{"id":110848,"date":"2023-07-28T13:23:02","date_gmt":"2023-07-28T13:23:02","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=110848"},"modified":"2023-07-28T13:23:08","modified_gmt":"2023-07-28T13:23:08","slug":"wgu-c182-objective-assessment-exam-latest-2022-2024-wgu-c182-objective-assessment-exam-2023-2024-real-exam-70-questions-and-answerspassed-with-a","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/28\/wgu-c182-objective-assessment-exam-latest-2022-2024-wgu-c182-objective-assessment-exam-2023-2024-real-exam-70-questions-and-answerspassed-with-a\/","title":{"rendered":"WGU C182 OBJECTIVE ASSESSMENT EXAM LATEST 2022-2024\/ WGU C182 OBJECTIVE ASSESSMENT EXAM 2023-2024 REAL EXAM 70 QUESTIONS AND ANSWERS|PASSED WITH A+"},"content":{"rendered":"\n<p>First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.<br>Evolution of Users<\/p>\n\n\n\n<p>Sends files over the network at the request of clients. Responds over LAN, within one location\/site. Support both application software and data files.<br>FILE SERVER<\/p>\n\n\n\n<p>Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network.<br>Domain Name Server (DNS)<\/p>\n\n\n\n<p>Uses TWO KEYS a public and private key for performing encryption and decryption<br>Public Key Encryption<\/p>\n\n\n\n<p>PROVING you are who you say you are which can be done by: what you know, what you have!<br>Authentication<\/p>\n\n\n\n<p>TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures<br>Presentation Tier<\/p>\n\n\n\n<p>SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training<br>System Deployment<\/p>\n\n\n\n<p>CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS<br>ROUTER<\/p>\n\n\n\n<p>Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users<br>Confidentiality<\/p>\n\n\n\n<p>Protecting EVERY LAYER that SURROUNDS ((( DATA )))<br>Defense in Depth<\/p>\n\n\n\n<p>Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application<br>THE MODEL<\/p>\n\n\n\n<p>Creates a subset of the data by reducing the data from multiple dimensions to one dimension<br>Slicing Data<\/p>\n\n\n\n<p>The technology used in creating, maintaining, and making information accessible.<br>Information Technology<\/p>\n\n\n\n<p>In charge of all aspects of the COMPUTER NETWORKS<br>Network Administrator<\/p>\n\n\n\n<p>Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs).<br>Database Administrator<\/p>\n\n\n\n<p>Installs, configures, maintains, secures, and troubleshoots web severs<br>Web Administrator<\/p>\n\n\n\n<p>Processed data.<br>Information<\/p>\n\n\n\n<p>INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.<br>Knowledge in DIKW<\/p>\n\n\n\n<p>Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE<br>WISDOM<\/p>\n\n\n\n<p>The INPUT Processing, OUTPUT, STORAGE Cycle<br>I.P.O.S.<\/p>\n\n\n\n<p>Raw data is organized or structured for usefulness.<br>PROCESSED DATA<\/p>\n\n\n\n<p>Information is output so user can see results.<br>OUTPUT DATA<\/p>\n\n\n\n<p>Processed information is stored for permanent record.<br>STORAGE<\/p>\n\n\n\n<p>A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS<br>COMPUTER SYSTEM<\/p>\n\n\n\n<p>Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER<br>HARDWARE<\/p>\n\n\n\n<p>A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER.<br>NETWORK<\/p>\n\n\n\n<p>Systems Software and Applications Software<br>SOFTWARE CATEGORIES<\/p>\n\n\n\n<p>RULES provided by WHICH NETWORKS communicate with each other<br>IP PROTOCOL<\/p>\n\n\n\n<p>STORES the programs BEING EXECUTED and the data they are using.<br>COMPUTER MEMORY<\/p>\n\n\n\n<p>Controls THE SPEED at which instructions are processed.<br>SYSTEM CLOCK<\/p>\n\n\n\n<p>Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power).<br>RAM<\/p>\n\n\n\n<p>Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers<br>2nd Generation of Computers<\/p>\n\n\n\n<p>Silicon chips (known as ICs &#8211; integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals<br>3rd Generation of Computers<\/p>\n\n\n\n<p>Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time<br>Low-level Language<\/p>\n\n\n\n<p>Easier than machine but still required detailed, precise LOW LEVEL instructions<br>Assembly Language<\/p>\n\n\n\n<p>Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer<br>Language Translator Programs<\/p>\n\n\n\n<p>Programmer is limited to high level control constructs such as while loops, for loops, and if\/else statements and not allowed to use primitive GOTO statements<br>Structured Programming<\/p>\n\n\n\n<p>A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions.<br>Interpreted Language (Code)<\/p>\n\n\n\n<p>Small programs that place Linux commands or DOS batch files into a file<br>Shell Scripting<\/p>\n\n\n\n<p>The computer that the user is using; physically present with<br>Local Computer<\/p>\n\n\n\n<p>Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers.<br>Network Hub<\/p>\n\n\n\n<p>Like a hub, but this will only send data that is INTENDED FOR SPECIFIC COMPUTER<br>Network Switch<\/p>\n\n\n\n<p>Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable<br>Wireless Access Point<\/p>\n\n\n\n<p>Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers<br>Client-server Network<\/p>\n\n\n\n<p>Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.<br>Web Server<\/p>\n\n\n\n<p>Monitors print jobs<br>Print Server<\/p>\n\n\n\n<p>Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server.<br>FTP Server<\/p>\n\n\n\n<p>Devices connected along a SINGLE CABLE Size of network is restricted<br>Bus Network<\/p>\n\n\n\n<p>Each device is connected to a CENTRAL DEVICE such as a hub or switch.<br>Star Network<\/p>\n\n\n\n<p>Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached.<br>Ring Network<\/p>\n\n\n\n<p>Every device is connected directly to every other device in the network.