Intro to IT Flashcards
True/False
Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast.
False
Which of the following technologies was introduced in the fourth generation of computers?
A. Magnetic Core Memory
B. Microprocessors
C. Disk Drives
D. Integrated Circuits
B. Microprocessors
True/False
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off.
True
What does the acronym IPOS stand for?
A. Identify, process, outcome, summary
B. Input, prepare, overview, save
C. Input, process, output, storage
D. Identify, post, optimize, storage
C. Input, process, output, storage
What is NOT part of data hygiene?
A. Data is valid
B. Lots of data
C. Free from malicious or inadvertent tampering
D. Data is good
B. Lots of data
Which of the following statements best defines the ALU?
A. The ALU is responsible for storing data as it is processed
B. The ALU retrieves the instructions of a computer program and the raw data that is input.
C. The ALU contains circuitry that performs operations on data such as addition and subtraction.
D. The ALU controls the speed at which instructions are retrieved and processed in the computer.
C. The ALU contains circuitry that performs operations on data such as addition and subtraction.
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards?
A. Hard drives
B. Bays
C. Ports
D. Slots
D. Slots
Which of the following type of transmission is paired correctly with the given media?
A. Fiber optic cable - light impulses
B. Coaxial cable - radio waves
C. Coaxial cable - light impulses
D. Fiber optic cable - electricity
A. Fiber optic cable - light impulses
A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following?
A. Image backups
B. Data mirroring
C. Backup media
D. Incremental backups
A. Image backups
What is a tree-like structure of records in a database referred to as?
A. Flat file
B. Relational database structure
C. Hierarchical database structure
D. Field
C. Hierarchical database structure
True/False
The selection operation takes columns from one table and creates a new table
True
A typical database application has how many layers?
A. 2
B. 4
C. 6
D. Infinite
A. 2
True/False
In the design phase of the SDLC, architects think about the components they would need, to solve the problem or implement the plan.
True
_________________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements.
A. Waterfall
B. Prototyping
C. Extreme programming
D. Agile methods
D. Agile methods
Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
A. Hierarchical
B. Isolated
C. Flat file
D. Relational
C. Flat file
What is a primary difference between a modern handheld computer and a modern desktop computer?
A. A handheld has more processing power
B. A desktop is more usable
C. A desktop has more processing power
D. A handheld is more usable
C. A desktop has more processing power
What does GUI stand for?
A. Graphic User Interchange
B. Graphic Utility Interface
C. Graphical User Interface
D. Graphical User Interchange
C. Graphical User Interface
True/False
IT functions cover these five different domains:
-communication
-data collection and management
-information security management
-consumer relationship management
-process improvement
True
Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier?
A. Hierarchical database
B. Flat-file database management system
C. Relational database
D. Data management
C. Relational database
Project managers work with project scope, the management plan, and SMART frameworks in this project phase.
A. Closing
B. Initiation
C. Executing
D. Planning
D. Planning
What is the collection of names, addresses, and account balances of all the patients of Mei’s office more technically known as?
A. Database
B. Key field
C. Record
D. Sheet
A. Database
Which statement is NOT true of compilers and interpreters?
A. All errors must be debugged before a compiler can compile the source code
B. Interpreters translate and execute one line of source code at a time.
C. Perl and Python are examples of programming languages that use an interpeter
D. Compilers do not translate source code into machine code
D. Compilers do not translate source code into machine code
As part of effective IT governance, the IT plan should be consistent with the organization’s what?
A. Information security plan
B. Business continuity plan
C. Business plan
D. Risk management plan
C. Business plan
True/False
A service portfolio is simply a list of the services the IT department offers
True
What is the purpose of a business continuity plan?
A. To assess risks for key processes in the event of man-made disasters.
B. To enable an organization to continue offering critical services in the event of disruptions.
C. To develop plans for continued business operations regardless of the circumstances.
D. To identify who is responsible for permanent growth of the business in the event of natural disasters.
B. To enable an organization to continue offering critical services in the event of disruptions.
What two types of software licenses are free?
A. Open source and proprietary
B. Proprietary and shareware
C. Freeware and open source
D. Shareware and freeware
C. Freeware and open source
A web page’s URL (uniform resource locator) has three main parts:
A. URL, network, IP address
B. The protocol, the domain name, and the resource or file name
C. Computer networks allow individuals to share hardware such as printers, but not software
D. Computer networks allow individuals to share many types of resources.
B. The protocol, the domain name, and the resource or file name.
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?
