Introduction to IT Flashcards
What is the definition of Information technology (IT)
It is the technology used to create, maintain, and make information accessible.
Which IT position has the responsibility of working with routers and switches?
Network administrator
In which generation were silicon chips first used in computers?
Third Generation
Vacuum Tubes were used in which generation of computers?
First Generation
In which generation were transistors first used in computers?
Second Generation
In which generation were microprocessors first used in computers?
Fourth Generation
Which low-level language corresponds one-to-one with assembly?
Machine Language
What is a cloud model that delivers third-party software such as email or games through the internet?
SaaS
What model has the user maintain the application and data but everything else is maintained by the provider?
PaaS
What model is self-service for accessing, monitoring, and managing remote datacenter infrastructures, such as compute (virtualized or bare metal), storage, networking, and networking services (e.g. firewalls)?
IaaS
What is one of IT’s roles in globalization?
It allows companies to reach a wider customer base.
Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
Desktop
What software is used to complete tasks such as writing documents, managing personal information, giving presentations, storing data, and sending email?
Productivity Software (ie. Word, Excel, Access, PowerPoint, VLC Player)
What software helps people communicate and work with one another, and helps computers share information?
Collaboration Software (ie. SharePoint, Google Drive, WebEx)
Which term is defined as a collection of information used to support management of an organization?
Information System
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenario?
Data
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made. Which characteristic of valuable data is the manager considering?
Timely
What is the difference between processing and storage?
Processing collects and translates data into useful information, while storage places the translated data in specific locationsp.
What is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?
Costs for hardware resources are decreased
What is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers?
Virtual Machine
What is it when each computer is roughly equal to every other computer?
Peer-to-Peer
What is it when one computer will request information from another computer, which responds with requested information?
Client-Server
What is an operation system?
Allows the user to control the actions of the software, and through the software, access the hardware.
True or False: Linux runs on both servers and workstations.
True
True or False: An internet browser that displays a web page requires support from a networked operating system.
True
The chief information officer wants to update the network server to improve internet access while also blocking certain social media websites. What type of server will meet this need?
Proxy Server
What characteristic identifies application software that is cloud-based?
Provided by third-party providers
What type of software permits free temporary use followed by long-term activation for a fee
Shareware
What is the purpose of an End User License Agreement for a commercial software package?
Establishes the customter’s right to use the software
What is the difference between proprietary and open-source software license?
proprietary software has a cost whereas open-source is free
What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?
A Copyright
What are the three parts to the CPU
the Arithmetic logic unit (ALU), the Control Unit (CU), and the Processor Register (PR)
What in the CPU holds the memory location of data that needs to be accessed?
Memory address register (MAR)
What in the CPU holds data that is being transferred to or from memory?
Memory data register (MDR)
What in the CPU holds the ALU results?
Accumulator (AC)
What in the CPU holds the address of the next program instruction to be executed?
Program counter (PC)
What in the CPU holds the current instruction during processing?
Current instruction register (CIR)
Which motherboard component helps cool the CPU
Heat Sink
What type of device is a Flash Drive?
Storage Device
In which type of network topology is each networked device directly connected to every other networked device?
Mesh
In which type of network topology are the machines connected to a common communication line?
Bus
What type of network topology have a single machine serving as a central point to which all others are connected?
Star
What type of network topology connect directly to each other as a peer?
Ring
Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?
Radio Signal
What indicates a specific internet location?
The IP Address
What is the role of a domain name server (DNS)?
Translates human-readable aliases into IP addresses
Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?
Resource path ID
What is the goal of Information Assurance (IA) that requires that information is accessible when needed?
Availability
Which technique uses all possible combinations of letters and numbers to crack a password?
Brute force
Smart card is what type of authentication?
Two-Factor
What is a characters of high-level languages?
The source code has to compiled.
How does an interpreter work?
It takes the most recently entered instruction, converts it into machine language, executes it.
What is the difference between compiled and interpreted computer languages?
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
Which language is often used for rapid prototyping and the creation of GUIs?
TCL
True or False? Applications are interdependent of the database
True
What is another term for a formula that outlines how to execute a task?
Algorithm
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using and assigned name and number. Which data type will be required in order to create his database?
Character string
Why is it important to ensure that data support business goals?
To aid in making strategic decisions
In which category of the Data, information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?
Knowledge
Which field must contain a unique value in order for a relational database table to function?
Primary Key
What are the three main categories of databases?
Flat file, Relational, Hierarchal
What is the database administrator’s role in security?
To institute protocols to protect the databases from external threats
What is the role of drivers in facilitating communication between applications and databases?
They allow the application to interact with the database
Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?
FROM
What is the purpose of an IT department?
It helps the organization achieve strategic goals
What is the role of the systems administrator?
To install and maintain network resources
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product
Which risk assessment question is part of the Initiation Phase?
Could the end user reject the outcome of the project
In what phase of a project does time estimation occur?
Planning
What effect does scope creep have on a project?
It increases unplanned costs for the project
Allowing secure access to customer account information is an example of what in the design of an information system?
Considering user needs
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
User Acceptance
Which type of systems conversion involves starting the conversion with a a portion of end users?
Pilot (beta)
What are two necessary elements of business continuity planning?
Assessing key organizational activities and Identifying risks that may occur
Which disaster recovery strategy is used to save information to multiple hard drives at the same time
Data Mirroring
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?
Security Breach Notification Laws
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage
What type of testing do developers, and/or an internal UX team test a preliminary version of the software, providing feedback about performance and functionality?
Alpha Testing