Introduction to IT full course

Ace your homework & exams now with Quizwiz!

Switch

A network switch extends the network by using packet switching to forward data to the intended hard-wired devices.

Scientific =Manage the process of doing scientific research

LabVIEW MATLAB

Entertainment =Entertain a specific audience

Spotify iTunes Netflix YouTube Sling

Collaboration software Online workplace =Provide an online environment for running cloud-based services and applications

Office Online Microsoft SharePoint Google Docs

What are two necessary elements of business continuity planning?Choose 2 answers

Assessing key organizational activities Identifying risks that may occur

Invalid data

Attributes not conforming to standardization

Which technique uses all possible combinations of letters and numbers to crack a password?

Brute force

Which characteristic identifies application software that is cloud-based?

Provided by third-party providers

Mei is concerned whether the selected vendor will complete the planned deliverables as agreed. Which of the following risks best describes Mei's concern?

Contract risk

Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?

Costs for hardware resources are decreased

Which risk assessment question is part of the Initiation Phase?

Could the end users reject the outcome of the project?

Phases of Project Management Initiation

Define the project Begin with a business case and feasibility study Develop project charter

Mei and her team draw the class diagrams for a new application. Which phase of the software development life cycle does this describe?

Design

Database software =Store and manage data, develop data-driven reports, and provide electronic filing

Microsoft Access Microsoft SQL Server MySQL

Email software =Send and receive email messages

Microsoft Outlook Gmail

In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?

Knowledge

Which statement describes the role of a systems administrator?

Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

Which language is often used for rapid prototyping and the creation of GUIs?

TCL

What is the primary duty of a computer support specialist?

The computer support specialist primarily operates as a trainer and troubleshooter.

Conflicting data

The same records with differing attributes

What is the purpose of a business continuity plan?

To enable an organization to continue offering critical services in the event of disruptions

What is a role of the systems administrator?

To install and maintain network resources

Internet

Toward the end of the twentieth century, the ability to connect individual computers in a world-wide system called the internet was revolutionizing communication. The British scientist Tim Bernes-Lee proposed a system by which documents stored on computers throughout the internet could be linked together producing a system of linked information called the World Wide Web. In order to make web pages more accessible to users, search engines (i.e. Bing and Google) and browsers (i.e. Edge and Chrome) were developed. Search engines use technologies to index and tag pages so users can quickly search for resources based on keywords.

Which description explains the role of a domain name system (DNS)?

Translates human-readable aliases into IP addresses

True or False Most of the data stored today are unstructured and include things such as text, blogs, clickstreams, tweets, and audio. This data is not organized in a way that allows for analysis.

True

Duplicate data

Two or more identical records

Which action would support confidentiality?

Updating security software

Which type of systems conversion involves starting the conversion with a portion of end users?

User Acceptance

WAN (Wide Area Network)

WANs (wide area networks) link systems over a greater distance, including machines on the opposite sides of the world.

IP addresses are traditionally written in _____________ notation.

dotted decimal

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario?

Data

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information?

Data and business intelligence

What is the definition of information technology (IT)?

It is the technology used to create, maintain, and make information accessible.

True or False Data breaches are easy to detect.

False

Execution

Hold a kick-off meeting Develop the project team Develop and complete project deliverables Monitor the project timetable Observe project performance

Memory data register (MDR)

Holds data that is being transferred to or from memory

Accumulator (AC)

Holds the ALU results

What is the primary difference between a modern handheld computer and a modern desktop computer?

A desktop has more processing power.

Firewall

A firewall monitors network traffic and blocks traffic that triggers its safety rules, providing a barrier between a trusted private network and an untrusted network like the internet.

Which network topology best handles downed links without losing connectivity between devices?

Mesh

Graphic Design =Create and edit drawings and other artwork

Adobe PhotoShop

What is the expected output for the following SQL query? SELECT * FROM Patient WHERE LastName = 'Moore';

All records from the Patient table where the patient's last name is "Moore"

Incomplete data

Missing attributes

Which of the following systems are examples of database applications in Mei's medical office? (Select all that apply.)

Patient scheduling system Billing system Equipment inventory system Accounting system

What is the role of the CPU in a computing system?

Performing instructions of computer programs

Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?

