WGU C182 FInal Exam Study Set, Intro to IT practice Test A and B , INTRO TO IT PRACTICE QUIZ

Ace your homework & exams now with Quizwiz!

Which of the following statements best describes the difference between information systems and information technology?

An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.

Which action by application programs requires support from an operating system?

An internet browser displays a web page.

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?

Data

What is the definition of information technology (IT)?

It is the technology used to create, maintain, and make information accessible.

What is the definition of information technology?

It is the technology used to create, maintain, and make information accessible.

In a SQL query, the __________ operation combines two tables together?

JOIN

SQL (Structured Query Language), a query for databases, was invented by?

IBM

With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere.

IaaS (Infrastructure as a Service)

Which of the following best describes the differences between memory and the hard drive?

Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.

What is another term for a formula that outlines how to execute a task?

Algorithm

Which system requirement is an example of considering user needs in the design of an information system?

Allowing secure access to customer account information

A local area network (LAN)

Allows hardware sharing within one office

Writes laws dealing with information technology

Outside of the role of an IT professional association

This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications

PaaS(Platform as a Service)

which form of cloud computing enables teams of developers to quickly and reliably develop and deliver applications by accessing the same environment in real-time.

Paas or Platform as a Service

Engages in best practices for information systems

Part of the role of an IT professional association

Provides professional standards for ethical behavior

Part of the role of an IT professional association

Each computer is roughly equal to every other computer.

Peer-to-peer

What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?

Ports

Which characteristic identifies application software that is cloud-based?

Provided by third-party providers

What is part of the role of an It professional assocation?

Provides professional standards for ethical behavior.

Temporarily stores data before it is processed and sent to your screen or printer.

RAM

Volitile memory that disappears when the computer is turned off or loses power.

RAM

Which is found on the motherboard and stores information, but the information is not permanent?

RAM

________________ is a general term that describes any attack that takes advantage of humans' trusting nature.

Social engineering

Which two software application packages would be classified as productivity software?

Spreadsheet program and word processor

Which data type is used to represent product order code that comprises alphanumeric characters?

String data

The device that permits information to move between each component.

The bus

During which generation did computers begin to see widespread use in business?

Third generation

In which generation were silicon chips first used in computers?

Third generation

What is the database administrators role in security?

To institute protocols to protect the databases from external threats.

A service portfolio is simply a list of the services the department offers?

True

The selection operation takes rows from one table and creates a new table?

True

The abbreviation "URL" indicates:

Uniform Resource Locator

Which type of systems testing includes having developers test internal structures of software?

White box

Which component facilitates communication between the other two components in the MVC architecture model?

controller

What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?

copyright

Which item is a storage device?

flash drive

Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.

high level language

What does http stand for?

hypertext transfer protocol

Android, Chrom, and iOS are common operating systems for which type of computer?

mobile devices

The name, address, and telephone number of each individual patient in Dr. Alan's office is known as a:

record

the programs and other operating information used by the computer

software

proprietary software produced by a company that commercially markets software

software house

what type of computer still uses silicon chips?

tablet

While hardware is ______, software is ______

tangible and intangible

Which data format is not in an easily usable format and takes greater effort to extract?

unstructured

The people who use the computer system

users

What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system?

utility software

Which of the following would NOT be considered hardware?

word processor

Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply.

-By knowing the purpose, the developer can determine how many fields are needed in the database. -The purpose determines the structure of the database. -The developer can determine which data types would help fulfill the purpose.

Which of the following describes the knowledge stage in the DIKW model? Number of hours worked by an employee. A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions. Average number of hours worked by department. Report on employee attendance.

A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.

Which action by application programs requires support from a networked operating system?

An Internet browser displays a web page.

What is the main difference between a compiled language and an interpreted language?

An interpreted language runs inside of a special environment called the interpreter.

A stand alone entity that would be programmed to handle its own internal methods as well as messages received from other objects.

An object

What are two necessary elements of business continuity planning?

