Intro to IT Flashcards

1
Q

True/False
Hot storage is a low cost and slow means of storing critical data, while cold storage is high cost and fast.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following technologies was introduced in the fourth generation of computers?
A. Magnetic Core Memory
B. Microprocessors
C. Disk Drives
D. Integrated Circuits

A

B. Microprocessors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered off.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the acronym IPOS stand for?
A. Identify, process, outcome, summary
B. Input, prepare, overview, save
C. Input, process, output, storage
D. Identify, post, optimize, storage

A

C. Input, process, output, storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is NOT part of data hygiene?
A. Data is valid
B. Lots of data
C. Free from malicious or inadvertent tampering
D. Data is good

A

B. Lots of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements best defines the ALU?
A. The ALU is responsible for storing data as it is processed
B. The ALU retrieves the instructions of a computer program and the raw data that is input.
C. The ALU contains circuitry that performs operations on data such as addition and subtraction.
D. The ALU controls the speed at which instructions are retrieved and processed in the computer.

A

C. The ALU contains circuitry that performs operations on data such as addition and subtraction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless access cards, and other PC cards?
A. Hard drives
B. Bays
C. Ports
D. Slots

A

D. Slots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following type of transmission is paired correctly with the given media?
A. Fiber optic cable - light impulses
B. Coaxial cable - radio waves
C. Coaxial cable - light impulses
D. Fiber optic cable - electricity

A

A. Fiber optic cable - light impulses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A form of backup that creates a copy of everything that is on a hard drive including the OS, programs, and configuration files. This statement best describes which of the following?
A. Image backups
B. Data mirroring
C. Backup media
D. Incremental backups

A

A. Image backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a tree-like structure of records in a database referred to as?
A. Flat file
B. Relational database structure
C. Hierarchical database structure
D. Field

A

C. Hierarchical database structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/False
The selection operation takes columns from one table and creates a new table

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A typical database application has how many layers?
A. 2
B. 4
C. 6
D. Infinite

A

A. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/False
In the design phase of the SDLC, architects think about the components they would need, to solve the problem or implement the plan.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________________ are system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements.
A. Waterfall
B. Prototyping
C. Extreme programming
D. Agile methods

A

D. Agile methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
A. Hierarchical
B. Isolated
C. Flat file
D. Relational

A

C. Flat file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a primary difference between a modern handheld computer and a modern desktop computer?
A. A handheld has more processing power
B. A desktop is more usable
C. A desktop has more processing power
D. A handheld is more usable

A

C. A desktop has more processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does GUI stand for?
A. Graphic User Interchange
B. Graphic Utility Interface
C. Graphical User Interface
D. Graphical User Interchange

A

C. Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True/False
IT functions cover these five different domains:
-communication
-data collection and management
-information security management
-consumer relationship management
-process improvement

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which is a database structure containing multiple tables (relations) with interrelated fields and has a unique identifier?
A. Hierarchical database
B. Flat-file database management system
C. Relational database
D. Data management

A

C. Relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Project managers work with project scope, the management plan, and SMART frameworks in this project phase.
A. Closing
B. Initiation
C. Executing
D. Planning

A

D. Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the collection of names, addresses, and account balances of all the patients of Mei’s office more technically known as?
A. Database
B. Key field
C. Record
D. Sheet

A

A. Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which statement is NOT true of compilers and interpreters?
A. All errors must be debugged before a compiler can compile the source code
B. Interpreters translate and execute one line of source code at a time.
C. Perl and Python are examples of programming languages that use an interpeter
D. Compilers do not translate source code into machine code

A

D. Compilers do not translate source code into machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

As part of effective IT governance, the IT plan should be consistent with the organization’s what?
A. Information security plan
B. Business continuity plan
C. Business plan
D. Risk management plan

A

C. Business plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True/False
A service portfolio is simply a list of the services the IT department offers

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of a business continuity plan?
A. To assess risks for key processes in the event of man-made disasters.
B. To enable an organization to continue offering critical services in the event of disruptions.
C. To develop plans for continued business operations regardless of the circumstances.
D. To identify who is responsible for permanent growth of the business in the event of natural disasters.

A

B. To enable an organization to continue offering critical services in the event of disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What two types of software licenses are free?
A. Open source and proprietary
B. Proprietary and shareware
C. Freeware and open source
D. Shareware and freeware

A

C. Freeware and open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A web page’s URL (uniform resource locator) has three main parts:
A. URL, network, IP address
B. The protocol, the domain name, and the resource or file name
C. Computer networks allow individuals to share hardware such as printers, but not software
D. Computer networks allow individuals to share many types of resources.

