Introduction to IT

Ace your homework & exams now with Quizwiz!

Which two are parts of an information system? Choose 2 answers. -Oscilloscope -Customers -Networks -Databases

-Networks -Databases

An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Choose 2 answers. -Printer -Monitor -Scanner -Web camera

-Printer -Monitor

What are two necessary elements of business continuity planning? Choose 2 answers -Assessing key organizational activities. -Ensuring continuity in the sequence of staffing schedules. -Identifying risks that may occur. -Hiring an outside consultant to develop a plan

-Assessing key organizational activities -Identifying risks that may occur

Each computer is roughly equal to every other computer.

Peer-to-peer

A ____________ plan specifies how the business will keep providing products and services and generate revenue after an event. A. Disaster Recovery B. Business Continuity C. Disaster Reconciliation D. Business Reconciliation

Business Continuity

What is the minimum grade of network cable required to transmit 1 Gpbs? A. CAT3 B. CAT5e C. CAT2 D. CAT5

CAT5e

Giving rights to new users so they can access various databases is a very common task database administrators perform. Mei's medical office has outsourced IT support services. What is one probable advantage of outsourcing? A. Employee satisfaction may increase. B. Reliance can be placed on the expertise of outsourcing vendors. C. The organization can transfer its accountability in terms of privacy laws. D. More control can be exercised over IT processing.

Reliance can be placed on the expertise of outsourcing vendors.

Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Implementation D. Requirements analysis

Requirements analysis

Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern? A. Resource risk B. Contract risk C. Resistance to change D. Project dependencies

Resistance to change

Which statement is not true of compilers and interpreters? A. All errors must be debugged before a compiler can compile the source code. B. Compilers do not translate source code into machine code. C. Interpreters translate and execute one line of source code at a time. D. Perl and Python are examples of programming languages that use an interpreter.

Compilers do not translate source code into machine code.

What is a cloud model that delivers third-party software such as email or games through the internet? A. Iaas B. SaaS C. RFID D. PaaS

SaaS

Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern? A. Budget risk B. Scope creep C. Resistance to change D. Project dependencies

Scope creep

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive? A. Handheld B. Laptop C. Desktop D. Mainframe

Desktop

Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query? A. WHERE B. FROM C. HERE D. SELECT

FROM

Which item is a storage device? A. Scanner B. Printer C. Flash Drive D. Monitor

Flash Drive

Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Implementation D. Requirements analysis

Implementation

Which IT position has the responsibility of working with routers and switches? A. Network administrator B. Systems administrator C. Database administrator D. Website administrator

Network administrator

Which statement describes the role of a network administrator? A. Network administrators are responsible for maintaining websites. B. Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network. C. Network administrators are accountable for the installation and maintenance of the resources on a network. D. Network administrators have a long list of essential responsibilities but mostly focus on the design, development, and support of database management systems.

Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.

Reflect for a moment about ethics, then respond to the following question. As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct? -It provides a legal mechanism for prosecuting unethical people. -It outlines what is not acceptable use of computers. -It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people. -It can be used by companies to train professionals how to act.

It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people.

Facts gathered from observations or from a clock that measures time are examples of data. What is not an example of data? A. On/off B. It is cold outside C. 9:30 a.m. D. 18:30

It is cold outside

What is the definition of information technology (IT)? A. It is a system of dependent parts working separately to accomplish information goals. B. It is a system indirectly used to support and improve particular aspects of a department. C. It is the technology used to create data, configure servers, and construct buildings. D. It is the technology used to create, maintain, and make information accessible.

It is the technology used to create, maintain, and make information accessible.

How does a compiler work? A. It relies on a session to complete its task. B. It allows a programmer to easily test out changes to code. C. It takes the most recent instructions and translates them into machine language. D. It interprets instructions into pseudo code.

It takes the most recent instructions and translates them into machine language.