Radio signals

Multimedia software =Display audio, video, image, and text content

Real Player VLC Player Media Player

The name, address, and account balance of each individual patient in Mei's office is known as a:

Record

Application Software are

Spreadsheet • Web browser • Accounting

Which data type uses a constructor that accepts no parameters?

boolean

Unstructured data refers to data that is_____________. (Select all that apply.)

more complex possibly stored in a format that is not easily decoded more time consuming to parse through to retrieve the essential information

Match each action with the corresponding category. Answer options may be used more than once or not at all.

-Engages in best practices for information systems =Part of the role of an IT professional association -Writes laws dealing with information technology =Outside of the role of an IT professional association -Provides professional standards for ethical behavior= Part of the role of an IT professional association

Which actions might be used to support the hardening of the systems you work with? (Select all that apply.)

-Maintain an antivirus system -Use a random password generator and change your passwords frequently -Install security patches as they become available

Which functions would Mei be completing in her network administrator role? (Select all that apply.)

-Managing the telephone system network -Connecting two or more computers together so they can communicate

The medical office is hiring a support specialist to assist Mei in managing the technology supporting business operations. Dozens of qualified candidates have applied, including the daughter of the office's receptionist, Mary. Mary and Mei are good friends outside of work. How could Mei stay objective in the selection of the new technical support specialist? What can she do to avoid pressure from her friend Mary? (Select all that apply.)

-Mei should ask a colleague to sit in on the interview with Mary's daughter. -Mei should use the same selection criteria for all candidates. -Mei should not discuss the job with Mary. -Mei should ask a colleague to interview Mary's daughter.

Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?

A desktop has more processing power.

Network Elements Laptop

A laptop computer is a portable personal computer with a folding design. It includes an integrated flat screen, a keyboard with a mouse, and usually, a battery. It can also contain a CDROM, DVD-ROM, as well as various other devices such as SD card readers, Wi-Fi, Bluetooth, etcetera. Laptops typically connect to networks via Wi-Fi or Ethernet.

Desktop Computer

A major step in the popularization of computer systems was the development of desktop computers. Steve Jobs and Stephen Wozniak built the first viable home computer and established Apple Computer, Inc. (now Apple, Inc.) in 1976 to mass-produce their garage-built, home computer. Other companies such as Commodore offered similar solutions, but these smaller computers were not widely adopted by businesses who continued to use the wellestablished mainframe computers.

Modem

A modem bridges between the customer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet.

Server

A server is a computer that provides services, such as website hosting and routing, for other devices.

Match each description with the type of computing ecosystem it describes. Answer options may be used more than once or not all. Select your answer from the pull-down list.

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. =Virtual machines Each computer is roughly equal to every other computer. = Peer-to-peer One computer will request information from another computer, which response with the requested information. = Client-server

Tablet Computer

A tablet computer is a portable computer typically with touchscreen display and a rechargeable battery in a thin and flat design. Typically, it connects to a network via Wi-Fi.

Which action by application programs requires support from a networked operating system?

An Internet browser displays a web page.

specialized Software Computer-aided design =Create blueprints and 3D renderings of buildings and products

AutoCAD

Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records. Which part of the CIA triad has been compromised in this scenario?

Availability

Which goal of Information Assurance (IA) requires that information is accessible when needed?

Availability

Cold storage

Cold storage offers less frequent access and is maintained on minimal equipment that is considered lower performance. Returning to normal operations after a disaster is slower with cold storage. Some examples of cold storage include tape backup, offline cloud storage, and even some online services such as Amazon Glacier and Google Coldline. One significant advantage of cold storage, however, is that it is less expensive than hot storage.

Which statement is not true of compilers and interpreters?

Compilers do not translate source code into machine code.

Computer Support Specialist?

Computer support specialist is somewhat of an umbrella term. Some of the roles of the support specialist could be a responsibility of a systems administrator. The support specialist primarily operates as a trainer and troubleshooter. Training tasks may include the production of material such as technical manuals, documentation, and training scripts. Training may take on numerous forms including group training, individual training, training videos, and the production of training videos and software. Troubleshooting might involve working the help desk, training help desk personnel, and overseeing the help desk personnel.

Which part of the CIA triad addresses rules that restrict access to only those who need to know?

Confidentiality

What does the acronym CIA stand for in cybersecurity?

Confidentiality, integrity, and availability

What step should be taken by a business when a third-party solution is found that will benefit a project?