A

B. The protocol, the domain name, and the resource or file name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?
A. Router
B. Server
C. Switch
D. ISP

A

A. Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following describes the wisdom stage in the DIKW model?
A. Number of hours worked by an employee
B. A management decision on how many people to hire after observing current employee levels and up-coming market promotions.
C. Average number of hours worked by department.
D. Report on employee attendance

A

B. A management decision on how many people to hire after observing current employee levels and up-coming market promotions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of these is NOT a category of risk in a project?
A. Risks in execution
B. Risks in integration
C. Risks in deployment
D. Risks of the unknown

A

C. Risks in deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The business case, feasibility study, and stakeholder input are 3 key elements of which project phase?
A. Closing
B. Initiation
C. Executing
D. Planning

A

B. Initiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which statement is correct given that usability is very subjective, and handheld and desktop computers may be more or less usable based on the demands of the user?
A. A desktop is more usable
B. A desktop has more processing power
C. A handheld is more usable
D. A handheld has more processing power

A

B. A desktop has more processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which classification for documents is used when the unauthorized disclosure, alteration, or destruction of data would result in little or not risk?
A. Public
B. Private
C. Top secret
D. Confidential

34
Q

__________ translates source code into machine language and translates the entire program creating an executable program which can be run at a later time.
A. Interpreter
B. COBOL program
C. Compiler
D. High level language

A

C. Compiler

35
Q

Which factors should Mike NOT consider when choosing a file organization system?
A. Hierarchy
B. Scalability
C. Security
D. Data retrieval speed

A

A. Hierarchy

36
Q

Which of the following is the best definition of a computer network?
A. A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software.
B. A computer network is a collection of computers and computer resources connected in such a way that the computers can communicate with each other and their resources.
C. A computer network consists of one computer connected wirelessly to a printer.
D. A computer network consists of a number of computers connected via a device that allows them to connect to the internet.

A

B. A computer network is a collection of computers and computer resources connected in such a way that the computers can communicate with each other and their resources.

37
Q

Which data format is not in an easily usable format and takes greater effort to extract?
A. Structured
B. Unstructured

A

B. Unstructured

38
Q

The abbreviation “URL” indicates:
A. Unified reader link
B. Uniform resource locator
C. United rendering lists
D. Undetermined resource location

A

B. Uniform resource locator

39
Q

Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last 5 years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer’s office to make a brief presentation on the new database system and how it can be used most effectively.
What job title most effectively depicts Javier’s position?
A. Database administrator
B. Network administrator
C. System administrator
D. Security administrator

A

A. Database administrator

40
Q

What is a program that allows the user to monitor and improve system performance and extends the capabilities of an operating system?
A. Utility software
B. Device drivers
C. System services
D. Kernel

A

A. Utility Software

41
Q

Which type of systems testing includes having developers test internal structures of software?
A. White-box
B. Beta
C. User acceptance
D. Analysis

A

A. White-box

42
Q

The name, address, and telephone number of each individual patient in Dr. Alan’s office is known as a:
A. Record
B. File
C. Key field
D. Database

43
Q

True/False
Traditional flat file systems are one-dimensional and present information from a single point of view and do not interact with other files.

44
Q

Which is not a common operating system used today?
A. Windows
B. Top hat
C. Mac
D. Linux

A

B. Top hat

45
Q

A monitor is peripheral device for what system?
A. I/O
B. Storage

46
Q

_____________ is defined as a code of moral conduct or a set of principles that govern behavior.
A. Morals
B. Ethics
C. Obligations
D. Principles

47
Q

Which of the following statements describes why network protocols are necessary?
A. Network protocols are necessary for a home computer that is not connected to the internet or any other device.
B. Network protocols prevent computer hacking
C. Network protocols are required by international laws
D. Network protocols are necessary for computers to communicate with each other.

A

D. Network protocols are necessary for computers to communicate with each other.

48
Q

SQL (Structured Query Language), a query for databases, was invented by:
A. Linux
B. Cisco
C. HP
D. IBM

49
Q

True/False
In the SDLC implementation phase, the design goes to the programmers who translate it into code to execute the plan

50
Q

Marcus has a summer job working at a real estate agency. He is calculating the zip code with the most houses for sale. At which stage of the DIKW hierarchy is Marcus working?
A. Wisdom
B. Information
C. Knowledge
D. Data

A

B. Information

51
Q

Prohibits intentionally accessing a computer without authorization or in excess of authorization. The anti-hacking law.
A. Electronic communication privacy act.
B. Computer fraud and abuse act
C. Federal information security management act
D. Anticybersquatting consumer protection act

A

B. Computer fraud and abuse act

52
Q

Which is NOT part of the history of the computer?
A. Abacus
B. Leibniz
C. Punch cards
D. Abracadabra

A

D. Abracadabra

53
Q

What is one probably advantage of outsourcing?
A. More control can be exercised over IT processing
B. Reliance can be placed on the expertise of outsourcing vendors
C. Employee satisfaction may increase
D. The organization can transfer its accountability in terms of privacy laws

A

B. Reliance can be placed on the expertise of outsourcing vendors

54
Q

________ refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.
A. Algorithms
B. Database management systems
C. Big data
D. Relational databases

