system?
1. CPU 2. users 3. keyboard 4. memory 5. Monitor 6. operating system 7. mouse
What are the four components of computer systems?
1. CPU - ALU, control Unit, Registers 2. Memory - SCRAM, DRAM, ROM 3. Input/Output (I/O) subsystem 4. The bus
Computer Network Advantages
1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication
What is required to verify authenticity of the recipient?
1. Encryption 2. Digital signatures 3. Certificates
What are the peripheral devices used by Input the IPOS cycle stage?
1. Keyboard 2. Mouse 3. Scanner 4. Microphone 5. Stylus
What are the peripheral devices used by Output in the IPOS cycle stage?
1. Monitor 2. Headphones 3. Printer 4. Speaker 5. projector
What are hardware components in a computer system?
1. Monitor 2. printer 3. internal fan 4. disk drives
What are the steps of SDLC
1. Preliminary investigation 2. analysis 3. logical design 4. physical design 5. implementation 6. maintenance
Software Architecture (N-Tier)
1. Presentation Tier where the user interface for the system is developed 2. Logic Tier sits between the interface and the data 3. Data Tier resides on the organization's servers and on a separate database server
What are the types of computer storage hardware in the order that they were developed?
1. Punch Cards 2. Magnetic tape 3. Hard Disk 4. Floppy disks 5. Optical discs 6. Flash memory 7. Cloud storage
What are the three main categories in a database?
1. Relational 2. Flat file 3. Hierarchical
What are the 5 characteristics of quality data?
1. Relevance 2. Timely 3. Thorough 4. Accurate 5. Reliable
System Deployment
1. System Conversion 2. Final Documentation 3. End User Training
What are the 2 categories of software?
1. Systems software, includes the OS and all the utilities that enable the computer to function 2. Applications software, includes programs that do real work for users. example word processors, spreadsheets, db management
Layers of computer system
1. User 2. applications 3. OS utilities 3. Services 4. shells 5. OS kernel 6. software device drivers 7. OM BIOS drivers 8. hardware
What are three operations used to alter data within a relation of a database?
1. delete 2. insert 3. update
Which era was it when the user would specify a program, send it off to the computer to run, and return later for the output?
1940s and 1950s
During which generation did computers begin to see widespread use in business?
3rd generation
When did computer companies start producing families of computers
3rd generation
When was the emergence of the software dev field?
3rd generation
When was the silicon chip introduced?
3rd generation
when was the emergence of computer networks?
3rd generation
Security Breach Notification Laws
47 states plus DC require employers to notify employees of potential or real security breaches that involve personally identifiable information (PII) (Hawaii: Yes)
When was the single chip processor (or microprocessor) produced?
4th generation
How many bits are in a byte?
8
Byte
8 bits; a single character of text in a computer
A stand alone entity that would be programmed to handle its own internal methods as well as messages received from other objects.
An object
_________ The team determines the user requirements for the new system and develops logical models of the system (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes).
Analysis
COBOL
A business-oriented language (common business oriented language)
Which of the following operating systems is for mobile devices?
Android
Ethics
A code of moral conduct or a set of principles that govern behavior.
Computer System
A collection of components that work together to meet the needs of the user
Computer System
A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.
What is the definition of a computer system?
A collection of computer hardware, software, users and networks
Computer Network
A collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Network
A collection of computers and resources connected by various media so that they can communicate with each other.
Network
A collection of computers and resources connected by various media so they can communicate with each other
Information Systems
A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.
Data Warehouse
A collection of organized databases
what is a data warehouse
A collection of organized databases
Protocol Stack
A collection of protocols. TCP/IP is an example.
Remote Computer
A computer being accessed over the network
Which statement accurately describes memory?
A computer can only run programs if it has a sufficient amount of memory.
NOT the responsibility of the system admin?
Answering emails from potential customers.
Which of the following is the best definition of a computer network?
A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Proxy Server
A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
Which of the following is an accurate definition of a computer system?
A computer system is a collection of hardware and software components that work together to meet the needs of the user.
Web Server
A computer that runs special software to serve up Web content by responding to requests.
_______ software attempts to identify if a file contains a virus or, more generally, some form of malware. The software can be run on demand, or you can set it up so that all incoming messages are scanned. Unfortunately, it will not necessarily catch every piece of malware.
Anti-viral
Shareware
A copyrighted software that can be sampled before it is purchased.
Hub
A device that connects multiple computers together. Broadcasts the transmission as it sends the data to every device in the network.
Router
A device that connects multiple networks together. Routers can be used to directly connect computers but are typically used instead in specific locations in a network so that messages can be routed to other networks. A router contains programming router tables and at least one input that comes from another network.
The following are examples of ________? 1. Spreadsheet software 2. database software 3. programs users will run to accomplish a task.
Application
Which software is run by the end user?
Application
Which type of software includes programs such as Microsoft Word and PowerPoint?
Application
Which is true of databases and the application that interact with them?
Applications are interdependent with the database.
Family Educational Rights and Privacy Act (FERPA)
A federal law that governs student confidentiality in schools. It requires that schools not divulge, reveal or share any personally identifiable information about a student or his/her family, unless it is with another school employee who needs the information to work with the student. An exception is the publishing of student directory information.
Primary Key
A field int he relations that contains a unique value
Algorithm
A formula or procedure for solving a problem
Algorithms
A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process
Heirarchical Databases
A hierarchical database format organizes data using a tree-like or organizational chart type structure
The ordering of packets is done by
A higher-level TCP protocol.
The _____ does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen.
Arithmetic Logic Unit (ALU)
This is an example of which type of language? Load #1
Assembly Language
Elena is tired of programming her homemade robots through typing long strings of 1s and 0s. So, she creates a program that translates commands she can type in for her robots such as Stop, Go, and Turn, into strings of 0s and 1s.
Assembly Language Programming
Move.1 #$2000030c, d0 ; Initialize DACR0 is an example of what?
Assembly Language Programming
Preliminary investigation
Assesses the feasibility of the proposed project and selects a development methodology
What is the first step in creating a BCP plan?
Assessing critical operational activities
Which of the following describes the knowledge stage in the DIKW model?
A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.
Packet Switched Network
A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic
Structured Programming
A method of programming which follows rules about selection, sequence, and iteration control structures.
Anti-viral Software
Attempts to identify if a file contains a virus or some form of malware
Specific characteristics or properties of a record.
Attribute Record
Verifies that the information or data is genuine.
Authenticity
Network Switch
A more functional connection than a network hub. It records and recognizes the local network addresses (Media Access Control (MAC) addresses) of all computers connected to the switch. Internally the switch has more hardware including storage for MAC addresses than a hub.
Client-Server Network
A network that contains one or more servers. Servers are more expensive as they require greater hard disk storage and faster response time. In a client-server network, software enables access to remote servers. This allows different parts of a business ecosystem to interact.
Strategic Risk Analysis
A number of practices that define an organization's information assets, the vulnerabilities of those assets, the threats that can damage those assets, and the policies to protect the assets.
Octal Number System
A number system that has a base of 8; digits from 0 to 7 are used to express an octal number.
Obtaining data from computers all over the organization is an example of
Availability
Obtaining data from computers all over the organization is an example of?
Availability
Requires that information is available when needed. This seems like an obvious requirement, but it conflicts to some extent with both confidentiality and integrity.
Availability
When one user is accessing some data and others are shut out of accessing that data, this is a problem for?
Availability
Which goal of information Assurance (IA) requires that information is accessible when needed?
Availability
The basic operating system that runs when a computer is first turned on. It runs test of memory and the cpu,and initilizes hardware components so that the actual Operating system can be loaded from the hard disk.
BIOS ROM
BIOS ROM
BIOS stands for Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software not hardware, ("basic" operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can't choose the amount or contents.
Peer to Peer Network
A peer means that each computer is roughly equal to every other computer. Cheaper.
peer to peer network
A peer means that each computer is roughly equal to every other computer. This differentiates a peer-to-peer network from that of a client-server model
System Development Life Cycle (SDLC)
A process for planning, creating, testing, and deploying information systems, including hardware and software
Public Domain software
A program distributed for free without a copyright.
Language Translators
A program that takes one program, written in a high level language, and creates a machine language program as output
High Level Language
A programming language that is designed to be easy for humans to read and write.
Smalltalk
A programming language that pioneered object-oriented programming. Not popularly used in Web development.
_____ is the transfer rate in bits per second and is influenced by the type of media.
Bandwidth
Projection
A query that returns all of the records from the relation, but only select attributes or fields
router
A router connects multiple computer networks. A router will relay messages to computers with appropriate IP addresses.
Routing Decision
A routing decision is the destination network that a message is placed onto. This decision is generally left up to a routing table stored in the router's memory.
What does BIOS stand for
Basic input output system
What type of information processing allows input data to be accepted as a set of records and processed as a unit?
Batch processing
House CDs and DVDs. They are typically on the front of the system unit for easy access.
Bays
What peripheral component houses CDs and DVD?
Bays
______(external openings) and ports that connect peripherals
Bays
Query
A search of data in the relation or relations that fit specific parameters
Off-Site Storage
A secure location for storing backup media
What are the external components that allow peripherals to be connected to the system unit?
Bays (CDs, DVDs), slots (wireless-access cards, camera cards), ports (input, output, storage, communication devices)
e-mail server
A server whose sole function is to process and deliver incoming and outgoing e-mail.
PaaS - platform as a service
A service model in which various platforms are provided virtually, enabling developers to build and test applications within virtual, online environments tailored to the specific needs of a project.
Why would it be desirable to use a switch as opposed to a hub in a network?
Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub.
Script
A small program
Virtual Machine (VM)
A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.
Business Intelligence
A specific information system to help an organization reach its strategic goals
When must a software license agreement be accepted when using proprietary software?
Before purchasing the software
Virtual Machines
A virtual machine is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. - Permits multiple platforms and multiple users - Provide a secure remote environment. - Lower costs and improved collaboration. - Ability to communicate with different OSs.
Implementation
Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users
Less reliance on internal IT expertise.
Benefits of cloud computing
During implementation, which testing method uses actual data without the assistance from developers? End users test the system without help from developers; using actual data.
Beta testing
wireless access point
A wireless access point can be connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable. it is commonly used on a router
Refers to data sets that are so enormous and multifaceted that they will require more sophisticated database management/processing tools than we currently use.
Big Data
To whom does the responsibility of accuracy fall, specific employees or all employees? To what extent does the company work to ensure that potential errors in data are eliminated?
Accuracy
Scope Creep
Adding to the scope of the project; can impact the allocation of resources.
IT Professional Roles
Administration and Support
Adding/deleting user accounts is the role of which account?
Administrator
Which account is also referred to as root or superuser also has the option to add/delete user accounts?
Administrator
Which account is also referred to as root or superuser?
Administrator
Which account typically has greater authority to write to or execute programs?
Administrator
A computer program is an ________ that executes a task. A set of instructions to follow for example, building a swing-set.
Algorithm
What is another term for a formula that outlines how to execute a task?
Algorithm
The following are examples of ______? Improving competitive advantage. Looking for relationships in collected data. Determining customers purchasing preferences and patterns.
Big data Analytics
The following are examples of what code type? 1. i.e. ( 111100010000) 2. number system that computers use. 3. Base 2 4. Is the foundation for machine language.
Binary
Which of the following statements is not part of the path a message takes from one computer to another?
All messages require a response from the destination machine to the sending device.
I/O Subsystem
All peripheral devices where long term storage devices are used.
Which system requirement is an example of considering user needs in the design of an information system?
Allowing easy access to customer account information.
Docking Station
Allows a notebook or tablet to function like a desktop
A local area network (LAN)
Allows hardware sharing within one office
Packet Sniffing
Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted
Packet Sniffing
Allows you to obtain anything being sent over the network if the data being transmitted is sent without encryption
How have computer users changed over the last 75 years?
Almost anyone can be a computer user today whereas in the past only computer scientists and those with specialized training used computers.
Types of Data
Alphaneumeric, Number Integer, Date / Time, Boolean / Logical
String Data
Alphanumeric or text character
Biometrics
Biometrics pertains to a personal physical characteristic such as a fingerprint.
________ are individuals with malicious intent who violate security in order to commit crimes or acts of terrorism.
Black-hat hackers
What is an example of a non-computer scenario that represents an algorithm? Select all that apply.
Building a swing-set Making a sandwich Solving a math problem
A collection of wires, cables, optical fiber, or printed circuits that allow multiple hardware components to communicate with each other.
Bus
The _____ can have many wires, each of which can transmit 1 bit of information. These bits can be combined to create more complex data.
Bus
This component facilitates the flow of information / communication between components and peripheral devices.
Bus
A company's ability to recover after a disaster is directly related to which of the following?
Business continuity plan
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage.
Over the years, the number of transisters that can be placed on a chip has increased by how much?
By orders of maginitude rather than linearly
The ____ is the device that not only executes your programs' instructions, but also commands the various components in the computer.
CPU
This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.
CPU
What are the main components in a computer?
CPU
Which of the following carries out the instructions of a computer program and is often referred to as the "chip"?
CPU
also referred to as "the chip"
CPU
Components of a Computer
CPU, Memory and Storage, Peripheral Devices
Which of the following components represent the basic structure of the computer system?
CPU, memory, I/O subsystem, and bus.
Computer Program
Can be characterized as an elaborate algorithm. The instructions must be clear so the rules are unambiguous, and there must be a distinct stopping point.
Wireless Access Point
Can be connected to a hub, switch or router. This device sends out a wireless signal so computers on the network connect without a cable. Many routers today act as a wireless access point.