Which language is often used for rapid prototyping and the creation of GUIs? A. TCL B. C++ C. COBOL D. Python

TCL

What is the primary duty of a computer support specialist? A. The computer support specialist is mainly responsible for allowing an organization to take full control of its data. B. The computer support specialist provides mostly technical expertise by developing and implementing IT systems for external clients. C. The computer support specialist primarily operates as a trainer and troubleshooter. D. The computer support specialist primarily identifies and helps clients adopt IT services or technologies.

The computer support specialist primarily operates as a trainer and troubleshooter.

What is the role of drivers in facilitating communication between applications and databases? A. What is the role of drivers in facilitating communication between applications and databases? B. They allow all the data to be communicated via the network. C. They allow ODBC to be used for interactions with the database and applications. D. They allow SQL to manage communications between applications and databases.

They allow the application to interact with the database.

Most of the data stored today are unstructured and include things such as text, blogs, clickstreams, tweets, and audio. This data is not organized in a way that allows for analysis. True or False

True

Which role is responsible for maintaining websites? A. Data analyst B. Network engineer C. Cloud architect D. Web administrator

Web administrator

IP addresses are traditionally written in _____________ notation. A. encrypted B. binary C. mnemonic D. dotted decimal

dotted decimal

Which functions would Mei be completing in her network administrator role? Choose 2 answers. -Connecting two or more computers together so they can communicate -Training employees to use the billing applications -Managing the telephone system network -Giving new users access to various databases

-Connecting two or more computers together so they can communicate -Managing the telephone system network

Which two components are parts of a central processing unit (CPU)? Choose 2 answers. -Control unit (CU) -Read only memory (ROM) -Arithmetic logic unit (ALU) -Random access memory (RAM)

-Control unit (CU) -Arithmetic logic unit (ALU)

Which two computer peripherals are connected to the computer through a port? Choose two answers. -DVD -PC Card -External Microphone -Camera Card -USB Flash Drive

-External Microphone -USB Flash Drive

Which of the following would be a disadvantage of an ethical code of conduct? Choose 3 answers. -It has no legal impact. -It is entirely voluntary. -It is legally binding. -It may not apply to new issues.

-It has no legal impact. -It is entirely voluntary. -It may not apply to new issues.

The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? Choose 2 answers. -Mei can disclose information about A.J. only with a warrant. -Mei should only follow HIPAA guidelines and disclose information about A.J. to law enforcement. -Mei should follow the protocol advised by the medical council of her state. -Mei should follow both HIPAA and state privacy protocols.

-Mei should follow the protocol advised by the medical council of her state. -Mei should follow both HIPAA and state privacy protocols.

Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user? A. A handheld is more usable. B. A desktop has more processing power. C. A handheld has more processing power. D. A desktop is more usable.

A desktop has more processing power.

Which action by application programs requires support from a networked operating system? A. A word processor program edits texts within a file. B. An Internet browser displays a web page. C. A photo editing software enhances a picture. D. A payroll program computes federal tax of an employee.

An Internet browser displays a web page.

Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario? A. Integrity B. Availability C. Confidentiality D. None of the above

Availability

The level of assurance that data will be available to people who need it, when they need it, is referred to as _____________. A. Integrity B. Availability C. Confidentiality

Availability

Which goal of Information Assurance (IA) requires that information is accessible when needed? A. Confidentiality B. Availability C. Integrity D. Stability

Availability

What type of information processing allows input data to be accepted as a set of records and processed as a unit? A. Real-time B. Event-driven C. Batch D. Just in time

Batch

Which part of the CIA triad addresses rules that restrict access to only those who need to know? A. Integrity B. Availability C. Confidentiality

Confidentiality

What step should be taken by a business when a third-party solution is found that will benefit a project? A. Contact the group to arrange a demo of their product B. Build the software with in-house resources C. Suggest that the company continues to explore options D. Begin coding the solution with estimated parameters

Contact the group to arrange a demo of their product

Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern? A. Scope creep B. Resource risk C. Contract risk D. Project dependencies

Contract risk

Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers? A. Costs for hardware resources are decreased B. Security of information is increased. C. Data integrity is increased D. Internet usage by employees for non-business tasks is decreased

Costs for hardware resources are decreased

Which risk assessment question is part of the Initiation Phase? A. Could the end users reject the outcome of the project? B. Was the project completed within budget? C. What were the strengths of the project? D. Did the scope change after the induction of the project?