Assessing key organizational activities. Identifying risks that may occur

Which goal of information Assurance (IA) requires that information is accessible when needed?

Availability

The basic operating system that runs when a computer is first turned on. It runs test of memory and the cpu,and initilizes hardware components so that the actual Operating system can be loaded from the hard disk.

BIOS ROM

What type of information processing allows input data to be accepted as a set of records and processed as a unit?

Batch processing

Less reliance on internal IT expertise.

Benefits of cloud computing

Which statement is NOT true of compilers and interpreters? All errors must be debugged before a compiler can compile the source code. Interpreters translate and execute one line of source code at a time. Perl and Python are examples of programming languages that use an interpreter. Compilers do not translate source code into machine code.

Compilers do not translate source code into machine code. A

Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law.

Computer Fraud and Abuse Act

Select the statement that best describes the difference between software and hardware.

Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.

What step should be taken by a business when a third-party solution is found that will benefit a project?

Contact the group to arrange a demo of their product

What step should be taken by a business when a third-party solution is found that will benefit a project?

Contact the group to arrange a demo of their product.

Which two components are parts of a central processing unit?

Control Unit (CU)

Retrieves instructions and raw data (input) and manages the transmission of the instructions and data to the alu.

Control unit

Which two components are parts of a central processing unit (CPU)?

Control unit (CU) Arithmetic logic unit (ALU)

Which benefit is provided by a computer network in a business?

Cost for hardware resources are decreased.

What is an advantage of outsourcing?

Cost-effective if time is constrained

Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?

Costs for hardware resources are decreased

Which risk assessment question is part of the Initiation Phase?

Could the end users reject the outcome of the project?

Which risk assessment question is part of the initiation phase?

Could the end users reject the outcome of the project?

Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?

Data

Which of the following best describes a hierarchical database format?

Data are modeled using parent-child relationships.

An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?

Data mirroring

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Data mirroring

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Data mirrorring

What is the purpose of the End User License Agreement for a commercial software package?

Establishes the customer's right tot use the software.

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?

Expanding the infrasturcture to support additional locations.

Which of the following best describes the purpose of expansion slots in modern computers?

Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.

Which two computer peripherals are connected to the computer through a port?

External microphone and USB flash drive

The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.

FROM

Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?

FROM

Which sql clause is used to inform the database management system which table should be interrograted by the query?

FROM

Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast.

False

The four computers based on size and processing speed are supercomputers, workstation, mainframe, and microcomputer.

False

_____________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Waterfall Prototyping Extreme programming Agile methods

Agile methods

Which of the following statements represents the relevant characteristic of quality data? Select all that apply. The data used applies to the question being answered. The data has been gathered using consistent, detailed collection processes. The data has been inputted correctly and is accurate for its intended use. The data is current enough to still serve its purpose for being accessed.

All of the above

Which of the following are the three main categories of databases?

Hierarchical , Flat File, Relational

What is a tree-like structure of records in a database referred to as?

Hierarchical database structure

A monitor is a peripheral device for what system?

I/O (input/output)

A scanner is a peripheral device for what system?

I/O (input/output)

What indicates a specific Internet location?

IP address

Which department supports day-to-day technology needs of an organization?

IT

Within this CLOUD computing function all the resources hardware and software(e.g., servers, data storage) an IT department needs are located outside of the organization and are accessible by anyone, anywhere

IaaS (Infrastructure as a Service)

Which cloud service provides all the resources (servers, data storage) tha an IT dept needs ouside of the org making them accessible by anyone, anywhere

IaaS or Infrastructure as a Service

What are two necessary elements of business continutiy planning?

Identifying risks that may occur

A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following?

Image backups

Which system requirement is an example of considering user needs in the design of an information system?

Allowing easy access to customer account information.

Which statement correctly describes the operating system?

Allows the user to control the actions of the software, and through the software, to access hardware

Which term is defined as a collection of information used to support management of an organization?

Information system

What is the correct order of project phase for Project Management?

Initiation, Planning, Executing, Closing

What does the acronym IPOS stand for?