Wireless Access Point
Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable
Firewalls
Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked
The Model
Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application
Internal Components of the System Unit
Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards
single-chip processor
Also known as a microprocessor. Ushered in the fourth generation of computers
Which of the following carries out the instructions of a computer program and is often referred to as the "chip"?
Central Processing Unit
CPU
Central Processing Unit. Executes programs instructions and commands various components of the computer. Consists of two parts. The Control Unit (CU) and the Arthmatic Log Unit (ALU) The two parts of the CPU do the computer's main work of accepting data and converting it to information.
______ is used to modify an existing table.
Alter
TLD(Top Level Domain) Name
Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page
Computer Matching and Privacy Protection Act of 1988
Amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases. Without this act, one agency could potentially access data from other agencies to build a profile on a particular individual
SQL Injection
An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database
______ can be accessed by anyone at anytime in anyplace.
Cloud computing
Which of the following technologies was developed to provide more efficient and accessible ways to work virtually?
Cloud computing.
A ______ site is an off-site storage shell that can be used for operations should a need arise.
Cold
COBOL
Common Business Oriented Language
Sara asks James questions about what he is experiencing, describes actions he can take to clarify what the issue is, and explains how to fix the problem.
Communication
IS or IS NOT
Compare to null (missing data)
Which of the language can create an executable program faster?
Compiled language
If an entire program is used as input to create executable code, the translator is a/an ________.
Compiler
The following characteristics are examples of _______? 1. Requires that the components of the software all be defined from the outset. 2. The code is more efficient.
Compiler
When the entire program is translated it is converted into machine code that works with a specific type of computer.
Compiler
Which of the following are types of language translators?
Compiler and interpreter
The first time this occurred everything was copied.
Complete backup
Peripheral Devices
Components that are located outside the system unit, yet are connected physically or wirelessly to it Typical peripheral devices for input include a keyboard, mouse, scanner, digital/web/video camera, and microphone.
What are peripheral devices?
Components that are located outside the system unit, yet are connected physically or wirelessly to it. Examples, keyboard, mouse, speakers, monitor
A list of instructions that tells the computer what to do is an example of?
Computer Software
Documenting the system and training users for this massive PPACA undertaking.
Computer Support Specialist
__________ allow individuals to share many types of resources.
Computer networks
Which of the following statements is true of computer networks?
Computer networks allow individuals to share many types of resources.
Information Technology includes:
Computer networks and IT personnel
Software
Computer programs that tell the computer what to do--how to execute commands and process information
Select the statement that best describes the difference between software and hardware.
Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
Server
Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network
Indicate the security classification for Project Plan for a new IT rollout.
Confidential
What is the Security Classification for Building specifications for new product?
Confidential
Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.
Confidentiality
Using a unique identifier to allow access to sensitive information is an example of
Confidentiality
Using a unique identifier to allow access to sensitive information is an example of?
Confidentiality
What part of information assurance and security (IAS) requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized individuals?
Confidentiality
CIA
Confidentiality, Integrity, Accuracy
CIA
Confidentiality, Integrity, Availability
Ports
Connect additional input, output, storage, and communication devices
Network Hub
Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network
Router
Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses
Application Software
Consists of programs that end users run to accomplish tasks
System Software
Consists of programs that make up the OS; software that directly supports the computer system itself
System software
Consists of the programs that control or maintain the operations of the computer and its devices. - consists of daemons
Project Execution
Consists of those processes performed to complete the work defined in the project management plan to satisfy the project specifications.
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product.
Client-server Network
Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers
Field
Contains the data of an attribute for a record within a relation
The ______ does as its name indicates—it retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU.
Control Unit (CU)
Parts of the CPU
Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen
Retrieves instructions and raw data (input) and manages the transmission of the instructions and data to the alu.
Control unit
System Clock
Controls the speed at which instructions are processed.
System Clock
Controls the speed at which instructions are processed. Clock speed is measured in GHz.
These are examples of what should be considered during the ______ process. Integration of the new system with other systems. Reaction of the end-users to the new system. Training end-users to use the new system.
Conversion Process
______, is a play-on-words of copyright: instead of using rights to limit users (as proprietary software does), it promotes freedom and flexibility of use.
Copyleft
Protects an original work (in its tangible, expressed form), but not the ideas behind the work. Has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.
Copyright
What will protect the original work but not the creation of the inventive concepts?
Copyright
Kernel
Core components of the OS that is loaded when the computer is first booted.
During the planning phase, it is also important to estimate the costs associated with each activity. This allows the team to consider potential costs associated with each element of the project, as well as the cost of the project as a whole.
Cost Estimation
Which benefit is provided by a computer network in a business?
Cost for hardware resources are decreased.
What are advantages of a network?
Cost savings
Which benefit is provided by a computer network in a business?
Costs for hardware resources are decreased
Which risk assessment question is part of the initiation phase?
Could the end users reject the outcome of the project?
Image backups
Create a copy of everything that is on a hard drive
Open Source
Created in the Open Source Community and made freely available as source code
Slicing
Creates a subset of the data by reducing the data from multiple dimensions to one dimension
Workstations
Creates and maintains client network connections to remote servers
System Unit
Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.
System Unit
Critical component of all computer-based systems. Consists of most of the hardware the computer needs in order to run. Core feature of notebooks, tablets, smartphones and other types of computers.
Sometimes when a project is underway, team members may realize that the time or capital allotted for the project will not be sufficient. When this happens, the team may try to cut corners to save time or money. For example, an IT manager may decide to purchase a server that does not meet the original specifications of the project in order to reduce costs. Later, the team may discover that the server cannot keep up with the demand placed on it, which puts the success of the project at risk.
Cutting Corners
These are characteristics of an ______? 1.It is a server with a table that contains IP addresses and aliases. 2. It translates Internet aliases to IP addresses. 3. Sends requests to other DNS servers when it cannot locate an IP alias.
DNS sever
In the ______ attack, one or more attackers attempts to flood a server with so many incoming messages that the server is unable to handle legitimate business. One of the simplest ways to perform a attack is to submit thousands or millions (or more) HTTP requests.
DOS attack
Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?
Data
_____, can be obtained from a: camera card, bar code reader, pen tablet, or values entered by the user.
Data
An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?
Data Mirroring
_______ is when data cannot be changed/manipulated while it resides on a host or travels across a network, or if it is changed, manipulated, then the change can be detected.
Data integrity
Integrity
Data is correct. 1. Data gathering must be accurate 2. Data must be entered into the system correctly 3. Data modification must be tracked
Data
Data is less structured than information
Database Information Processing (OLAP)
Data is processed through a suite of analysis software tools
Each server has two hard drives and every time anything is changed on one an immediate copy is made to the other hard drive.
Data mirroring
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
Data mirrorring
Data is stored, Data is retrieved and, Data is updated are examples of how data is used in a ________.
Data tier
DIKW
Data, Information, Knowledge, Wisdom
DIKW Hierarchy
Data, Information, Knowledge, Wisdom
Design development and DBMS support are responsibilities of which IT professional?
Database Administrator
Read the following scenario, and then select the job title that most accurately depicts the descriptions. Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively. The titles most fit Javier's job?
Database Administrator
Structuring and organizing the enormous amount of data that is utilized as consumers review insurance options and determine what the cost of the policy will be as well as any subsidy that may be available.
Database Administrator
Respond to client queries, responds mainly to local clients, generate reports
Database server
Flat File Database
Database which consists of just one table.
Which two are parts of an information system?
Databases and Networks.
What type of information is this? Date of the order: 10/11/13
Date
Online Data Processing (OLDP)
Deals with data in real time
The following are examples of what code type? 1. number system that people use in everyday life. 2. i.e. ( 968 ) 3. Base 10
Decimal
Which number system is read and used by humans every day?
Decimal
Physical Level of a Network
Defined as how information is carried over the network
DIKW Hierarchy
Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)
Object-Oriented Programming (OOP)
Designing a program by discovering objects, their properties, and their relationships
What device does not have peripherals permanently attached to the system unit?
Desktop
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
Desktop
Which computer has a system unit that is easily distinguished from the peripherals?
Desktop
Which computer has the most performance capability?
Desktop
A certain computer has the following components and capabilities: peripherals include an external flatscreen monitor and an optical disk drive large capacity hard drive this is an example of what?
Desktop computer
In the strategic risk analysis, prioritizing risks is before which step?
Determine threats
Analysis
Determines the user requirements for the new system and develops logical models of the system
In strategic risk analysis, what is the final step?
Develop and enact policies against threats
In the strategic risk analysis, prioritizing risks is before which step?
Develop and enact policies against threats
When to call the Help Desk
Developing a email list Using programs
Provide specific interfaces between the OS running a computer and hardware.
Device Drivers
Device Drivers
Device drivers provide specific interfaces between the OS running a computer and hardware
Bus Network
Devices connected along a single cable. Size of network is restricted.
Bus Network
Devices connected along a single cable. Size of network is restricted.
Makes it illegal to violate copyrights of text, sound, video, or program code by transmitting them via the Internet."
Digital Millennium Copyright Act of 1998 (DMCA)
Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures. This was followed 2 years later with the Electronic Signatures in Global and National Commerce Act.
Digital Signature and Electronic Authentication Law of 1998 (SEAL)
High or Low
Digital data is represented as electrical current in a computer. High means their is noticeable current flowing through the component, and low means there is no current
The old system is "turned off" and the new system is "turned on" at a specific date and time. After the conversion, the old system is no longer available to end users.
Direct Conversion
MS-DOS
Disk operating system
Identifies the server on which a web page can be found.
Domain Name
Identifies the server on which the web page can be found? For example: abank.com
Domain Name
Moore's Law
Doubling of transistor count roughly every 18 - 24 months (exponential increase); observation, not physical law
Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs).
Drivers Privacy Protection Act of 1994
_______ is used to delete a table (be careful with this one).
Drop
SDLC - Logical Design
During this step,the logical models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step. logical diagrams
Which of the following describes the duties of a web administrator?
Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.
______ is typically called main memory.
Dynamic RAM (DRAM)
Types of RAM
Dynamic RAM (DRAM) - typically called main memory Static RAM (SRAM) - cache memory and registers
What was the first digital, general-purpose, programmable computer?
ENIAC (Electronic Numerical Integrator and Computer) first known to the public in February of 1946 - data input was performed by punch cards - output was produced using an offline accounting machine - performed decimal computations - vacuum tubes for storage - transistors and other electronics for computation - programming was in machine language This ended all interest in analog computers
what is the typical process used by data warehouse
ETL (Extract, Transform, Load)
Ring Network
Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.
Star Network
Each device is connected to a central devices such as a hub or switch.
Which of the following descriptions best represents the reliable characteristic of quality data?
Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.
Which of the following statements accurately describe IT certifications?
Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.
Assembly Language
Easier than machine but still required detailed, precise low level instructions
Buffer overflow, a technique used to attack computer systems is, _________.
Easily preventable
Learning about social engineering and how to protect passwords is ___.
Education
Establishes regulations over electronic wiretapping
Electronic Communication Privacy Act of 1986
Phishing
Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information
User Acceptance Testing
Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user
Emily is working on the company database of employees. She has been asked to create a birthday list. What information would she need?
Employee name and date of birth.
How does a network enhance the business ecosystem? Select all that apply.
Employees in different locations can share hardware and software. Team members can review files on the shared drive synchronously.
What is required to verify authenticity of the recipient? Select all that apply.
Encryption
The agreement is a contract between the software company and the purchaser.
End User License Agreement, or Software License Agreement
The ______ is a contract between the Licensor and the purchaser that gives the purchaser the right to use the software.
End User License Agreements
Grey Hat Hacker
Engage in both white and black hat types of hacking activities
Information Systems Audit and Control Association (ISACA)
Engages in the development, adoption and use of globally-accepted, industry-leading knowledge and practices for information systems
Select the IT education that would be most appropriate for the individual in the following scenario. Since she was a child, Rebecca has enjoyed taking things apart and putting them back together. She has built her own computer from scratch and loves to find ways to improve its capabilities. Which specialized IT focus would be a good fit for Rebecca?
Engineering
Because IP addresses consist of numbers, they have ______ aliases to make it easier for individuals to remember an address - such as CNN.com versus http://157.166.226.26.
English-like name
Role-based Access Control
Ensures that the user gains access only to the resources that the user should be able to access
Data Validation
Ensuring that users enter the correct data type
=
Equal to
IN
Equal to one of multiple possible values
Electronic Communication Privacy Act of 1986
Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping)
What is the purpose of the End User License Agreement for a commercial software package?
Establishes the customer's right tot use the software.
Project managers use Program Evaluation and Review (PERT) and GANTT charts to?
Estimate time for each activity
Mesh Network
Every device is connected directly to every other device in the network.
Binary numbering system
Every value is represented with some combination of 2 digits (0,1) - base 2
Octal
Every value is represented with some combination of 8 digits (0 - 7)
Full backup
Everything on the hard drive is copied each and every time a backup is performed
CPU
Executes programs' instructions and commands various components in the computer. Referred to as the "chip".
The project manager uses the information from initiation and planning to ensure the project stays on track in terms of time, capital, and scope in which project phase?
Executing & Controlling
Project managers use variance reports, status reports, and resource allocation reports in which project phase?
Executing & Controlling (Phase)
Training Material are used at this phase of the project
Executing the Plan
When integrating a new system within an organization, what will it interact with?
Existing systems in the organization
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?
Expanding the infrasturcture to support additional locations.
