Introduction to IT - Practice Exam B

Ace your homework & exams now with Quizwiz!

Which department supports day-to-day technology needs of an organization? Management IT Marketing Finance

IT

Which is NOT part of the history of the computer? Abacus Leibniz Punch cards Abracadabra

Abracadabra

The name, address, and telephone number of each individual patient in Dr. Alan's office is known as a: Record File Key field Database

Record

Which statement describes the role of a systems administrator? Systems administrators are responsible for designing and developing software that makes hardware and software systems work. Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users. Systems administrators are responsible for the installation and maintenance of the resources of an organization's network.

Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user? A desktop is more usable. A desktop has more processing power. A handheld is more usable. A handheld has more processing power.

A desktop has more processing power.

Which of the following describes the knowledge stage in the DIKW model? Number of hours worked by an employee. A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions. Average number of hours worked by department. Report on employee attendance.

A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.

During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system? Logical Design Physical Design Implementation Analysis

Analysis

A ________ translates source code into machine language and translates the entire program, creating an executable program which can be run at a later time. Interpreter COBOL program Compiler High level language

Compiler

Which statement is NOT true of compilers and interpreters? All errors must be debugged before a compiler can compile the source code. Interpreters translate and execute one line of source code at a time. Perl and Python are examples of programming languages that use an interpreter. Compilers do not translate source code into machine code.

Compilers do not translate source code into machine code.

Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law. Electronic Communication Privacy Act Computer Fraud and Abuse Act Federal Information Security Management Act Anticybersquatting Consumer Protection Act

Computer Fraud and Abuse Act

Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working? Wisdom Information Knowledge Data

Data

What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as? Database Key field Record Sheet

Database

________ is defined as a code of moral conduct or a set of principles that govern behavior? Morals Ethics Obligations Principles

Ethics

Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast. True False

False

_____________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Waterfall Prototyping Extreme programming Agile methods

Agile methods

What is a tree-like structure of records in a database referred to as? Flat file Relational database structure Hierarchical database structure Field

Hierarchical database structure

A monitor is a peripheral device for what system? I/O Storage

I/O

SQL (Structured Query Language), a query for databases, was invented by? Linux Cisco HP IBM

IBM

Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere. Paas (Platform as a Service) SaaS (Software as a Service) IaaS (Infrastructure as a Service)

IaaS (Infrastructure as a Service)

A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following? Image Backups Data Mirroring Backup Media Incremental Backups

Image Backups

The business case, feasibility study, and stakeholder input are 3 key elements of which project phase? Closing Initiation Executing Planning

Initiation

What does the acronym IPOS stand for? Identify, process, outcome, summary Input, prepare, overview, save Input, process, output, storage Identify, post, optimize, storage

Input, process, output, storage

Teachers complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Marcus uses the funding to purchase new software games that require less memory. Marcus plans on buying each school a new monitor to replace the older models. Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.

Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.

Which of the following technologies was introduced in the fourth generation of computers? Magnetic Core Memory Microprocessors Disk Drives Integrated Circuits

Microprocessors

Which of the following statements describes why network protocols are necessary. Network protocols are necessary for a home computer that is not connected to the Internet or any other device. Network protocols prevent computer hacking. Network protocols are required by international laws. Network protocols are necessary for computers to communicate with each other.

Network protocols are necessary for computers to communicate with each other.

Project managers work with project scope, the management plan, and SMART frameworks in this project phase? Closing Initiation Executing Planning

Planning

Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk? Public Private Top secret Confidential

Public

Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier? Hierarchical Database Flat-File Database Management System Relational Database Data Management

Relational Database

What is one probable advantage of outsourcing? More control can be exercised over IT processing. Reliance can be placed on the expertise of outsourcing vendors. Employee satisfaction may increase. The organization can transfer its accountability in terms of privacy laws.

Reliance can be placed on the expertise of outsourcing vendors.

Which of these is NOT a category of risk in a project? Risks in execution Risks in integration Risks in deployment Risks of the unknown

Risks in deployment

Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)? Router Server Switch ISP

Router

Thru this CLOUD computing function, businesses can access and use software through the Internet? PaaS (Platform as a Service) SaaS (Software as a Service) IaaS (Infrastructure as a Service)

SaaS (Software as a Service)

Which factors should Mike NOT consider when choosing a file organization system? Hierarchy Scalability Security Data retrieval speed

Scalability

Which one of these is NOT a operation for database queries? Union Serve Product Join

Serve

What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards? Hard drives Bays Ports Slots

Slots

Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system? Microsoft Power Point Application Server System

System

What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system? Utility Software Device Drivers System Services Kernel

System Services

Which of the following statements best defines the ALU? The ALU is responsible for storing data as it is processed. The ALU retrieves the instructions of a computer program and the raw data that is input. The ALU contains circuitry that performs operations on data such as addition and subtration. The ALU controls the speed at which instructions are retrieved and processed in the computer.