Contact the group to arrange a demo of their product

Which two components are parts of a central processing unit (CPU)?Choose 2 answers

Control unit (CU) Arithmetic logic unit (ALU)

In 2015, Target, a retail store with an online presence, experienced a security breach that resulted in the loss of data affecting approximately 40 million customers. If you are not familiar with this security breach, read more about it in this article, then answer the following question. Which types of data were stolen during the Target credit card hack?

Customer names Credit and debit card numbers Card verification values (CVVs) *All of the above is the answer

what are the differences between Data vs Information

Data 18:23 45 mph 15% humidity Phoenix information It's hot outside. The time is 3:05 am. The customer's name is Mike. The price of the item is $4.25.

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Data mirroring

Unsynchronized data

Data not appropriately shared between two systems

What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as?

Database

Electromechanical Machine

Examples of this progress include the electromechanical machine of George Stibitz completed in 1940 at Bell Laboratories and Mark 1 completed in 1944 at Harvard University by Howard Aiken and a team of IBM engineers. These machines made heavy use of electronically controlled mechanical relays.

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?

Expanding the infrastructure to support additional locations

Which two computer peripherals are connected to the computer through a port? Choose 2 answers

External microphone USB flash drive

Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?

FROM

What is another term for a formula that outlines how to execute a task?

Algorithm

What is a tree-like structure of records in a database referred to as?

Hierarchical database structure

Program counter (PC)

Holds the address of the next program instruction to be executed

Current instruction register (CIR)

Holds the current instruction during processing

Memory address register (MAR)

Holds the memory location of data that needs to be accessed

Business Continuity and Disaster Recovery Hot storage

Hot storage allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe. Hot storage solutions typically involve the latest and greatest storage equipment and the fastest protocols. In addition, hot storage is typically located close to the client or in multiple locations to ensure fast access. Some hot data storage solutions include Microsoft's Azure Hot Blobs and Amazon's AWS service, but these premium solutions can be quite expensive because of the high-performing resources and protocols involved.

Mei and her team write the code for a new application. Which phase of the software development life cycle does this describe?

Implementation

Personal Computer

In 1981, IBM introduced its first desktop computer called the personal computer, or PC, whose underlying software was developed by a newly formed company known as Microsoft. The term PC is now widely used to refer to all machines that evolved from IBM's personal computer product, including desktops and laptops.

Which system requirement is an example of considering user needs in the design of an information system?

Allowing secure access to customer account information

Which statement correctly describes the operating system?

Allows the user to control the actions of the software, and through the software, to access hardware

Fully Electronic Computer

In parallel to electromechanical machine efforts, the use of vacuum tubes gave way to fully electronic computers, such as the Atanasoff-Berry machine constructed at Iowa State College between 1937 and 1941, and Colossus built in England to decode German messages during the latter part of World War 2. Other more flexible machines, such as ENIAC (Electronic Numerical Integrator and Calculator) developed at Pennsylvania State University, soon followed.

Which term is defined as a collection of information used to support management of an organization?

Information System

Mei gets the company's phone service invoice in the mail. The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80. Which part of the CIA triad has been compromised in this scenario?

Integrity

Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10. Which part of the CIA triad has been broken in this scenario?

Integrity

Which part of the CIA triad addresses the level of assurance that can be given as to how accurate and trustworthy data is?

Integrity

What is one of IT's roles in globalization?

It allows companies to reach a wider customer base.

Reflect for a moment about ethics, then respond to the following question. As an IT professional in a situation that might compromise data security, which of the following is an advantage of having an explicit professional code of conduct?

It clarifies the recommended acceptable standards of behavior for a professional group consisting of a wide variety of people.

Which of the following would be a disadvantage of an ethical code of conduct? (Select all that apply.)

It has no legal impact. -t may not apply to new issues. -It is entirely voluntary.

What is the purpose of an IT department?

It helps the organization achieve strategic goals.

What effect does scope creep have on a project?

It increases unplanned costs for the project.

Facts gathered from observations or from a clock that measures time are examples of data. What is not an example of data?

It is cold outside

Medical =Provide reference to medical professionals; manage medical practice, including patient data, scheduling, and medical records

MedClarity Kareo

The medical office treated A.J. three days ago. Today, the police are in Mei's office asking for A.J.'s medical records. What information can Mei release without a warrant? (Select all that apply.)

Mei should follow the protocol advised by the medical council of her state. Mei should follow both HIPAA and state privacy protocols.