<br>Mesh Network<\/p>\n\n\n\n<p>Identifies the server on which the web page can be found<br>Domain Name<\/p>\n\n\n\n<p>Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page<br>TLD (Top Level Domain) Name Exam: www.yourname.com .edu .net . gov .org<\/p>\n\n\n\n<p>Indicates the name of the file you are accessing, or the location of the document on the server<br>Resource\/ Filename ID<\/p>\n\n\n\n<p>Confidentiality, Integrity, Availability<br>CIA<\/p>\n\n\n\n<p>1st &#8211; Must include a component that ensures the accuracy of the collected data 2nd &#8211; Must be entered into the system accurately 3rd &#8211; Data modification must be tracked<br>Data Integrity Efforts<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Identify the organization&#8217;s information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats<br>Risk Management &amp; Strategic Risk Analysis<\/li>\n<\/ol>\n\n\n\n<p>An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company&#8217;s website; web server might pass the command onto the database which then allows potentially anything to be done to the database<br>SQL Injection<\/p>\n\n\n\n<p>Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code<br>Buffer Overflow<\/p>\n\n\n\n<p>Informs companies of potential problems with software HACK ATTACKS so companies can fix the problems.<br>White Hat Hacker<\/p>\n\n\n\n<p>Individuals with MALICIOUS INTENT WHO VIOLATE SECURITY in order to commit crimes or acts of terrorism<br>Black Hat Hacker<\/p>\n\n\n\n<p>Engage in BOTH WHITE and BLACK hat types of hacking activities<br>Grey Hat Hacker<\/p>\n\n\n\n<p>Type of virus that completely replaces an existing application and takes the name of the taken over file<br>Trojan Horse<\/p>\n\n\n\n<p>Attempts to identify if a file contains a virus or some form of malware<br>Anti-virus Software<\/p>\n\n\n\n<p>Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline<br>Data Redundancy<\/p>\n\n\n\n<p>Uses the same key for performing the encryption and decryption<br>Symmetric Key Encryption<\/p>\n\n\n\n<p>Ensures that the user gains access only to the resources that the user should be able to access<br>Role-based Access Control<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication<br>Computer Network Advantages<\/li>\n<\/ol>\n\n\n\n<p>Consists of programs that END USERS RUN to accomplish tasks<br>Application Software<\/p>\n\n\n\n<p>Consists of programs that MAKE UP THE OS software that directly supports the computer system itself<br>System Software<\/p>\n\n\n\n<p>Works with hardware to provide a NETWORK SERVICE<br>Server Software<\/p>\n\n\n\n<p>A LAN that uses the Internet Protocol<br>Intranet<\/p>\n\n\n\n<p>Core components of the OS that is loaded when the computer is first booted.<br>Kernel<\/p>\n\n\n\n<p>An interface for the user, often personalized for that given user, that provides access to the kernel.<br>Shell<\/p>\n\n\n\n<p>Administration and Support<br>IT Professional Roles<\/p>\n\n\n\n<p>Maintains all aspects of the system including hardware, software, and programming.<br>System Administrator<\/p>\n\n\n\n<p>Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.<br>Security Administrator<\/p>\n\n\n\n<p>Help desk and training.<br>Support IT Professionals<\/p>\n\n\n\n<p>Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom)<br>DIKW Hierarchy<\/p>\n\n\n\n<p>The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.<br>Data in DIKW<\/p>\n\n\n\n<p>Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.<br>Information in DIKW<\/p>\n\n\n\n<p>A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.<br>Information Systems<\/p>\n\n\n\n<p>RELEVANCE &#8211; the data being used must apply directly to the decision being made TIMELY &#8211; data must be efficient and must be provided in a timely manner THOROUGH &#8211; the data must be complete ACCURATE &#8211; data should be captured only once, where possible and should be captured as close to the point of activity as possible. RELIABLE &#8211; data should reflect stable and consistent data collection processes across collections points and over time<br>Characteristics of Quality Data<\/p>\n\n\n\n<p>Raw data is entered BY THE USER<br>Input<\/p>\n\n\n\n<p>COMPUTER PROGRAMS that tell the computer what to do&#8211;how to execute commands and process information<br>Software<\/p>\n\n\n\n<p>Transmission Control Protocol\/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.<br>TCP\/IP<\/p>\n\n\n\n<p>A collection of protocols. TCP\/IP is an example.<br>Protocol Stack<\/p>\n\n\n\n<p>CPU, Memory and Storage, Peripheral Devices<br>Components of a Computer<\/p>\n\n\n\n<p>Executes programs&#8217; instructions and commands various components in the computer. Referred to as the &#8220;chip&#8221;.<br>CPU<\/p>\n\n\n\n<p>All peripheral devices where long term storage devices are used.<br>i\/o Subsystem<\/p>\n\n\n\n<p>Permits information to move between each component; electrical channels that enable communication among the electronic components<br>System Bus<\/p>\n\n\n\n<p>Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.<br>System Unit<\/p>\n\n\n\n<p>Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots\/Cards<br>Internal Components of the System Unit<\/p>\n\n\n\n<p>Control Unit (CU) &#8211; retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) &#8211; does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen<br>Parts of the CPU<\/p>\n\n\n\n<p>Dynamic RAM (DRAM) &#8211; typically called main memory Static RAM (SRAM) &#8211; cache memory and registers<br>Types of RAM<\/p>\n\n\n\n<p>BIOS stands for: Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software NOT hardware, (&#8220;basic&#8221; operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can&#8217;t choose the amount or contents.<br>BIOS ROM<\/p>\n\n\n\n<p>Vacuum tubes, relay switches, the need to program in machine language<br>1st Generation of Computers<\/p>\n\n\n\n<p>Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use<br>4th Generation of Computers 1971 &#8211; 1980.<\/p>\n\n\n\n<p>Doubling of transistor count roughly every 18 &#8211; 24 months (exponential increase)<br>Moore&#8217;s Law<\/p>\n\n\n\n<p>Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage<br>Evolution of Storage<\/p>\n\n\n\n<p>Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more efficient<br>Compiler<\/p>\n\n\n\n<p>Characterized by the creation of windowed operating systems, easier real-world object modeling in programming code, and the application of inheritance in program code.<br>Object Oriented Programming<\/p>\n\n\n\n<p>A computer being accessed over the network<br>Remote Computer<\/p>\n\n\n\n<p>Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission; like calling someone on the phone<br>Circuit Switched Network<\/p>\n\n\n\n<p>A message&#8217;s pathway is only established as it is sent; the choice of pathway is based on availability and amount of message traffic<br>Packet Switched Network<\/p>\n\n\n\n<p>Creates and maintains client network connections to remote servers<br>Workstations<\/p>\n\n\n\n<p>A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.