Could the end users reject the outcome of the project?

A website logs a timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario? A. Data B. Information C. Knowledge D. Wisdom

Data

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information? A. Structured query language (SQL) B. Database information processing C. Data and business intelligence

Data and business intelligence

What is the purpose of an End User License Agreement for a commercial software package? A. Establishes the customer's right to use the software B. Establishes the customer's right to resell the software C. Establishes the customer's right to modify the source code D. Establishes the customer's right to purchase without paying user fees

Establishes the customer's right to use the software

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion? A. Supporting the continuation of the current infrastructure B. Scheduling their own internal meetings to discuss department goals C. Expanding the infrastructure to support additional locations D. Working independently from business management to achieve company goals

Expanding the infrastructure to support additional locations

What is another term for a formula that outlines how to execute a task? A. Process B. User-defined function C. Algorithm D. Pseudocode

Algorithm

The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? Select all that apply. -Mei should use the same selection criteria for all candidates. -Mei should not discuss the job with Mary. -Mei should ask a colleague to interview Mary's daughter. -Mei should ask a colleague to sit in on the interview with Mary's daughter.

All of the above

What are examples of structured data? A. Telephone number B. Date of birth or transaction C. First and last name D. All of the above

All of the above

Why is merging unstructured and structured data essential? A. Both types of data contain essential information. B. Most of the data stored today is unstructured. C. Better insights and discovery of hidden connections in data sets help strengthen decision-making. D. All of the above

All of the above

What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore'; A. All records from the Patient table where the patient's last name is not "Moore" B. All records from the SQL table C. All records from the Patient table where the patient's last name is "Moore" D. All records from the Patient table

All records from the Patient table where the patient's last name is "Moore"

Which system requirement is an example of considering user needs in the design of an information system? A. Including an eye-tracking device for an input device B. Allowing secure access to customer account information C. Ensuring that insertions into the buffer are limited in size D. Incorporating a program that can translate text into spoken words

Allowing secure access to customer account information

Which statement correctly describes the operating system? A. Consists of programs that end users run to accomplish some tasks and is sometimes referred to as horizontal software B. Works with hardware to provide a network service that can be distributed across several machines on the network C. Requires the user to have specialized training concerning specific commands that must be entered with proper syntax D. Allows the user to control the actions of the software, and through the software, to access hardware

Allows the user to control the actions of the software, and through the software, to access hardware

Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario? A. Integrity B. Availability C. Confidentiality D. None of the above

Integrity

Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10. Which part of the CIA triad has been broken in this scenario? A. Integrity B. Availability C. Confidentiality D. None of the above

Integrity

What is one of IT's roles in globalisation? A. It provides support for JIT manufacturing. B. It allows companies to achieve ISO 9001:2008 certification. C. It provides tax havens for companies. D. It allows companies to reach a wider customer base.

It allows companies to reach a wider customer base.

What is the purpose of an IT department? A. It helps the organization achieve strategic goals. B. It promotes the firm's products. C. It hires employees for the organization. D. It oversees funds flowing through the organization.

It helps the organization achieve strategic goals.

What effect does scope creep have on a project? A. It provides additional control to the project. B. It increases unplanned costs for the project. C. It includes unqualified team members on the project. D. It adds non-essential features to the project.

It increases unplanned costs for the project.

Which network topology best handles downed links without losing connectivity between devices? A. Bus B. Ring C. Mesh D. Star

Mesh

What is the difference between proprietary and open-source software license? A. Proprietary software has a cost whereas open-source software is free. B. Open-source software lacks technical support whereas proprietary software provides this assistance. C. Open-source software can be freely modified whereas proprietary software cannot be modified. D. Proprietary software can be copyrighted by the business that uses it whereas open-source software cannot be copyrighted.