Mei's medical office is looking for a system to manage the electronic health records of its patients and has published a request for proposals (RFP). Tom, Mei's brother, is managing a team at a large software producer that has decided to bid for the contract to provide a solution for the medical office. What could Mei and Tom do to avoid possible conflicts of interest? (Select all that apply.)

Mei should not disclose details of offers by any respondents to the RFP. -Both Tom and Mei should disclose the conflict of interest. -Tom and Mei should not discuss details of the contract outside official channels.

In which type of network topology is each networked device directly connected to every other networked device?

Mesh

Spreadsheet software =Create worksheets that perform calculations on financial and statistical data; generating charts, graphs, data visualizations, simple databases, grade books, and invoices

Microsoft Excel OpenOffice Calc Google Sheets

Document storage =Provide private or shareable file storage via cloud-based services

Microsoft OneDrive Google Drive Dropbox

Personal information managers =Manage contracts, calendars, tasks, notes, and reminders

Microsoft Outlook Google Calendar

Presentation software =Create slides using graphs and simple animations to support presentations

Microsoft PowerPoint OpenOffice Impress Google Slides

System Software are

Microsoft Windows • Linux • Mac OS X • DOS

Productivity Software Word processing software =Create business and personal documents such as letters, memos, newsletters, posters, and reports

Microsoft Word Google Docs OpenOffice Writer

Which IT position has the responsibility of working with routers and switches?

Network administrator

Which statement describes the role of a network administrator?

Network administrators are responsible for the installation and maintenance of hardware and software that make up a computer network.

Network Administrator?

Network administrators are responsible for the installation and maintenance of hardware and software that makes up a computer network. Network administrators may also be required to secure the network; this task may be accomplished in conjunction with other IT personnel such as systems administrators. High-level network administration positions, sometimes referred to as network architects or network engineers, are often responsible for designing networks that meet the performance and capacity needs of an organization

Which two are parts of an information system? Choose 2 answers

Networks Databases

Which of the following describes a computer support specialist's responsibilities? (Select all that apply.)

Overseeing help desk personnel Working the help desk Training help desk personnel

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?

Phishing

Which type of systems conversion involves starting the conversion with a portion of end users?

Pilot

Which field must contain a unique value in order for a relational database table to function?

Primary key

An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used?Choose 2 answers

Printer Monitor

What is the difference between processing and storage?

Processing collects and translates data into useful information, while storage places the translated data in specific locations.

Mei is concerned that Task C will not be complete by a given date so that Task D can commence on time. Which of the following risks best describes Mei's concern?

Project dependencies

The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need?

Proxy server

Which tool resides between the client and server to protect the client from adverse actions of the server?

Proxy server

Financial =Track and manage financial information

Quicken TurboTax

Giving rights to new users so they can access various databases is a very common task database administrators perform. Mei's medical office has outsourced IT support services. What is one probable advantage of outsourcing?

Reliance can be placed on the expertise of outsourcing vendors.

Mei and her team analyze the needs of the users of their new software application. Which phase of the software development life cycle does this describe?

Requirements analysis

Mei is unsure whether all company employees will be using the new system. Which of the following risks best describes Mei's concern?

Resistance to change

Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?

Resource path ID

Mei is concerned that some team members may become unavailable during the project. Which of the following risks best describes Mei's concern?

Resource risk

Router

Routers are special-purpose computers that forward messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine.

What is a cloud model that delivers third-party software such as email or games through the internet?

SaaS

Which factors should Mei consider when choosing a file organization system? (Select all that apply.)

Scalability Security Data retrieval speed

Mei is unsure that the project task list will remain unchanged. Which of the following risks best describes Mei's concern?

Scope creep

Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen

Security Breach Notification laws

Which data type is used to represent product order code that comprises alphanumeric characters?

String

Systems Administrator?

Systems administrators are accountable for the installation and maintenance of the resources on that network. The systems administrator will, at a minimum, be required to install and configure operating systems on the organization's machines, install new hardware, perform software upgrades and maintenance, and handle user administration. Other duties include performing backup and recovery, system monitoring, performance tuning, and troubleshooting. The systems administrator may also be involved with application development and deployment, system security and reliability, and work with networked file systems.

Which are examples of structured data?