A

C. Big data

55
Q

Which department supports day-to-day technology needs of an organization?
A. Management
B. IT
C. Marketing
D. Finance

56
Q

While hardware is _________, software is______.
A. Intangible, tangible
B. Tangible, everlasting
C. Tangible, intangible
D. Free, shareware

A

C. Tangible, intangible

57
Q

Within this CLOUD computing function, all the resources hardware and software an IT department needs are located outside of the organization and are accessible by anyone, anywhere:
A. PAAS (platform as a service)
B. SAAS (software as a service)
C. IAAS (infrastructure as a service)

A

C. IAAS (infrastructure as a service)

58
Q

During this phase of the SDLC the team determines the user requirements for the new system and develops logical models of the system?
A. Logical design
B. Physical design
C. Implementation
D. Analysis

A

D. Analysis

59
Q

There are how many tiers of ISPs?
A. One
B. Two
C. Three
D. Four

60
Q

Which software is run automatically rather than by the end user and provides the infrastructure needed to run application software, allowing it to interface with the hardware of the computer system?
A. Microsoft power point
B. Application
C. Server
D. System

61
Q

Which one of these is NOT an operation for database queries?
A. Union
B. Serve
C. Product
D. Join

62
Q

Through this CLOUD computing function, businesses can access and use software through the internet.
A. PAAS (platform as a service)
B. SAAS (software as a service)
C IAAS (infrastructure as a service)

A

B. SAAS (software as a service)

63
Q

A petabyte consists of how many terabytes?
A. 100
B. 10000
C. 1500
D. 1000

64
Q

Scope creep can impact the allocation of which of the following resources?
A. Time
B. Capital
C. Time and capital
D. The number of staff

A

C. Time and capital

65
Q

Project managers use business cases and feasibility studies in which project phase?
A. Initiation
B. Planning
C. Monitoring & controlling
D. Closing

A

A. Initiation

66
Q

A company’s ability to recover after a disaster is directly related to which?
A. Marketing strategy
B. Financial plan
C. Business continuity plan
D. IT department

A

C. Business continuity plan

67
Q

Describe the timeline of computer development.

A
  1. Computers built and programmed by engineers
  2. Limited use of computers by large organizations
  3. Introduction of personal computers
  4. Graphical user interface systems introduced.
68
Q

Which 2 best describe hierarchical databases?
A. Parent-child relationships
B. Amazon’s customer database
C. A spreadsheet
D. A tree-like structure

A

A. Parent-child relationships and
D. A tree-like structure

69
Q

What rights does the End User License Agreement for proprietary software typically give to purchasers?
A. Rights to modify the software
B. Freedom to share the software with others
C. Ownership rights to the software
D. The right to use the software

A

D. The right to use the software

70
Q

What is the difference between memory and the hard drive?

A

Memory stores instructions and data used by programs in the moment; a hard drive stores data, programs and files that can be accessed at a future time.

71
Q

Which 3 are used for disaster recovery and business continuity?
A. Data mirroring
B. Data analysis
C. Data backups
D. Off-site storage

A

A. Data mirroring
C. Data backups
D. Off-site storage

72
Q

Determining the project scope or the work that needs to be completed is in what project phase?
A. Initiation
B. Planning
C. Executing
D. Closing

A

B. Planning

73
Q

Which generation did computers begin to see widespread use in homes and offices?
A. Third generation
B. Fourth generation
C. Second generation
D. First generation

A

B. Fourth generation

74
Q

What is the definition of PaaS?

A

A Platform as a Service (PaaS) is the ability to quickly and consistently develop and deliver applications.

75
Q

What 2 could be a field in a database?
A. Sales
B. 19943-5568
C. 63.2%
D. Gender

A

A. Sales
D. Gender

76
Q

Which best describes the internet?
A. The internet is an isolated computer network
B. The internet uses circuit switching
C. In order to communicate over the internet, a host does not need to run the IP network protocol.
D. The internet is a global network of networks.

A

D. The internet is a global network of networks

77
Q

Which is NOT an important characteristic of an IT role?
A. Ability to troubleshoot
B. Desire to continually learn
C. Good written and oral communication skills
D. Strong math background and programming skills

A

D. Strong math background and programming skills

78
Q

During implementation , which testing assesses whether the system functions and is useful?
A. User acceptance
B. Deployment
C. Alpha
D. Beta

A

A. User acceptance

79
Q

The use of IT has allowed businesses to have
A. Small customer bases
B. Fewer privacy/security concerns
C. More tools for communicating
D. Local reach

A

C. More tools for communicating

80
Q

Which of the following operators is used to select all of a certain data?
A. *
B. <>
C. LIKE
D. =

81
Q

Which is a threat to privacy?
A. Names and addresses in a phone book
B. Phone numbers and email addresses
C. Student ID and credit card numbers
D. Secret business plans

A

C. Student ID and credit card numbers D