D075 Test Answers

Ace your homework & exams now with Quizwiz!

A discussion board facilitates communication between geographically dispersed group members. What is the correct term to describe an initial post and its subsequent comments? A thread A stream Linked posts Linked comments

A thread

What is the major function of a computer operating system? Data management Application program management Network management Computer resource management

Computer resource management

Bullzai Meat Company has freezer warehouses across the southern United States to hold meat until it is purchased by restaurants and schools. Bullzai needs to monitor the atmosphere and temperature quality of each of its freezers but cannot afford to have personnel perform this on a continual basis. Which technology implementation will allow the company to accomplish this goal? RFID Wi-Fi Mobile app IoT

IoT can monitor and send information via the internet.

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer? Interfacing with the IT users and setting end-user policies Ensuring that the IT infrastructure is up to date Managing the IT group and designing the IT architecture Keeping the IT development projects on schedule

Managing the IT group and designing the IT architecture

Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees? Human resource management system Customer relationship management system Knowledge management system Project management system

Knowledge management system

FERPA—Family Educational Rights and Privacy Act

FERPA—Family Educational Rights and Privacy Act: A federal law that protects the rights of students' educational records. Information about grades, attendance, disciplinary records, report cards, transcripts, and so forth cannot be given to anyone not specifically listed on a FERPA form that is signed when a student enters a school.

Which category of software includes programs such as word processors and PDF document readers? Utility software Application software Project software System software

Application software

Which advantage does a business gain by using cloud web hosting (CWH) rather than local hosting? Managing seasonal access Speed of access Customer access Cost savings

Cost savings. CWH is implemented quickly and is easy to maintain without hiring IT specialists.

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files? Cloud database system Knowledge management system File-sharing system Project management system

File-sharing system

In which network topology is each client computer connected directly to the hub? Ring Star Bus P2P

In star topology has computers that are connected to a central hub.

Which file format is suitable to use when sharing a legal contract that requires a digital signature? DOCX PDF HTML XML

PDF

What is the purpose of the primary key in a database? It is the primary encryption key for a secure database. It uniquely identifies the tables in a database. It uniquely identifies the records in a specific table. It is the record number of each record in a table.

It uniquely identifies the records in a specific table.

A company produces a mobile app that provides recipes and cooking tutorials. Which category of app is this? Social networking Entertainment Lifestyle Utility

Lifestyle

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? The exterior light The camera The door lock The interior light

The door lock

Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed. Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week? An intranet at the manufacturer that Endothon can access An extranet that provides Endothon access to data from the manufacturer An extranet that provides the manufacturer access to data at Endothon An intranet at Endothon that the manufacturer can access

An extranet that provides the manufacturer access to data at Endothon

Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose? A database A spreadsheet A customer relationship management (CRM) system A knowledge management system (KMS)

A database

A business organization can increase collaboration if it has a database of its internal reports, articles, documents, policies, and decisions. Which tool helps manage this type of information? A data warehouse A knowledge management system A business information system A collaborative database

A knowledge management system

The IT department of a company has been asked to provide systems for financial and investment management. Which business department has the greatest need for this type of system? Marketing Sales Operations Accounting

Accounting

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area. Which type of protection should this company seek to protect the computer code for its program from being copied by others? Copyright Brand Trademark Registration

Copyright

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author. Which type of law prohibits this kind of unethical behavior? Patent Trade secret Copyright Trademark

Copyright

Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? Cut and paste Object embedding Object linking File transfer

Cut and paste

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data. What is the term that describes this effort? Data governance Schema design Database management Master data management

Data governance

What is the distinguishing feature that differentiates data from information? Data that have been recorded in a computer become information. Data that have been structured become information. Data that have been given context become information. Data that have been verified for correctness become information.

Data that have been given context become information.

What is the term used to refer to end-user computers on a network? Clients Routers Servers Nodes

Clients are computers that are requesting information from the network, such as accessing web pages.

A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company? Cloud database Distributed database Managed database Relational database

Cloud database

What is the defining characteristic of function-specific software? It is tailored to a specific group or industry. It works only on specific devices. It is graphical in nature. It is designed for use by upper management.

Function-specific software is designed for a very specific purpose.

What is the name of the law that states a doctor cannot share a patients results/records?

Health Insurance Portability and Accountability Act: A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPAA form is signed each time you visit a new doctor so they can understand who they can share that information with.

What is the purpose of a dashboard in business intelligence (BI) software? It is a visual presentation of graphs, charts, and diagrams. It is a graphical display of raw data to assist in data consolidation. It is a user tool for inputting queries into the software. It is a graphical user interface for controlling the execution of the software.

It is a visual presentation of graphs, charts, and diagrams.

