Intro to IT - practice test 2
A typical database application has how many layers?
2
Which of the following is the best definition of a computer network?
A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
What is a primary difference between a modern handheld computer and a modern desktop computer?
A desktop has more processing power.
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?
A desktop has more processing power.
As a part of effective IT governance, the IT plan should be consistent with the organization's what?
Business plan
What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as?
Database
Which answer most accurately describes the timeline of computer development?
First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.
Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
Flat file
What two types of software licenses are free?
Freeware and Open source
What does GUI stand for?
Graphical User Interface
What is a tree-like structure of records in a database referred to as?
Hierarchical database structure
Which factors should Mike NOT consider when choosing a file organization system?
Hierarchy
A monitor is a peripheral device for what system?
I/O
Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere.
IaaS (Infrastructure as a Service)
A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following?
Image Backups
The business case, feasibility study, and stakeholder input are 3 key elements of which project phase?
Initiation
What does the acronym IPOS stand for?
Input, process, output, storage
What is NOT part of data hygiene?
Lots of data
Which of these is NOT a category of risk in a project?
Risks in deployment
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?
Router
Thru this CLOUD computing function, businesses can access and use software through the Internet?
SaaS (Software as a Service)
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards?
Slots
Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system?
System
Which of the following statements best defines the ALU?
The ALU contains circuitry that performs operations on data such as addition and subtraction.
Which of the description of duties below would be for a System Administrator?
This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
What is the purpose of a business continuity plan?
To enable an organization to continue offering critical services in the event of disruptions
A service portfolio is simply a list of the services the IT department offers.
True
A service portfolio is simply a list of the services the department offers? True
True
IT functions cover these five different domains: - communication - data collection and management - information security management - consumer relationship management - process improvement
True
In the SDLC implementation phase, then design goes to the programmers who translate it into code to execute the plan.
True
In the design phase of the SDLC, architects think about the components they would need to solve the problem or implement the plan.
True
Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files.
True
he abbreviation "URL" indicates:
Uniform Resource Locator
Which data format is not in an easily usable format and takes greater effort to extract?
Unstructured
What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system?
Utility Software
Which type of systems testing includes having developers test internal structures of software?
White-box
Which of the following type of transmission is paired correctly with the given media?
fiber optic cable - light impulses
A petabytes consists of how many terabytes?
1,000
Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?
Data
Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast.
False
SQL (Structured Query Language), a query for databases, was invented by?
IBM
Which is NOT part of the history of the computer?
Abracadabra
Which statement describes the role of a systems administrator?
Systems administrators are responsible for the installation and maintenance of the resources of an organization's network.
Which of the following describes the knowledge stage in the DIKW model?
A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.
During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system?
Analysis
A ________ translates source code into machine language and translates the entire program, creating an executable program which can be run at a later time.
Compiler
Which statement is not true of compilers and interpreters?
Compilers do not translate source code into machine code.
Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law.
Computer Fraud and Abuse Act
________ is defined as a code of moral conduct or a set of principles that govern behavior?
Ethics
_____________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements.
Agile methods
Which department supports day-to-day technology needs of an organization?
IT
Read the following scenario and determine the best hardware or software solution for the situation. Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.
Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.
Project managers work with project scope, the management plan, and SMART frameworks in this project phase?
Planning
Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk?
Public
The name, address, and telephone number of each individual patient in Dr. Alan's office is known as a:
Record
What is one probable advantage of outsourcing?
Reliance can be placed on the expertise of outsourcing vendors.
Which one of these is NOT a operation for database queries?
Serve
A Web page's URL (Uniform Resource Locator) has three main parts:
The protocol, the domain name, and the resource or file name.
There are how many tiers of ISPs?
Three
Which is not a common operating system used today?
Top Hat
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off?
True
The four computers based on size and processing speed are supercomputers, workstation, mainframe, and microcomputer.
True
The selection operation takes rows from one table and creates a new table?
True
While hardware is ______, software is ______
tangible - intangible
Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier?
Relational Database
______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use?
Big Data
Read the following scenario, and then select the job title that most accurately depicts the descriptions. Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively.
Database administrator
Which of the following technologies was introduced in the fourth generation of computers?
Microprocessors
Which of the following statements describes why network protocols are necessary.
Network protocols are necessary for computers to communicate with each other.