<br>Virtual Machine (VM)<\/p>\n\n\n\n<p>Responds to queries by pulling from the database. Typically only to local clients.<br>Database Server<\/p>\n\n\n\n<p>Two email servers communicate with each other<br>Mail Server<\/p>\n\n\n\n<p>Link between two resources; links two routers without any host or network in between<br>Point-to-Point Network<\/p>\n\n\n\n<p>Protocol, Domain name, Resource\/Filename<br>Parts of URL (Uniform Resource Locator)<\/p>\n\n\n\n<p>Requires that data is correct<br>Integrity<\/p>\n\n\n\n<p>Requires that information is available when needed<br>Availability<\/p>\n\n\n\n<p>Public &#8211; available through public sources; includes names and addresses Sensitive &#8211; not considered a threat to a person&#8217;s privacy if others learn of it; include email addresses Private &#8211; information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential &#8211; information that an organization will keep secret; includes patentable information and business plans<br>Information Security Classifications<\/p>\n\n\n\n<p>Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information<br>Phishing<\/p>\n\n\n\n<p>Allows you to obtain anything being sent over a network if the data being transmitted isn&#8217;t encrypted<br>Packet Sniffing<\/p>\n\n\n\n<p>Self contained programs that do not need other programs to propagate across computers and computer networks<br>Worm<\/p>\n\n\n\n<p>Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information<br>Encryption<\/p>\n\n\n\n<p>First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.<br>Evolution of Users<\/p>\n\n\n\n<p>Sends files over the network at the request of clients. Responds over LAN, within one location\/site. Support both application software and data files.<br>FILE SERVER<\/p>\n\n\n\n<p>Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network.<br>Domain Name Server (DNS)<\/p>\n\n\n\n<p>Uses TWO KEYS a public and private key for performing encryption and decryption<br>Public Key Encryption<\/p>\n\n\n\n<p>PROVING you are who you say you are which can be done by: what you know, what you have.<br>Authentication<\/p>\n\n\n\n<p>TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures.<br>Presentation tier<\/p>\n\n\n\n<p>SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training<br>System Deployment<\/p>\n\n\n\n<p>CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS<br>Router<\/p>\n\n\n\n<p>Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users<br>Confidentiality<\/p>\n\n\n\n<p>Protecting EVERY LAYER that SURROUNDS ((( DATA )))<br>Defense in Depth<\/p>\n\n\n\n<p>Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application<br>The model<\/p>\n\n\n\n<p>Creates a subset of the data by reducing the data from multiple dimensions to one dimension<br>Slicing data<\/p>\n\n\n\n<p>The technology used in creating, maintaining, and making information accessible<br>Information Technology<\/p>\n\n\n\n<p>In charge of all aspects of the COMPUTER NETWORKS<br>Network Administrator<\/p>\n\n\n\n<p>Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs).<br>Database Administrator<\/p>\n\n\n\n<p>Installs, configures, maintains, secures, and troubleshoots web severs.<br>Web Administrator<\/p>\n\n\n\n<p>processed data<br>Information<\/p>\n\n\n\n<p>INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.<br>Knowledge in DIKW<\/p>\n\n\n\n<p>Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE<br>Wisdom<\/p>\n\n\n\n<p>IPOS<br>The INPUT Processing, OUTPUT, STORAGE Cycle<\/p>\n\n\n\n<p>Processed data<br>Raw data that is organized and structured for usefulness.<\/p>\n\n\n\n<p>output data<br>An information processing activity that retrieves, formats, and distributes data to users.<\/p>\n\n\n\n<p>Storage<br>Processed information is stored for permanent record.<\/p>\n\n\n\n<p>Computer System<br>A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS<\/p>\n\n\n\n<p>Hardware<br>Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER<\/p>\n\n\n\n<p>Network<br>A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER.<\/p>\n\n\n\n<p>Software Categories<br>Systems Software and Applications Software<\/p>\n\n\n\n<p>IP Protocol<br>RULES provided by WHICH NETWORKS communicate with each other.<\/p>\n\n\n\n<p>computer memory<br>STORES the programs BEING EXECUTED and the data they are using.<\/p>\n\n\n\n<p>system clock<br>Controls THE SPEED at which instructions are processed<\/p>\n\n\n\n<p>RAM<br>Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power).<\/p>\n\n\n\n<p>Second generation computers<br>Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers<\/p>\n\n\n\n<p>Third generation computers<br>Silicon chips (known as ICs &#8211; integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals<\/p>\n\n\n\n<p>low-level language<br>Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time<\/p>\n\n\n\n<p>Assembly Language<br>Easier than machine but still required detailed, precise LOW LEVEL instructions<\/p>\n\n\n\n<p>Language Translator Programs<br>Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer<\/p>\n\n\n\n<p>Structured Programming<br>Programmer is limited to high level control constructs such as while loops, for loops, and if\/else statements and not allowed to use primitive GOTO statements<\/p>\n\n\n\n<p>Interpreted Language<br>A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions.<\/p>\n\n\n\n<p>Shell Scripting<br>Small programs that place Linux commands or DOS batch files into a file<\/p>\n\n\n\n<p>Local Computer<br>The computer that the user is using; physically present with<\/p>\n\n\n\n<p>Network Hub<br>Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers.<\/p>\n\n\n\n<p>Network Switch<br>Like a hub, but this will only send data that is intended for a specific computer.<\/p>\n\n\n\n<p>WAP (Wireless Access Point)<br>Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable<\/p>\n\n\n\n<p>client\/server network<br>Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers<\/p>\n\n\n\n<p>Web Server<br>Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.<\/p>\n\n\n\n<p>print server<br>Monitors print jobs<\/p>\n\n\n\n<p>ftp (file transfer protocol) server<br>Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server.<\/p>\n\n\n\n<p>Bus Network<br>consists of a single central cable, to which all computers and other devices connect<\/p>\n\n\n\n<p>Star Network<br>Each device is connected to a central device such as a hub or switch.