Test Flashcards

1
Q
What stores the program(s) being executed and the data that each program is using?
CPU
Motherboard
Memory
Bus
A

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Susan works for a local company in Tulsa, has been asked to setup a solution to allow her project team to share files, templates, and reports. She setup a file share and must be sure the files are restricted to only the project team. What method would you recommend she use?

A

Susan should use permissions to restrict access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Southern Georgia clinic is a small practice. There are just 12 employees, but they anticipate growing over the next 3 – 5 years. The IT consultant is recommending creating a network by having the PCs branch out around a hub. This is an example of what type of network topology?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which characteristic identifies application software that is cloud-based?

  • Hosted on an individual computer
  • Hosted in the internal business network
  • Provided by servers in the internal business network
  • Provided by third-party providers
A

Provided by third-party providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a major components of an IT infrastructure?

  • Networks
  • Information
  • People
  • Processes
A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of business computer application programs of associated functionality that share a common GUI is know as __________________?

A

Productivity Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A research company has been asked to review vaccine research to verify its authenticity. The data is sensitive and if it falls into the wrong hands, the company could face legal consequences and their public image could be tarnished. What role is responsible for implementing the security permissions to protect this data?

A

Network Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Southern Georgia clinic is concerned about how best to establish a barrier between their secured and controlled internal network and untrusted outside networks, such as the Internet.Which is their best option?

  • Gateway
  • Virus Software
  • Firewall
  • Virtual private network
A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Georgia Widget Company has been growing over the last 2 years which has led for the need to find a new way to share information about their community services programs and HR benefits. Which of the following would work best for this situation?

A

A knowledge management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two software application packages would be classified as productivity software?

  • E-mail
  • Word processor
  • Spreadsheet program
  • FTP client
A

Word processor

Spreadsheet program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The corner coffee shop is in trouble. Recently, customers have been posting negative reviews online and the owner of the shop needs to figure out the root cause so they can take action. The owner requested all subscribers to the coffee shop mailing list complete a survey. What process describes cataloging common themes for analysis?

A

Topic analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Robbie recently was hired as the Operations Manger for Southern Regional Hospital. After meeting with the department leaders Robbie has learned that departments within the hospital are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data. Robbie recommends using the same software in all departments. Who is responsible for designing a detailed plan to address this issue?

A

IT portfolio manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________a controlled private network that allows access to partners, vendors, and suppliers.

  • Intranet
  • Extranet
  • Virtual private network
  • Wide area network
A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A list of test grades for a student in one class is an example of ______?

  • Information
  • Data
  • Table
  • Scheme
A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following refers to integrity of a dataset? Volume
Variety
Veracity
Viability

A

Veracity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jay, the owner of a small accounting firm, has set a goal of increasing his business over the next year. To achieve this goal he is planning to leverage social meeting to drive customers to his website. What would be the main financial benefit of using cloud web services vs upgrading their current web server?

A

Pay for specific services as needed

17
Q

Which level of management receive highly detailed information that is generated directly fromthetransactionprocessingsystem?

  • Executives
  • Supervisory
  • Middle management
  • Individual contributors
A

Supervisory

18
Q

Dream Vacation Inc. wants to implement a tracking system of everyone who logs in and searches their listings of vacation rentals for rent, capturing information on who logs in, when, and what listing they review. Which piece of IT infrastructure should they implement to help automate this process?

A

A customer relationship management system

19
Q
\_\_\_\_\_\_\_\_ memory is faster than RAM but has minimal storage capacity.
ROM
RAM
Virtual 
Cache
A

Cache

20
Q

___________ is defined as the necessary core activities required to operate a successful business.

  • Business Analytics
  • Operational procedures
  • Business functional behaviors
  • Organizational behaviors
A

Business functional behaviors

21
Q

A clothing store recently is planning to use a transaction processing systems (TPS) to gather data on which products are sold andwhen they are sold, and customer information. If the TPS data is related to the store’s finances, inventory, and customers, which type of network configuration would be most appropriate for the implementation of a TPS?

A

Intranet

22
Q

Which is NOT oneof the four main components of a network?

  • Network interface controller (NIC)
  • Protocol
  • Hub
  • Operating system
A

Operating system

23
Q

The HR department has set a goal of working with IT to purchase and install a Human Resources Information System (HRIS) database this fiscal year. The IT project manager would like you to draft out how you would like the data to be organized. What have you been asked to create?

  • Database model
  • Database scheme
  • Database SQL query
  • Database DSS
A

Database scheme

24
Q

Within the HRIS there will be two table. One table will include current employees the other table will include terminated employees. What is needed to link these two tables together?

A

A foreign key that refers to the primary key in another table

25
Q

Data and information exchange software and techniquescan be categorized as____________________, whereascollaborative software and techniquescan be categorized as ____________________

A

Electronic computing tools, management tools

26
Q

Karen’s uncle was admitted to a local hospital for heart surgery. Karen knows her uncle is in room 425 because she checked the kiosk display. When a she enters the room, the light has a motion sensor to turn it on. A nurse is already in the room. She captures the patient observations on a mobile tablet, and the patient vitals are automatically updated to the patient chart from a sensor in the bed. Which of these items is an IoT?

A

Bed Sensor

27
Q

Machines, appliances, trucks, cars, thermostats, and healthcare equipment can all be considered ________?–IT Nodes

  • Edge IoT devices
  • Intermediary IoT devices
  • End user devices
A

Edge IoT devices

28
Q

The Georgia Widget Company does test on their computer before an item is made and/or produced. What is this process called?

  • Prototype testing
  • CAD testing
  • Milestone testing
  • Mock-up testing
A

CAD testing

29
Q

______________ has an embedded operating system and is well suited for a very specific business application. -Microcomputer

  • Midrange Computer
  • Handheld computer
  • Sensors
A

Handheld computer

30
Q

HireRight, an HR consulting firm, knows that if it wants to be successful and grown using social media that its’ current and potential customers must have trust in HireRight. How can HireRight most effectively use social media to create trust?

A

Use social media to build an online community

31
Q

Pop-Up Doc is a new telemedicine service that has been rapidly growing due to allowing providers to work from home. Which methodology would be best for sharing information between the various service providers?

A

Browser-Based

32
Q

Which function of a customer relationship management system helps a company capture information such as customer interactions on the phone andthrough the internet and puts it into a structure where reports can be run, analyses can be done, and information can be gleaned to support the business?

A

Technology

33
Q

The Southern Regional Hospital is planning to install a sensor in every bed that will automatically update patient vitals to the patient’s chart. Which network information is needed to connect the sensor

A

WI-FI connection information

34
Q

Jay, a new employee, at the Georgia Widget Company was ask to install a new version of the network operating system (NOS) on all the device in the network. In order not to look bad Jay has turned to you to learn which devices he should load the updated version of the NOS on? What do you tell Jay?

A

The servers

35
Q

What identifies a computer attached to a corporate network so that the correct information direct to it.

  • Unique identifier (UID)
  • Network interface controller (NIC)
  • Communication protocol
  • Media access control address (MAC)
A

Media access control address (MAC)

36
Q

Gayle received notice from her IT Security Team that they had revoked her access to company systems due to suspect activity. Gayle is confused because just yesterday she provided IT Security with the information they requested from her. What has Gayle fallen victim to?

A

Phishing

37
Q

You have been asked to recommend a solution to allow business data to be available in a format that allows managers to run queries and glean insight. What is NOT a recommended tool for this process?

  • Excel
  • SQL
  • Hadoop
  • Tableau
A

Hadoop