The ALU contains circuitry that performs operations on data such as addition and subtraction.

A Web page's URL (Uniform Resource Locator) has three main parts: URL, Network, IP Address The protocol, the domain name, and the resource or file name. Computer networks allow individuals to share hardware such as printers, but not software. Computer networks allow individuals to share many types of resources.

The protocol, the domain name, and the resource or file name.

for a System Administrator? This individual is in charge of ensuring that the network is working properly. include connecting devices using cable, configuring individual employee computers, working with the network hardware, and troubleshooting. This individual has responsibility for all aspects databases and database management systems. This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.

This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.

There are how many tiers of ISPs? One Two Three Four

Three

What is the purpose of a business continuity plan? To assess risks for key processes in the event of man-made disasters To enable an organization to continue offering critical services in the event of disruptions To develop plans for continued business operations regardless of the circumstances Feedback:Unit 7 Module 23 Pg 137 To identify who is responsible for permanent growth of the business in the event of natural disasters

To develop plans for continued business operations regardless of the circumstances

Which is not a common operating system used today? Windows Top Hat Mac Linux

Top Hat

IT functions cover these five different domains: communication data collection and management information security management consumer relationship management process improvement True False

True

In the SDLC implementation phase, the design goes to the programmers who translate it into code to execute the plan. True False

True

In the design phase of the SDLC, architects think about the components they would need to solve the problem or implement the plan. True False

True

RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off? True False

True

The selection operation takes rows from one table and creates a new table? True False

True

Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files. True False

True

The abbreviation "URL" indicates: Unified Reader Link Uniform Resource Locator United Rendering Lists Underdetermined Resource Location

Uniform Resource Locator

Which data format is not in an easily usable format and takes greater effort to extract? Structured Unstructured

Unstructured

Which type of systems testing includes having developers test internal structures of software? White-box Beta User acceptance Analysis

White-box

Which of the following type of transmission is paired correctly with the given media? fiber optic cable - light impulses coaxial cable - radio waves coaxial cable - light impulses fiber optic cable - electricity

fiber optic cable - light impulses

While hardware is ______, software is ______ intangible - tangible tangible - everlasting tangible - intangible free - shareware

tangible - intangible

A service portfolio is simply a list of the services the IT department offers. True False

true

The four computers based on size and processing speed are supercomputers, workstation, mainframe, and microcomputer. True False

true

A petabytes consists of how many terabytes? 100 10000 1500 1000

1000

A typical database application has how many layers? 2 4 6 Infinite

2

best definition of a computer network? A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software. A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources. A computer network consists of a number of computers connected to connect to the Internet.

A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

What is a primary difference between a modern handheld computer and a modern desktop computer? A handheld has more processing power. A desktop is more usable. A desktop has more processing power. A handheld is more usable.

A desktop has more processing power.

______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use? Algorithms Database Management Systems Big Data Relational Databases

Big Data

As a part of effective IT governance, the IT plan should be consistent with the organization's what? Information security plan Business continuity plan Business plan Risk management plan

Business plan

Javier starts the day by checking his e-mails. In the afternoon, performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, brief presentation on the new database system Database administrator Network administrator System administrator Security administrator

Database administrator

Which answer most accurately describes the timeline of computer development? First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced. First, Graphical User Interface systems are introduced. Next, limited use of computers by large organizations. Next, computers built and programmed by engineers. Lastly, introduction of the personal computer.

First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.

Which of the following database categories is the most similar to a spreadsheet or MS Excel document? Hierarchical Isolated Flat file Relational

Flat file

What two types of software licenses are free? Open source and Proprietary Proprietary and Shareware Freeware and Open source Shareware and Freeware

Freeware and Open source

What does GUI stand for? Graphic User Interchange Graphic Utility Interface Graphical User Interface Graphical User Interchange

Graphical User Interface

What is NOT part of data hygiene? Data is valid Lots of data Free from malicious or inadvertent tampering Data is good

Lots of data


Related study sets

The Child with Gastrointestinal Alterations

View Set

Unit 5 Macro The Financial Sector

View Set

disadvantages and advantages of common data structures

View Set

CompTIA TestOut Unit 3 Test Review

View Set

Ch 49 Obstetrics Sonography, Ch.49 First Trimester

View Set

Ch20 - The Written Research Report

View Set

Test - CLM 017 Risk Management Exam

View Set