Input, process, output, storage. (IPOS) represent the different tasks of computers.

What is another term that defines a script?

Interpreted program

What is one of IT's role in golobalization?

It allows companies to reach a wider customer base.

What is one of IT's roles in globalization?

It allows companies to reach a wider customer base.

What is the purpose of an IT department?

It helps the organization achieve strategic goals.

What effect does scope creep have on a project?

It increases unplanned costs for the project.

Read the following scenario and determine the best hardware or software solution for the situation. Teachers in the Lincoln County School District are complaining about the speed of the Internet in their classrooms. Marcus, the IT Coordinator, has a limited amount of money to spend to address the issue. Select the option below that uses hardware or software to help solve the problem.

Marcus determines the school's routers that transmit information from the Internet across the district are slow and outdated, so he will use the money to replace them.

In which type of network topology is each networked device directly connectd to every other networked device?

Mesh

In which type of network topology is each networked device directly connected to every other networked device?

Mesh

Which of the following technologies was introduced in the fourth generation of computers?

Microprocessors

What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?

Moore's law

Which IT position has the responsibillity of working with routers and switches?

Network Administrator

Which of the following statements describes why network protocols are necessary.

Network protocols are necessary for computers to communicate with each other.

Which of the following is/are true of the IPOS cycle?

Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.

What is the difference between proprietary and open-source software license?

Open-source software can be freely modified whereas proprietary software cannot be modified.

__________ uses the concept of reflection of light through a core made up of glass or plastic.

Optical wire

What are the risks of cloud computing?

Org becomes dependent on the reliability and performance of a third party vendor.

Which type of systems conversion involves starting the conversion with a portion of end users?

Pilot

In what phase of a project does time estimation occur?

Planning

What is the difference between processing and storage?

Processing collects and translates data into useful information, while storage places the translated data in specific locations.

What is the difference between processing and storage?

Processing involves temporary information, while storage involves permenant information.

What is the difference between proprietary and open-source software license?

Proprietary software has a cost whereas open-source software is free.

___________ is ephemeral, meaning data stored is lost when the computer is powered off.

RAM

What does RFID stand for?

Radio frequency identification device

Which communication medium is typically used when sending data transmissions over very long distances?

Radio signals

Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?

Radio signals

a dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?

Reliable

What is one probable advantage of outsourcing?

Reliance can be placed on the expertise of outsourcing vendors.

Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?

Resource path ID

Which part of a Uniform Resource Locator identifies the location of the document on the server?

Resource path id

Which of these is NOT a category of risk in a project Risks in execution Risks in integration Risks in deployment Risks of the unknown

Risks in deployment

Which device permits packet switching so that a message can be routed to the next link in a network?

Router A router is a device that permits packet switching in order to send messages to the next link in the network.

Which two are both types of scripting languages?

Ruby and Python

The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in).

SELECT

Thru this CLOUD computing function, businesses can access and use software through the Internet?

SaaS (Software as a Service)

What is a cloud model that delivers third-party software such as email or games through the internet?

SaaS (Software as a Service)

What allows an organization to use software through the internet?

Saas or Software as a Service

what cloud service provides access and use of software to businesses through the internet?

Saas or software as a service

Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?

Security Breach Notification laws

Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?

Security Breach Notification laws

What type of software permits free temporary use followed by long term activation for a fee?

Shareware

What type of software permits free temporary use followed by long-term activation for a fee?

Shareware

What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards?

Slots. Incorrect answers: Hard drives. Bays. Ports.

Which of the following types of information present a threat to someone's privacy?

Student ID and credit card numbers

Which statement describes the role of a systems administrator?

Systems administrators are responsible for supporting, monitoring, and maintaining workplace technology and end users.

Which language is often used for rapid prototyping and the creation of GUIs?

TCL

Which two languages have traditionally been used for automation rather than software development?

TCL and Python because they are scripting languages

Which of the following statements best defines the ALU?

The ALU processes the raw computer data, including mathematical calculations and logical operations.

