IT Final Notes

Ace your homework & exams now with Quizwiz!

Each layer of the OSI model adds header information onto the message except for the ...

... Physical layer.

To support confidentiality of data stored in files, we might want to implement ...

... access control (permossions).

The term used to describe the amount of data that can be transferred over a network over a unit of time, such as bits per second, is known as ...

... bandwidth.

A network with a file server which services the local computers would be considered a(n) ...

... client-server network.

The lowest paying career in IT would probably fall on the ...

... computer technician.

Encryption supports ...

... confidentiality.

To use the telephone network for computer communication, one must ...

... convert the analog information stored in the computer into a digital form.

Morris' Internet worm was an attempt to ...

... demonstrate weaknesses in Unix security.

In order to demonstrate that you are an authentic operator, your web site should use ...

... digital certificates signed by a certificate authority.

A network port ...

... indicates the message's intended application software.

A jam signal is used in an Ethernet network to ...

... inform all computers on the network of a collision.

The idea that collected data are correct and accurate is known as ...

... integrity.

We should think of information as ...

... interpreted data.

The full mesh network is seldom used because ...

... it costs the most.

Mapping an external IP address into an internal IP address is known as ...

... network address translation.

TCP/IP's link layer is roughly equivalent to the OSI model's ...

... physical and data link layers.

Symmetric key encryption is also known as ...

... private key encryption.

Projections, restrictions and joins collectively are forms of database ...

... queries.

database is commonly a collection of ...

... relations.

Last mile technology is used to express the idea that ...

... some households still use low bandwidth telephone lines to access the Internet.

Some organization are using biometrics in place of or in addition to passwords to support the idea of ...

... who you are.

Some will refer to wisdom as an understanding of ...

... why.

In a Linux system, the address(es) of your DNS servers will be stored in which file?

/etc/hosts.conf

Of these forms of RAID, which one offers no redundancy at all?

0

Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data?

1

The first message broadcast on the Internet, in its earliest incarnation, was in which year?

1969

Which of the following forms of RAID is not used because the redundancy information is too time consuming to compute efficiently?

2

A Class C network has how many IP addresses available for the network?

256

In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?

3

Of these RAID levels, which uses the smallest possible stripe sizes?

3

IPv4 addresses are _____ bits long.

32

The number of computers on the original ARPAnet was ...

4

IPv4 offers approximately how many unique IP addresses?

4 billion

Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule "if someone buys beer they will also buy pretzels" is ...

80%

A company may draw upon multiple sources to build their data warehouse. Which of the following would not be one of those sources?

All of the above are possible sources. (Enterprise resource planning systems Sales records Marketing reports Project reports)

Which of the following network programs sends information in clear text and so is not secure?

All of the above except ssh

Which of the following IT roles would most likely work at the help desk?

Computer support specialist

Which of the following encryption algorithms has been declared as insecure?

DES

At which level of the OSI model are data units decomposed into packets?

Data link

When combining data from various databases into a data warehouse, which process might be required?

Data transformation

Which of these IT roles would most need knowledge of such software as MySQL and Oracle?

Database administrator

Why was Y2K an issue?

Early programmers used 2 digits to store the year.

A checksum is used in network communication for which purpose?

Error checking

What method is often used to determine closeness in clustering?

Euclidean distance formula

All information systems are stored on computer.

False

Computer programmer and software engineering have the same roles and duties.

False

Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.

False

In rule association learning, a high frequency always means a useful rule.

False

It is strictly illegal for a company to have an IT policy prohibiting users from having to disclose their Facebook passwords to their employers.

False

It is the IT person's responsibility to ensure that all employees of the organization act ethically when using computers.

False

It is the IT person's responsibility to monitor employees of the organization with respect to their IT usage.

False

One learns as much with a 2-year technical degree as one does with a 4-year bachelor's degree in IT.

False

The Internet uses packet switching while local area networks use circuit switching.

False

The Unix operating system has no security holes in it, unlike Windows.

False

The web administrator and the web developer have the same roles and duties.

False

We can think of the Internet and the World Wide Web interchangeably.

False

We view computer networks at a logical level while the operating system views the network at a physical level.

False

Web developers generally get paid more than web administrators.

False

Which of the following careers would benefit most from having a master's degree?

IT Manager

Twisted wire pair is most commonly used in which of the following?