<\/p>\n\n\n\n<p>Ring Network<br>Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.<\/p>\n\n\n\n<p>Mesh Network<br>Every device is connected directly to every other device in the network.<\/p>\n\n\n\n<p>Domain Name<br>Identifies the server on which the web page can be found<\/p>\n\n\n\n<p>top-level domain<br>Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page<\/p>\n\n\n\n<p>Resource\/Filename ID<br>Indicates the name of the file you are accessing, or the location of the document on the server<\/p>\n\n\n\n<p>CIA<br>Confidentiality, Integrity, Availability<\/p>\n\n\n\n<p>Risk Management and Strategic Risk Analysis<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Identify the organization&#8217;s information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats<\/li>\n<\/ol>\n\n\n\n<p>SQL Injection<br>An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company&#8217;s website; web server might pass the command onto the database which then allows potentially anything to be done to the database<\/p>\n\n\n\n<p>Buffer Overflow<br>Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code<\/p>\n\n\n\n<p>white hat hackers<br>work at the request of the system owners to find system vulnerabilities and plug the holes<\/p>\n\n\n\n<p>black hat hackers<br>breaking the systems to destroy information or for illegal gain<\/p>\n\n\n\n<p>grey hat hackers<br>A cross between black and white\u2014they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.<\/p>\n\n\n\n<p>Trojan Horse<br>a program designed to breach the security of a computer system while ostensibly performing some innocuous function.<\/p>\n\n\n\n<p>anti-virus software<br>Attempts to identify if a file contains a virus or some form of malware<\/p>\n\n\n\n<p>data redundancy<br>Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline<\/p>\n\n\n\n<p>Symmetric Key Encryption<br>Uses the same key for performing the encryption and decryption<\/p>\n\n\n\n<p>Role-Based Access Control (RBAC)<br>Ensures that the user gains access only to the resources that the user should be able to access<\/p>\n\n\n\n<p>Computer Network Advantages<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication<\/li>\n<\/ol>\n\n\n\n<p>Application Software<br>Consists of programs that END USERS RUN to accomplish tasks<\/p>\n\n\n\n<p>Systems software<br>Consists of programs that MAKE UP THE OS software that directly supports the computer system itself<\/p>\n\n\n\n<p>Server Software<br>Works with hardware to provide a NETWORK SERVICE<\/p>\n\n\n\n<p>Intranet<br>a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization<\/p>\n\n\n\n<p>kernel<br>Core components of the OS that is loaded when the computer is first booted.<\/p>\n\n\n\n<p>Shell<br>An interface for the user, often personalized for that given user, that provides access to the kernel.<\/p>\n\n\n\n<p>IT Professional Roles<br>Administration and Support<\/p>\n\n\n\n<p>System Administrator<br>Maintains all aspects of the system including hardware, software, and programming.<\/p>\n\n\n\n<p>Security Administrator<br>Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions<\/p>\n\n\n\n<p>Support IT Professionals<br>Help desk and training.<\/p>\n\n\n\n<p>DIKW Hierarchy<br>Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom)<\/p>\n\n\n\n<p>Data in DIKW<br>The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.<\/p>\n\n\n\n<p>Information in DIKW<br>Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.<\/p>\n\n\n\n<p>Information Systems<br>A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.<\/p>\n\n\n\n<p>Characteristics of Quality Data<br>RELEVANCE &#8211; the data being used must apply directly to the decision being made TIMELY &#8211; data must be efficient and must be provided in a timely manner THOROUGH &#8211; the data must be complete ACCURATE &#8211; data should be captured only once, where possible and should be captured as close to the point of activity as possible. RELIABLE &#8211; data should reflect stable and consistent data collection processes across collections points and over time<\/p>\n\n\n\n<p>Input<br>Raw data is entered BY THE USER<\/p>\n\n\n\n<p>Software<br>COMPUTER PROGRAMS that tell the computer what to do&#8211;how to execute commands and process information<\/p>\n\n\n\n<p>TCP\/IP<br>Transmission Control Protocol\/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.<\/p>\n\n\n\n<p>protocol stack<br>A collection of protocols. TCP\/IP is an example.<\/p>\n\n\n\n<p>Components of a Computer<br>CPU, Memory and Storage, Peripheral Devices<\/p>\n\n\n\n<p>CPU<br>Executes programs&#8217; instructions and commands various components in the computer. Referred to as the &#8220;chip&#8221;.<\/p>\n\n\n\n<p>System bus<br>Permits information to move between each component; electrical channels that enable communication among the electronic components<\/p>\n\n\n\n<p>System unit<br>Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.<\/p>\n\n\n\n<p>Internal components of software unit<br>Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots\/Cards<\/p>\n\n\n\n<p>Parts of the CPU<br>Control Unit (CU) &#8211; retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU<\/p>\n\n\n\n<p>Arithmetic Logic Unit (ALU) &#8211; does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen<\/p>\n\n\n\n<p>Types of RAM<br>Dynamic RAM (DRAM) &#8211; typically called main memory<\/p>\n\n\n\n<p>Static RAM (SRAM) &#8211; cache memory and registers<\/p>\n\n\n\n<p>BIOS ROM<br>BIOS stands for: Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software NOT hardware, (&#8220;basic&#8221; operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can&#8217;t choose the amount or contents.<\/p>\n\n\n\n<p>First generation computers<br>Vacuum tubes, relay switches, the need to program in machine language<\/p>\n\n\n\n<p>Fourth generation computers<br>Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use<\/p>\n\n\n\n<p>Moore&#8217;s Law<br>Doubling of transistor count roughly every 18 &#8211; 24 months (exponential increase)<\/p>\n\n\n\n<p>Evolution of Storage<br>Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage<\/p>\n\n\n\n<p>Compiler<br>Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more efficient<\/p>\n\n\n\n<p>object-oriented programming<br>Characterized by the creation of windowed operating systems, easier real-world object modeling in programming code, and the application of inheritance in program code.