D075 Extra Quiz 1 Flashcards
The Georgia Widget Company does test on their computer before an item is made and/or produced. What is this process called?
CAD testing
The HR department has set a goal of working with IT to purchase and install a Human Resources Information System (HRIS) database this fiscal year. The IT project manager would like you to draft out how you would like the data to be organized. What have you been asked to create?
Database scheme
A collection of business computer application programs of associated functionality that share a common GUI is known as __________________
Productivity Suite
Grandpa and Grandma give their grandkids birthday gifts, but only if they are younger than 18. Return “Yes” if he’s eligible, and “No” if he is not. Which IF function should be check who’s eligible for gifts this year.
=IF(B2>18,”No”,”Yes”)
Linux is considered utility software.
T/F?
False
Which characteristic identifies application software that is cloud-based?
Hosted in the internal business network
Pop-Up Doc is a new telemedicine service that has been rapidly growing due to allowing providers to work from home. Which methodology would be best for sharing information between the various service providers?
Browser-Based
Within the HRIS there will be two table. One table will include current employees the other table will include terminated employees. What is needed to link these two tables together?
A foreign key that refers to the primary key in another table
Jay, a new employee, at the Georgia Widget Company was ask to install a new version of the network operating system (NOS) on all the device in the network. In order not to look bad Jay has turned to you to learn which devices he should load the updated version of the NOS on? What do you tell Jay?
The servers
A research company has been asked to review vaccine research to verify its authenticity. The data is sensitive and if it falls into the wrong hands, the company could face legal consequences and their public image could be tarnished. What role is responsible for implementing the security permissions to protect this data?
Network Administrator
The corner coffee shop is in trouble. Recently, customers have been posting negative reviews online and the owner of the shop needs to figure out the root cause so they can take action. The owner requested all subscribers to the coffee shop mailing list complete a survey. What process describes cataloging common themes for analysis?
Topic analytics
A list of test grades for a student in one class is an example of ______
Data
Which of the following refers to integrity of a dataset?
Veracity
a controlled private network that allows access to partners, vendors, and suppliers
Extranet
has an embedded operating system and is well suited for a very specific business application.
Handheld computer