Module 1 Flashcards
Which of the following is a role of IT personnel? Select all that apply.
a) Processing data into information
b) Developing faster computer chips
c) Repairing copy machines.
d) Installing, testing, and updating software.
a & d ?
For each of the following scenarios, indicate if the function described would be appropriate for individuals who are part of an IT department. Select all that apply.
a) Maria is designing a new online form for the company so they can more quickly input sales data.
b) Aiko is testing a new network that is connecting the main office with satellite offices in the area.
c) Emily is working on a cost analysis to justify the need for a new server.
d) Leo is updating his profile located on the company website.
a,b, & c
Which of the following employees would be considered IT personnel?
a) Maria, a computer engineer who designs computer chips.
b) Nadir who creates marketing plans based on aggregated company data.
c) Yuki who writes textual content for client websites.
d) Jeff, who works in human resources screening electronic resumes of potential hires.
c ?
Which of the description of duties below would be for a System Administrator?
a) This individual is in charge of ensuring that the network is working properly. Duties may include connecting devices using cable, configuring individual employee computers, working with the network hardware, and troubleshooting.
b) This individual has responsibility for all aspects of an organization’s databases and database management systems.
c) This individual has responsibility for developing new software applications to improve the functionality of an organization’s information technology.
d) This individual updates an organization’s computer hardware and software, performs troubleshooting, and maintains the operating system of a computer system.
c ?
Which of the following would NOT be the responsibility of the system administrator?
a) Creating new user accounts
b) Installing new hardware and software
c) providing support to users
d) Answering e-mails from potential customers
b ?
Read the following scenario, and then select the job title that most accurately depicts the descriptions.
Javier starts the day by checking his e-mails. Sandra in payroll would like him to print a report detailing how much money has been spent on training new employees. She would like a comparison of the training dollars spent over the last five years. Javier spends the morning retrieving the appropriate information from the database and e-mails a report to Sandra. In the afternoon, Javier begins a performance analysis of the new database management system that he installed last week. He also double-checks that the old data has properly transferred to the new system. He then develops a list of procedures for those who work under him so they can also run performance analyses. Finally, he heads upstairs to the Chief Operating Officer’s office to make a brief presentation on the new database system and how it can be used most effectively.
Which of the following titles most fits Javier’s job?
a) Database Administrator
b) Network Administrator
c) Systems Administrator
a
Which of the following describes the duties of a web administrator?
a) Duties include connecting devices on an organization’s network, configuring individual machines to access the network, working with the network hardware, and troubleshooting.
b) Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.
c) Ensures firewalls are up to date, researches current security threats, and designs websites.
d) Designs databases, maintains databases, provides database access to users, selects and supports database management systems.
b
Which of the following describe the duties of a security administrator? Select all that apply.
a) Installs firewalls.
b) Keeping user account information up to date.
c) Continually monitor the safety and security of the data stored on a computer system.
d) Ensuring all users have passwords that are properly configured and align with security policies.
a & d ?
Which of the following tasks would be handled by IT support personnel? Select all that apply.
a) Training new employees on system log-in protocol
b) Answer general questions about hardware and software use at an organization.
c) Design a new company website
d) Meet with employees on health plan options.
a & b
Which of the following scenarios, would a user contact a help desk for assistance? Select all that apply.
a) Sophia is having trouble developing an invitation list using her company’s e-mail program. She is not sure what she is doing wrong.
b) Alfonso wants to set up a training for all the emergency room nurses to learn to use the new computerized physician order entry system.
c) Bella signs up to participate in a training course on how to use the new company e-mail system.
d) Horatio is having problems inputting his time using the company’s new project management tracking system.
b & c ?
Which of the following statements accurately describe IT certifications?
a) There are no specific IT certificates available for web administrators.
b) Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.
c) IT certificates are generally not standardized and often not recognized by major companies.
d) IT certificates are easy to earn and don’t require specialized training.
b
Select the IT education that would be most appropriate for the individual in the following scenario.
Since she was a child, Rebecca has enjoyed taking things apart and putting them back together. She has built her own computer from scratch and loves to find ways to improve its capabilities. Which specialized IT focus would be a good fit for Rebecca?
a) Engineering
b) Computer Science
c) Computer Systems
d) Management Information Systems
b ?
Which of the following is NOT an important characteristic of an IT professional?
a) Ability to troubleshoot
b) Desire to continually learn
c) Strong math background and programming skills
d) Good communication skills – both oral and written
c
Define Information Technology
Information Technology (IT) is the technology used in creating, maintaining, and making information accessible as well as the people who supply and support the use and integration of Information Technology in an organization.
Indicate whether each of the following is (yes) or is not (no) part of the definition of Information Technology.
a) Technology that enables the processing of data
b) The people who supply and support the use of Information Technology in organizations
c) Analyze profit and loss data and information for businesses
d) Software, data, and computer networks
a) yes
b) yes
c) no
d) yes
Information Technology includes:
a) Stand-alone t.v. monitors and computer desks
b) Copy machines and projectors
c) Computer networks and IT personnel
d) Every computer user and digital phone systems
c
Indicate whether each of the following would (yes) or would not (no) be the responsibility of IT personnel and align with the definition of information technology.
a) Gathering data and processing it into information
b) Maintenance of computers, networks, and operating systems
c) Running background checks on new employees
d) Writing software programs
a) yes
b) yes
c) no
d) yes
System Administrator
The person or people who performs system administration.
Common tasks include: account management; password management; file protection management; Installing and configuring new hardware and troubleshooting hardware including the network; Installing and configuring new software including updating new operating system (OS) patches, and troubleshooting software; Providing documentation, support, and training for computer users; Performing system-level programming as necessary (usually through scripting languages rather than writing large-scale applications or systems software); security
System Administration
The process of maintaining the operating system of a computer.
Account management
creating new user accounts and deleting obsolete user accounts
Password management
making sure that all users have passwords that agree with the security policy
File protection management
making sure that files are appropriately protected (for instance, making sure that important documents are not writable by the outside world) and performing timely backups of the file system
Security
installing and maintaining a firewall, examining log files to see if there are any odd patterns of attempted logins, and examining suspicious processes that perhaps should not be running
Network Administrator
In charge of all aspects of the computer network. Duties include: physically laying down cable, making connections, and working with the network hardware; configure individual machines to be able to communicate via the network; troubleshoot the network (physical and software troubleshooting); edit configuration files, write shell scripts, and install software and patches