<\/p>\n\n\n\n<p>Remote Computer<br>A computer being accessed over the network<\/p>\n\n\n\n<p>Circuit Switched Network<br>Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission; like calling someone on the phone<\/p>\n\n\n\n<p>Packet Switched Network<br>A message&#8217;s pathway is only established as it is sent; the choice of pathway is based on availability and amount of message traffic<\/p>\n\n\n\n<p>virtual machine (VM)<br>Software that simulates the hardware of a physical computer, creating one or more logical machines within one physical machine.<\/p>\n\n\n\n<p>Server<br>Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network<\/p>\n\n\n\n<p>database server<br>Responds to queries by pulling from the database.<\/p>\n\n\n\n<p>Typically only to local clients.<\/p>\n\n\n\n<p>Mail server<br>Two email servers communicate with each other<\/p>\n\n\n\n<p>Point-to-Point Network<br>Link between two resources; links two routers without any host or network in between<\/p>\n\n\n\n<p>Parts of URL (Uniform Resource Locator)<br>Protocol, Domain name, Resource\/Filename<\/p>\n\n\n\n<p>Integrity<br>Requires that data is correct<\/p>\n\n\n\n<p>Availability<br>Requires that information is available when needed<\/p>\n\n\n\n<p>Information security classifications<br>Public &#8211; available through public sources; includes names and addresses Sensitive &#8211; not considered a threat to a person&#8217;s privacy if others learn of it; include email addresses Private &#8211; information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential &#8211; information that an organization will keep secret; includes patentable information and business plans<\/p>\n\n\n\n<p>Phishing<br>Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information<\/p>\n\n\n\n<p>Packet Sniffing<br>Allows you to obtain anything being sent over a network if the data being transmitted isn&#8217;t encrypted<\/p>\n\n\n\n<p>Worm<br>Self contained programs that do not need other programs to propagate across computers and computer networks<\/p>\n\n\n\n<p>Encryption<br>Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information<\/p>\n\n\n\n<p>What is the definition of information technology?<br>It is the technology used to create, maintain, and make information accessible.<\/p>\n\n\n\n<p>Which IT position has the responsibillity of working with routers and switches?<br>Network Administrator<\/p>\n\n\n\n<p>In which generation were silicon chips first used in computers?<br>Third generation<\/p>\n\n\n\n<p>Which low-level language corresponds one to one with assembly?<br>machine language<\/p>\n\n\n\n<p>What allows an organization to use software through the internet?<br>Saas or Software as a Service<\/p>\n\n\n\n<p>What is one of IT&#8217;s role in golobalization?<br>It allows companies to reach a wider customer base.<\/p>\n\n\n\n<p>Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?<br>Desktop<\/p>\n\n\n\n<p>Which two software application packages would be classified as productivity software?<br>Spreadsheet program and word processor<\/p>\n\n\n\n<p>Which two computer peripherals are connected to the computer through a port?<br>External microphone and USB flash drive<\/p>\n\n\n\n<p>Which term is defined as a collection of information used to support management of an organization?<br>Information system<\/p>\n\n\n\n<p>A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?<br>Data<\/p>\n\n\n\n<p>a dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?<br>Reliable<\/p>\n\n\n\n<p>Which two are parts of an information system?<br>Databases and Networks.<\/p>\n\n\n\n<p>What is the difference between processing and storage?<br>Processing involves temporary information, while storage involves permenant information.<\/p>\n\n\n\n<p>What type of information processing allows input data to be accepted as a set of records and processed as a unit?<br>Batch processing<\/p>\n\n\n\n<p>What is the role of the systems administrator?<br>To install and maintain network resources.<\/p>\n\n\n\n<p>Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?<br>Expanding the infrasturcture to support additional locations.<\/p>\n\n\n\n<p>What step should be taken by a business when a third-party solution is found that will benefit a project?<br>Contact the group to arrange a demo of their product.<\/p>\n\n\n\n<p>Which risk assessment question is part of the initiation phase?<br>Could the end users reject the outcome of the project?<\/p>\n\n\n\n<p>In what phase of a project does time estimation occur?<br>Planning<\/p>\n\n\n\n<p>What effect does scope creep have on a project?<br>It increases unplanned costs for the project.<\/p>\n\n\n\n<p>Which system requirement is an example of considering user needs in the design of an information system?<br>Allowing easy access to customer account information.<\/p>\n\n\n\n<p>Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?<br>User Acceptance<\/p>\n\n\n\n<p>Which type of systems conversion involves starting the conversion with a portion of end users?<br>Pilot<\/p>\n\n\n\n<p>What are two necessary elements of business continutiy planning?<br>Identifying risks that may occur<\/p>\n\n\n\n<p>Assessing key organizational activities.<\/p>\n\n\n\n<p>Which disaster recovery strategy is used to save information to multiple hard drives at the same time?<br>Data mirrorring<\/p>\n\n\n\n<p>Which action would support confidentiality?<br>Updating security software.<\/p>\n\n\n\n<p>Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?<br>Security Breach Notification laws<\/p>\n\n\n\n<p>How can an organization assist employees with the ethical use of information technology?<br>By developing policies for information usage.<\/p>\n\n\n\n<p>What is part of the role of an It professional assocation?<br>Provides professional standards for ethical behavior.<\/p>\n\n\n\n<p>Engages in best practices for information systems<\/p>\n\n\n\n<p>What is outside of the rold of an IT professional assocation?<br>Writes laws dealing with information technology<\/p>\n\n\n\n<p>Which benefit is provided by a computer network in a business?<br>Cost for hardware resources are decreased.<\/p>\n\n\n\n<p>A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing mutiple computers.<br>virtual machines<\/p>\n\n\n\n<p>Each computer is roughly equal to every other computer.