_________, like a sound card or graphics card, are plugged into expansion slots and enhance the performance of a computer.
Expansion cards
Which of the following best describes the purpose of expansion slots in modern computers?
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
Which of the following is NOT a characteristic of a bus network topology?
Expensive compared to other topologies.
Which two computer peripherals are connected to the computer through a port?
External microphone and USB flash drive
__________data comes from various sources. These sources must be identified, understood, and tapped.
Extract data
Define ETL (Extract, Transform, Load)
Extract data—data comes from various sources. These sources must be identified and understood. Transform data—given that the data come from different sources, it is likely that the data are not organized using the same collection of attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This will include altering data to relations or objects (or whichever format is preferred), recognizing the unique identifier(s), and selecting the appropriate attributes (fields). Load data—into the storage facility, that is, the transformed data must be stored in the data warehouse using the appropriate representation format.
The development of first generation computers was quickened by World War I. True or False?
False
True or False - Database management software is an example of system software.
False Database management software is an example of application software; it is not an operating system.
True or False - Computer memory is not considered hardware.
False Memory is part of a computer's hardware.
True or False - Database management software is an example of system software.
False - DB management software is an example of application software; it is not an operating system
A data value of a record's attribute.
Field
The following characteristics are examples of which generation computer? 1. Advancement hastened by world WAR II 2. A computer the requires programming in machine language. 3. A computer built with vacuum tubes. 4. The Electronic numerical Integrator and Computer (ENIAC) is developed
First Generation (1940's - 1950's)
Evolution of Users
First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.
Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
Flat File Database
A _______ database has records that are separated by a delimiter.
Flat file database
One large single table without relations between tables. A single workbook within a spreadsheet program uses this format.
Flat file dtabase
What are the three main categories of databases?
Flat file, relational, and hierarchal
What type of information is this? Price of the product: $14.75
Floating-point
Database Administrators
Focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas
Database Administrator
Focuses on the design, development, and support of database management systems (DBMSs).
Projection
Form of query used to return all of the records from the relation but only select attributes or fields.
The following characteristics are examples of which generation computer? 1. GUI are introduced. 2. IBM makes a single-chip processor. 3. The Mark 8, the first personal computer, appears.
Fourth Generation (1974 - today)
Which two types of software licenses are free?
Freeware and Open source
______, is usually software that has become obsolete because a newer software has replaced it, or is software that the original producer (whether an individual or a company) no longer wishes to maintain and provide support for.
Freeware software
Language Translator Programs
Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer
What is the measurement unit used to identify "Clock Speed" on today's computers?
GHz
What is the measurement unit used to identify clock speed on today's computers?
GHz
Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?
GOTO
Complete the sentence: Dragging, pointing, clicking, and double clicking with the mouse are examples of _______.
GUI
The introduction of ______ made the process of interaction with computers much less complicated.
GUIs (Graphical User Interface)
Your site's Internet point of presence is called a _______.
Gateway
End User License Agreement (EULA)
Gives the purchaser the right to use the software
>=
Greater than or equal
_____ is when an individual obtains unauthorized access to a host.
Hacking
What will store data even when the computer is turned off but may lose data and should be backed up?
Hard Drive
What is the the physical components of the computer?
Hardware
Relational Database
Has multiple tables (relations) with interrelated fields; most common structure for databases
What does a JDBC driver allow a user to do?
Have an application interact with any database when developing in Java. a standard application programming interface (API) for accessing database management systems (DBMS).
Information in DIKW
Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.
Site Sharing
Having multiple data centers located in disparate regions; typically used by large organizations.
Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition).
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Who are some of the professional individuals mentioned that would be involved in finding ways to administer and collect useful information from large amounts of data?
Healthcare. Media/advertising. Financial sector.
Bob lives in Arizona and works for a large company with employees located around the world. Bob responds to phone calls and e-mails sent by employees to a dedicated IT support address. He answers questions and is able to log in remotely to view information on an employee's computer. When he is not able to solve a problem, he routes the issue to another IT professional who can provide the necessary support.
Help Desk
The following are ________ ? 1. Answering e-mails about software questions 2. Routes questions to the most appropriate IT professional.
Help Desk duties
Support IT Professionals
Help desk and training.
Sub-tables contain data related to a single main data point.
Hierarchical database
The following are characteristics of a __________? Parent-child relationships A tree like structure
Hierarchical database
Function get_all_factors(number) is an example of what?
High-level Language Programming
Jessica works for a company that builds training simulations for fire fighters. To build each training scenario, Jessica programs the behavior of the virtual fire fighter agents in the scenario using a language developed for the simulator. She can program the virtual fire fighter agents to enter the building, search for building occupants, and perform other common tasks based on simulated conditions.
High-level Language Programming
Which accurately describes the advantages of high-level programming languages over low-level programming languages?
High-level languages use English words.
A business intelligence system is used by which of the following groups of people?
High-level management
This is an example of which type of language? int a =1,b=5,c;
High-level programming language
With a ______ an organization can shift operations to a different location with little to no delay.
Hot site
Bays
House CDs and DVDs. They are typically on the front of the system unit for easy access.
Contains peripheral devices used for input, output, and long-term storage
I/O subsystem
The _______ includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape).
I/O subsystem
________, consist of four numbers, where each number is between 0 and 255.
IP addresses
Once words, numbers or images are entered, a computer processes the data into usable information that can then be accessed to answer questions or meet specific needs. This is a description of how a computer uses the __________?
IPOS cycle
Supports day-to-day technology needs
IT
Which department will work with the management department to achieve strategic goals by developing applications and databases?
IT
Supports day-to-day technology needs of an organization. Make sure the company's website can handle e-commerce transactions. There are functions of which department?
IT Department
IT personnel who understand both the technical IT infrastructure and management of the business fill which role?
IT Management
Establishing deadlines, Hiring and firing staff members, Being a project manager, these are examples of what IT professional?
IT Manager
The following are examples of _______? IT provides improved local and global communication. IT has enabled world-wide tracking of shipments. IT has facilitated global expansion for some organizations.
IT globalization
All the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.
IaaS
Which of the following demonstrate an information system? Select all that apply.
Ian is making updates to the company website to include the latest product information. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees.
Encryption
Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information
Host Name
Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored
Which is part of the definition of Domain Name?
Identifies the server on which a web page can be found.
Domain Name
Identifies the server on which the web page can be found
In strategic risk analysis, what is the first step?
Identify information assets
In strategic risk analysis, what is the first step?
Identify vulnerabilities
What are two necessary elements of business continutiy planning?
Identifying risks that may occur
A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?
Image
A form of backup that creates a copy of everything that is on a hard drive including the operating system, programs, and configuration files. This statement best describes which of the following?
Image backup
Donald has written a script that copies everything from the server (data, programs, scripts, configuration files, etc.) onto DVDs.
Image backup
________ Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users.
Implementation
Which step involves the development of software while converting the models in the SDLC?
Implementation (step)
Digital Millennium Copyright Act of 1998 (DMCA)
Implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer
During project planning, the organization may not realize that they do not have staff members with the correct skill sets to complete the project. For example, the team may feel confident that their experienced software programmers can handle a project, but if the project involves new technologies that they are not familiar with, the project can take longer than expected or remain incomplete.
Improper Skill Sets
Complier
Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient
Network Administrator
In charge of all aspects of the computer network
Why do high-level programming languages need to be translated?
In order for the computer to understand the code.
ASCII
In place of the character, we have the binary sequence. For instance, 'a' is stored as the decimal value 97, or the hexadecimal value 61. Using either decimal to binary or hexadecimal to binary, you will see that 'a' is 01100001. Compare this to 'A', which is decimal 65 (hexadecimal 41), which is 01000001.
I/O Subsystem
Includes all peripheral devices (input, output, storage, network) where storage consists of long-term storage devices (disk drives, tape).
Now only those items which have changed from the previous day are copied.
Incremental backup
Resource/Filename ID
Indicates the name of the file you are accessing, or the location of the document on the server
Black Hat Hacker
Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism
Black Hat Hacking
Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism
As a new sales manager, Sylvia is studying the sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working?
Information
IAS
Information Assurance & Security. Concerned primarily with the protection of IT.
The definition of _________ does include the people who support Information Technology systems and who enable the processing of data.
Information Technology
________ enables the processing of data. It also provides a means for the information to be disseminated and refers to the people who facilitate the process.
Information Technology
Availability
Information is available when needed.
What is information?
Information is data that has processed. The output of some process.
Output
Information is output so user can see results.
Which term is defined as a collection of information used to support management of an organization?
Information system
Knowledge in DIKW
Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.
White Hat Hacker
Informs companies of potential problems with software so companies can fix
IaaS
Infrastructure as a Service
Makes it possible to have all of your businesses IT departments needs sited outside of the organization and available to anyone, wherever.
Infrastructure as a Service (IaaS)
IaaS
Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.
LaaS
Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.
Object Oriented Programming
Initially introduced in Smalltalk in 1970's and early 80's
Problem definition, resource allocation, and risk assessment are 3 key elements of which project phase?
Initiation
What is the first project phase?
Initiation
A risk assessment is completed during which phase of the project?
Initiation ( Phase)
Project phases
Initiation, planning, execution, monitor and control, and closure
Abigail enters the method of payment into the computer system what operation is this?
Input
Abigail types the meal order into the computer system this is an example of what operation?
Input
The process of taking data (e.g., words, numbers, images, sounds) from outside the computer and bringing it into the computer.
Input
A computer performs four operations
Input Processing Output Storage (IPOS)
What are the 4 operations a computer performs?
Input, Processing, Output, Storage Referred to as IPOS
What does the acronym IPOS stand for?
Input, process, output, and storage
What does the acronym IPOS stand for?
Input, process, output, storage.
Slots
Insert wireless-access cards, and other PC cards (such as camera cards).
System Administrator
Install and configure operating systems on the organization's machines, install new hardware, perform software upgrades and maintenance, and handle user administration
Web Administrator
Install, configure, maintain, secure, and troubleshoot the web server.
Which of the following is a role of IT personnel?
Installing, testing, and updating software. Processing data into information. Developing faster computer chips.
Security Administrator
Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.
Web Administrator
Installs, configures, maintains, secures, and troubleshoots web severs.
Entering data into the system accurately is an example of
Integrity
Entering data into the system accurately is an example of?
Integrity
Requires that data are correct. This requires at a minimum three different efforts. First, data gathering must include a component that ensures the accuracy of the collected data. Second, data must be entered into the system accurately. But most importantly, data modification must be tracked.
Integrity
What part of information assurance and security (IAS) requires that data are correct, data gathering ensures the accuracy of the data, data must be entered into the system accurately, and data modification must be tracked.
Integrity
What part of information assurance and security (IAS) requires that data is correct, data gathering ensures the accuracy of the data, data must be entered into the system accurately, and data modification must be tracked.
Integrity
The ______ refers to the countless kinds of devices that can and will be connected to the Internet in the next few years.
Internet of things
What is another term that defines a script?
Interpreted program
The ______ takes the most recently entered instruction, translates it into machine language, and executes it.
Interpreter
The following characteristics are examples of _______? 1. Relies on a session. 2. Allows you to test out and idea.
Interpreter
Pilot Conversion
Involves starting the conversation with a portion of end users
Which of the following describes local computers only?
Is a computer that a person is physically at.
Model-View-Controller (MVC)
Is a development technique used in the implementation of user interfaces
What is one of IT's role in golobalization?
It allows companies to reach a wider customer base.
What does the ALU do?
It does the actual processing of the data
What effect does scope creep have on a project?
It increases unplanned costs for the project.
What is the definition of information technology?
It is the technology used to create, maintain, and make information accessible.
how does a compiler work?
It requires the components of the software to be defined from the onset.
What does the CU do?
It retrieves the instructions and raw input data and sends that data for processing
Developers using Java can use ______ in conjunction with ODBC to have an application interact with any database.
JDBC- Java Database Connectivity
Point-to-Point Network
Link between two resources. Simplest for of a network. Limits how devices can communicate with each other
Point-to-Point Network
Link between two resources. Simplest for of a network. Limits how devices can communicate with each other.
What is true about the Linux operating system?
Linux runs on both servers and workstations
_______ into the storage facility, that is, the transformed data must be stored in the data warehouse using the appropriate representation format.
Load data
Which of the following would NOT require the use of a network?
Loading a statistical program on your personal computer.
LAN
Local Area Network which is a network within one location/site such as one room, one floor, one building.
The level where data processing occurs
Logic tier
Using diagrams to describe to the end-users how the system will work. Modifying the model design while still in the diagram phase to better fit the end-users' needs. Are examples of which Model type?
Logical Modeling
________ During this step, the logical models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step.
Logical design
Which step occurs after the analysis step and before the physical design step in the SDLC?
Logical design Step
Physical design
Logical models are converted into physical models
Jeremy is building a small electronic toy bug in his home garage. He wants to program the toy bug to walk forward and backward when the switch is turned on directly through the internal chip in the toy by adjusting the electrical currents on the chip.
Machine Language Programing
Which of the following statements applies to an open source software license?
Made freely available as a source code to enhance and distribute the software.
During this step, modifications or corrections to the system are made.
Maintenance
Malware
Malicious software usually in the form of a worm or virus.
______ is the term given to "evil" software.
Malware
Sets goals and evaluates progress toward those goals.
Management
Which of the following is a role of an administrator account?
Manipulate system files
OLAP (online analytical processing)
Manipulation of information to create business intelligence in support of strategic decision making
Read the following scenario and determine the best hardware or software solution for the situation. Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.
Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.
