Study Guide Flashcards

1
Q

Thinking of the DIKW hierarchy, give an example of the Data level.

A

A. On
B. Off
C. Phoenix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Thinking of the DIKW hierarchy, give an example of the Information level.

A

A. It’s hot outside.
B. The motorcycle is blue and red.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Thinking of the DIKW hierarchy, give an example of the Knowledge level.

A

Knowledge is hard to define. It’s context oriented. An example would be “The light switch was turned off earlier and now the room I am in is getting dark.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name as many characteristics of Quality Data as you can. Give examples of each.

A

A. Precision - How Accurate the data is.

B. Valid - Meets the requirements of the data collection process.

C. Reliable - Data should be reliable, regardless of where it’s stored or how it was collected. So if you have multiple locations that a set of data is stored, each set should be equal to each other.

D. Timely - Data should be collected at the right time to relevant to the decisions being made.

E. Complete - Complete and thorough. Providing a full picture of the situation at hand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 3 input devices.

A
  1. Mouse
  2. Keyboard
  3. External Microphone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 output devices.

A
  1. Monitor
  2. Speakers
  3. Printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the operating system do?

A

Allows the user to control the actions of the software, and through the software, to access the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name some tasks that a System Administrator is responsible for.

A

A sysadmin is responsible for providing admin level tech support for hardware and software issues end users encounter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name some tasks that a Database Administrator is responsible for.

A

A database admin is responsible for installing and configuring databases. They also fix database errors and creates user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some tasks that a Web Administrator is responsible for.

A

A web admin is responsible for troubleshooting website errors users may encounter. They are also responsible for tracking, compiling and analyzing website usage data. They also report security breaches to the appropriate personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a CPU do?

A

It executes computer program instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the ALU do?

A

Arithmetic Logic Unit. Performs operations on data, such as addition and subtraction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the CU do?

A

Control Unit. Contains the circuitry coordinating the machines activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between RAM and ROM? Which one is volatile?

A

RAM stores instructions and data while they are being used and is volatile.

ROM is nonvolatile and generally keeps instructions for starting the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 5 peripheral devices.

A
  1. Mouse
  2. Keyboard
  3. Speakers
  4. Monitor
  5. External Microphone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does an operating system interact with driver software?

A

This is at the kernel level. Device drivers translate generic requests into the technical steps needed to complete the task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name 5 components that are soldered to the motherboard.

A
  1. IO Panel
  2. CPU socket
  3. Expansion bus or slot
  4. SATA ports
  5. Fan headers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe some differences between the GUI and CLI interfaces.

A

Graphical User Interfaces allow users to input commands using their mouse, keyboard or fingers.

Command Line Interfaces only communicate with users using text based messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which category of languages (programming or scripting languages) is compiled?

A

C, C++, C#, Java

Programming languages need to be compiled, while scripting languages need to be interpreted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which category of languages is the one that is used to send commands over a network?

A

Programming Languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which category of languages executes one command at a time?

A

Scripting Languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which category of languages uses an interpreter to change the source code into machine language?

A

Scripting Languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does “high-level language” refer to?

A

Languages that are used to develop software and are closer to human language than machine language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does “machine language” refer to?

A

The only language that a machine understands. These are typically in binary and/or hexadecimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Does a computer understand high-level languages?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Does a computer understand low-level languages?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Who or what understands only “machine language?”

A

The computer only understands machine language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When a program is run “locally,” is it typically written in a programming language or a scripting language?

A

Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Name all the scripting languages I told you to memorize.

A

Perl
Python
Bash
Ruby
Node js

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Is Python a scripting language?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Is Python a programming language?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

According to the text, which runs faster: a program written in a programming language or a script written in a scripting language?

A

Program written in a programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Are programs written in a programming language “portable?”

A

It depends on the language. Certain languages like C and C++ are consider portable languages. Others, like Java or Python, are fairly portable and just have a requirement or two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is an algorithm?