<br>Peer-to-peer<\/p>\n\n\n\n<p>One computer will request information from another computer, which responds with requested information.<br>Client-server<\/p>\n\n\n\n<p>Allows the user to control the actions of the software and through the software, to access hardware.<br>The operating system<\/p>\n\n\n\n<p>Which action by application programs requires support from an operating system?<br>An internet browser displays a web page.<\/p>\n\n\n\n<p>What is true about the Linux operating system?<br>Linux runs on both servers and workstations<\/p>\n\n\n\n<p>Which characteristic identifies application sotware that is cloud based?<br>provided by third party providers<\/p>\n\n\n\n<p>What type of software permits free temporary use followed by long term activation for a fee?<br>Shareware<\/p>\n\n\n\n<p>What is the purpose of the End User License Agreement for a commercial software package?<br>Establishes the customer&#8217;s right tot use the software.<\/p>\n\n\n\n<p>What is the difference between proprietary and open-source software license?<br>Proprietary software has a cost whereas open-source software is free.<\/p>\n\n\n\n<p>Which two components are parts of a central processing unit?<br>Control Unit (CU)<\/p>\n\n\n\n<p>Arithmetic logic unit (AlU)<\/p>\n\n\n\n<p>An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?<br>printer<\/p>\n\n\n\n<p>monitor<\/p>\n\n\n\n<p>Which motherboard component helps cool the cpu?<br>heat sink<\/p>\n\n\n\n<p>Which item is a storage device?<br>flash drive<\/p>\n\n\n\n<p>In which type of network topology is each networked device directly connectd to every other networked device?<br>Mesh<\/p>\n\n\n\n<p>Which communication medium is typically used when sending data transmissions over very long distances?<br>Radio signals<\/p>\n\n\n\n<p>What indicates a specific internet location?<br>The ip address<\/p>\n\n\n\n<p>Translates human readable aliases into IP addresses<br>domain name system (DNS)<\/p>\n\n\n\n<p>Which part of a Uniform Resource Locator identifies the location of the document on the server?<br>Resource path id<\/p>\n\n\n\n<p>Which goal of information Assurance (IA) requires that information is accessible when needed?<br>Availability<\/p>\n\n\n\n<p>Which technique uses all possible combination of letters and numbers to crack a password?<br>brute force<\/p>\n\n\n\n<p>which is a characterisc of high level languages?<br>language translator programs are required.<\/p>\n\n\n\n<p>how does a compiler work?<br>It requires the components of the software to be defined from the onset.<\/p>\n\n\n\n<p>On which tier of the n tier architecture model are user interfaces developed?<br>presentation<\/p>\n\n\n\n<p>Which component facilitates communication between the other two components in the MVC architecture model?<br>controller<\/p>\n\n\n\n<p>What is the difference between a compiled and interpreted computer language?<br>compiler translates an entire program into executable progam which can be run at a later time, while the interpreter does this incrementally.<\/p>\n\n\n\n<p>Which two languages have traditionally been used for automation rather than software development?<br>TCL and Python because they are scripting languages<\/p>\n\n\n\n<p>Which is true of databases and the application that interact with them?<br>Applications are interdependent with the database.<\/p>\n\n\n\n<p>What is another term for a formula that outlines how to execute a task?<br>Algorithm<\/p>\n\n\n\n<p>What is the role of drivers in facilitating communication between application and databases?<br>They allow the ODBC to be used for interactions with the database and applications.<\/p>\n\n\n\n<p>Which sql clause is used to inform the database management system which table should be interrograted by the query?<br>FROM<\/p>\n\n\n\n<p>Which data type is used to represent product order code that comprises alphanumeric characters?<br>String data<\/p>\n\n\n\n<p>Why is it important to ensure that data support business goals?<br>To aid in making strategic decisions.<\/p>\n\n\n\n<p>In which category of the DIKW hierarchy would business intelligence be located?<br>Knowledge<\/p>\n\n\n\n<p>Which field must contain a unique value in order for a relational database table to function?<br>primary key<\/p>\n\n\n\n<p>What are the three main categories of databases?<br>Flat file, relational, and hierarchal<\/p>\n\n\n\n<p>What is the database administrators role in security?<br>To institute protocols to protect the databases from external threats.<\/p>\n\n\n\n<p>A single chip process developed in 1974 by IBM<br>microprocessor<\/p>\n\n\n\n<p>Over the years, the number of transisters that can be placed on a chip has increased by how much?<br>By orders of maginitude rather than linearly<\/p>\n\n\n\n<p>What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?<br>Moore&#8217;s law<\/p>\n\n\n\n<p>How long has Moore&#8217;s law continued to be a trend?<br>from 1965 to the present<\/p>\n\n\n\n<p>Is moore&#8217;s law an observation or a physical law?<br>observation<\/p>\n\n\n\n<p>The fetch-execute cycle is performed in an overlapped fashion on several instructions.<br>pipelines cpu<\/p>\n\n\n\n<p>a programming language that is a lengthy list of 1s and 0s.<br>machine language<\/p>\n\n\n\n<p>An early language translator that would translate an assembly program into machine language.<br>assemblers<\/p>\n\n\n\n<p>Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.<br>high level language<\/p>\n\n\n\n<p>What was the operation system called in the early 1960s?<br>a resident monitor<\/p>\n\n\n\n<p>Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?<br>GOTO<\/p>\n\n\n\n<p>What does the GOTO statement create?<br>spaghetti code<\/p>\n\n\n\n<p>What replaced the GOTO statement with high level control constructs such as while loops, and if-else statements, and is not allowed to use the GOTO statement?<br>structured programming<\/p>\n\n\n\n<p>A stand alone entity that would be programmed to handle its own internal methods as well as messages received from other objects.<br>An object<\/p>\n\n\n\n<p>What is the main difference between a compiled language and an interpreted language?<br>An interpreted language runs inside of a special environment called the interpreter.<\/p>\n\n\n\n<p>We have an expert-written solution to this problem!<br>When a programmer enters a command, what converts that command to machine language and executes it?