Individuals who are part of an IT department?
Maria is designing a new online form for the company so they can more quickly input sales data. Emily is working on a cost analysis to justify the need for a new server. Aiko is testing a new network that is connecting the main office with satellite offices in the area.
Which of the following employees would be considered IT personnel?
Maria, a computer engineer who designs computer chips.
Promotes products or services
Marketing
LIKE
Match a character pattern
What is the typical bandwidth of today's networks
Mbps to Gbps
What is the typical bandwidth of today's networks?
Mbps to Gbps (Mbps stands for megabits or millions of bits per second and Gbps stands for gigabits or billions of bits per second)
Stores programs being executed and data that the programs use
Memory
______ stores the program(s) being executed and the data that each program is using.
Memory
______ contain electronic components that store instructions and data
Memory slots
Which of the following best describes the differences between memory slots and expansion slots?
Memory slots contain electronic components that store instructions and data; whereas expansion slots may hold adapter cards, video cards, or wireless network cards.
Which of the following best describes the differences between memory and the hard drive?
Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
In which type of network topology is each networked device directly connectd to every other networked device?
Mesh
Which of the following technologies was introduced in the fourth generation of computers?
Microprocessors
_______ identifies the reason the organization exists, including the people it serves and the principles and standards of practice that should guide everyday operations.
Mission
The following are examples of _______? 1. Android 2. iOS 3. Chrome
Mobile Device Operating System
Complete the following sentence: Android, Chrome, and iOS are operating systems for
Mobile devices
The ability to use a smartphone or tablet would make it easier for a consumer to access the healthcare.gov website from wherever they were.
Mobile technology
What does M-V-C stand for?
Model-View-Controller
Maintenance
Modifications or corrections to the system are made
Which of the following include only elements of a computer system? Select all that apply.
Monitor, print drivers, operating system, and mouse CPU, users, keyboard, and memory
Print Server
Monitors print jobs
Print Server
Monitors print jobs and replies with acknowledgement when print job has been completed.
What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?
Moore's law
_____ is considered to be an observation that may or may not hold true in the coming years.
Moore's law
Network Switch
More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it
The use of IT has allowed businesses to have __________.
More tools for communicating
The ______ connects or stores all of the components in a computer.
Motherboard
Which input peripherals are now integrated in the laptop?
Mouse, keyboard, and webcam
What is a relational database?
Multiple tables with interrelated fields can be queried to generate reports and provide information to users.
Which other model is the M-V-C model similar to?
N-tier model
What are the means for devices and networks to communicate with each other and connect to devices in other networks.
Network hub, router, switch
What is TCP/IP
Network protocol stack TCP/IP is made up of a collection of protocols referred to as a protocol stack.
Which of the following statements describes why network protocols are necessary.
Network protocols are necessary for computers to communicate with each other.
Malicious attack on an entire network?
Network worm
Yes or No - Software is tangible, like computer hardware.
No Software is intangible; it is a set of instructions written in a programming language.
Yes or No - Software programming language instructions can be general and fairly broad.
No Software programming language instructions are descriptive and break tasks down into definable steps.
The ability to verify that an e-commerce contract is valid.
Non-repudiation
Hard Drive is ______ meaning, the purpose of a hard drive is to store data even when the computer is turned off. However, hard drives can develop problems involving the loss of data and should therefore be backed up.
Nonvolatile
Read-Only Memory (ROM) is ________, meaning ROM memory is a form of permanent storage for instructions that the computer needs to boot up or start.
Nonvolatile
<>
Not equal to (most DBMS also accept != instead of )
Hexidecimal number system
Number system that has 16 digits 0 - 9 and A - F.
Floating-point
Number with a decimal point
A _____ is an application that interfaces with databases.
OBDC- Open Database Connectivity
The combination of analyzed data from various databases into a meaningful report. Looking at data in a more granular fashion; examining the details of the data.
OLAP - Online Analytical Processing
______ is real time data.
OLDP- online data processing
The team may ask, What are our goals for the project? And how can we achieve them? In Phase 2, they break down the project into a step-by-step process consisting of manageable activities.
Objectives and Activities
Cloud Computing
Offers, as a service, the ability to offload computation and storage from your local computer
Spyware
Often downloaded unknown to the user when accessing websites. The spyware might spy on your browsing behavior at a minimum, or report back to a website sensitive information such as a credit card number that you entered into a web form.
Relation
Often presented as a table
N-tier Development
Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects
Direct Conversion
Old system is turned off and the new system is turned on at a specific data and time
Buffer Overflow
Oldest and well-known forms of software exploit. The buffer is a specific address in a computer's memory where a variable is stored. The buffer is of limited size. If the software does not ensure that insertions into the buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount so that the memory locations after the array are filled as well.
Sara has received training for other software programs, but she has never worked with the program James is using. She looks up information about the program to understand similarities and differences that may affect how she approaches this situation.
On-going learning
Which of the following is/are true of the IPOS cycle?
Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.
What is a flat file database?
One large single table without relations between tables. A single workbook within a spreadsheet program uses this format.
Flat File Database
One large single table; used if the amount of data that is being recorded is fairly minimal
Denial of Service (DOS)
One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business
Denial of Service (DOS)
One or more attackers attempts to flood a server with so many incoming messages that the server is unable to handle legitimate business.
Complete the sentence: Public key encryption uses __________.
One public key & one private key
Computer Support Specialist
Operates as a trainer and troubleshooter. Training tasks may include the production of material such as technical manuals, documentation, and training scripts. Training may take on numerous forms including group training, individual training, training videos, and the production of training videos and software.
What is a program that will allow a computer to easily access the hardware and software of the computer system?
Operating system
What are the risks of cloud computing?
Org becomes dependent on the reliability and performance of a third party vendor.
Once all the activities have been identified, the team needs to organize the activities in a useful order.
Organize Activities
Hierarchical Database
Organizes data using a tree like or organizational chart type structure
Services
Os programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.
This is one of the most frequently cited problems in project management. Often, the individuals who estimate the time needs of a project are not in sync with those who assign individuals to work on the project or those who have firsthand knowledge of how long it will take to complete an activity.
Overly Optimistic Time Frame
Project Monitor and Control
Oversees all the tasks and metrics necessary to ensure that the approved and authorized project is within scope, on time, and on budget so that the project proceeds with minimal risk. Monitoring and Controlling process is continuously performed throughout the life of the project.
Who owns the data accumulated and the products produced by the organization?
Ownership
Is to be able to quickly and reliably develop and deliver applications. Now, teams of developers located around the world can collaborate on the development of an app by accessing the same environment in real-time. This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers.
PaaS
which form of cloud computing enables teams of developers to quickly and reliably develop and deliver applications by accessing the same environment in real-time.
Paas or Platform as a Service
_______ will obtain passwords if the data being transmitted is sent without encryption.
Packet sniffing
________ is a digital communications method that breaks down communication into small packets of data.
Packet switching
Packets
Packets are relatively small. If the message is short, it can fit in one packet. As an example, the request http://www.google.com/ will be short, but an e-mail message could be thousands to millions of bytes long so it might be placed into multiple packets. Each packet is given the destination address (an IP alias). A checksum is computed from other data contained within the IP packet and stored as part of the IP packet. When the IP packet arrives at its destination, the checksum is re-computed and the two are compared. If they are the same, the integrity of the message is assured.
What will protect the original work and the creation of inventive concepts also prevents others from making, selling, or using an invention for 20 years?
Patent
What will protect the original work and the creation of inventive concepts?
Patent
Packet Switched Network
Pathway is only established as it is sent. When a message is received at one location, if it is not the destination location, then the message is forwarded on to another location. The choice of pathway is based on network availability and amount of message traffic. Most computer networks are packet switched.
Each computer is roughly equal to every other computer.
Peer-to-peer
Beta Testing
Performed by the end user without any assistance from the system developers; live data in a real working environment is used.
Bus
Permits information to move between each component; electrical channels that enable communication among the electronic components
Digital Signature and Electronic Authentication Law of 1998 (SEAL)
Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms
The team deploys a subset of the system first, rather than deploying the whole system at once. The old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively.
Phased conversion
All of the following are authentication except:
Phishing
_______ involves e-mails to people to redirect them to a website to perform some operation.
Phishing
Logical models are converted into physical models. These physical models are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system.
Physical design
Hot Site
Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.
Which step develops models of how the system will be physically laid out after charts and diagrams have been created and reviewed by the users?
Physical modeling step
Which type of systems conversion involves starting the conversion with a portion of end users?
Pilot
This involves starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization. The team can roll this out using either the direct approach, or the parallel approach.
Pilot Conversion
Which OLAP operation involves viewing the data using a different filter first?
Pivoting
Buffer Overflow
Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code
In what phase of a project does time estimation occur?
Planning
Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?
Planning
A GANTT Chart is typically used during this phase of the project?
Planning (Phase)
What does PaaS stand for?
Platform as a Service
PaaS
Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.
Connect additional input, output, storage, and communication devices.
Ports
What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?
Ports
These connectors provide the _____ to make the PC work.
Power
__________: SDLC begins when an organization discovers a problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology.
Preliminary investigation
What is the correct order of steps in the System Development Life Cycle?
Preliminary investigation analysis logical & physical design implementation maintenance
Translates the final result into a user-friendly format
Presentation tier
Trojan Horse
Pretends to be one kind of software but is another.
Firewalls
Prevent certain types of messages from coming into or out of the network
Operating Systems
Primary task is to allow a computer user to easily access the hardware and software of a computer system
All of the following are storage systems except:
Printer
Under what circumstances should an administrator view other people's files? Under what circumstances should a company use the data accumulated about its customers?
Privacy
______ the earliest piece of legislation that pertains to the collection and usage of personal data, this act limits actions of the federal government. The act states that: No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with prior written consent of, the individual to whom the record pertains. The act also states that federal agencies must publicly make available the data that they are collecting, the reason for the collection of the data, and the ability for any individual to consult the data collected on them to ensure its integrity.
Privacy Act of 1974
Administrator Ethics
Privacy, Ownership, Control, Accuracy, Security
Indicate the security classification for Student Id Number.
Private
What is the Security Classification for a person's Banking account number?
Private
What type of information can present a threat if disclosed such as social security numbers?
Private information
During this phase, the team defines the problem or opportunity that the project is expected to address. This lays the foundation for determining the project scope (i.e., the work that needs to be completed to achieve the desired outcome).
Problem Definition
In which element of the project initiation phase is the scope of a project determined?
Problem definition
Project Initiation
Problem definition, resource allocation, risk assessment
SDLC - Preliminary Investigation
Problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology surveys, research, task force, committees, leadership request, strategic planning
Information
Processed data.
Storage
Processed information is stored for permanent record.
What is the difference between processing and storage?
Processing involves temporary information, while storage involves permenant information.
Batch Processing
Processing large amounts of data all in one batch when the computer system is not busy
The ______ is a part of the motherboard and carries out the basic instructions that operate the PC.
Processor
________, software includes the word processor, presentation software (e.g., PowerPoint), spreadsheet program, database management systems, calendar program, address book, and data organizer.
Productivity
open source software
Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products. Most open source software is made available using the GNUs Public License, and some are made available with what is known as a copyleft instead of a copyright. users have to abide by the copyright provided
Structured Programming
Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements
Utility Programs
Programs that allow the user to monitor and improve system performance.
Driver's Privacy Protection Act (1994)
Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs)
An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the?
Project
What is the difference between proprietary and open-source software license?
Proprietary software has a cost whereas open-source software is free.
Copyrights
Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author's life plus 70 years.
Patents
Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date
Defense in Depth
Protecting every layer that surrounds data
defense in depth
Protecting every layer that surrounds data
The set of rules by which the resource is transmitted? For example https://
Protocol
Parts of URL (Uniform Resource Locator)
Protocol, Domain name, Resource/Filename
Device Drivers
Provide specific interfaces between the OS running a computer and hardware devices.
Wisdom in DIKW
Provides a social setting to knowledge; an understanding of the "why". Can only come by having both knowledge and experience.
Shareware
Provides a trial version of the software.
What is part of the role of an It professional assocation?
Provides professional standards for ethical behavior.
Authentication
Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)
Which server will cache web pages and block certain content?
Proxy
Indicate the security classification for Online list of Company Board of Directors.
Public
What is the Security Classification for a person's First and Last Name?
Public
Information Security Classifications
Public - available through public sources; includes names and addresses Sensitive - not considered a threat to a person's privacy if others learn of it; include email addresses Private - information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential - information that an organization will keep secret; includes patentable information and business plans
________, software, on the other hand, is software that has been moved into the public domain.
Public domain software
Encryption that uses two keys, a public and private key is known as what _______?
Public-key
Evolution of Storage
Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage
Which of the following statements applies to a proprietary software license?
Purchased from a vendor and gives you the right to use the software but is not yours to own.
Which two are both types of scripting languages?
Python and ASP
Where possible, data should be captured once only, although it may have multiple uses. Accuracy is most likely to be secured if data is captured as close to the point of activity as possible.
Quality data is Accurate
If information is needed about a customer's purchase history, in order to better serve the customer's needs, it is relevant to collect data on prior business transactions with the specific customer.
Quality data is Relevance
Data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer-based systems, or a combination. Managers and stakeholders should be confident that changes in performance targets reflect real changes rather than variations in data collection approaches or methods.