Open-source software can be freely modified whereas proprietary software cannot be modified.

Writes laws dealing with information technology. Outside of IT or Part of IT

Outside of the role of an IT professional association

Engages in best practices for information systems. Outside of IT or Part of IT

Part of the role of an IT professional association

Provides professional standards for ethical behavior. Outside of IT or Part of IT

Part of the role of an IT professional association

What is the role of the CPU in a computing system? A. Permanently storing all data and programs on the computer B. Performing instructions of computer programs C. Distributing signals between all the parts in the computer D. Temporarily storing activities before transferring them to the hard disk

Performing instructions of computer programs

What is the difference between processing and storage? A. Information is received by processing, while data is received by storage. B. Processing handles data and information, while storage is restricted to handling data. C. Processing collects and translates data into useful information, while storage places the translated data in specific locations. D. Users are responsible for processing, while computers are responsible for storage

Processing collects and translates data into useful information, while storage places the translated data in specific locations.

Which characteristic identifies application software that is cloud-based? A. Hosted on an individual computer B. Hosted in the internal business network C. Provided by servers in the internal business network D. Provided by servers in the internal business network

Provided by servers in the internal business network

The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need? A. Web server B. Proxy server C. Database server D. File server

Proxy server

Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? A. Protocol B. IP address C. Domain name D. Resource path ID

Resource path ID

Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern? A. Scope creep B. Project dependencies C. Contract risk D. Resource risk

Resource risk

Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen? A. Computer Matching and Primary Protection Act of 1988 B. Security Breach Notification laws C. The Electronic Communication Privacy Act of 1986 D. Digital Signature and Electronic Authorization laws

Security Breach Notification laws

What type of software permits free temporary use followed by long-term activation for a fee? A. Proprietary B. Public Domain C. Open Source D. Shareware

Shareware

Which is a type of two-factor authentication? A. Smart card B. Least privilege C. Packet sniffing D. Access right

Smart card

Which data type is used to represent product order code that comprises alphanumeric characters? A. String B. Fixed-point C. Floating-point D. Boolean

String

Which statement describes the role of a systems administrator? A. Systems administrators are responsible for monitoring an organization's network for security breaches. B. Systems administrators are responsible for the installation and maintenance of the resources of an organization's network. C. Systems administrators are responsible for designing and developing software that makes hardware and software systems work. D. Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

What indicates a specific Internet location? A. The IP address B. The interrupt vector C. The packet Identifier D. The Media Access Control (MAC)

The IP address

Which statement about the systems analyst role is accurate? A. The role includes choosing appropriate network hardware. B. The role includes securing an organization's network. C. The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements. D. The role includes planning the allocation of network addresses across an organization.

The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements.

Which is a characteristic of high-level languages? A. They are machine dependent. B. Code is more difficult to write than low-level language. C. The source code has to be complied. D. The instructions interact directly with registers and memory.

The source code has to be complied.

A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering? A. Timely B. Thorough C. Accurate D. Reliable

Timely

Why is it important to ensure that data support business goals? A. To provide opportunities for communication B. To ensure raw data is captured C. To establish needs of users D. To aid in making strategic decisions

To aid in making strategic decisions

What is the purpose of a business continuity plan? A. To develop plans for continued business operations regardless of the circumstances B. To identify who is responsible for permanent growth of the business in the event of natural disasters C. To assess risks for key processes in the event of man-made disasters D. To enable an organization to continue offering critical services in the event of disruptions

To enable an organization to continue offering critical services in the event of disruptions

What is a role of the systems administrator? A. To install and maintain the website B. To design networks C. To install and maintain network resources D. To develop and maintain the websites on the company web server

To install and maintain network resources

What is the database administrator's role in security? A. To eliminate data redundancy when integrating old with new systems B. To create a redundant server architecture C. To institute protocols to protect the databases from external threats D. To set ports on the router to secure the transport of data

