Foundations of ITM — 25% of assessment Flashcards
A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments.
Which term refers specifically to this type of device?
Handheld computer
What is the major function of a computer operating system?
Computer resource management
Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory?
Copy and paste
What are the basic components, in addition to computers, that are required for a local network to function?
Ethernet cards, a common protocol, ethernet cables, and a hub
Example of an ethernet card?
Network interface controller (NIC)
What is the purpose of a MAC address?
To uniquely identify a computer on a network
Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail?
A star topology
A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers.
After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?
A password
Many websites keep track of a user’s actions and information. They store much of this information on the user’s computer in a private folder on the hard drive.
What are these very small files called?
Tracking cookies
What is the purpose of a universal serial bus (USB) on a laptop or desktop computer?
It allows the computer to connect peripheral devices
Which category of software includes programs such as word processors and PDF document readers?
Application software
What is the defining characteristic of a part of a system that is considered a point of failure?
It causes everything to stop if it fails.
Computer system administrators protect the organization when they require strong passwords to connect to the server, enact policies for safe internet browsing, and install malware-protection software to keep unwanted users and viruses out.
Which term is used to describe this set of practices?
Network security
How does a Gantt chart facilitate project management?
It identifies and sequences the tasks of a project.
What is the title of the person in the organization who is directly responsible for the setup and operation of the organization’s networks, including hardware and software?
Network administrator