A

A mathematical method of solving problems both big and small.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Give an example of an integer.

A

These are basic numbers.

4, 15, 236

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Give an example of a Floating point number.

A

Decimal numbers essentially.

9.5, 1.3, 95.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Give an example of a Character.

A

Characters as in character requirements for a password.

F, !, #

38
Q

Give an example of a String or Character String.

A

Several characters in a row or “string.”

abc, def123, 3we45fg!@

39
Q

Boolean values

A

Can only be one of two values or outcomes.

True, False

40
Q

What are three types of databases?

A

Relational, Hierarchal, and Flat-File

41
Q

Which database reads text files and organizes the data in columns and rows?

A

Flat-File Database

42
Q

Which of the three types of databases has a “tree-branch” or “parent-child” structure?

A

Hierarchical Database

43
Q

Which database uses tables with a column full of (typically) numbers, each of which uniquely identifies one and only record? what do you call that special kind of column?

A

Relational Database

Primary Key

44
Q

What does SQL stand for?

A

Structured Query Language

45
Q

What is the SELECT keyword used for?

A

Identifies the records being requested.

46
Q

What is WHERE keyword used for?

A

The condition the query is requesting.

ex. WHERE PatientID = ‘223344’

47
Q

What is WHERE keyword used for?

A

The condition the query is requesting.

ex. WHERE PatientID = ‘223344’

48
Q

In SQL query, what is the FROM keyword used for?

A

Identifies the table or the name of the table you are looking to pull information from.

ex. SELECT * FROM Patient

49
Q

What is JOIN used for?

A

It’s used to join two tables or columns of data together into a new table.

50
Q

In a WHERE clause, what does != mean?

A

It is used to compare two values and returns true if the values are not equal, and false if they are equal.

51
Q

In a relational database, what is a Primary Key?

A

It is an identifier that each record has within a relational database.

52
Q

What is a Foreign Key?

A

A field may be marked as the primary key on one table but also be found on another table. When this happens, a relationship called a foreign key is created.

53
Q

In a relational database, what is an attribute?

A

Basically the title or description of a column of data.

ex. EmployeeID, FirstName, LastName

54
Q

What is a record?

A

Individual pieces of data underneath an attribute. So if the attribute is FirstName, the “record” could be John.

55
Q

What type of database processes .csv files?

A

Flat-File and Relational databases can process .csv files.

56
Q

Name at least two events that happened in the FIRST Generation of Computers.

A
  1. The ENIAC emerged in 1946 with 18,000 vacuum tubes.
  2. The EDVAC (Electronic Discrete Variable Automatic Computer)
  3. UNIVAC (Universal Automatic Computer)
  4. IBM-701
  5. IBM-650
57
Q

Name at least two events that happened in the SECOND Generation of Computers.

A
  1. Transistors replaced vacuum tubes.
  2. Over 100 computer programming languages were developed.
  3. FORTRAN was developed as a high-level language.
  4. COBOL was developed as a high-level language.
58
Q

Name at least two events that happened in the THIRD Generation of Computers.

A
  1. The invention of integrated circuits.
  2. Users were able to interact with computers with keyboards and monitors.
  3. Operating systems were introduced.
59
Q

Name at least two events that happened in the FOURTH Generation of Computers.

A
  1. The creation of microprocessors.
  2. Intel 4004 developed in 1971 included all the components of a computer on a single chip.
  3. The first IBM computer for home use was available in 1981.
60
Q

In the SDLC, who participates in Alpha testing?

A

Devs and/or an internal UX (user experience) team.

61
Q

In the SDLC, who participates in Beta testing?

A

A segment of end users.

62
Q

When is white-box testing performed? Who performs white-box testing?

A

Before the product is completed.

Developers

63
Q

Who does black-box testing?

A

Depending on the step, developers and end users.

64
Q

Who participates in User Acceptance Testing?

A

End users in an operational setting.

65
Q

What is scope creep?

A

Unplanned changes to a project’s scope. Typically adding tasks and unplanned costs.