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? Transmission Control Protocol (TCP) Hypertext transfer protocol (HTTP) User Datagram Protocol (UDP) Internet Protocol version 6 (IPv6)

Internet Protocol version 6 (IPv6)

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? Freedom of Information Act Santini-Burton Act Sarbanes-Oxley Act Fair Labor Standards Act

Sarbanes-Oxley Act

Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser? Landing page strategy Search engine marketing Content marketing Search engine optimization

Search engine marketing

Each computer attached to the internet or a corporate network is uniquely identified so that it can be sent the information directed to it. What is this unique identifier known as? Network Interface Controller (NIC) Network Operating System (NOS) Transmission Control Protocol / Internet Protocol (TCP/IP) Media Access Control address (MAC)

Media Access Control address (MAC). This MAC address is unique to every computer on the network.

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software? Network administrator Network architect Network engineer Network development

Network administrator

Which type of device is an ethernet card? Network server hardware Network firewall hardware Network operating system (NOS) Network interface controller (NIC)

Network interface controller (NIC)

Which function of a customer relationship management system helps a company identify opportunities to increase its business? Process Data collection (X result of using a CRM. It may be used to increase business by employing business intelligence or analytics, but the data collection itself does not increase business) Technology Strategy

Strategy. A CRM's strategy function helps a company understand customers' concerns and desires and respond in ways that encourage more and better customer activity.

What is the standard programming language that is used to extract and update data in most relational databases? Structured Query Language (SQL) JavaScript Python Hypertext markup language (HTML)

Structured Query Language (SQL)

Where does IoT data collection begin? The edge The internet The cloud The database

The edge

IoT devices observe and gather data but have limited intelligence for analysis. With respect to the design of an IoT network, where are the IoT devices located? The data center The cloud (software and services that run on the internet) The network hub The edge

The edge is outside the data center and is connected to the internet.

What is the purpose of a network switch? To manage access to the network operating system. Incorrect. This is the job of a Network Administrator. To direct data to the intended target location. To convert data to a universal data type. To categorize unstructured data on the network.

To direct data to the intended target location.. A network switch filters information to the correct part of a network.

What is the purpose of a foreign key in a database? It is a key that has invalid or decayed data. It is used to link multiple databases together. It is a key that connects to the wrong data. It is used to link two tables together.

It is used to link two tables together.

In today's environment, more and more companies are providing "smart" household items such as lights, doorbells, and refrigerators that can be controlled via applications on consumers' phones or tablets. What is the common term for this type of technology? Linked devices Distributed systems Internet of Things Cloud services

Internet of Things

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer? It provides a wired ethernet connection to the network. It serves as an internal transmission bus between components within the computer. It allows for universal data transmission to various types of wireless networks. It allows the computer to connect peripheral devices.

It allows the computer to connect peripheral devices.

What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing? Social media surveys provide customer feedback. Social media users often submit product reviews. User behavior is highly predictable in social media. User behavior can be tracked in social media.

User behavior can be tracked in social media.

Radio frequency identification (RFID)

radio frequency identification (RFID). RFIDs are essentially small tags used to label products for identification and have the product's information transmitted through radio waves.

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? An encryption key A digital signature A MAC address A password

A password

Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? A mesh topology A linear bus topology A ring topology A star topology

A star topology. These are the most common.

What is the most important qualification that a Chief Information Officer (CIO) must possess? Business and leadership experience Programming and network design skill IT project management proficiency Information technology knowledge

Business and leadership experience. CIOs sometimes make tactical business decisions, but their expertise and focus is typically their strategic decision and project management skills.

What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing? By providing companies with the opportunity to easily solicit customer feedback and interaction By allowing companies to track which sales can be connected directly to a specific advertisement By providing companies with transparent pricing on all advertising offerings By allowing companies to utilize user-generated content as an advertising tool

By allowing companies to track which sales can be connected directly to a specific advertisement

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? Chief cybersecurity officer Chief operating officer Chief technology officer Chief information security officer

Chief information security officer

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer legal copyright on these marketing images? Registering the images with a copyright office Creating the marketing images Declaring the images to be copyrighted Publishing the marketing images

Creating the marketing images

A company is planning several IT projects including a major software development project. The software development project will be organized using the software development life cycle (SDLC) methodology. Which IT professional should be called upon to create a detailed project plan for this effort? IT Manager Computer Systems Analyst Chief Technology Officer IT Architect

IT managers are in charge of software application development teams that develop, design, program, and test software applications.

How have online web development tools benefitted small businesses? Simplified programming education for business owners Increased user control of the organization's website Simplified HTML coding on business websites Increased search engine rankings for small businesses

Increased user control of the organization's website

William has a fleet of 60 trucks that deliver products within 100 miles of his distribution center. He would like to know where his trucks are at all times. How can he efficiently manage this? Use radio signals to track location Use cell phone tower geolocation Install RFID tags in his vehicles Install GPS tracking on his trucks

Install GPS tracking on his trucks

Oliver would like to integrate Internet of Things (IoT) technologies into his small bike manufacturing business. He has contracted with several different IoT system vendors to automate different aspects of the production process. What is the main potential flaw in Oliver's automation strategy? IoT provides little benefit for manufacturing firms. IoT systems require significant factory floor space. IoT systems may be incompatible with each other. IoT is generally incompatible with robotic systems.