Quality data is Reliable
_______________ means that the data must be complete. Data that is not like this might contain errors or lapses of data.
Quality data is Thorough
When there is a delay in data, it may no longer be of use or properly serve its purpose. Data must be efficient and must be provided in a timely manner so that companies can utilize it in their business. Consider a company attempting to set a budget for the new fiscal year. Ideally, they would have access to financial data from the most recent year and possibly several years prior in order to evaluate trends in spending, then create the budget accordingly.
Quality data is Timely
Which is found on the motherboard and stores information but the information is not permanent?
RAM
Which of the following statements accurately describes random access memory (RAM)?
RAM is short-term memory.
The following statements accurately describes RAM except:
RAM runs tests of memory and the CPU, and initializes hardware components.
Which of the following statements accurately describes read only memory (ROM)?
ROM is long-term memory.
What does RFID stand for?
Radio frequency identification device
Which communication medium is typically used when sending data transmissions over very long distances?
Radio signals
______ use radio signals that are bounced off of satellites and therefore can be used over very long distances.
Radio towers
What does RFID stand for?
Radio-frequency identification
Short-term storage is most commonly known as
Random Access Memory (RAM)
What is RAM
Random access memory - short term storage made up of DRAM - dynamic RAM called the main memory and SRAM static RAM the cache memory and registers. RAM temporarily stores data before it is processed and sent to your screen or printer. RAM storage is in the 1-8 GB range.
Input
Raw data is entered by the user.
Processing
Raw data is organized or structured for usefulness.
_______ is memory that retains its contents indefinitely.
Read Only Memory (ROM)
What is ROM
Read only memory - it holds the instructions the computer needs to boot
All of the data listed for a single person or entity.
Record or Tuple
What will ensure proper storage so that data are available even when storage devices are damaged or offline?
Redundancy
Big Data
Refers to data sets that are so large and complex that they will require more advanced database management/processing tools.
The Internet of Things (IoT)
Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.
A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system. This is an example of what type of database?
Relational database
Multiple tables with interrelated fields can be queried to generate reports and provide information to users.
Relational database
Characteristics of Quality Data
Relevance - the data being used must apply directly to the decision being made Timely - data must be efficient and must be provided in a timely manner Thorough - the data must be complete Accurate - data should be captured only once, where possible and should be captured as close to the point of activity as possible. Reliable - data should reflect stable and consistent data collection processes across collections points and over time
a dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?
Reliable
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition). Similar to FERPA, HIPAA prohibits agencies from disseminating health care information of an individual without that individual's consent. This is one reason why going to the doctor today requires first filling out paperwork dealing with privacy issues.
Circuit Switched Network
Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission
circuit switched network
Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission Because the path exists during the entire conversation, communication in either direction can occur simultaneously
Circuit Switched Network
Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission
Circuit Switched Routing
Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission.
Confidentiality
Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users.
Confidentiality
Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users
Integrity
Requires that data is correct
Availability
Requires that information is available when needed
Encoding / Decoding
Requires translating the individual bits in the message from the form stored in the computer to the form that the network requires
The team must also determine what resources are available to meet the needs of the project. Resources are commonly thought of in terms of time and capital.
Resource Allocation
________ indicate how time and capital have been used thus far for the project. This report, which is tied to the budget, keeps everyone informed of where the project is in relation to the resources originally allocated for the project.
Resource Allocation Reports
Indicates the name of the file you are accessing or the location of the document on the server? For example: /checking
Resource ID
In which element of the project initiation phase does the team determine the time and capital needed for the project?
Resource allocation
Which part of a Uniform Resource Locator identifies the location of the document on the server?
Resource path id
Database Server
Responds to client database queries with responses pulled from the database. Additionally, the server may generate reports from data obtained from the database management system.
Database Server
Responds to queries by pulling from the database. Typically only to local clients.
Network Administrator
Responsible for the installation and maintenance of hardware and software that make up a computer network.
New devices can be easily added, however message transmission time may be longer based on the number of devices on the network.
Ring network
During this phase, the team must identify risks associated with the project. This assessment is used to determine whether or not the benefits of undertaking the project outweigh the risks.
Risk Assessment
In which element of the project initiation phase does the team determine any challenges the project might encounter?
Risk Assessment
Pivot
Rotates data to view the data from a different perspective
Influences the path a message will take: direct or indirect is an example of what?
Routing and Switching
Tuples
Rows of a relation
Protocol
Rules provided by which networks communicate with each other.
Interpreted Code
Runs inside a special environment; is better for testing
Database Interacting Format
SELECT fields FROM tables WHERE fields from tables match criteria
A GUI translating mouse motions into opening a file.
SHELL
Developed for string manipulations
SNOBOL
The following examples are examples of what? 1. SELECT 2. INSERT 3. DROP
SQL (standard query language) command
In a ________, an attacker issues an SQL command to a web server. The web server might pass the SQL command onto the database, and the command could delete and change records.
SQL injection
two popular forms of software exploits
SQL injections and butter overflows
Makes it possible for businesses to access and use software through the Internet.
SaaS
What allows an organization to use software through the internet?
Saas or Software as a Service
what cloud service provides access and use of software to businesses through the internet?
Saas or software as a service
Dicing
Same as slicing except that the result can be in multiple dimensions
At the beginning of a project, the team must determine what work needs to be done to create the desired result (e.g., a new service or product with the specified features and functions). It is often difficult for a team to identify accurately the scope of a project before work has been initiated.
Scope Creep
The work that needs to be completed?
Scope of a project
ASP and Python are both examples of ______________.
Scripting language and high-level programming languages
The following characteristics are examples of which generation computer? 1. First mainframe computers. 2. Computers first used magnetic core memory. 3. First computers to use Boolean operators. 4. A computer built with transistors.
Second Generation (1959 - 1965)
To what extent does the company ensure the integrity of its data and systems?
Security
________ involves keeping data confidential and preventing unauthorized users from accessing the data.
Security
Continually monitor the safety and security of the date stored on a computer system
Security Administrator
Since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both unencrypted and compromised.
Security Breach Notification Laws
Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?
Security Breach Notification laws
Worms
Self contained programs that do not need other programs to propagate across computers and computer networks
File Server
Sends files over the network at the request of clients
File Server
Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files.
What information is not public and will not be considered a threat to a person's privacy if others learned of it?
Sensitive information
Multi-tier Development
Separation of different aspect of a system
The following are examples of _______? 1. Windows Server 2. Unix
Server Operating System
______ are computers that typically have greater hard disk storage and faster response time and are used to respond to requests from other computers in a network.
Servers
Operating system programs that start when the operating system is loaded but run in the background and do not take up any CPU time until it is called.
Services
Which layer of the operating system run in the background and will handle an event?
Services
Services
Services, or daemons, are operating system programs that are usually started when the operating system is loaded and initialized, but they run in the background
Larger hard disk drives for more storage, faster response time, more expensive are all characteristics of a _______ ?
Sever
The following are examples of _______? 1. Web servers 2. email servers 3. works with hardware to provide a network service
Sever
What type of software permits free temporary use followed by long term activation for a fee?
Shareware
________, usually provides you a trial version of the software. Companies provide it as a way to entice users to purchase the software. The trial version will usually have some limitation(s) such as a set number of uses, a set number of days, or restrictions on the features. If you install the software, you can often easily upgrade it to the full version by purchasing a registration license.
Shareware software
An interface for the user that gives access to the kernel.
Shell
Which layer of the operating system run in the background and will handle an event?
Shell
Drilling up and down
Shifts the view of the data; down provides more detail, up provides summarized data
________ could replace transmitters and interfaced faster with the magnetic memory cores.
Silicon chips
3rd Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals
Rolling up
Similar to drilling up but it collapses the data from multiple items into a single value
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless-access cards, and other PC cards?
Slots
Shell Scripting
Small programs that place Linux commands or DOS batch files into a file
Which of the following programming languages first introduced the concept of object-oriented programming?
Smalltalk
Why is it best to keep the data independent from the application? Select all that apply.
So the data can not be seen or changed
What are the programs and other operating information used by the computer called?
Software
______ tells the computer how to execute commands
Software
________ is intangible; it is a set of instructions written in a programming language.
Software
When you purchase proprietary software, you will be given a?
Software License Agreement
What does SaaS stand for?
Software as a Service
SaaS
Software as a Service. Can access and use software through the Internet.
Which of the following is an accurate statement about the software in a computer system? Select all that apply.
Software must be part of the computer system in order for the system to be useful. The software in a computer system may be shared if the system is a part of a network. A computer system needs software to be able to communicate with users as well as other computers.
____________ instructions are descriptive and break tasks down into definable steps.
Software programming language
Proprietary Software
Software purchased from a vendor; also known as commercial
Server Software
Software run on a server. Includes print service, ftp server, web server, email server, database server and file server. The software must be installed, configured and managed.
Virus
Software that attaches itself to another legitimate software application
Public Domain
Software that has been moved into the public domain; can be used however you feel
Local Applications
Software that is stored on an individual computer
Local applications
Software that is stored on an individual computer
Downloaded to a computer while the user is viewing a website to track usage.
Spyware
_______ is often downloaded unknown to the user when accessing websites. It might spy on your browsing behavior at a minimum, or report back to a website sensitive information such as a credit card number that you entered into a web form.
Spyware
SQL stands for?
Standard Query Language
Software Architecture (MVC)
Stands for Model-View-Controller and is a development technique used in the implementation of user interfaces. Model - Can take on different forms depending on the complexity of the application. In certain instances, the model is an actual object that is an actual implementation of the application. View - Part of the application that represents the user interface Controller - The part of an application that interacts with the user (via the view) and passes along the user requests to the model
RAM
Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. It is volatile (means data or information stored disappears when the computer is turned off or loses power). You can choose the amount of RAM your computer has.
_______ which is cache memory and registers.
Static RAM (SRAM)
__________ indicate the state of the project. It provides specific information on the achievement of objectives and completion of activities. It is critical to track such progress, particularly for those activities that are dependent on other activities.
Status Reports
A scanner is a peripheral device for what system?
Storage
Read/write disks, thumb drives, external hard drives, and cloud storage are peripheral devices for what system?
Storage
Saving information for later use.
Storage
The computer saves the meal and payment information so that the information can be used for future earnings reports what operation is this?
Storage
Recall the IPOS (Input-Processing-Output-Storage) cycle. Which two steps of the IPOS cycle deal exclusively with binary representations of data?
Storage and Processing
Web Server
Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.
Memory
Stores the programs being executed and the data that each program is using. Used for short-term and long-term storage. The two main forms of RAM are dynamic RAM (DRAM) which is typically called main memory, and static RAM (SRAM) Another form of memory is read-only memory (ROM), which retains its contents indefinitely
Memory
Stores the programs being executed and the data they are using.
What type of information is this? Customer Name: Janet Jones
String
What type of information is this? Product ordered (code): 10357924
String
Which data type is used to represent product order code that comprises alphanumeric characters?
String data
Which of the following is NOT an important characteristic of an IT professional?
Strong math background and programming skills
Which of the following types of information present a threat to someone's privacy?
Student ID and credit card numbers
What is a hierarchical database
Sub-tables contain data related to a single main data point. Data is modeled using parent child relationships.
ISACA Code of Professional Ethics
Support the implementation of, and encourage compliance with, appropriate standards and procedures for the effective governance and management of enterprise information systems and technology, including: audit, control, security, and risk management. Perform their duties with objectivity, due diligence, and professional care, in accordance with professional standards. Serve in the interest of stakeholders in a lawful manner, while maintaining high standards of conduct and character, and not discrediting their profession or the Association. Maintain the privacy and confidentiality of information obtained in the course of their activities unless disclosure is required by legal authority. Such information shall not be used for personal benefit or released to inappropriate parties. Maintain competency in their respective fields and agree to undertake only those activities they can reasonably expect to complete with the necessary skills, knowledge and competence. Inform appropriate parties of the results of work performed including the disclosure of all significant facts known to them that, if not disclosed, may distort the reporting of the results. Support the professional education of stakeholders in enhancing their understanding of the governance and management of enterprise information systems and technology, including: audit, control, security, and risk management.
What does an IT department do?
Supports the day-to-day technology needs of an organization. Charged with helping an organization achieve its strategic goals. Provide leadership, advising management about how the organization could use technology to create a competitive advantage
What do you use to change to the user account?
Switch user (su) with the username
______ encryption uses the same key for performing the encryption and decryption.
Symmetric key
Which software consists of programs such as daemons and a scheduler?
System
Which software consists of programs that make up the operating system and directly supports the computer system?
System
Which software is run automatically rather than by the end user?
System
_______, software consists of programs that make up the operating system.
System
__________ are responsible for the installation and maintenance of the resources residing on the network.
System Administrators
SDLC stands for?
System Development Life Cycle
Which type of administrator would not deal directly with the installation and maintenance of database applications, performance tuning parameters, account creation, and procedures associated with DBMS?
System administrators and web administrators
When does system conversion (direct, parallel, pilot, or phased) occur?
System deployment
Alpha Testing
System developers assist end users as they interact with new system; simulated data is used
Utility Programs
System utilities are programs that allow the user to monitor and improve system performance
Utility Programs
System utilities are programs that allow the user to monitor and improve system performance. Utilities greatly range in function. For example, utilities exist to defragment the hard disk and to scan files for viruses and other forms of malware.
Software Categories
Systems Software and Applications Software
Which two languages have traditionally been used for automation rather than software development?
TCL and Python because they are scripting languages
Along with a notebook, which computer will use a docking station to function like a desktop?
Tablet
Interpreted Language
Takes the most recently entered instruction, translates it into machine language, and executes it
Interpreted Language
Takes the most recently entered instruction, translates it into machine language, and executes it. Portable. Some have the option to be compiled.
what is the final step in creating a BCP plan?
