IVY INFM 109

Ace your homework & exams now with Quizwiz!

The application that gets installed on a system that will enable the user to create virtual machines inside of it is called a . (one word)

Hypervisor

Identify whether the characteristic on the left describes IPv4 or IPv6. 32-bit address 128-bit address Is written in octets Uses binary or Base 2 Uses hexadecimal or Base 16 Has to have a subnet mask to make sense

IPv4 IPv6 IPv4 IPv4 IPv6 IPv4

The purpose of a spider or web crawler is to scan across the Internet to find new web pages and index the information.

True

Server operating systems will often times have command line interfaces instead of graphical user interfaces.

True

Swift, Python, and Javascript are examples of the most popular programming languages in use today.

True

There are dozens of Android phone manufacturers because of the proprietary nature of the Android operating system.

False

Virtualization and Cloud Computing mean the same thing.

False

The "people" part of an information system includes Tier 1 and Tier 2 help desk workers, analysts, and developers.

True

Email has been around for a long time. Email was created for use on ARPANET in what year?

1971

How many computers were networked on ARPANET in 1974?

4

You should always feel safe in opening email attachments as long as you recognize the sender's email address as being someone you know and trust.

False

Which two sentences describe a database accurately?

A database is a shared collection of related data used to support the activities of a particular organization. A database is as a repository of data that is defined once and then accessed by various users.

What encryption standard was developed to replace DES and is still in use today?

AES

Discuss the role of ARPA in the development of what has become the Internet.

ARPA developed ARPANET to better communicate and share information. The first network was between four locations at UCLA, Stanford, University of California, and University of Utah. Their need for communication and information sharing allowed the creation of the network which would eventually grow into the internet.

List 2 advantages and 2 disadvantages of cloud computing.

Advantages include: -No software to install or upgrades to maintain. -Available from any computer that has access to the Internet. -Can scale to a large number of users easily. -New applications can be up and running very quickly. -Services can be leased for a limited time on an as-needed basis. -Your information is not lost if your hard disk crashes or your laptop is lost or stolen. -You are not limited by the available memory or disk space on your computer. Disadvantages include: -Your information is stored on someone else's computer. -You must have Internet access to use it. -You are relying on a third-party to provide these services.

According to Michael Fourman, what is "metadata?" (Choose all that apply)

An "electronic card" attached to each document and Data about data

Which two smart phone operating systems are seen most often?

Android Apple

What is the name of a peer-to-peer network that provides an open, distributed record of transactions?

Blockchain

Discuss how packet switching is an improvement over circuit switching.

Circuit switching was initially designed for telephone communication and is slower than packet switching. Packet switching allows the data to be broken up into smaller bits and sent to their location without a dedicated switch like in circuit switching.

Web pages are written in HTML. What does HTML stand for?

Hypertext markup language

Which term best describes an attribute in a database table?

Column

Microsoft Office is an example of open-source software because it can be downloaded from the Internet at no cost and its source code is freely available.

False

Mobile apps that are downloaded to Android phones are obtained from the App Store.

False

NoSQL databases consist of tables, rows, and columns.

False

Explain the difference between data, information, and knowledge. Give a specific example to illustrate your discussion.

Data is defined as raw facts with no context or intent, information if the processed data with context and purpose, and knowledge is the application of the information to known facts or concepts. An example of data would be hammers in a store's inventory system. An example of information would be, the store's inventory system shows them that they had 8 hammers at the end of the previous day. An example of knowledge would be, whoever is in charge of inventory at the store would know they sold 3 hammers today, and may need to order more to restock.

Define the term "digital divide" and list at least three population groups that are at-risk for receiving less than adequate access.

Digital divide can be described as the separation of those who have access to the internet and web services and those who do not. Three population groups that are receiving less than adequate access may be those that are on the lower end of the socioeconomic spectrum, elderly people, and people with low literate abilities.

According to Oracle, about how often are data volumes doubling?

Every 24 months

Input Device

Examples include touch screen, card reader, and keyboard

Output Device

Examples include touch screen, printer, and speakers.