<br>the interpreter<\/p>\n\n\n\n<p>perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?<br>scripting languages<\/p>\n\n\n\n<p>Relies on a session and allows you to test out an idea because they are executed as they&#8217;re written.<br>interpreter<\/p>\n\n\n\n<p>Requires that the componenets of the software all be defined from the onset and is considered to have more efficient code.<br>compiler<\/p>\n\n\n\n<p>What generation used vacuum tubes in computers?<br>first generation<\/p>\n\n\n\n<p>What generation of computers began to use transistors?<br>second<\/p>\n\n\n\n<p>what generation of computers introduced the silicon chip?<br>third<\/p>\n\n\n\n<p>what type of computer still uses silicon chips?<br>tablet<\/p>\n\n\n\n<p>What generation of computers introduced operating systems?<br>third<\/p>\n\n\n\n<p>What do integrated circuits need to function?<br>silicon chip<\/p>\n\n\n\n<p>a location beacon that uses bluetooth technology and can be embedded in any location aware mobile device.<br>iBeacons<\/p>\n\n\n\n<p>The myriad of types of devices that can and will be connected to the internet in the next few years.<br>the internet of things (IoT)<\/p>\n\n\n\n<p>What does RFID stand for?<br>Radio frequency identification device<\/p>\n\n\n\n<p>Refers to data sets that are so large and complex that they will require more advanced database management\/processing tools than we currently use.<br>big data<\/p>\n\n\n\n<p>what cloud service provides access and use of software to businesses through the internet?<br>Saas or software as a service<\/p>\n\n\n\n<p>which form of cloud computing enables teams of developers to quickly and reliably develop and deliver applications by accessing the same environment in real-time.<br>Paas or Platform as a Service<\/p>\n\n\n\n<p>Which cloud service provides all the resources (servers, data storage) tha an IT dept needs ouside of the org making them accessible by anyone, anywhere<br>IaaS or Infrastructure as a Service<\/p>\n\n\n\n<p>Reduced costs<\/p>\n\n\n\n<p>Increased speed of development of projects<\/p>\n\n\n\n<p>The ability to quickly and easily scale operations.<\/p>\n\n\n\n<p>Less reliance on internal IT expertise.<br>Benefits of cloud computing<\/p>\n\n\n\n<p>What are the risks of cloud computing?<br>Org becomes dependent on the reliability and performance of a third party vendor.<\/p>\n\n\n\n<p>Adverse effects on internal IT employees.<\/p>\n\n\n\n<p>Could raise concerns about data ownership and compliance issues.<\/p>\n\n\n\n<p>Possible breach in security.<\/p>\n\n\n\n<p>What are the main components in a computer?<br>CPU<\/p>\n\n\n\n<p>memory<\/p>\n\n\n\n<p>input\/output (i\/o) system<\/p>\n\n\n\n<p>bus<\/p>\n\n\n\n<p>what does ipos stand for?<br>input, process, output, storage<\/p>\n\n\n\n<p>Includes all peripheral devices for input, output, storage and network.<br>i\/o subsystem<\/p>\n\n\n\n<p>consists of long term storage devices<br>disk drives<\/p>\n\n\n\n<p>tapes<\/p>\n\n\n\n<p>The device that permits information to move between each component.<br>The bus<\/p>\n\n\n\n<p>Also known as the chassis or cabinet.<br>The case of a computer<\/p>\n\n\n\n<p>The circuitry and electrical channels that enable communication among the electronic components.<br>the bus<\/p>\n\n\n\n<p>the printed circuit board that houses the cpu, memory chips, and expansion cards in any computer.<br>the motherboard<\/p>\n\n\n\n<p>also referred to as &#8220;the chip&#8221;<br>CPU<\/p>\n\n\n\n<p>Retrieves instructions and raw data (input) and manages the transmission of the instructions and data to the alu.<br>Control unit<\/p>\n\n\n\n<p>Completes mathematical calculations and logical operations to process the data, converting the input of keyboard text entry to output displayed on the screen.<br>arithmetic logic unit<\/p>\n\n\n\n<p>controls the speed at which instructions are processed.<br>The system clock<\/p>\n\n\n\n<p>What is the measurement unit used to identify clock speed on today&#8217;s computers?<br>GHz<\/p>\n\n\n\n<p>What does BIOS stand for<br>Basic input output system<\/p>\n\n\n\n<p>The basic operating system that runs when a computer is first turned on. It runs test of memory and the cpu,and initilizes hardware components so that the actual Operating system can be loaded from the hard disk.<br>BIOS ROM<\/p>\n\n\n\n<p>Temporarily stores data before it is processed and sent to your screen or printer.<br>RAM<\/p>\n\n\n\n<p>Volitile memory that disappears when the computer is turned off or loses power.<br>RAM<\/p>\n\n\n\n<p>Houses CDs and DVDs, typically located on the front of the system unit for easy access.<br>bays<\/p>\n\n\n\n<p>can insert modem cards, wireless access cards, and other PC cards such as camera cards<br>slots<\/p>\n\n\n\n<p>Can connect additional input, output, storage, and communication devices<br>ports<\/p>\n\n\n\n<p>computer that has the least amount of performance<br>handheld<\/p>\n\n\n\n<p>computer that has the mid amount of performance capability<br>laptop<\/p>\n\n\n\n<p>computer with the most amount of performance capability<br>desktop<\/p>\n\n\n\n<p>consists of programs that end users run to accomplish tasks. An example of a type of this software includes the email client, web browser, and ftop client<br>application software<\/p>\n\n\n\n<p>consists of applications that are usefule to everyone such as word processor, presentation software, spreadsheet program, database mgmt systems, calendar program, address book, and data organizer.<br>productivity software<\/p>\n\n\n\n<p>software more specific towards artists and graphic designers<br>drawing software<\/p>\n\n\n\n<p>also referred to as horizontal software<br>productivity software<\/p>\n\n\n\n<p>Software used by select groups with an organization or to a specific discipline such as music sequencers, samplers, and digital recorders for muscians.<br>vertical software<\/p>\n\n\n\n<p>progams that make up the operating system and directly supports the computer system itself.<br>system software<\/p>\n\n\n\n<p>Pieces of the operating system that run in the background all of the time<br>daemons or services<\/p>\n\n\n\n<p>works with hardware to provide a network service, types of software includes web servers, email servers, and database servers<br>server software<\/p>\n\n\n\n<p>software stored on an individual computer<br>local application<\/p>\n\n\n\n<p>the ability to have computation anywhere at any time<br>ubiquitous computing<\/p>\n\n\n\n<p>Android, Chrom, and iOS are common operating systems for which type of computer?