Telephone number Date of birth or transaction First and last name *All of the above is answer

Leibniz Machine

The Leibniz machine was designed to perform basic arithmetic operations, and the algorithm for addition was embedded into the structure of the hardware itself. Babbage's Analytical Engine (which was never constructed) was designed to read instructions in the form of holes on paper cards. Babbage's Analytical Engine was programmable. Ada Lovelace, who showed in a publication that the Analytical Engine is indeed programmable, is considered to be the world's first programmer.

Abacus

The abacus was first used in China and then by the early Greek and Roman civilizations. The abacus consists of strings of beads strung on rods which are mounted on a rectangular frame. As the beads are moved back and forth on the rod, their positions represent stored values. To carry out calculations, the abacus needs a human operator. Thus, the abacus must combine with a human to form a system whose purpose is carrying out additions.

Computing System

The development of computer systems largely depended on advancement in technology such as the invention of the transistor. Later the invention of complete circuits allowed for integration of multiple circuits on one piece of semiconductor material such as silicon. These integrated circuits reduced the size of the early computing systems of the 1940s from roomsized machines, to the size of a single cabinet. Processing power began to double every two years.

Punched Cards

The idea of communicating instructions with punched cards originated in 1801 in a system specifying the steps of the weaving process. Different patterns of holes resulted in different woven designs. Herman Hollerith used punched cards to speed up the tabulation process in the 1890 US census. Punched cards were heavily used for a variety of computing systems until the mid-1970s.

Which statement about the systems analyst role is accurate?

The role includes both business and technical knowledge and relies on effective communication to understand clients' requirements

Which is a characteristic of high-level languages?

The source code has to be complied.

Web Administrator?

The web administrator, also known as the webmaster, but more precisely referred to as a web server administrator, is responsible for maintaining websites. This differs from the development of websites. Specifically, the web administrator must install, configure, maintain, secure, and troubleshoot the web server. The web administrator may or may not be responsible for the hardware. Typically, the web administrator is not a systems administrator on those computers. herefore, the web administrator will have to work with the systems administrator on some aspects of installation and configuration.

What is the role of drivers in facilitating communication between applications and databases?

They allow the application to interact with the database.

In which generation were silicon chips first used in computers?

Third generation

Internet

This term is often confusing. To ensure the proper meaning of the term, pay attention to whether or not it is capitalized. The Internet (with a capital I) generally refers to the worldwide Internet and is most often what non-technical people are referring to when they speak of the Internet. However, an internet is simply a network of networks. Often, when IT professionals refer to the internet, they are referring to a network of networks.

A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering?

Timely

Hand-Held Computers

Tiny computers are embedded in a wide variety of electronic appliances and devices. Because hardware components are continuing to reduce in size, the capabilities of smartphones continue to expand. These hand-held computers are much more than mobile telephones. They are equipped with a wide variety of sensors, including cameras, microphones, compasses, and touch screens, as well as a number of wireless technologies used to communicate with other smartphones and computers.

Why is it important to ensure that data support business goals?

To aid in making strategic decisions

What is the database administrator's role in security?

To institute protocols to protect the databases from external threats

True or False Although database administrators have many responsibilities, their focus is the design, development, and support of database management systems (DBMSs).

True

Desktop Computer

Typically, a tower chassis enclosure which contains the internal components of the computer system, an external display that provides output, and a keyboard and mouse to provide input. Desktops typically connect to a network via Ethernet but can also utilize Wi-Fi.

Which role is responsible for maintaining websites?

Web administrator

What is another title for a web administrator? (Select all that apply).

Webmaster Web server administrator

Which type of systems testing includes having developers test internal structures of software?

White-box

Which of the following is not true of Windows and Linux?

Windows uses the forward slash (/) to express directory paths.

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?

Word processor Spreadsheet program

Gaming =Entertain the user

World of Warcraft Candy Crush

When you visit Mei's office's website, the site (like many other websites) has the capability of recording data, called cookies, on your computer indicating that you have visited that site. These cookies can then be used to identify return visitors and to record other previous activity so that future visits to the site can be handled more efficiently. The cookies on your computer also provide a record of the sites that you have visited. Should the website for Mei's office have the capability to record cookies on its patients' computers?

Yes, the cookies allow a web application to respond to the user as an individual.

What is one of IT's roles in globalization?

it promotes and increases interactions between different regions and populations around the globe.

Which task describes the role of a database administrator?

ntegrating data from legacy systems to newer systems and playing a role in application design and development

A disaster recovery plan

plan specifies how a business will resume after an event to continue its operations.