To institute protocols to protect the databases from external threats

Which description explains the role of a domain name system (DNS)? A. Decodes packet addresses B. Transforms network nodes into URLs C. Renders host responses as sender directions D. Translates human-readable aliases into IP addresses

Translates human-readable aliases into IP addresses

Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs). True or False

True

Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information. True or False

True

Data includes raw facts or observations and, given context, becomes information. True or False

True

The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix. True or False

True

Which action would support confidentiality? A. Checking that data is correct B. Making sure data is available when needed C. Updating security software D. Ensuring that software is properly licensed

Updating security software

Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? A. Beta B. Alpha C. User Acceptance D. Analysis

User Acceptance

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

Virtual machines

Which of the following is not true of Windows and Linux? A. Linux is case-sensitive. B. Linux places the home directory within the /home/. C. Windows uses the forward slash (/) to express directory paths. D. Windows' root directory is referred to by a letter.

Windows uses the forward slash (/) to express directory paths

What is another title for a web administrator? Choose 2 answers. - Web developer - Cybersecurity specialist - Web server administrator - Webmaster

-Web server administrator -Webmaster

Which disaster recovery strategy is used to save information to multiple hard drives at the same time? A. Cold site storage B. Data mirroring C. Storing tape backups D. Site sharing

Data mirroring

Which term is defined as a collection of information used to support management of an organization? A. Information Technology B. Information Security C. Information System D. Information Archiving

Information System

Which task describes the role of a database administrator? A. Working with organizations to keep their information systems secure and ensuring integrity, confidentiality, and availability of data B. Creating, documenting, executing, and manually creating test plans and procedures relating to system anomalies C. Integrating data from legacy systems to newer systems and playing a role in application design and development D. Organizing people, time, and other resources to make sure projects meet requirements and are completed on time and within budget

Integrating data from legacy systems to newer systems and playing a role in application design and development

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person? A. Buffer overflow B. Black hat C. Packet sniffing D. Phishing

Phishing

Which type of systems conversion involves starting the conversion with a portion of end users? A. Pilot B. Direct C. Parallel D. Phased

Pilot

In what phase of a project does time estimation occur? A. Initiation B. Planning C. Executing and Controlling D. Closing

Planning

Which field must contain a unique value in order for a relational database table to function? A. Record number B. ID number C. Primary key D. Name

Primary key

Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern? A. Resource risk B. Resistance to change C. Project dependencies D. Scope creep

Project dependencies

Which type of systems testing includes having developers test internal structures of software? A. White-box B. Analysis C. User acceptance D. Beta

White-box

Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? Choose 3 answers. -Tom should resign from the software production company. -Tom and Mei should not discuss details of the contract outside official channels. -Mei should not disclose details of offers by any respondents to the RFP. -Both Tom and Mei should disclose the conflict of interest.

-Tom and Mei should not discuss details of the contract outside official channels. -Mei should not disclose details of offers by any respondents to the RFP. -Both Tom and Mei should disclose the conflict of interest.

Which two software application packages would be classified as productivity software? Choose two answers. -E-Mail -Word Processor -Spreadsheet Program -FTP Client

-Word Processor -Spreadsheet Program

Which of the following describes a computer support specialist's responsibilities? Choose 3 answers. - Working the help desk -Training help-desk personnel -Overseeing help-desk personnel -Using statistical and other quantitative methods to gain insights that support the organization's decision-making

-Working the help desk -Training help-desk personnel -Overseeing help-desk personnel

Unstructured data refers to data that is _____________. Choose 3 answers. -more complex -coded in a way that makes it easy to convert into a form usable for analysis -possibly stored in a format that is not easily decoded -more time-consuming to parse through to retrieve the essential information

-more complex -possibly stored in a format that is not easily decoded -more time-consuming to parse through to retrieve the essential information

In which generation were silicon chips first used in computers? A. 1st B. 2nd C. 3rd D. 4th

3rd Generation

What statement is true concerning compiled and interpreted computer language? A. Both compiled and interpreted languages are written in binary code. B. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. C. A compiled language program is portable and can be run on multiple types of systems, whereas an interpreted program runs on a single type of system. D. An interpreted language program runs faster than a compiled language program.