Which of the following statements best defines the CPU?

The CPU controls the speed at which instructions are retrieved and processed in the computer.

Which of the following best describes the Internet?

The Internet is a global network of networks.

Also known as the chassis or cabinet.

The case of a computer

What indicates a specific internet location?

The ip address

Allows the user to control the actions of the software and through the software, to access hardware.

The operating system

controls the speed at which instructions are processed.

The system clock

What is the role of drivers in facilitating communication between application and databases?

They allow the ODBC to be used for interactions with the database and applications.

What is the role of drivers in facilitating communication between applications and databases?

They allow the application to interact with the database.

Which of the description of duties below would be for a System Administrator? This individual has responsibility for developing new software applications to improve the functionality of an organization's information technology. This individual is in charge of ensuring that the network is working properly. Duties may include connecting devices using cable, configuring individual employee computers, working with the network hardware, and troubleshooting. This individual has responsibility for all aspects of an organization's databases and database management systems. This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.

This individual updates an organization's computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system

Why is it important to ensure that data support business goals?

To aid in making strategic decisions

Why is it important to ensure that data support business goals?

To aid in making strategic decisions.

What is the purpose of a business continuity plan?

To enable an organization to continue offering critical services in the event of disruptions

What is a role of the systems administrator?

To install and maintain network resources

What is the role of the systems administrator?

To install and maintain network resources.

What is the database administrator's role in security?

To institute protocols to protect the databases from external threats

Which is not a common operating system used today? Windows Top Hat Mac Linux

Top Hat

Which description explains the role of a domain name system (DNS)?

Translates human-readable aliases into IP addresses

A service portfolio is simply a list of the services the IT department offers.

True

IT functions cover these five different domains: communication data collection and management information security management consumer relationship management process improvement

True

In the SDLC implementation phase, the design goes to the programmers who translate it into code to execute the plan.

True

In the design phase of the SDLC, architects think about the components they would need to solve the problem or implement the plan.

True

RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off?

True

Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files.

True

The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document.

URL

Which of the following are operations used to alter the data within a relation of a database?

Update, Delete, Insert

Which action would support confidentiality?

Updating security software.

Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?

User Acceptance

During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders.

User Acceptance Testing

The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.

WHERE clause

What is outside of the rold of an IT professional assocation?

Writes laws dealing with information technology

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario?

data

Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?

data

in the dikw, what is data?

data is the input directly received by human or computer.

What is the collection of names, addresses, and account balances of all the patients of Mei's office more technically known as?

database

permits database access across a network. Performs tasks such as data analysis, data manipulation, security, and archiving.

database server

A ____________ is also known as a datasheet.

database table

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?

desktop

computer with the most amount of performance capability

desktop

________, sometimes referred to as middleware, facilitate the communication of hardware and software.

device driver

a piece of the operating system that provides specific interfaces between the OS running a computer and hardware.

device drivers

consists of long term storage devices

disk drives

Translates human readable aliases into IP addresses

domain name system (DNS)

software more specific towards artists and graphic designers

drawing software

This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME?

email server

________ is defined as a code of moral conduct or a set of principles that govern behavior?

ethics

Which of the following type of transmission is paired correctly with the given media?

fiber optic cable - light impulses

a computer with a large hard disk storing files that any or many users of the network may wish to access.

file server

What generation used vacuum tubes in computers?

first generation

software free from purchase, but not necessarily free in how you use it.

freeware

what types of software is ususally software that has become obsolete because a new software has replaced it, or is software that the original producer no longer wants to maintain and provide support for?

freeware

How long has Moore's law continued to be a trend?

from 1965 to the present

like a web server, this server host files and allows clients to access those files. However, it instead provides access in the form of uploading and downloading files.

ftp server

computer that has the least amount of performance

handheld

The physical components of a computer

hardware

in dikw, what is wisdom?

having both knowledge and experience

Which motherboard component helps cool the CPU?

heat sink

Which motherboard component helps cool the cpu?

heat sink

This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure).

hierarchal

Which factors should Mike NOT consider when choosing a file organization system? Hierarchy Scalability Security Data retrieval speed

hierarchy

Includes all peripheral devices for input, output, storage and network.

i/o subsystem

a location beacon that uses bluetooth technology and can be embedded in any location aware mobile device.

iBeacons

data that has been processed

information

in dikw, what is information?

information is inferred from data, meaning that one or many processes have been applied to the data to tranform it into a more useful form.