Testing the Plan
Association of Information Technology Professionals (AITP)
That I have an obligation to management, therefore, I shall promote the understanding of information processing methods and procedures to management using every resource at my command. That I have an obligation to my fellow members, therefore, I shall uphold the high ideals of AITP as outlined in the Association Bylaws. Further, I shall cooperate with my fellow members and shall treat them with honesty and respect at all times. That I have an obligation to society and will participate to the best of my ability in the dissemination of knowledge pertaining to the general development and understanding of information processing. Further, I shall not use knowledge of a confidential nature to further my personal interest, nor shall I violate the privacy and confidentiality of information entrusted to me or to which I may gain access. That I have an obligation to my College or University, therefore, I shall uphold its ethical and moral principles. That I have an obligation to my employer whose trust I hold, therefore, I shall endeavor to discharge this obligation to the best of my ability, to guard my employer's interests, and to advise him or her wisely and honestly. That I have an obligation to my country, therefore, in my personal, business, and social contacts, I shall uphold my nation and shall honor the chosen way of life of my fellow citizens. I accept these obligations as a personal responsibility and as a member of this Association. I shall actively discharge these obligations and I dedicate myself to that end.
Which of the following statements best defines the ALU?
The ALU controls the speed at which instructions are retrieved and processed in the computer.
Arithmetic Log Unit (ALU)
The ALU does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen
Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.
The CPU executes instructions for programs in addition to controlling all of the components in a computer.
Which of the following statements best defines the CU?
The CU retrieves the instructions of a computer program and the raw data that is input.
The ____ (also known as the chassis or cabinet) is the most visible part of any computer.
The Case
Gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization.
The Family Educational Rights and Privacy Act of 1974 (FERPA)
IPOS
The Input-Processing-Output-Storage Cycle
IPOS
The Input-Procession-Output-Storage Cycle
The need for professionals and businesses to have a better way to communicate over a distance led to IT professionals first developing ______.
The Internet
Which of the following best describes the Internet?
The Internet is a global network of networks.
MVC
The MVC model is one application where the various design logic (input, business, and interface) are logically separated. This differs from the N-tier development model where each tier is a separate application.
Data mirroring
The OS writes data (and changes to data) to multiple hard drives at the same time.
Privacy Act of 1974
The Privacy Act requires that agencies give the public notice of their systems of records by publication in the Federal Register. The Privacy Act prohibits the disclosure of information from a system of records absent the written consent of the subject individual, unless the disclosure is pursuant to one of twelve statutory exceptions.
Business Continuity
The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.
Media Bandwidth
The amount of data that can be transmitted over a unit of time such as bits per second.
binary
The binary number system is base 2, using only bits 0 and 1.
The device that permits information to move between each component.
The bus
MVC - The model
The business logic is designed here. it is used to retrieve information about the "product" to add new product information or to update product information.
Internal Components of the System Unit
The case, which is a protective covering, Internal bays and slots that grip the internal components, Buses, which are the circuitry and electrical channels that enable communication among the electronic components, Bays (external openings) and ports that connect peripherals, and Lights and indicators that show the computer is turned on.
_________ or processor is the component in a computer that executes programs.
The central processing unit (CPU)
The metal or plastic case that houses and protects the internal electronic components of the computer.
The chassis
Local computer
The computer that the user is using
Local Computer
The computer that the user is using; physically present with
Kernel
The core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources, such as devices, programs, apps, data, and information.
Which of the following statements best represents the relevant characteristic of quality data?
The data used applies to the question being answered.
Which statements about the history of computer development are correct? Select all that apply.
The development of new hardware and software requires special training. The capabilities and complexities of computers have grown substantially, but the ease of use has also made them user friendly. The following are examples of Graphical User Interface systems: GPS systems, ATM machines, and tablets and smart phones.
I/O Bus
The device that permits information to move between each component. The size or width of a bus indicates how much data can be transferred at one time.
what is the domain name
The domain name identifies the server on which the web page can be found. Domain names usually start with the prefix 'www'. The domain name can be considered in two parts: the host name, and the top-level domain name - DNS, connects the domain name with the IP
Domain Name
The domain name identifies the server on which the web page can be found. Domain names usually start with the prefix 'www'. The domain name can be considered in two parts: the host name, and the top-level domain name.
FORTRAN
The first mainstream high-level language
Reception
The first step a network performs when receiving a message.
Encryption
The idea of obfuscating the information that resides on a computer or is sent over a network so that if it is intercepted the hacker will be unable to use the information
Data in DIKW
The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.
MVC - The controller
The input logic is designed here. The controller is the part of an application that interacts with the user (via the view) and passes along the user requests to the model.
What indicates a specific internet location?
The ip address
Machine Language (Machine Code)
The language made up of binary-coded instructions that is used directly by the computer
Transmission
The last step that a network performs when sending a message.
SDLC - Physical design
The logical models are converted into physical models. These physical models are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system. physical diagrams
What were the two new pieces of hardware that symbolized the second generation computers?
The magnetic core memory and the transistor.
UTP (Unshielded Twisted Wire Pair)
The most common form of network connection used today and fiber optic cable. UTP is cheap and because so much of it is already in place.
What is one way the n-tier model differs from the M-V-C model?
The n-tier model has tiers that are each separate applications.
Which factor contributed to the development of the first generation of computers?
The need to easily calculate missile trajectories
Which factor contributed to the development of the first generation of computers?
The need to easily calculate missile trajectories.
What is Moore's law?
The number of transistors doubles over each time period, indicating an exponential increase
Allows the user to control the actions of the software and through the software, to access hardware.
The operating system
The Controller
The part of an application that interacts with the user and passes the user requests to the model
The View
The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model
Difference between a desktop PC system and a notebook/laptop computer?
The peripherals and system unit of a notebook/laptop are sold as a single unit.
Cloud Computing
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Phishing
The process of targeting a specific individual, usually via email, under the guise of a reputable or trustworthy entity to reveal private or personal details such as usernames or password.
The [blank] is a part of the motherboard and carries out the basic instructions that operate the PC.
The processor
Software
The programs and other operating information used by the computer
What is a protocol?
The protocol reflects the set of rules by which the resource is transmitted. Web pages use HyperText Transfer Protocol (HTTP), so http is standard secure protocol uses https
Protocol
The protocol reflects the set of rules by which the resource is transmitted. Web pages use HyperText Transfer Protocol (HTTP), so http is standard. The protocol is followed by a colon (:) and two forward slashes (//). With today's more modern browsers, you can usually leave out the http:// portion when you are typing a URL.
Hard Drive
The purpose of the hard drive is to store data even when the computer is turned off. It is typically referred to as memory or primary memory, while disk storage is sometimes referred to as secondary memory.
Resource ID
The resource ID indicates the name of the file you are accessing, or the location of the document on the server.
What rights does the End User License Agreement for proprietary software typically give to purchasers?
The right to use the software
In a client-server network, what is the role of the server?
The role of the server is to take requests from the client and send back the requested information.
How do a router and switch differ when handling a message?
The router will purposefully drop messages if message traffic exceeds its capacity.
Shell
The shell is an interface for the user, often personalized for that given user
Privacy
The state or condition of being free from being observed or disturbed by other people.
Router in a Packet Switched Network
The switch and router use the message's destination address to select the line to route the incoming message to. A router has additional decision-making capabilities. For instance, if message traffic exceeds its capacity, the router may have to purposefully drop messages. Additionally, when there are multiple incoming messages, the router must select which to forward first. A routing decision is the destination network that a message is placed onto. This decision is generally left up to a routing table stored in the router's memory.
controls the speed at which instructions are processed.
The system clock
SDLC - Analysis
The team determines the user requirements for the new system and develops logical models of the system (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes). Documentation,interviews, questionnaires, requirements gathering, meetings
Information Technology
The technology used in creating, maintaining, and making information accessible.
MVC - The view
The user interface logic is designed here. it is the part of the application that represents the user interface. it is used to capture input form the user to be passed on view the controller to the model.
Parallel Conversion
There is a period of time in which both systems are operating concurrently
What is the role of drivers in facilitating communication between application and databases?
They allow the ODBC to be used for interactions with the database and applications.
What is the role of drivers in facilitating communication between applications and databases?
They allow the application to interact with the database.
The following characteristics are examples of which generation computer? 1. Integrated circuits are first used for computation and storage. 2. minicomputers are available for as little as $16,000.00 3. The first silicon Chips are used in computers. 4. Computer networks are introduced.
Third Generation (1965 - 1974)
During which generation did computers begin to see widespread use in business?
Third generation
In which generation were silicon chips first used in computers?
Third generation
Description of duties for a Systems Admin?
This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
Scripting language
This term is also used to describe coding that is for a specific environment. Often interpreted. JavaScript ASP JSP PHP Perl Tcl Python
The 10 Commandments of Computer Ethics
Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people's computer resources without authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use computers in ways that ensure consideration and respect for fellow humans.
Which of the following is an example of what 1 GB would store?
Thousands of books
Logic Tier
Tier that sits between the user interface and the data.
Data Tier
Tier where data is stored, retrieved and updated from database tables
Presentation Tier
Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures
During this phase, project managers estimate how much time is required to fulfill each activity and consider other factors that influence when each activity can be completed. For example, if it is expected that an activity can be completed in 40 hours but the individual who will be completing the activity works only 20 hours per week and can only devote 50% of her time to the project, it will take 4 weeks to complete the activity.
Time Estimation
Scope creep can impact the allocation of which resources?
Time and capital
Why is it important to ensure that data support business goals?
To aid in making strategic decisions.
What is the database administrators role in security?
To institute protocols to protect the databases from external threats.
Veronica is leading a company-wide workshop on how to use a newly adopted software program. She makes a brief presentation to introduce the program, and then walks participants through the steps they are likely to engage in when they use the system. She fields questions and inquires about additional information the participants may need to be able to use the program effectively.
Training
The following are ________ ? 1. Making presentations on new programs. 2. Helps with orientation of new employees on the policies in the employee handbook.
Training duties
Tasks handled by IT personnel
Training new employees on system log-in protocol. Answer general questions about hardware and software use at an organization. Install firewall
Given that the data come from different sources, it is likely that the data are not organized using the same collection of attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This will include altering data to relations or objects (or whichever format is preferred), recognizing the unique identifier(s), and selecting the appropriate attributes (fields).
Transform data
2nd Generation of Computers
Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers
Demodulation
Translates from an analog signal to the original digital signal.
Compiled Language
Translates the entire program, creating an executable program which can be run at a later time
Compiled languages
Translates the entire program, creating an executable program, which can be run at a later time. Not portable. Compiled languages run faster than interpreted.
_______ still requires detailed, basic instructions. Also, will translate source code to a more usable machine language.
Translators
TCP/IP
Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.
A LAN allows hardware and software sharing within one office. True or False?
True
A VM can provide a secure remote environment. True or False?
True
A device can connect wirelessly using either a Wireless access point and/or a Radio tower. True or False?
True
All operating systems give users a means to interact with the computer system hardware and software. True or False?
True
Business intelligence systems are used when making long-term decisions. True or False?
True
Buying a solution is Faster than building one. True or False?
True
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices true or False ?
True
First generation computers used vacuum tubes for storage. True or False?
True
First generation computers were less reliable than today's computers. True or False?
True
Gordon Moore's original prediction that transistors on a chip will double every year has proven to be inaccurate. True or False?
True
Hubs, switches, and routers are devices that provide points within a network where messages can be relayed to the computers and devices within the network. True or False?
True
IT is the technology used in creating, maintaining, and making information accessible, which includes the software, data, and computer networks. True or False
True
Integrated circuit boards could now be used for both computation and memory. True or False?
True
It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal. True or False?
True
Memory is part of a computer's hardware. True or False?
True
Networks can allow computers to share software when appropriate licenses are purchased or when freeware is being used. True or False?
True
Operating systems are programs. True or False?
True
Second generation computers were still expensive and required expert knowledge to use. True or False?
True
True or False - GUI (Graphical User Interface) operating systems improved the ease of using a computer making computers more accessible to individuals without special training.
True
True or False - Software uses program languages to guide the specific actions of a computer.
True
VMs can communicate with different OSs without needing multiple computers and multiple platforms. True or False?
True
True or False - Cable is used to link computational circuits and memory.
True Before integrated circuits, which combined computation and memory onto a single chip, these two elements were separate and physically linked by cables.
True or False - Gordon Moore's original prediction that transistors on a chip will double every year has proven to be inaccurate.
True In reality, transistors on a chip have doubled roughly every 18 to 24 months
True or False - In the 1940s-1970s, most computer processing did not require user interaction.
True The user would specify a program, send it off to the computer to run, and return later for the output.
True or False - In the 1940s-1970s, most computer processing did not require user interaction.
True - the user would specify a program, send it off to the computer to run, and return later for the output
Boolean/Logical
True/False
Mail Server
Two email servers communicate with each other
Trojan Horse
Type of virus that completely replaces an existing application and takes the name of the taken over file
Mbps to Gbps
Typical bandwidth of today's networks
An operating system will issue commands using the command line prompt by?
Typing in commands.
Sometimes, during the early phases of a project, requirements that are not actually needed are included in the project plan. Often, these requirements are in the form of "nice to have" features, which are mistaken for essentials or included without thought of how this may impact resource allocation.
Unnecessary Requirements
Which action would support confidentiality?
Updating security software.
Radio and Cell towers
Use a transmission type that doesn't need wiring or cable.