A business continuity plan

plan specifies how the business will keep providing products and services and generate revenue after an event.

Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk?

public

True or False Both structured and unstructured data are collected by most companies and are stored for potential use in record keeping and data analysis. Both types of data contain potentially useful information.

true

True or False Data includes raw facts or observations, and given context, becomes information.

true

True or False The term big data refers to the amount of collected data that continues to grow exponentially and is used in new and innovative ways for competitive advantage by companies like Amazon and Netflix.

true

Video conferencing software =Place and receive video calls among two or more locations

Adobe Connect GoToMeeting WebEx

In what phase of a project does time estimation occur?

Planning

Which is a type of two-factor authentication?

Smart card

What indicates a specific Internet location?

The IP address

Which item is a storage device?

Flash Drive

1 kilobyte (KB) 1 megabytes (MB) 1 gigabytes (GB) 1 terabyte (TB) 1 petabyte (PB)

2^10 or 1,024 bytes 2^20 or 1,048,576 bytes 2^30 or 1,073,741,824 bytes 2^40 or 1,099,511,627,776 bytes 2^50 or 1,125,899,906,842,624 bytes

PAN (Personal Area Network)

A PAN (personal area network) is normally used for short-range communications, within a few feet, such as wireless headphones to a smartphone or a wireless mouse to a PC.

What statement is true concerning compiled and interpreted computer language?

A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.

Which is true of databases and the applications that interact with them?

Applications are interdependent of the database.

What is the role of a firewall? (Select all that apply.)

Block outgoing messages to specified destinations Block incoming messages from untrustworthy sources

Why is merging unstructured and structured data essential?

Both types of data contain essential information. Most of the data stored today is unstructured. Better insights and discovery of hidden connections in data sets help strengthen decision-making. *All of the above is the answer

Mei is unsure that she can control the allocation of costs during the project budget control issues, such as underestimated or improper allocation of cost. Which of the following risks best describes Mei's concern?

Budget risk

As a part of effective IT governance, the IT plan in Mei's office should be consistent with the organization's:

Business plan

How can an organization assist employees with the ethical use of information technology?

By developing policies for information usage

What is the minimum grade of network cable required to transmit 1 Gpbs?What is the minimum grade of network cable required to transmit 1 Gpbs?

CAT5e

Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database?

Character string

Which database can increase resources to accommodate for demands on the system while maintaining high availability even in the case of local or regional outages?

Cloud database

Which type of transmission media can broadcast in baseband mode?

Coax cable

Database Administrator?

Database administrators have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, and procedures associated with the DBMS that are separate from those of systems administrators and web administrators.

Closure

Declare the project complete Dissolve the project team Complete the final project documentation Reflect on strengths and areas for improvement

Planning

Develop a roadmap Set the project goals Define the project scope Draft a project management plan

What are the three main categories of databases?

Flat file, relational, hierarchal

Which function would Mei be completing in her database administrator role?

Giving new users access to various databases

Instant messaging software =Enable two or more people to communicate in real time using text

Google Hangouts Cisco Jabber Facebook Messenger

What is the tool used to encode a document while focusing on appearance known as?

HTML

How does a compiler work?

It takes the most recent instructions and translates them into machine language.

Which of the following contains the basic functions of the operating system?

Kernel

Which type of computer peripheral is used only as an input device?

Keyboard

The devices in Mei's office are interconnected in which type of network?

LAN

LAN (Local Area Network)

LANs (local area networks) consist of a collection of computers in a single building or building complex.

Which low-level language corresponds one-to-one with assembly?

Machine language

Mei's database administration function includes:

Managing user access to resources

The level of assurance that data will be available to people who need it, when they need it is referred to as

availability


Related study sets

UWF BSC1005 Chapter 10 & 11 Homework & Quiz

View Set

CFA Level 1 - Section 2: Quantitative Methods - Reading 10 and 11: Probability and Sampling

View Set

HTH 351 - Chap.8- Social Marketing

View Set

Pharm ATI CANCER & IMMUNOSUPPRESANT Medications

View Set

Chapter 25 Submersion Incidents: Drowning & Diving Emergencies

View Set

Test 3: Chapter 7-9 Contemporary Human Geography

View Set

Finance Test 2 Practice Questions

View Set

FInal Exam 3, Econ 1040 final exam Ohio University

View Set