Network Adaptor Card

Expansion card to that enabled the network connection. Usually referred to as NIC

Which US law protects the privacy of student educational records?

FERPA

According to the Michael Fourman article, HTTP is a markup language.

False

Examples of third generation programming languages include Python, BASIC, Java, and SQL.

False

Hardware requirements for desktop systems are usually greater than the requirements for servers.

False

IBM's PC was developed with a closed architecture, it made it more difficult for competitors to develop PC "clones"

False

In the SDLC methodology, the programming phase is where the code actual gets written and tested.

False

In the SDLC methodology, the system analysis phase includes performing a feasibility study to determine whether the project will generate enough return to justify the expense.

False

Microsoft Azure, Amazon AWS, and Google Cloud provide all the same services. They just use different terminology and pricing structures

False

Which technology requires the most training to install?

Fiber optic cabling

In the video "5 Components of Information Literacy," using Boolean search terms or requesting genealogical records are examples of which level of Information Literacy?

Find

Define the term "globalization."

Globalization is the integration of goods, services, and culture among nations of the world.

Which 3 platforms dominate the cloud services market?

Google Cloud Amazon AWS Microsoft Azure

A web browser uses which protocols to communicate with a web server? (Choose the best two answers)

HTTPS HTTP

This component is designed for long-term non-volatile data storage:

Hard Disk Drive

Which type of malware tracks every button you press on the keyboard that a hacker can then use to determine things such as your username and password?

Keylogger

In which software development methodologies is testing combined with the development process?

Lean Rad Agile

From the list below, select the options that identify desktop operating systems. (Choose all that apply)

Mac OSX Ubuntu Windows 10 Windows 7 Mint

This component interconnects all other components inside a computer:

Motherboard

Using Boolean logic, which operator will give you a list of all cars that won't include Teslas?

NOT

Removal Media

Often use a USB port to connect to a PC, example include USB drive and removable hard drive.

Software can be divided into which two broad categories?

Operating systems Application software

Explain the constraint between the three components of the Quality Triangle.

The three components of the quality triangle are time, cost, and quality. The rule of constraint between the three states that, generally, you can only have two components of the triangle at any one time. For example, to complete the project quickly (time) and maintain a quality product, you will greatly increase the cost of the process.

Which of the following describe methods when implementing new software systems? (Choose all that apply)

Parallel operation Phased implementation Pilot implementation Direct Cutover

Which legal concept describes the protection for someone who invents a new product or process?

Patent

Solid State Hard Drive

Performs the same function as a hard disk, namely long-term storage. Instead of spinning disks, the SSD uses flash memory that incorporates EEPROM

The following component performs the function of mathematical calculations and is considered "the brain" of the computer:

Processor

This component is designed for short-term volatile data storage:

Random Access Memory

Identify five (5) of the common database models from the below list.

Relational Model Flat File Model Network Model Hierarchical Model Object-Oriented Model

Bluetooth

Requires the two connecting devices to be paired.

Which device is used to connect multiple networks together?

Router

Disadvantages of cloud computing include which of the following? (Choose all that apply)

Security Limited control of infrastructure Requires good internet bandwidth and speed Ongoing costs

Explain why servers are good candidates for virtualization.

Servers are good candidates for virtualization because they have much more RAM than desktop computers, and are designed to handle far more requests from multiple users at a single time.

Hard Disk Drive

Slower permanent storage that uses spinning platters and a read/write head.

According to "Information Systems for Business and Beyond," what are the major components of an information system? (Choose all that apply)

Software People Processes Data Hardware

User authentication refers to ensuring that the person accessing information is who they present themselves to be. Authentication can be accomplished through any combination of which 3 factors?

Something they know Something they have Something they are

CPU

The brains of the computer.

Motherboard

The primary circuit board in a computer.

"Malware" can be considered a general term that includes a variety of specific types, such as spyware, worms, trojans, and rootkits.