IoT systems may be incompatible with each other.

How does a Gantt chart facilitate project management? It graphically shows the organization of a project team. It helps calculate the projected and actual costs of a project. It identifies and sequences the tasks of a project. It maps the flow of communication and decisions for a project

It identifies and sequences the tasks of a project.

What is the term used to refer to a massive, room-sized computer that processes and stores enormous amounts of bulk data and information? Processor Database Hub Mainframes

Mainframes are designed to handle massive amounts of transactions and data.

What is the final step in the deployment and use of an app? Market the app using focused marketing to reach the desired audience Track the technical performance and user reviews of the app Maintain and upgrade the app based on use and user feedback Launch the app in the app stores for all applicable platforms

Maintain and upgrade the app based on use and user feedback

Which function or feature has allowed mobile phones to replace PCs for many small-business functions? Wi-Fi GPS Cloud-based data storage Mobile apps

Mobile apps. Mobile apps replicate many programs previously only offered on PCs.

Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies? Chief Technology Officer (CTO) Network Analyst Chief Information Officer (CIO) Network Administrator

Network Administrator. The network administrator has the authority to develop and implement network policies.

What is the main financial benefit of using cloud web services? Reduce the number of IT staff Pay for software and hardware separately Pay for specific services as needed Reduce the number of IT products used

Pay for specific services as needed

A hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner. Which technology did the hospital implement to perform this service? Bluetooth HTTP **RFID XX Internet of Things (Each product is not connected to the internet as would be required by IoT devices. Rather, a scanner is required to read the product information contained in the tags.)

RFID transmits product identification over radio waves for inventory.

What is the approach that a business would use to facilitate communication when the business has employees that are in different locations and telecommute for work? Face-to-face communication Offline communication Peer-to-peer communication Real-time communication

Real-time communication

Which core business department is primarily responsible for business intelligence? Sales and marketing Research and development Production Human resources

Research and development. R&D gathers information on competitors and creation and sales of their own products.

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost. What is this metric called? Profitability ratio Profit and loss Cost benefit analysis Return on investment

Return on investment

What is the term used to describe technologies that enable, facilitate, and enhance people's ability to share digital content? Social media (sharing) Social networking (making connections to people digitally) Mobile apps Mobile technology

Social media allows for sharing independent of time or location.

Which level of management gets the most detailed reports directly from the transaction processing system? Managers Laborers Supervisors Executive

Supervisors

IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit? Supply chain Operations Marketing Manufacturing

Supply chain

What makes IT unique compared to other departments in businesses? The IT department is funded through the budgets of the other departments. The IT department provides services and support to the other departments. The IT department is given monitoring authority over other departments. The IT department reports directly to the managers of other departments.

The IT department provides services and support to the other departments.

Which part of a computer executes the computations required by the software? The central processing unit The operating system The motherboard The random-access memory

The central processing unit

When using extract, transform, and load (ETL), what is done during the "transform" step? The data are normalized and structured. The data are given context and relevance. The database is queried for relevant data. The database schema is designed and created.

The data are normalized and structured.

What do all the applications in a productivity software suite have in common? The same data structure The same graphical user interface The same keyboard commands The same default file format

The same graphical user interface allows data to be easily exchanged across programs in the software suite.

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? The transaction processing system (TPS) The cloud web hosting (CWH) system The customer relationship management system (CRM) The business intelligence (BI) system

The transaction processing system (TPS)

What is the purpose of a MAC address? To uniquely identify an internet URL To uniquely identify a computer on a network To uniquely identify a computer motherboard To uniquely identify an email client

To uniquely identify a computer on a network

Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive. What are these very small files called? Tracking packages Tracking URLs Tracking data Tracking cookies

Tracking cookies

A company makes personal computers and sells them directly to the public. At present, all business processes are completed manually by employees, lengthening the time from customer order to shipment. Which business process would deliver the most immediate customer satisfaction and reduced costs if automated? Customer relationships Transaction processing Production Communications

Transaction processing. Using IT to replace manual transaction processing with automated processing would increase speed of delivery and immediately reduce costs.

Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem? Airplanes that use heat sensors and GPS to map fires Satellite mapping systems with real-time updates Wi-Fi headsets that facilitate real-time communication Wi-Fi-connected drones with GPS and camera

Wi-Fi-connected drones with GPS and camera


Related study sets

Chapter 47: Management of Patients with Intestinal and Rectal Disorders

View Set

Accounting 205 Chapter 11 Review

View Set

Isolating,Cloning and Sequencing DNA

View Set

Module 1: Marketing Fundamentals

View Set

CA Real Estate Practices Chapter 15

View Set