Coaxial Cables
Use electrical current to transmit signals
Fiber Optic Cables
Use light pulses to transmit information
The proprietary software license agreement gives the purchaser the right to
Use the software
AS
Used to change the table names when viewing results
Database Management System (DBMS)
Used to create, manipulate, and access the data in a database
WHERE
Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query
SELECT
Used to inform the DBMS what fields or attributes are of interest
FROM
Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined
Domain Name Server (DNS)
Used to translate from an IP alias to an IP address
End users test the system in operational setting to see if it is useful.
User Acceptance
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
User Acceptance
The true indication of a project's success is not whether all the deliverables have been achieved, but whether the end users adopt the service or product. By and large, human beings are uncomfortable with change. It is quite common for users to "resist" a new technology or technology-based process.
User Resistance
The presentation tier is where the ______ is developed.
User interface
During analysis, which system requirement includes features that will satisfy end user needs?
User needs
What are the people called who use the computer?
Users
Security Education
Users learn how to protect their passwords and other security measures
Hexadecimal
Uses a base 16
Decimal
Uses base 10 to represent numbers (0 - 9)
Binary
Uses base 2 system (0 and 1)
Event-driven Processing
Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another
Symmetric Key Encryption
Uses the same key for performing the encryption and decryption
Public Key Encryption
Uses two keys, a public and private key for performing encryption and decryption
Transistors Magnetic Cores Magnetic disks
Ushered in the 2nd generation of computers
silicon chip
Ushered in the third generation of computers
What will violate a proprietary software agreement?
Using the software after rejecting the agreement
Freeware
Usually software that has become obsolete; is free
Defragmenting the hard disk or scanning files for viruses?
Utility Programs
Programs that allow the user to monitor and improve system performance.
Utility Programs
1st Generation of Computers
Vacuum tubes, relay switches, the need to program in machine language
____________ indicate differences between planned resources (what has been allocated for each activity or task) and actual resources (what has been used thus far in the project).
Variance Reports
_______ software applies instead to software used by select groups with an organization or to a specific discipline.
Vertical
_____describes future aspirations of the organization.
Vision
Random Access Memory (RAM) is _______, Meaning RAM memory never stores data when the power is off and is designed to be the primary work area of a computer when data is being processed.
Volatile
User Authentication
What you know, what you have, what you are
compiled language
When a high-level language is compiled, the language translator, called a compiler, translates the entire program. This creates an executable program which can be run at a later time.
Hacking
When an individual obtains unauthorized access to a host
client server network
When discussing a network, the client is a computer that will request information from another computer. The server is a computer that takes requests and responds with the requested information. The client-server network then is a network that contains one or more servers - enables access to virtual machines
Modulation
When physical media carries an analog signal rather than a digital signal translation is needed. This is called modulation.
_________ are security professionals and hack for "good purposes" to find vulnerabilities and fix or protect against them. They inform companies of potential problems with software so companies can fix and send out patches, etc.
White-hat hackers
Which of the following will find vulnerabilities and fix or protect against them?
White-hat hacking
Access rights
Will include files that the user can access
No desktop level menu selection. Each software title has its own set of menus.
Windows 7
Which of the following operating systems is for workstations?
Windows 7/8
A gesture-based interface where movements include such operations as swipe, tap, pinch, and reverse pinch, uses the touch screen GUI?
Windows 8
Which of the following operating systems is for servers?
Windows Server
Examples of server operating systems
Windows Server, OS X Server, UNIX, and Linux.
A __________ is commonly connected to a router.
Wireless access point
What is the difference between the FTP server and HTTP?
With FTP, users have access to files in the form of uploading files
Join
Withdraws information from multiple relations
Which of the following would NOT be considered hardware?
Word processor.
Server Software
Works with hardware to provide a network service
The following are examples of _______? 1. Mac OSX 2. Windows 7/8 3. Linux
Workstation Operating System
Complete the following sentence: Windows 7/8, Linux, and Mac OS X are operating systems for
Workstations
_______ are self-contained programs and do not need other programs to propagate across computers and computer networks.
Worms
What is outside of the rold of an IT professional assocation?
Writes laws dealing with information technology
Machine/Low-level Language
Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time
computer network
a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Information System
a collection of data and information used to support management of an organization
FTP Server
a computer that allows users to upload and/or download files using FTP
network hub
a device that connects multiple computers together. it broadcasts transmissions as it sends the data to every device in the network
What interacts between a database and an application?
a driver
The ordering of packets is done by?
a higher-level TCP protocol
what is packet switching?
a mode of data transmission in which a message is broken into a number of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.
Intranet
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
Hot site
a physical location where an organization can move its operations. A hot site includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data.
Cold site
a physical location, but unlike a hot site, it is not equipped with hardware, servers, and the full range of items a hot site has. A cold site is more like a shell that can be used for operations should the need arise.
System Development Life Cycle (SDLC)
a process for planning, creating, testing and depolying information systems, including hardware and software sometimes referred to as the waterfall model
A set of rules established to govern how people behave and interact with each other
a protocol
What was the operation system called in the early 1960s?
a resident monitor
Tuple
a row in a table that contains data about a specific item in a database table
Query
a search in a database for data
ODBC application
a standard application programming interface (API) for accessing database management systems (DBMS).
IP Addresses
a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
characteristic of quality data whereas data is captured once only, where possible, and captured as close to the point of activity as possible.
accurate
Scope creep
adding additional features that can impact the allocation of resources and put the project at risk. (time and capital)
IaaS - Infacstructure as a service
all the resources (e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere
SQL injections attacks
an attacker issues an SQL command to a web server as part of the URL or as input to a form on a company's website. The web server, which can accept queries as part of the URL, is not expecting an SQL command. If not protected against, the web server might pass the SQL command onto the database. The malicious SQL command could potentially do anything to the database from returning secure records to deleting records to changing the values in the records.
_________ software is based around Internet usage. Software in this class includes the e-mail client, web browser, and FTP client.
application
Database management software is an example of _______; it is not an operating system.
application software
consists of programs that end users run to accomplish tasks. An example of a type of this software includes the email client, web browser, and ftop client
application software
Completes mathematical calculations and logical operations to process the data, converting the input of keyboard text entry to output displayed on the screen.
arithmetic logic unit
An early language translator that would translate an assembly program into machine language.
assemblers
what are the 3 types of language translators?
assembly languages, high level compiled languages and high level interpreted languages assemblers, compilers, interpreters
Each of the different broad categories is known as an ___________?
attribute
Houses CDs and DVDs, typically located on the front of the system unit for easy access.
bays
Refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.
big data
bits
binary digits the digital circuits in the CPU operate on bits and memory stores bits 8 bits are placed in a unit called a byte a byte is the smallest addressable unit of memory
What type of information is this? Shipping status : Shipped
boolean
Which technique uses all possible combination of letters and numbers to crack a password?
brute force
The ________ topology has a simple form where every resource is connected to a single cable, and is also one of the least expensive.
bus network
Saas - software as a service
businesses can access and use software through the Internet. In most cases a subscription model is used
General-purpose computer
can conceivably execute any program that can be written for that computer
system conversion
can occur as: - direct: the old system is "turned off" and new system "turned on" ad specified time/date - parallel: There is a period of time in which both systems (the old and the new) are operating concurrently - pilot: This involves starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization. - phased: The team deploys a subset of the system first, rather than deploying the whole system at once.
What is required to verify authenticity of the recipient?
certificates, digital signatures, encryption
What are attributes?
characteristics which are used to describe a record, and are the column headings of the table.
A _________________ is computed from other data contained within an IP packet and stored as part of the IP packet.
checksum
Which describes an algorithm?
clear
Networks facilitate the _______ between computers and computer networks.
communication
What are the 3 components of the IAS (information assurance and security) model?
communications, hardware, software
Requires that the componenets of the software all be defined from the onset and is considered to have more efficient code.
compiler
What is the difference between a compiled and interpreted computer language?
compiler translates an entire program into executable progam which can be run at a later time, while the interpreter does this incrementally.
checksum
computed from other data contained within an IP packet and stored as part of the IP packet. when it arrives at its destination, the checksum is recomputed and the two are compared
Internal and external hard drives are examples of?
computer hardware
A _________ is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
computer network
A __________ is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
computer network
The need to connect dumb terminals to the organization's main computer led to the rise of ____________.
computer networking
Application software
computer software created to allow the user to perform a specific job or task
What is the collection of computer hardware, software, user(s) and networks.
computer system
The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an example of
confidentiality
What are the 3 goals of IAS?
confidentiality, integrity and availability (CIA)
Certificate Authority
contains both the authentication proof and the encryption information needed to send secure information
Which component facilitates communication between the other two components in the MVC architecture model?
controller
excluse right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.
copyright
protects an original work, but no the ideas behind the work
copyright
Example of how Networks allow software to be shared between hardware
customer database on a central server, email program like Outlook
Pieces of the operating system that run in the background all of the time
daemons or services
in the dikw, what is data?
data is the input directly received by human or computer.
Information is stored here until it needs to be retrieved for a specific application.
data tier
The ___________ is an IT person whose job is to manage the database management system and database(s), and whose duties include software installation, security of data, creation of accounts to access the database, and configuring the database to be accessible over network.
database administrator
Which of the following servers can generate reports from client queries?
database server
permits database access across a network. Performs tasks such as data analysis, data manipulation, security, and archiving.
database server
Provide specific interfaces between the OS running a computer and hardware.
device drivers
a piece of the operating system that provides specific interfaces between the OS running a computer and hardware.
device drivers
consists of long term storage devices
disk drives
DNS
domain name service or domain name server. The DNS is a server that has a table that contains Host IP addresses and aliases. When provided with an Internet alias, the DNS looks the entry up in its own DNS table and returns the corresponding IP address.
Translates human readable aliases into IP addresses
domain name system (DNS)
DNS
domain name system - connects the domain name with the IP Host name: part of the URL that identifies the organizaiton and is reponsible for the info on the page TLD name: The domain name always ends with a period ('.') and a three- or two-letter extension, which signifies the type of organization or country associated with the page. example .com, .org, .edu, .us
software more specific towards artists and graphic designers
drawing software
A _________ interacts between as database and an application.
driver
Users submit messages to the server that are sent to a different server, the servers communicate with each other, recipient server communicates with recipient
e-mail server
ring network
each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.
star network
each device is connected to a central device, such as a hub or switch.
Today's operating systems
easier to use.
Type of transmission for coaxial and twisted pair
electric
coaxial and twisted pair
electric
user acceptance testing
employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user.
Creative Commons (CC) license
enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that he/she has created.
mesh network
every device is connected directly to every other device in the network.
hexadecimal numbering system
every value is represented with some combination of 16 digits (0-9 and A,B,C,D,E,F) - base 16.
A video card or wireless network card would be located in?
expansion slots
_______ may hold adapter cards, video cards, or wireless network cards.
expansion slots
transmit information using light pulses
fiber optic cable
Which of the following type of transmission is paired correctly with the given media?
fiber optic cable - light impulses
19943-5568 and 63.2% are _______ in a database.
field
A _____________ does the following: Responds to client (computer) requests over the LAN, supports application software, shares data files.
file server
a computer with a large hard disk storing files that any or many users of the network may wish to access.
file server
The ______ software contains a list of rules that describe the types of incoming messages that should either be permitted or blocked from a computer.
firewall
What generation used vacuum tubes in computers?
first generation
Which item is a storage device?
flash drive
What is a projection query
form of query that returns all of the records from the relation, but only select attributes or fields
An algorithm is a ______.
formula
software free from purchase, but not necessarily free in how you use it.
freeware
what types of software is ususally software that has become obsolete because a new software has replaced it, or is software that the original producer no longer wants to maintain and provide support for?
freeware
How long has Moore's law continued to be a trend?
from 1965 to the present
like a web server, this server host files and allows clients to access those files. However, it instead provides access in the form of uploading and downloading files.
ftp server
Your site's Internet point of presence is called a
gateway
There are also _______ who engage in both types of hacking activities.
grey-hat hackers
computer that has the least amount of performance
handheld
The ______ is used for long-term storage and is the component used to save data when the computer is turned off.
hard drive
The physical components of a computer
hardware
_____ is the physical devices that make up a computer system.
hardware
in dikw, what is wisdom?
having both knowledge and experience
Encryption
he idea of obfuscating the information that resides on a computer or is sent over a network so that if it is intercepted the hacker will be unable to use the information. Encryption uses a mathematical algorithm for converting the plain-text information to the encrypted form.
The ______ ensures that the CPU does not overheat and the fan keeps the heat sink cool so it does not overheat.
heat sink
Which motherboard component helps cool the cpu?
heat sink
Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.
high level language
BASIC and Ada are examples of ________?
high-level programming languages
Productivity software is sometimes referred to as _______ software because the software can be used across all divisions within an organization.
horizontal
What does http stand for?
hypertext transfer protocol
Includes all peripheral devices for input, output, storage and network.
i/o subsystem
a location beacon that uses bluetooth technology and can be embedded in any location aware mobile device.
iBeacons
resource ID
indicates the name of the file you are accessing, or the location of the document on the server. the part of the resource ID after the slash is the file name for hte page examples: .html - webpage .jpg - graphic file .pdf - portable document file
Characteristics of ______ include: more structure resulting from a process that has been applied, more relevant, more useful in decision making.
information
Once data has been processed, it becomes _______ ?
information
data that has been processed
information
The first step in a risk assessment is to identify the organization's ___________.
information assets
in dikw, what is information?
information is inferred from data, meaning that one or many processes have been applied to the data to tranform it into a more useful form.