A. Router
B. Server
C. Switch
D. ISP
A. Router
Which of the following describes the wisdom stage in the DIKW model?
A. Number of hours worked by an employee
B. A management decision on how many people to hire after observing current employee levels and up-coming market promotions.
C. Average number of hours worked by department.
D. Report on employee attendance
B. A management decision on how many people to hire after observing current employee levels and up-coming market promotions.
Which of these is NOT a category of risk in a project?
A. Risks in execution
B. Risks in integration
C. Risks in deployment
D. Risks of the unknown
C. Risks in deployment
The business case, feasibility study, and stakeholder input are 3 key elements of which project phase?
A. Closing
B. Initiation
C. Executing
D. Planning
B. Initiation
Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?
A. A desktop is more usable
B. A desktop has more processing power
C. A handheld is more usable
D. A handheld has more processing power
B. A desktop has more processing power
Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or not risk?
A. Public
B. Private
C. Top secret
D. Confidential
A. Public
__________ translates source code into machine language and translates the entire program creating an executable program which can be run at a later time.
A. Interpreter
B. COBOL program
C. Compiler
D. High level language
C. Compiler
Which factors should Mike NOT consider when choosing a file organization system?
A. Hierarchy
B. Scalability
C. Security
D. Data retrieval speed
A. Hierarchy
Which of the following is the best definition of a computer network?
A. A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software.
B. A computer network is a collection of computers and computer resources connected in such a way that the computers can communicate with each other and their resources.
C. A computer network consists of one computer connected wirelessly to a printer.
D. A computer network consists of a number of computers connected via a device that allows them to connect to the internet.
B. A computer network is a collection of computers and computer resources connected in such a way that the computers can communicate with each other and their resources.
Which data format is not in an easily usable format and takes greater effort to extract?
A. Structured
B. Unstructured
B. Unstructured
The abbreviation “URL” indicates:
A. Unified reader link
B. Uniform resource locator
C. United rendering lists
D. Undetermined resource location
B. Uniform resource locator
Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last 5 years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer’s office to make a brief presentation on the new database system and how it can be used most effectively.
What job title most effectively depicts Javier’s position?
A. Database administrator
B. Network administrator
C. System administrator
D. Security administrator
A. Database administrator
What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system?
A. Utility software
B. Device drivers
C. System services
D. Kernel
A. Utility Software
Which type of systems testing includes having developers test internal structures of software?
A. White-box
B. Beta
C. User acceptance
D. Analysis
A. White-box
The name, address, and telephone number of each individual patient in Dr. Alan’s office is known as a:
A. Record
B. File
C. Key field
D. Database
A. Record
True/False
Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files.
True
Which is not a common operating system used today?
A. Windows
B. Top hat
C. Mac
D. Linux
B. Top hat
A monitor is peripheral device for what system?
A. I/O
B. Storage
A. I/O
_____________ is defined as a code of moral conduct or a set of principles that govern behavior.
A. Morals
B. Ethics
C. Obligations
D. Principles
B. Ethics
Which of the following statements describes why network protocols are necessary?
A. Network protocols are necessary for a home computer that is not connected to the internet or any other device.
B. Network protocols prevent computer hacking
C. Network protocols are required by international laws
D. Network protocols are necessary for computers to communicate with each other.
D. Network protocols are necessary for computers to communicate with each other.
SQL (Structured Query Language), a query for databases, was invented by:
A. Linux
B. Cisco
C. HP
D. IBM
D. IBM
True/False
In the SDLC implementation phase, the design goes to the programmers who translate it into code to execute the plan
True
Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?
A. Wisdom
B. Information
C. Knowledge
D. Data
B. Information
Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law.
A. Electronic communication privacy act.
B. Computer fraud and abuse act
C. Federal information security management act
D. Anticybersquatting consumer protection act
B. Computer fraud and abuse act
Which is NOT part of the history of the computer?
A. Abacus
B. Leibniz
C. Punch cards
D. Abracadabra
D. Abracadabra
What is one probably advantage of outsourcing?
A. More control can be exercised over IT processing
B. Reliance can be placed on the expertise of outsourcing vendors
C. Employee satisfaction may increase
D. The organization can transfer its accountability in terms of privacy laws
B. Reliance can be placed on the expertise of outsourcing vendors
________ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.
A. Algorithms
B. Database management systems
C. Big data
D. Relational databases
C. Big data
Which department supports day-to-day technology needs of an organization?
