IT #3 Flashcards
Which is a type of two factor authentication?
Smart card
Which is a characteristic on high-level languages?
A source code has to be compiled
How does an interpreter work?
It takes the most recent, entered instructions, convert it into machine, language, and execute it
What statement is true concerning compiled and interpreted computer language?
A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
Which language is often used for rapid prototyping, and the creation of GUI’s?
TCL
Which is true of databases and the application that interacted with them?
Applications are interdependent of the database
What is another term for a formula that outlines how to execute a task?
Algorithm
What is the purpose of an IT department?
It helps the organization achieve strategic goals
What is a role of the systems administrator?
To install and maintain network resources
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?
Expanding the infrastructure to support additional locations
What step should be taken by a business when a third-party solution is found that will benefit a project?
Contact the group to arrange a demo of their product
Which risk assessment question is part of the initiation phase?
Could the end users reject the outcome of the project?
In what phase of a project does time estimation occur?
Planning
What effect does scope creep have on a project?
It increases unplanned cost for the project
Which system requirements is an example of considering user needs in the design of an information system?
Allowing secure access to customer account information
Which type of systems testing includes having the customer test the system in a operational setting to see if it is useful?
User acceptance
Which type of systems conversion involves starting the conversion with a portion of end users?
Pilot
What are two necessary elements of business continuity planning?
Assessing key organizational activities, and identifying risk that may occur
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
Data mirroring
Which regulation governors the action of a company in the case of data records, being compromised, lost, or stolen?
Security breach, notification laws
How can an organization assist employees with the ethical use of information technology?
By developing policies for information usage
engages in best practices for information systems
Part of the role of an IT professional association
Writes laws dealing with information technology
Outside of the role of an IT professional association
Provides professional standards for ethical behavior
Part of the role of an IT professional association