Which term is defined as a collection of information used to support management of an organization?

information system

The business case, feasibility study, and stakeholder input are 3 key elements of which project phase?

initiation

What four operations does a computer perform?

input

what does ipos stand for?

input, process, output, storage

Relies on a session and allows you to test out an idea because they are executed as they're written.

interpreter

loaded when the computer is first booted, included components that handle process mgmt, resource mgmt, and memory mgmt

kernel

As a new sales manager, Edgar is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Edgar working?

knowledge

In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?

knowledge

which is a characterisc of high level languages?

language translator programs are required.

computer that has the mid amount of performance capability

laptop

software stored on an individual computer

local application

What is NOT part of data hygiene? Data is valid Lots of data Free from malicious or inadvertent tampering Data is good

lots of data

A program written in a high-level language must be converted into __________ code to be executed by the computer.

machine

Which low-level language corresponds one to one with assembly?

machine language

Which low-level language corresponds one-to-one with assembly?

machine language

a programming language that is a lengthy list of 1s and 0s.

machine language

A single chip process developed in 1974 by IBM

microprocessor

a collection of computers and resources connected by various media so they can communicate with each other.

network

Which IT position has the responsibility of working with routers and switches?

network administrator

Is moore's law an observation or a physical law?

observation

software created in the open source community and made freely available as source code

open source

This type of software is made freely available as source code.

open source software

What is a program that will allow a computer to easily access the hardware and software of the computer system?

operating system

Each computer is roughly equal to every other computer.

peer-to-peer

Which type of systems conversion involves starting the conversion with a portion of end users?

pilot

The fetch-execute cycle is performed in an overlapped fashion on several instructions.

pipelines cpu

In what phase of a project does time estimation occur?

planning

Project managers work with project scope, the management plan, and SMART frameworks in this project phase?

planning

Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?

planning

During this phase of Project Management, the projects scope and project management plan are defined

planning phase

Can connect additional input, output, storage, and communication devices

ports

On which tier of the n tier architecture model are user interfaces developed?

presentation

Which field must contain a unique value in order for a relational database table to function?

primary key

An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?

printer

An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used?

printer, monitor

also referred to as horizontal software

productivity software

consists of applications that are usefule to everyone such as word processor, presentation software, spreadsheet program, database mgmt systems, calendar program, address book, and data organizer.

productivity software

commercial software purchased from a vendor

proprietary

Which characteristic identifies application sotware that is cloud based?

provided by third party providers

The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need?

proxy server

Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.

proxy server

what type of server has the capability of blocking specific servers and rejecting responses that contain certain content?

proxy server

Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or no risk?

public

software that has been moved into the public domain and are made available as executables.

public domain

in dikw, what is knowledge?

refined information that hte user of the knowledge is able to call forth only relevant portions of information when needed.

This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables.

relational

Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier?

relational database

which characteristic of quality data requires data being used to be applied directly to the decision being made.

relevance

characteristic of quality data whereas data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer based systems or a combination.

reliable

Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?

router

perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?

scripting languages

What generation of computers began to use transistors?

second

Which one of these is NOT a operation for database queries? Union Serve Product Join

serve

dedicated computers within a network whose function is to respond to network requests and provide a network service

server

works with hardware to provide a network service, types of software includes web servers, email servers, and database servers

server software

What do integrated circuits need to function?

silicon chip

can insert modem cards, wireless access cards, and other PC cards such as camera cards

slots

Which is a type of two-factor authentication?

smart card

What does the GOTO statement create?

spaghetti code

In this network topology ALL devices have a single point-to-point connection with a central device.