True

According to the Fourman article, Natural Language Processing (NLP) can be considered the "next generation" of document searching, since it involves extracting the meaning from the document contents and not simply perform a keyword search.

True

Agile development projects can be characterized as smaller projects that are not clearly defined at the beginning and include a lot of continuous interaction and feedback from the customer.

True

Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations that can be used for decision-making. This process can be automated through the use of machine learning.

True

Even though it was invented in 1989, Hypertext Markup Language (HTML) still forms the foundation of all web pages built and used today.

True

Hubs and switches can both be used to create networks.

True

IaaS (Infrastructure as a Service) refers to using cloud-delivered infrastructure. Examples include compute services as well as storage and backup services.

True

In the SDLC methodology, the preliminary analysis phase includes making a determination as to whether a proposed project is worth taking on from both a technical and cost/benefit review.

True

The three V's of Big Data refer to which of the following?

Velocity Volume Variety

Random Access Memory

Volatile storage that is erased when the power is removed.

Global companies that have employees and customers from different cultures need to be aware of the following challenges: (Choose all that apply)

differences in infrastructure language and customs international shipping labor laws

What term BEST describes columnar data in a relational database?

field

What is Web 2.0? How has the evolution of Web 2.0 affect how we interact with the web?

Web 2.0 is a new stage of the internet exemplified by interactive websites that require little, or no, programming knowledge. With the evolution of Web 2.0, almost everyone can can interact with and publish anything they want online through the use of their own personal social media page or blog.

Identify 3 functional roles that a server can provide.

Web server File server Application server

What are some ways to protect yourself from social engineering attacks? (Choose all that apply)

When in doubt, contact the sender Keep your operating system, antivirus and anti-malware software up to date Set email spam filters to the highest setting

Which technology created the ability to BYOD?

Wireless networking

Advantages of cloud computing include which of the following? (Choose all that apply)

accessibility and pay-per-use data backup and recovery reliability minimum management and cost

Match the order of each process from the Big Data Analysis Pipeline from the below list. 1 2 3 4 5

acquisition extraction and cleaning integration, aggregation, and representation analysis and modeling interpretation

The three common types of NoSQL databases are:

graph document key-value

In the SDLC methodology, end user training and documentation take place in which phase?

implementation

Complete the following sentence: A database management system utilizes a process known as _________________ to support multiple users simultaneously.

concurrency control strategies

Which characteristics describe advantages of fiber networking? (Choose all that apply)

long-term cost security connection quality

IoT

network of billions of devices, each with their own unique network address

What term BEST describes a field or combination of fields that are used to uniquely identify a record?

primary key

Digital

processes electronic signals into discrete values, of which there can be two or more

A data warehouse should be designed so that it meets which three criteria?

puts data into standardized format time-stamps the data uses non-operational data

Match the following concepts in the left column with the definition found in the right column. Volume Velocity Variety Variability

quantity of data to be stored speed at which data is entered into system and must be processed variations in the structure of data to be stored changes in the meaning of data based on content

If you need to look for scholarly articles on software development, which websites will BEST fit your need? (Choose all that apply)

research.yahoo.com scholar.google.com

Complete the following sentence: A database management system is considered ___________________ because it contains user data as well as the characteristics (metadata) of the structure and data stored in the database.

self-describing

Analog

signals are continuous and can be represented by a smooth wave pattern

What tools are used in DevOps? (Choose all that apply)

test automation virtual infrastructure source code repository pipeline orchestration configuration management build server

Match the term on the left with its definition on the right. ping tracert nslookup ipconfig

tests connectivity between two networked devices replies with the intervening "hops" between two networked devices replies with the IP address of a given domain name lists a computer's network configuration information

Which type of malware can spread without the user having to do anything to introduce the malware into their computer system?

worm


Related study sets

Chapter 10: Investment Company Products

View Set

Conduction psych research in the real world

View Set

Vertebrate Physiology Exam 1 (Ch.1-7)

View Set

Smart Book : Chapter 8: The Debate over Utilitarianism

View Set