Pre-Assessment Flashcards

1
Q

A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments.

Which term refers specifically to this type of device?

A

Handheld computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the major function of a computer operating system?

A

Computer resource management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory?

A

Copy and paste

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the basic components, in addition to computers, that are required for a local network to function?

A

Ethernet cards, a common protocol, ethernet cables, and a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of device is an ethernet card?

A

Network interface controller (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a MAC address?

A

To uniquely identify a computer on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail?

A

A star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers.

After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?

A

A password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Many websites keep track of a user’s actions and information. They store much of this information on the user’s computer in a private folder on the hard drive.

What are these very small files called?

A

Tracking cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer?

A

It allows the computer to connect peripheral devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which category of software includes programs such as word processors and PDF document readers?

A

Application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the defining characteristic of a part of a system that is considered a point of failure?

A

It causes everything to stop if it fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer system administrators protect the organization when they require strong passwords to connect to the server, enact policies for safe internet browsing, and install malware-protection software to keep unwanted users and viruses out.

Which term is used to describe this set of practices?

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a Gantt chart facilitate project management?

A

It identifies and sequences the tasks of a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization’s networks, including hardware and software?

A

Network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer?

A

Managing the IT group and designing the IT architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information?

A

Chief information security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When using extract, transform, and load (ETL), what is done during the “transform” step?

A

The data are normalized and structured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the key characteristic that differentiates a datamart from a data warehouse?

A

A datamart is smaller and more specialized in its focus than a data warehouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A marketing employee is tasked with mailing discount coupons to the company’s top 100 customers by sales volume. The marketing employee only has lists of customers’ names, customers’ addresses, and the sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers?

A

Data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the velocity of big data?

A

The speed of data produced in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is it called when an organization implements security procedures to protect the hardware, network, and software from intrusion?

A

System-level security

23
Q

Which term is used to refer to data that come from many different sources in various structures?

A

Disparate data

24
Q

What are scrubbed data?

A

Data that have been validated for accuracy

25
Q

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost.

What is this metric called?

A

Return on investment

26
Q

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data.

What is the term that describes this effort?

A

Data governance

27
Q

Which level of management gets the most detailed reports directly from the transaction processing system?

A

Supervisors

28
Q

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate.

What is the primary source of the data used by this DSS?

A

The transaction processing system (TPS)

29
Q

What is a key capability of a decision support system?

A

It compiles data from many systems to assist in decision-making.

30
Q

Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed.

Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week?

A

An extranet that provides the manufacturer access to data at Endothon

31
Q

The IT department of a company has been asked to provide systems for financial and investment management.

Which business department has the greatest need for this type of system?

A

Accounting

32
Q

Which strategy can be used to help a company’s web page appear on the first page of search results in a browser?

A

Search engine optimization

33
Q

Which technology enables people without computer programming skills to design and publish their own websites?

A

Browser-based web development tools

34
Q

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices.

What is the designation of this new protocol?

A

Internet Protocol version 6 (IPv6)

35
Q

A small online retailer has grown rapidly over the past year, and now during times of high activity, the retailer’s web server is nearly at capacity. The retailer anticipates continued rapid growth but is concerned that this growth may stall if the economy goes into recession.

What is an appropriate strategic planning decision for this retailer to make in order to ensure adequate server capacity?

A

Use a cloud web hosting service

36
Q

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients.

Which action will give the graphic designer initial copyright protection of these marketing images?

A

Creating the marketing images

37
Q

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area.

Which legal protection prohibits unethical duplication of this computer program?

A

Copyright

38
Q

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system’s accounting record retention policies are set in accordance with federal law.

Which law should the IT manager become familiar with?

A

Sarbanes-Oxley Act

39
Q

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author.

Which type of law prohibits this kind of unethical behavior?

A

Copyright

40
Q

Which communication technology has a range of approximately 30 feet and allows smartphones, tablets, and handheld product scanner devices to communicate with a network?

A

Bluetooth

41
Q

What is an example of an Internet of Things (IoT) device?

A

A light bulb that can be turned on or off with a smartphone

42
Q

Where does IoT data collection begin?

A

The edge

43
Q

Which type of technology can be used to monitor every product in a warehouse to enable real-time inventory tracking and updates?

A

Radio-frequency identification (RFID)

44
Q

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house.

What is an example of Internet of Things (IoT) technology in this scenario?

A

The door lock

45
Q

How does the healthcare industry use Internet of Things (IoT) devices?

A

To monitor patients’ heart rate and oxygen levels

46
Q

A large automobile maker has added sensors to its assembly line equipment to alert managers to manufacturing anomalies via a mobile application (app) on their smartphones. This Internet of Things (IoT) system connects proprietary manufacturing components.

What is the greatest risk created by incorporating this IoT system?

A

Increased security risk

47
Q

What is the final step in the deployment and use of an app?

A

Maintain and upgrade the app based on use and user feedback

48
Q

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files?

A

File-sharing system

49
Q

Which approach facilitates live communication when a business has employees that are in different locations and telecommute for work?

A

Real-time communication

50
Q

A company produces a mobile app that provides recipes and cooking tutorials.

A

Lifestyle

51
Q

Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees?

A

Knowledge management system

52
Q

Which file format is suitable to use when sharing a legal contract that requires a digital signature?

A

PDF

53
Q

What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing?

A

By allowing companies to track which sales can be connected directly to a specific advertisement

54
Q

What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing?

A

User behavior can be tracked in social media.