In the public telephone network in the US

Switches use which of the following addresses to send a message to the proper device?

MAC addresses

Which level of the OSI model performs routing?

Network

Which of these IT roles would be in charge of securing a computer network?

Network administrator

Which of these IT roles would most need knowledge of VoIP and trunking protocols?

Network administrator

Which of the following certifications would a system administrator pursue?

Novel CNA

Of the following network types (sizes or classifications), which is generally considered the smallest?

PAN

SSL, the secure sockets layer, is an implementation of which level of the OSI model?

Presentation

Which of the following terms is used to denote a computer you wish to access over a network?

Remote computer

Which of these IT roles would most need knowledge how to install computer hardware and software?

System administrator

In streaming audio and video, which of TCP and UDP would be preferred as it would trade off speed for assurance of arrival?

TCP

In which protocol can you use UDP type packets?

TCP

Which of the following is a form of protocol attack?

TCP hijacking

An intranet LAN has which of the following properties?

The LAN uses IP to easily extend the network to the Internet.

What noteworthy event happened to the APRANet in 1973?

The first international computer was added to the network.

Which of the following is not part of the 10 Commandments of computer ethics?

Thou shalt not use work computers for personal purposes.

Which level of the OSI model takes care of reliability?

Transport

A decision tree can be generated automatically from a database of records.

True

As an IT employee of an organization, you should expect your employer(s) to support your efforts in continuing education by paying for you to take classes or travel to conferences and trade shows.

True

As an IT person, you may be asked to write or help write organizational policies with respect to IT usage.

True

Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.

True

In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.

True

In a circuit switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.

True

It is important for all IT people to act ethically when using computers.

True

Law enforcement uses data mining to identify possible crime "hot spots" in their city to predict where future crimes might occur.

True

The goal of availability often can conflict with the goals of confidentiality and integrity.

True

To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like "youth", "teen", "young adult", "adult", "senior".

True

When generating goals of an organization, you might find that some goals contradict or conflict with other goals requiring that they be prioritized.

True

Which of the following forms of secure communication protocol/software is used specifically for wireless communication?

WPA2

Which of these IT roles would most need knowledge of using scripting languages like ASP, Perl and PHP?

Web developer

Which of the following is not a soft skill?

ability to troubleshoot (soft skills are mainly social/writing skills)

"T" connectors are used to join computers together in which type of network topology?

bus

Which of the following network topologies is generally considered the cheapest?

bus

Someone in information systems (IS) would learn which of the following skills that differ from most other IT areas?

business practices

Which of the following careers would require knowledge of criminal justice?

computer forensics

Of the various IT related professions, which one of the following is seeing jobs decline instead of grow?

computer programmers

Which of the following services is used to map IP aliases to IP addresses?

dns

Which of the following technologies differentiates a normal extranet from a virtual private network?

encryption

Long distance communication (dozens, hundreds or thousands of miles) generally does not use which of the following?

fiber optic cable

RAID technology uses which of the following?

hard disks

The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.

incremental

Which mathematical operation is used to obtain the checksum once the sum of the bits is computed?

modulo

The ability of a network to carry multiple messages at the same time is known as ...

multiplexing

In order to determine if another computer is available and accessible over your network, you might use which program to test it?

ping

In OLAP, which of the following techniques allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?

pivoting

Which of the following is not a threat that involves an individual in an organization but instead is a threat to the technology itself?

protocol attack

Which of the following devices would transmit any message received on to all computers in its local area network?

repeater

As a network gets larger (has more computers connected to it), which of the following network topologies performance is most affected?

ring

If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?

ring

Which of the following devices deals with IP addresses?

router

Which of the following terms applies to the idea that the company ensures the integrity of their collected data and the computer systems?

security

In OLAP, which of the following techniques allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?

slicing

A database projection returns _____ of a database relation.

specific fields of all records

TCP/IP introduced which of the following communication ideas?

three-way network handshake

The best way to protect the vulnerabilities of the human in IT is through ...

training


Related study sets

Micro Economics Final- PITT STATE

View Set

Abeka 5th Grade History Quiz 22 Study Guide

View Set

Chapter 4 - Ethical Considerations in Research

View Set

Ch 47 Assessment of Kidney and Urinary Function

View Set

ECON chapter 2 guided reading (lesson 1)

View Set

Which of the following statements are true about kinetic energy? Include all that apply.

View Set