A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.

What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years? A. A patent B. A copyright C. A trademark D. A trade secret

A copyright

What is a primary difference between a modern handheld computer and a modern desktop computer? A. A desktop has more processing power. B. A handheld is more usable. C. A desktop is more usable. D. A handheld has more processing power.

A desktop has more processing power.

Which is true of databases and the applications that interact with them? A. The database can support at most one application. B. The database determines the application classes C. Applications store data in their own files. D. Applications are interdependent of the database.

Applications are interdependent of the database.

Which technique uses all possible combinations of letters and numbers to crack a password? A. Brute force B. Packet sniffing C. Dictionary attack D. Password generator

Brute force

Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern? A. Budget risk B. Resource risk C. Contract risk D. Scope creep

Budget risk

How can an organization assist employees with the ethical use of information technology? A. By developing policies for information usage B. By monitoring network throughput C. By ensuring databases are backed up D. By establishing optimal server performance

By developing policies for information usage

What does the acronym CIA stand for in cybersecurity? A. Central Intelligence Agency B. Confidentiality, integrity, and availability C. Confidentiality, intelligence, accessibility D. Cybersecurity, internet, accessibility

Central Intelligence Agency

Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? A. Numeric integer B. Floating point C. Boolean D. Character string

Character string

One computer will request information from another computer, which responds with requested information.

Client-server

Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages? A. Cloud database B. Data lake C. NoSQL databas D. Distributed database

Cloud database

Which type of transmission media can broadcast in baseband mode? A. Twisted pair cable B. Optical wire C. Wireless transmission D. Coax cable

Coax cable

Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe? A. Design B. Testing C. Implementation D. Requirements analysis

Design

A _____________ plan specifies how a business will resume after an event to continue its operations. A. Disaster Recovery B. Business Continuity C. Disaster Reconciliation D. Business Reconciliation

Disaster Recovery

What are the three main categories of databases? A. Relation, join, project B. Flat file, relational, hierarchal C. Spreadsheet, simple, complex D. Table, query, report

Flat file, relational, hierarchal

Which function would Mei be completing in her database administrator role? A. Managing the telephone system network B. Connecting two or more computers together so they can communicate C. Training employees to use the billing applications D. Giving new users access to various databases

Giving new users access to various databases

What is the tool used to encode a document while focusing on appearance known as? A. HTML B. HTTP C. DNS D. URL

HTML

Where are the basic functions of the operating system located? A. Applications B. Kernel C. Utility software D. File manager

Kernel

Which type of computer peripheral is used only as an input device? A. External hard drive B. Monitor C. Docking station D. Keyboard

Keyboard

Which type of computer peripheral is used only as an input device? A. Monitor B. External hard drive C. Keyboard D. Docking station

Keyboard

In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located? A. Data B. Information C. Knowledge D. Wisdom

Knowledge

Which type of network is used to interconnect devices in a single office or building? A. WAN B. PAN C. SAN D. LAN

LAN

Which low-level language corresponds one-to-one with assembly? A. Translator Language B. Machine Language C. Compiler Language D. Programming Language

Machine Language

When you visit the website for Mei's office, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers? A. Yes, as long as the patient regularly clears cookies from their machine. B. No, patient information could be leaked. C. No, they impede the user interaction with the website. D. Yes, the cookies allow a web application to respond to the user as an individual.

Yes, the cookies allow a web application to respond to the user as an individual.

As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's: A. business plan. B. business continuity plan. C. risk management plan. D. information security plan.

business plan.


Related study sets

Chapter 13: Drugs used for Sedation and Sleep- Pharmacology

View Set

Pharmacology - Exam 3 Questions - ATI & Karch

View Set

GS - MGT 303 CH 1 Professional Communication in a Digital, Social, Mobile World

View Set

Global Warming and Sea Level Rise

View Set