Pre-Assessment Flashcards
A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments.
Which term refers specifically to this type of device?
Handheld computer
What is the major function of a computer operating system?
Computer resource management
Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory?
Copy and paste
What are the basic components, in addition to computers, that are required for a local network to function?
Ethernet cards, a common protocol, ethernet cables, and a hub
Which type of device is an ethernet card?
Network interface controller (NIC)
What is the purpose of a MAC address?
To uniquely identify a computer on a network
Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail?
A star topology
A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers.
After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?
A password
Many websites keep track of a user’s actions and information. They store much of this information on the user’s computer in a private folder on the hard drive.
What are these very small files called?
Tracking cookies
What is the purpose of a universal serial bus (USB) on a laptop or desktop computer?
It allows the computer to connect peripheral devices.
Which category of software includes programs such as word processors and PDF document readers?
Application software
What is the defining characteristic of a part of a system that is considered a point of failure?
It causes everything to stop if it fails.
Computer system administrators protect the organization when they require strong passwords to connect to the server, enact policies for safe internet browsing, and install malware-protection software to keep unwanted users and viruses out.
Which term is used to describe this set of practices?
Network security
How does a Gantt chart facilitate project management?
It identifies and sequences the tasks of a project.
What is the title of the person in the organization who is directly responsible for the setup and operation of the organization’s networks, including hardware and software?
Network administrator
On a day-to-day basis, what is the major focus and responsibility of a chief technology officer?
Managing the IT group and designing the IT architecture
What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information?
Chief information security officer
When using extract, transform, and load (ETL), what is done during the “transform” step?
The data are normalized and structured.
What is the key characteristic that differentiates a datamart from a data warehouse?
A datamart is smaller and more specialized in its focus than a data warehouse.
A marketing employee is tasked with mailing discount coupons to the company’s top 100 customers by sales volume. The marketing employee only has lists of customers’ names, customers’ addresses, and the sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers?
Data mining
What is the velocity of big data?
The speed of data produced in a given time