The following are aspects of an __________? 1. A collection of data and information 2. The people who assist with the processing of data 3. The technology that facilitates the processing of data
information system
The following are examples of __________ ? 1. A company's directory 2. A company's customer database 3. A university's course catalog
information system
what are the phases of a project
initiation planning executing monitoring and controlling closing
What four operations does a computer perform?
input
what does ipos stand for?
input, process, output, storage
The ________ are used to connect peripheral devices such as a monitor, speakers, projector, etc.
input/output connections
Entering data into the system accurately is an example of
integrity
Relies on a session and allows you to test out an idea because they are executed as they're written.
interpreter
Your organization needs to maintain its own internal e-mail system, which approach would typically be used.
intranet
network switch
it records and recognizes the local network addresses (MACs) of all computers connected to the switch. Messages are passed to the computer that matches the destination address. Utilizes network bandwidth more efficiently
Examples of scripting languages
javascript ASP JSP PHP Perl Tcl Python
What type of query is used to withdraw information from multiple relations?
join
The core components of the operating system are referred to as the _____. It is loaded when the computer is first booted. Included are the components that handle process management, resource management, and memory management. Without these, you would not be able to start a new program or have that program run efficiently. It sits on top of the hardware and is the interface between hardware and software.
kernel
The core components of the operating system that handle process management, resource management, and memory management.
kernel
Which layer of the operating system will handle process management, resource management, and memory management?
kernel
loaded when the computer is first booted, included components that handle process mgmt, resource mgmt, and memory mgmt
kernel
LISP
language to support artificial intelligence research
which is a characterisc of high level languages?
language translator programs are required.
computer that has the mid amount of performance capability
laptop
Which low-level language corresponds one to one with assembly?
machine language
a programming language that is a lengthy list of 1s and 0s.
machine language
In which type of network topology is each networked device directly connected to every other networked device?
mesh
The _____ network topology includes a point-to-point connect between each device in the network.
mesh network
A single chip process developed in 1974 by IBM
microprocessor
Android, Chrom, and iOS are common operating systems for which type of computer?
mobile devices
Which peripheral device that was previously only an output device became both an input and output device with the advent of the tablet computer?
monitor
The _____ is a thin, flat piece of circuit board, usually green or gold, that directly or indirectly connects all other components and peripherals.
motherboard
Which other model is the M-V-C model similar to?
n-tier
a collection of computers and resources connected by various media so they can communicate with each other.
network
Matt was recently hired by Today's Technology Solutions as the _____________. During his second week on the job, Loise came to him because her computer was not connecting to the Internet. In addition, her colleague in the next cubicle was not able to get online either or to access the shared file server.
network administrator
The __________ is the person responsible for installation, configuration, maintenance, securing, and troubleshooting of the computer network.
network administrator
TCP/IP is a _________ that all computers must use to communicate over the Internet.
network protocol stack
Although ______ provide many benefits, they also create an opportunity for unauthorized communication between computers which can pose serious threats to information security.
networks
The following characteristics are examples of _______? 1. Creation of windowed operating systems. 2. Easier real-world object modeling in programming code. 3. The application of inheritance in program code.
object-oriented programming model
Is moore's law an observation or a physical law?
observation
Alpha testing
occurs where the system will be used. For example, software may be tested by a client or by a specific department within an organization. During alpha testing, system developers often assist end users as they interact with the new system. It is common for simulated data to be used to prevent any damage to a user's actual data.
Which of the following pairs of numbering systems use the least number of digits in machine code?
octal and hexidecimal
how do Bluetooth devices communicate?
on a short-range, ad hoc network called a piconet. When a piconet network is established, one device takes the role of the master while all the other devices act as slaves.
Buffer Overflow attack
one of the oldest and well known forms of software exploit; The buffer is a specific address in a computer's memory where a variable is stored. The buffer is of limited size. If the software does not ensure that insertions into the buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount so that the memory locations after the array are filled as well. Since memory stores both data and code, one could attempt to overflow a buffer with malicious code. Once stored in memory, the processor could potentially execute this code and thus perform the operations inserted by the attacker.
software created in the open source community and made freely available as source code
open source
An ________ issues commands through the GUI and command line prompt.
operating system
The computer sends the meal order to the kitchen as a ticket what operation is this?
output
Communication taking place between the same two computers may reach their destination using different pathways is an example of what?
packet-switched
Most computer networks, including the Internet, are _______.
packet-switched
Protects the creation of inventive concepts as well as the tangible work product. will prevent others from making, selling, or using the invention for 20 years from the application filing date.
patent
Each computer is roughly equal to every other computer
peer-to-peer
Computer hardware also includes?
peripheral devices
Can connect additional input, output, storage, and communication devices
ports
The _______ provides the electrical power needed to make the PC operate.
power supply
Which field must contain a unique value in order for a relational database table to function?
primary key
A _____________ does the following: Does not return files, monitors requests, replies when a request is complete.
print server
Which of the following servers monitors requests, but doesn't send files in return?
print server
An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?
printer
Converting the data into information (a meaningful form)
processing
The computer calculates the cost of the meal items ordered what operation is this?
processing
also referred to as horizontal software
productivity software
consists of applications that are usefule to everyone such as word processor, presentation software, spreadsheet program, database mgmt systems, calendar program, address book, and data organizer.
productivity software
commercial software purchased from a vendor
proprietary
Copyrights
protect an original work (in its tangible, expressed form), but not the ideas behind the work. The copyright holder has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years
Patents
protect the creation of inventive concepts as well as the tangible work product (not just the tangible work, as copyrights do)
device drivers
provide specific interfaces between the OS running a computer and hardware.
Which characteristic identifies application sotware that is cloud based?
provided by third party providers
Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.
proxy server
what type of server has the capability of blocking specific servers and rejecting responses that contain certain content?
proxy server
software that has been moved into the public domain and are made available as executables.
public domain
Security classifications can be public, sensitive, private, or confidential. Information that can be found online or in the phone book is_______.
public information
The End User License Agreements is a contract between the Licensor and the
purchaser
radio and cell towers
radio waves
The following examples are examples of __________. 1. Playing an online multiplayer video game. 2. paying your bills online.
real-time processing
The information across all categories on a single individual is called a ________ ?
record or tuple
Big data
refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use. Big data means more than simply storing enormous amounts of data in databases and data warehouses. We are already doing that. Big data means integrating these vast amounts of data, whether the data is generated internally or externally and finding ways to investigate the relationships that can be discerned from the data.
Site sharing
refers to having multiple data centers located in disparate regions. This approach is typically used by large organizations, which can shift critical functions to other sites when one site is impacted by a disaster.
examples of server software
refers to software that works with hardware to provide a network service print service, ftp server, web server, email server, db server, file server
Internet of Things (IoT)
refers to the countless kinds of devices that can and will be connected to the internet in the next few years
in dikw, what is knowledge?
refined information that hte user of the knowledge is able to call forth only relevant portions of information when needed.
If information is needed about a customer's purchase history, in order to better serve the customer's needs, it is ________ to collect data on prior business transactions with the specific customer.
relevant
characteristic of quality data whereas data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer based systems or a combination.
reliable
In a client-server network, software enables access to ________. This allows different parts of a business ecosystem to interact.
remote servers
Integrity
requires that data are correct 1. must ensure accuracy of collected data 2. must be entered into system accurately 3. data modification must be tracked
Confidentiality
requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users. - who the authorized users of the data are, data storage, and privacy.
Availibility
requires that information is available when needed
Data tier
resides on the organizations server and usually on a separate database server. it is where data are stored retrieved and updated from database tables info is stored here until it needs to be retrieved
User can Manipulate system files?
role of an administrator account
Which of the following communication system hardware devices is commonly used as a wireless access point?
router Routers can be used as a wireless access point.
What skills are needed to assist with application design and development?
schema development and performance tuning
types of risk analysis
scope creep unnecessary requirements cutting corners overly optimistic time frame improper skill sets user resistance
perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?
scripting languages
What generation of computers began to use transistors?
second
The Volleyball Academy of Central Florida has grown into a very large organization that has over 1,000 members. They are moving more and more of their processes to online - from handling event registrations to purchasing clothing and sports equipment. Shanteal is the ____________ and has been diligent in ensuring the online portal is securing quality data. She also has made sure the organization's firewalls are up to date and able to withstand new threats.
security administrator
buffer overflow
security concern addressed during the analysis stage of SDLC The buffer is of limited size. If the software does not ensure that insertions into the buffer are limited to its size, then it is possible to insert into the buffer a sufficient amount so that the memory locations after the array are filled as well. Since memory stores both data and code, one could attempt to overflow a buffer with malicious code.
The role of the _______ is to take requests from the client and send back the requested information.
server
Windows Server 8 is an operating system for type of device?
server
dedicated computers within a network whose function is to respond to network requests and provide a network service
server
the programs and other operating information used by the computer
software
In the ________, all devices have a single point-to-point connection with a central server.
star network
Which of the following types of networks has each device in the network connected in a single point-to-point connection with a central HUB?
star network
IAS combines a number of practices that define an organization's information assets, the vulnerabilities of those assets, the threats that can damage those assets, and the policies to protect the assets. The result of this analysis, known as?
strategic risk analysis
What replaced the GOTO statement with high level control constructs such as while loops, and if-else statements, and is not allowed to use the GOTO statement?
structured programming
Is commonly used to connect multiple computers together in such a way that messages are relayed to computers with the corresponding IP address.
switch
Maintaining the operating system of computers and other devices. These tasks are commonly performed by a _________________.
system administrator
The ________________ is the person in charge of administering a computer system or a collection of computer systems.
system administrator
The _____ controls the speed at which instructions are processed. Processing speed is listed in terms of megahertz (MHz), (millions of processes per second) or gigahertz (GHz) (billions of processes per second), although today's PCs have processing speeds in GHz only.
system clock
The _____ contains various components that enable the PC system to run programs and complete other important functions.
system unit
programs that allow the user to monitor and improve system performance
system utilities
what type of computer still uses silicon chips?
tablet
A collection of protocols that is sometimes referred to as a protocol stack
tcp/ip
Type of circuit switched network
telephone network
Beta testing
tests are performed by the end user without any assistance from the system developers. Beta testing uses actual (i.e., live) data in the real working environment.
The need for professionals and businesses to have a better way to communicate over a distance led to IT professionals first developing
the Internet.
Project management
the application of knowledge, skills, tools, and techniques to project activities to meet the project requirements.
The circuitry and electrical channels that enable communication among the electronic components.
the bus
what is the routers role in the internet?
the device that permists packet switching so that a message can be routed to the next link in the network on the fly. the router receives a message, examines its destination IP address and sends the message on to the next location in the ntwork, usually another router. At the destination network the router routes the messages until they reach a LAN and the LANs router or switch sends the message to that one destination machine
Type of packet switched network
the internet
The myriad of types of devices that can and will be connected to the internet in the next few years.
the internet of things (IoT)
When a programmer enters a command, what converts that command to machine language and executes it?
the interpreter
sits on top of the hardware and is the interface between hardware and software
the kernel
What is machine language?
the most basic set of instructions that a computer can execute directly.
the printed circuit board that houses the cpu, memory chips, and expansion cards in any computer.
the motherboard
Phishing
the process of targeting a specific individual, usually via email, under the guise of a reputable or trustworthy entity to reveal private or personal details such as usernames or password
an interface for the user that provides access to the kernel
the shell
What is bandwidth
the transfer rate permissible over the media, described as some number of bits per second
What generation of computers introduced operating systems?
third
what generation of computers introduced the silicon chip?
third
characteristic of quality data whereas data must be complete and not contain errors or lapses of data.
thorough
characateristic of quality data where data is provided efficiently and on time so that companies can utilize it in their business.
timely
hat is the role of a web server
to respond to HTTP requests
The use of IT has allowed businesses to have __________.
tools for communicating
part of the domain name of a Web page's URL.
top-level domain (TLD)
An operating system will issue commands using the command line prompt by?
typing in commands
the ability to have computation anywhere at any time
ubiquitous computing
In order for a database to work, at least one of the fields has to contain unique values. What is the name of this field?
unique identifier or primary key.
cloud computing
use of web services to perform functions that were traditionally performed with software on an individual computer; i.e. Flickr, Google Docs, etc.
The ________ requirement involves new software that will allow for easy access to account information.
user
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
user acceptance
The people who use the computer system
users
Symmetric key encryption
uses the same key for performing the encryption and decryption
Public-key encryption aka asymmetric encyption
uses two keys, a public and private key.
Social Engineering
using deception to obtain unauthorized access to information resources
Programs that allow the user to monitor and improve system performance.
utility programs
A _________ is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. This also provides for improved collaboration because platforms and software are not a limitation.
virtual machine (VM)
A ______ is software that attaches itself to another legitimate (or seemingly legitimate) software application.
virus
A _____________ does the following: Runs server side scripts, logs requests and errors, handles security.
web server
Store data files and programs, respond to client (computer) requests from anywhere, running server side scripts
web server
Which of the following servers responds to HTTP requests on the Internet?
web server
Jose's organization has recently hired 50 new interns to fulfill positions in a variety of departments. He installed online training software for the new hires and configured the software to be used and will be maintaining the software. His boss also asked him to monitor the activities of the new interns by monitoring the log files that the company also uses for data mining. Jose's role in the IT department is most likely as a _________.
website administrator
data integrity
when data cannot be changed/manipulated while it resides on a host or travels across a network, or if it is changed, manipulated, then the change can be detected.