star network

Which data type is used to represent product order code that comprises alphanumeric characters?

string

What replaced the GOTO statement with high level control constructs such as while loops, and if-else statements, and is not allowed to use the GOTO statement?

structured programming

Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system?

system

Which software is run automatically rather than by the end user?

system software

progams that make up the operating system and directly supports the computer system itself.

system software

programs that allow the user to monitor and improve system performance

system utilities

A collection of protocols that is sometimes referred to as a protocol stack

tcp/ip

The circuitry and electrical channels that enable communication among the electronic components.

the bus

The myriad of types of devices that can and will be connected to the internet in the next few years.

the internet of things (IoT)

When a programmer enters a command, what converts that command to machine language and executes it?

the interpreter

sits on top of the hardware and is the interface between hardware and software

the kernel

the printed circuit board that houses the cpu, memory chips, and expansion cards in any computer.

the motherboard

What generation of computers introduced operating systems?

third

what generation of computers introduced the silicon chip?

third

In which generation were silicon chips first used in computers?

third generation

characteristic of quality data whereas data must be complete and not contain errors or lapses of data.

thorough

There are how many tiers of ISPs?

three

A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering?

timely

characateristic of quality data where data is provided efficiently and on time so that companies can utilize it in their business.

timely

hat is the role of a web server

to respond to HTTP requests

a requirment of all computers to communicate over the internet

transmission control protocol/ internet protocol or TCP/IP

the ability to have computation anywhere at any time

ubiquitous computing

Software used by select groups with an organization or to a specific discipline such as music sequencers, samplers, and digital recorders for muscians.

vertical software

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

virtual machines

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing mutiple computers.

virtual machines

The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP

web server

The scope of the project is considered what?

work that needs to be done

Learning about social engineering and how to protect passwords is ___.

Education

Pieces of the operating system that run in the background all of the time

daemons or services

What does BIOS stand for

Basic input output system

Which is a characteristic of high-level languages?

The source code has to be complied.

an interface for the user that provides access to the kernel

the shell

A petabytes consists of how many terabytes?

1000

A typical database application has how many layers?

2

Which is true of databases and the application that interact with them?

Applications are interdependent with the database.

What is the definition of a Platform as a Service (PaaS)?

A Platform as a Service is the ability to quickly and consistently develop and deliver applications.

What statement is true concerning compiled and interpreted computer language?

A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.

Which of the following is the best definition of a computer network?

A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

Which of the following is an accurate definition of a computer system?

A computer system is a collection of hardware and software components that work together to meet the needs of the user.

Which of the following is an example of a relational database?

A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system.

What is a primary difference between a modern handheld computer and a modern desktop computer?

A desktop has more processing power.

Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?

A desktop has more processing power.

Which of the following would NOT be the responsibility of the system administrator?

Answering e-mails from potential customers.

51. Which is true of databases and the applications that interact with them?

Applications are interdependent of the database

A company's ability to recover after a disaster is directly related to which of the following?

Business continuity plan

What is the definition of business intelligence?

Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.

How can an organization assist employees with the ethical use of information technology?

By developing policies for information usage

How can an organization assist employees with the ethical use of information technology?

By developing policies for information usage.

Over the years, the number of transisters that can be placed on a chip has increased by how much?

By orders of maginitude rather than linearly

In 2nd generation computers, which of the following high-level programming languages was created to be business-oriented?

COBOL

What are the main components in a computer?

CPU

Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.

CPU

also referred to as "the chip"

CPU

The __________________ is the electronic circuit responsible for executing computer program instructions.

Central Processing Unit

One computer will request information from another computer, which responds with requested information.

Client-server

What is the purpose of an End User License Agreement for a commercial software package?

Establishes the customer's right to use the software

Read the following scenario, and then select the job title that most accurately depicts the descriptions. Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer's office to make a brief presentation on the new database system and how it can be used most effectively.

Database Administrator

Which two are parts of an information system?

Databases and Networks.

In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan.

Design

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?