66
Q

What is risk management?

A

Identifying potential risks and how to respond to them.

67
Q

What is the difference between hot and cold storage?

A

Hot storage is the fastest at restoring data after a disaster.

Ex. MSoft Azure Hot Blobs, Amazon AWS

Cold storage is less expensive but returning to normal operation with cold storage is slower.

Ex. Tape Backups, Amazon Glacier, Google Coldline

68
Q

What is a benefit of hiring contractors to work on a software development project? What is a drawback of this?

A

Companies cannot always justify the cost of hiring for a narrow skill set. Outsourcing can improve efficiency and productivity, while saving money.

A vendor or contractor could fail to deliver.

69
Q

Which phase does Defining the project’s scope take place in the Project Management Life Cycle?

A

Planning Phase

70
Q

Which phase does Feasibility study take place in the Project Management Life Cycle?

A

Initiation Phase

71
Q

Which phase does Documentation of user requirements take place in the Project Management Life Cycle?

A

Planning Phase

72
Q

Which phase does WBS (Work Breakdown Structure) take place in the Project Management Life Cycle?

A

Planning Phase

73
Q

Which phase does Minutes from a project closure meeting take place in the Project Management Life Cycle?

A

Closure Phase

74
Q

Which phase does Risk mitigation strategy take place in the Project Management Life Cycle?

A

Planning Phase

75
Q

Which phase does Coding the system take place in the System Management Life Cycle?

A

Implementation Phase

76
Q

Which phase does UAT take place in the System Development Life Cycle?

A

Testing Phase

77
Q

Which phase does Creating class diagrams take place in the System Management Life Cycle?

A

Design Phase

78
Q

Which phase does Creating SMART goals take place in the System Management Life Cycle?

A

Planning Phase

79
Q

Which phase does Project charter take place in the System Management Life Cycle?

A

Planning Phase

80
Q

Which phase does Time and Cost take place in the System Management Life Cycle?

A

Planning Phase

81
Q

Which phase does Fixing bugs take place in the System Management Life Cycle?

A

Development Phase

82
Q

In project management, what is a dependency and where would you see them?

A

Tasks that are required to be completed before others can start. Most likely seen in the Execution phase.

83
Q

What is business continuity? How is it different from disaster recovery?

A

Business continuity is a set of plans to define how a business can resume services to customers and vital operations while operating with limited resources.

Disaster recovery is all about restoring lost data from hot or cold storage.

84
Q

What does “CIA” stand for in the CIA Triad? Gave an example of the “C.” Gave an example of the “I.” Give an example of the “A.”

A

Confidentiality - Strong password policies

Integrity - File Permissions and User Access Control

Availability - Rigorously maintaining all hardware and testing compatibility with operating systems.

85
Q

Who is responsible for data security?

A

Everyone in an organization.

86
Q

Name four US Federal IT regulations and what they protect.

A
  1. Communication Assistance for Law Enforcement Act - Telecommunications carriers to modify their equipment to accommodate law enforcement tabs.
  2. Computer Fraud and Abuse Act - The anti-hacking law.
  3. Federal Information Security Management Act - Requires each US federal agency to develop, document, and implement an agency-wide program providing information security.
  4. Electronic Communication Privacy Act - Confirms an individual’s right to private communication, making it illegal for ISPs to share information about client’ communication.
87
Q

What is the difference between a copyright and a patent?

A

Copyright protects intellectual property for at least 35 years. While a patent protects the actual invention.

88
Q

Define Proprietary Software

A

Proprietary or closed-sourced software does not permit anyone to modify their operating system code.

89
Q

Define Shareware Software

A

Can installed as a trial for free, followed by a subscription or purchase to unlock full functionality.

90
Q

Define Freeware Software

A

Free software but still has an EULA

91
Q

Define Public domain (also known as Open Source) Software

A

Has no EULA and no intellectual property protection. Available for anyone to download and use at their own discretion.