A. Management
B. IT
C. Marketing
D. Finance
B. IT
While hardware is _________, software is______.
A. Intangible, tangible
B. Tangible, everlasting
C. Tangible, intangible
D. Free, shareware
C. Tangible, intangible
Within this CLOUD computing function, all the resources hardware and software an IT department needs are located outside of the organization and are accessible by anyone, anywhere:
A. PAAS (platform as a service)
B. SAAS (software as a service)
C. IAAS (infrastructure as a service)
C. IAAS (infrastructure as a service)
During this phase of the SDLC the team determines the user requirements for the new system and develops logical models of the system?
A. Logical design
B. Physical design
C. Implementation
D. Analysis
D. Analysis
There are how many tiers of ISPs?
A. One
B. Two
C. Three
D. Four
C. Three
Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system?
A. Microsoft power point
B. Application
C. Server
D. System
D. System
Which one of these is NOT an operation for database queries?
A. Union
B. Serve
C. Product
D. Join
B. Serve
Through this CLOUD computing function, businesses can access and use software through the internet.
A. PAAS (platform as a service)
B. SAAS (software as a service)
C IAAS (infrastructure as a service)
B. SAAS (software as a service)
A petabyte consists of how many terabytes?
A. 100
B. 10000
C. 1500
D. 1000
D. 1000
Scope creep can impact the allocation of which of the following resources?
A. Time
B. Capital
C. Time and capital
D. The number of staff
C. Time and capital
Project managers use business cases and feasibility studies in which project phase?
A. Initiation
B. Planning
C. Monitoring & controlling
D. Closing
A. Initiation
A company’s ability to recover after a disaster is directly related to which?
A. Marketing strategy
B. Financial plan
C. Business continuity plan
D. IT department
C. Business continuity plan
Describe the timeline of computer development.
- Computers built and programmed by engineers
- Limited use of computers by large organizations
- Introduction of personal computers
- Graphical user interface systems introduced.
Which 2 best describe hierarchical databases?
A. Parent-child relationships
B. Amazon’s customer database
C. A spreadsheet
D. A tree-like structure
A. Parent-child relationships and
D. A tree-like structure
What rights does the End User License Agreement for proprietary software typically give to purchasers?
A. Rights to modify the software
B. Freedom to share the software with others
C. Ownership rights to the software
D. The right to use the software
D. The right to use the software
What is the difference between memory and the hard drive?
Memory stores instructions and data used by programs in the moment; a hard drive stores data, programs and files that can be accessed at a future time.
Which 3 are used for disaster recovery and business continuity?
A. Data mirroring
B. Data analysis
C. Data backups
D. Off-site storage
A. Data mirroring
C. Data backups
D. Off-site storage
Determining the project scope or the work that needs to be completed is in what project phase?
A. Initiation
B. Planning
C. Executing
D. Closing
B. Planning
Which generation did computers begin to see widespread use in homes and offices?
A. Third generation
B. Fourth generation
C. Second generation
D. First generation
B. Fourth generation
What is the definition of PaaS?
A Platform as a Service (PaaS) is the ability to quickly and consistently develop and deliver applications.
What 2 could be a field in a database?
A. Sales
B. 19943-5568
C. 63.2%
D. Gender
A. Sales
D. Gender
Which best describes the internet?
A. The internet is an isolated computer network
B. The internet uses circuit switching
C. In order to communicate over the internet, a host does not need to run the IP network protocol.
D. The internet is a global network of networks.
D. The internet is a global network of networks
Which is NOT an important characteristic of an IT role?
A. Ability to troubleshoot
B. Desire to continually learn
C. Good written and oral communication skills
D. Strong math background and programming skills
D. Strong math background and programming skills
During implementation , which testing assesses whether the system functions and is useful?
A. User acceptance
B. Deployment
C. Alpha
D. Beta
A. User acceptance
The use of IT has allowed businesses to have
A. Small customer bases
B. Fewer privacy/security concerns
C. More tools for communicating
D. Local reach
C. More tools for communicating
Which of the following operators is used to select all of a certain data?
A. *
B. <>
C. LIKE
D. =
A. *
Which is a threat to privacy?
A. Names and addresses in a phone book
B. Phone numbers and email addresses
C. Student ID and credit card numbers
D. Secret business plans
C. Student ID and credit card numbers D