Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
76 Cards in this Set
- Front
- Back
What is the definition of IT?
|
Technology used to create, maintain, and make information accessible.
|
|
Which IT position has the responsibility of working with routers and switches?
|
Network Administrator
|
|
In which generation were silicon chips first used in computers?
|
Third generation
|
|
Which low-level language corresponds one to one with assembly?
|
Machine language
|
|
What allows an organization to use software through the internet?
|
Saas or Software as a Service
|
|
What is one of IT's role in globalization?
|
It allows companies to reach a wider customer base.
|
|
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
|
Desktop
|
|
Which two software application packages would be classified as productivity software?
|
Spreadsheet program and word processor
|
|
Which two computer peripherals are connected to the computer through a port?
|
External microphone and USB flash drive
|
|
Which term is defined as a collection of information used to support management of an organization?
|
Information system
|
|
A website logs the time-stamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the time-stamp considered in this scenario?
|
Data
|
|
A dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?
|
Reliable
|
|
Which two are parts of an information system?
|
Databases and Networks
|
|
What is the difference between processing and storage?
|
Processing involves temporary information, while storage involves permanent information
|
|
Which benefit is provided by a computer network in a business?
|
Cost for hardware resources are decreased
|
|
Which action by application programs requires support from an operating system?
|
An internet browser displays a web page
|
|
What is true about the Linux operating system?
|
Linux runs on both servers and workstations
|
|
Which characteristic identifies application software that is cloud based?
|
Provided by third party providers
|
|
What type of software permits free temporary use followed by long term activation for a fee? |
Shareware |
|
What is the purpose of the End User License Agreement for a commercial software package?
|
Establishes the customer's right tot use the software.
|
|
What is the difference between proprietary and open-source software license?
|
Proprietary software has a cost whereas open-source software is free. |
|
Which two components are parts of a central processing unit CPU?
|
Control Unit (CU) and Arithmetic logic unit (AlU)
|
|
An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?
|
Printer & monitor
|
|
Which motherboard component helps cool the CPU?
|
Heat sink |
|
Which item is a storage device?
|
Flash drive |
|
In which type of network topology is each networked device directly connected to every other networked device?
|
Mesh
|
|
Which communication medium is typically used when sending data transmissions over very long distances?
|
Radio signals
|
|
What indicates a specific internet location?
|
The IP address
|
|
Which description explains the role of a domain name system?
|
Translates human readable aliases into IP addresses
|
|
Which part of a Uniform Resource Locator identifies the location of the document on the server?
|
Resource path ID |
|
Which goal of information Assurance (IA) requires that information is accessible when needed?
|
Availability
|
|
Which technique uses all possible combination of letters and numbers to crack a password?
|
Brute force
|
|
Which is a type of two-factor authentication?
|
Biometrics
|
|
Which is a characteristic of high level languages?
|
Language translator programs are required.
|
|
How does a compiler work?
|
It requires the components of the software to be defined from the onset.
|
|
On which tier of the n tier architecture model are user interfaces developed?
|
Presentation
|
|
Which component facilitates communication between the other two components in the MVC architecture model?
|
Controller
|
|
Which two languages have traditionally been used for automation rather than software development?
|
TCL and Python because they are scripting languages
|
|
Which is true of databases and the application that interact with them?
|
Applications are interdependent with the database.
|
|
What is another term for a formula that outlines how to execute a task?
|
Algorithm
|
|
What is the role of drivers in facilitating communication between application and databases?
|
They allow the ODBC to be used for interactions with the database and applications
|
|
Which SQL clause is used to inform the database management system which table should be interrogated by the query?
|
FROM
|
|
Which data type is used to represent product order code that comprises alphanumeric characters?
|
String data
|
|
Why is it important to ensure that data support business goals?
|
To aid in making strategic decisions
|
|
In which category of the DIKW hierarchy would business intelligence be located?
|
Knowledge
|
|
Which field must contain a unique value in order for a relational database table to function?
|
Primary key
|
|
What are the three main categories of databases?
|
Flat file, relational, and hierarchal
|
|
What is the database administrators role in security?
|
To institute protocols to protect the databases from external threats
|
|
What type of information processing allows input data to be accepted as a set of records and processed as a unit?
|
Batch processing
|
|
What is the role of the systems administrator?
|
To install and maintain network resources.
|
|
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?
|
Expanding the infrastructure to support additional locations.
|
|
What step should be taken by a business when a third-party solution is found that will benefit a project?
|
Contact the group to arrange a demo of their product.
|
|
Which risk assessment question is part of the initiation phase?
|
Could the end users reject the outcome of the project?
|
|
In what phase of a project does time estimation occur?
|
Planning
|
|
What effect does scope creep have on a project?
|
It increases unplanned costs for the project
|
|
Which system requirement is an example of considering user needs in the design of an information system?
|
Allowing easy access to customer account information
|
|
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
|
User Acceptance
|
|
Which type of systems conversion involves starting the conversion with a portion of end users?
|
Pilot
|
|
What are two necessary elements of business continuity planning?
|
Identifying risks that may occur Assessing key organizational activities
|
|
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
|
Data mirroring
|
|
Which action would support confidentiality?
|
Updating security software
|
|
Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?
|
Security Breach Notification laws
|
|
How can an organization assist employees with the ethical use of information technology?
|
By developing policies for information usage
|
|
Which statement correctly describes the operating system
|
Allows the user to control the actions of the software, and through the software, to access hardware |
|
The chief information officer wants to update the network server to improve internet access while also blocking certain social media websites.
|
Proxy server |
|
What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?
|
Copyright? |
|
What statement is true concerning compiled and interpreted computer language?
|
A compiler translates the entire program, creating an executable program, which can be run at a later time, while the interpreter does this incrementally. |
|
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of the pieces of art is stored using an assigned name and number.
|
String data? |
|
What is the purpose of an IT department
|
It helps the organization achieve strategic goals |
|
Provides professional standards for ethical behavior |
Outside of the role of an IT professional association? |
|
Writes laws dealing with information technology |
Part of the role of an IT professional association? |
|
Engages in best practices for information systems |
Part of the role of an IT professional association? |
|
Which benefit it's provided by a computer network in a business? |
Costs for hardware resources are decreased? |
|
A software emulator program that permits a computer user to use multiple computers and multiple computers platforms. |
Virtual Machines |
|
One computer will request information from another computer, which responds with requested information. |
Client server |
|
Each computer is roughly equal to every other computer |
Peer-to-peer |