Desktop

Which answer most accurately describes the timeline of computer development? First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced. First, Graphical User Interface systems are introduced. Next, limited use of computers by large organizations. Next, computers built and programmed by engineers. Lastly, introduction of the personal computer. First, limited use of computers by large organizations. Next, computers built and programmed by engineers. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced. First, computers built and programmed by engineers. Next, Graphical User Interface systems are introduced. Next, limited use of computers by large organizations. Lastly, introduction of personal computers.

First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.

Which of the following database categories is the most similar to a spreadsheet or MS Excel document?

Flat File Database

What are the three main categories of databases?

Flat file, relational, and hierarchal

What are the three main categories of databases?

Flat file, relational, hierarchal

What two types of software licenses are free?

Freeware and Open source

What is the measurement unit used to identify clock speed on today's computers?

GHz

Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?

GOTO

What does GUI stand for?

GUI stands for Graphical User Interface.

how does a compiler work?

It requires the components of the software to be defined from the onset.

How does an interpreter work?

It takes the most recently entered instructions, converts it into machine language, and executes it.

All of the following are compiled languages except for: Javascript BASIC Java C++

JavaScript

In which category of the DIKW hierarchy would business intelligence be located?

Knowledge

All of the following are parts of a URL except for: LAN Protocol Host name TLD

LAN

In a __________ shell forward slash (/) is used to express directory paths?

Linux

What is true about the Linux operating system?

Linux runs on both servers and workstations

Which of the following would NOT require the use of a network?

Loading a statistical program on your personal computer.

What is the difference between a compiled and interpreted computer language?

compiler translates an entire program into executable progam which can be run at a later time, while the interpreter does this incrementally.

excluse right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.

copyright

A set of rules established to govern how people behave and interact with each other

a protocol

What was the operation system called in the early 1960s?

a resident monitor

Which is NOT part of the history of the computer? Abacus Leibniz Punch cards Abracadabra

abracadabra

characteristic of quality data whereas data is captured once only, where possible, and captured as close to the point of activity as possible.

accurate

sometimes referred to as root or superuser

administrator account

What is another term for a formula that outlines how to execute a task?

algorithm

During this phase of the SDLC (system development life cycle) the team determines the user requirements for the new system and develops logical models of the system?

analysis

Which type of software includes programs such as Microsoft Word and PowerPoint?

application

consists of programs that end users run to accomplish tasks. An example of a type of this software includes the email client, web browser, and ftop client

application software

Completes mathematical calculations and logical operations to process the data, converting the input of keyboard text entry to output displayed on the screen.

arithmetic logic unit

An early language translator that would translate an assembly program into machine language.

assemblers

Which goal of Information Assurance (IA) requires that information is accessible when needed?

availability

Houses CDs and DVDs, typically located on the front of the system unit for easy access.

bays

In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released.

beta

Refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.

big data

______ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use?

big data

Which technique uses all possible combination of letters and numbers to crack a password?

brute force

Which technique uses all possible combinations of letters and numbers to crack a password?

brute force

As a part of effective IT governance, the IT plan should be consistent with the organization's what?

business plan

Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database?

character string

One computer will request information from another computer, which responds with requested information.

client-server

The team will write a final report detailing the processes and outcomes of the project in which project phase?

closing

A ________ translates source code into machine language and translates the entire program, creating an executable program which can be run at a later time.

compiler

Requires that the componenets of the software all be defined from the onset and is considered to have more efficient code.

compiler

protects an original work, but no the ideas behind the work

copyright


Related study sets

Chemistry OCR A Level Chapter 4 - Acids and Redox

View Set

National Topic Tester - Valuation & Market Analysis

View Set

Fundamentals ATI Review Questions

View Set

Chapter 41: Management of Patients With Musculoskeletal Disorders

View Set

National 5 Biology- Life on Earth Test Revision

View Set

Study Guide 2: Hematologic Disorder

View Set

CISCO Cybersecurity Essentials v1.1 - Chapter 7 Quiz

View Set