<br>mobile devices<\/p>\n\n\n\n<p>dedicated computers within a network whose function is to respond to network requests and provide a network service<br>server<\/p>\n\n\n\n<p>loaded when the computer is first booted, included components that handle process mgmt, resource mgmt, and memory mgmt<br>kernel<\/p>\n\n\n\n<p>sits on top of the hardware and is the interface between hardware and software<br>the kernel<\/p>\n\n\n\n<p>a piece of the operating system that provides specific interfaces between the OS running a computer and hardware.<br>device drivers<\/p>\n\n\n\n<p>an interface for the user that provides access to the kernel<br>the shell<\/p>\n\n\n\n<p>programs that allow the user to monitor and improve system performance<br>system utilities<\/p>\n\n\n\n<p>sometimes referred to as root or superuser<br>administrator account<\/p>\n\n\n\n<p>hat is the role of a web server<br>to respond to HTTP requests<\/p>\n\n\n\n<p>What does http stand for?<br>hypertext transfer protocol<\/p>\n\n\n\n<p>Used in an organization to act as a giant cache of web pages that anyone in the organization has recently retrieved.<br>proxy server<\/p>\n\n\n\n<p>what type of server has the capability of blocking specific servers and rejecting responses that contain certain content?<br>proxy server<\/p>\n\n\n\n<p>permits database access across a network. Performs tasks such as data analysis, data manipulation, security, and archiving.<br>database server<\/p>\n\n\n\n<p>like a web server, this server host files and allows clients to access those files. However, it instead provides access in the form of uploading and downloading files.<br>ftp server<\/p>\n\n\n\n<p>a computer with a large hard disk storing files that any or many users of the network may wish to access.<br>file server<\/p>\n\n\n\n<p>data that has been processed<br>information<\/p>\n\n\n\n<p>in the dikw, what is data?<br>data is the input directly received by human or computer.<\/p>\n\n\n\n<p>in dikw, what is information?<br>information is inferred from data, meaning that one or many processes have been applied to the data to tranform it into a more useful form.<\/p>\n\n\n\n<p>in dikw, what is knowledge?<br>refined information that hte user of the knowledge is able to call forth only relevant portions of information when needed.<\/p>\n\n\n\n<p>in dikw, what is wisdom?<br>having both knowledge and experience<\/p>\n\n\n\n<p>which characteristic of quality data requires data being used to be applied directly to the decision being made.<br>relevance<\/p>\n\n\n\n<p>characateristic of quality data where data is provided efficiently and on time so that companies can utilize it in their business.<br>timely<\/p>\n\n\n\n<p>characteristic of quality data whereas data must be complete and not contain errors or lapses of data.<br>thorough<\/p>\n\n\n\n<p>characteristic of quality data whereas data is captured once only, where possible, and captured as close to the point of activity as possible.<br>accurate<\/p>\n\n\n\n<p>characteristic of quality data whereas data should reflect stable and consistent data collection processes across collection points and over time, whether using manual or computer based systems or a combination.<br>reliable<\/p>\n\n\n\n<p>What four operations does a computer perform?<br>input<\/p>\n\n\n\n<p>processing<\/p>\n\n\n\n<p>Output<\/p>\n\n\n\n<p>Storgage<\/p>\n\n\n\n<p>The physical components of a computer<br>hardware<\/p>\n\n\n\n<p>the programs and other operating information used by the computer<br>software<\/p>\n\n\n\n<p>a collection of computers and resources connected by various media so they can communicate with each other.<br>network<\/p>\n\n\n\n<p>The people who use the computer system<br>users<\/p>\n\n\n\n<p>A set of rules established to govern how people behave and interact with each other<br>a protocol<\/p>\n\n\n\n<p>a requirment of all computers to communicate over the internet<br>transmission control protocol\/ internet protocol or TCP\/IP<\/p>\n\n\n\n<p>A collection of protocols that is sometimes referred to as a protocol stack<br>tcp\/ip<\/p>\n\n\n\n<p>commercial software purchased from a vendor<br>proprietary<\/p>\n\n\n\n<p>proprietary software produced by a company that commercially markets software<br>software house<\/p>\n\n\n\n<p>software free from purchase, but not necessarily free in how you use it.<br>freeware<\/p>\n\n\n\n<p>what types of software is ususally software that has become obsolete because a new software has replaced it, or is software that the original producer no longer wants to maintain and provide support for?<br>freeware<\/p>\n\n\n\n<p>public domain<\/p>\n\n\n\n<p>software that has been moved into the public domain and are made available as executables.<br>public domain<\/p>\n\n\n\n<p>software created in the open source community and made freely available as source code<br>open source<\/p>\n\n\n\n<p>protects an original work, but no the ideas behind the work<br>copyright<\/p>\n\n\n\n<p>excluse right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author&#8217;s life plus 70 years.<br>copyright<\/p>\n\n\n\n<p><a>What is the definition of information technology?<\/a><\/p>\n\n\n\n<p><a>It is the technology used to create, maintain, and make information accessible.<\/a><\/p>\n\n\n\n<p><a>Which IT position has the responsibillity of working with routers and switches?<\/a><\/p>\n\n\n\n<p><a>Network Administrator<\/a><\/p>\n\n\n\n<p><a>In which generation were silicon chips first used in computers?<\/a><\/p>\n\n\n\n<p><a>Third generation<\/a><\/p>\n\n\n\n<p><a>Which low-level language corresponds one to one with assembly?<\/a><\/p>\n\n\n\n<p><a>machine language<\/a><\/p>\n\n\n\n<p><a>What allows an organization to use software through the internet?<\/a><\/p>\n\n\n\n<p><a>Saas or Software as a Service<\/a><\/p>\n\n\n\n<p><a>What is one of IT&#8217;s role in golobalization?<\/a><\/p>\n\n\n\n<p><a>It allows companies to reach a wider customer base.<\/a><\/p>\n\n\n\n<p><a>Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?<\/a><\/p>\n\n\n\n<p><a>Desktop<\/a><\/p>\n\n\n\n<p><a>Which two software application packages would be classified as productivity software?<\/a><\/p>\n\n\n\n<p><a>Spreadsheet program and word processor<\/a><\/p>\n\n\n\n<p><a>Which two computer peripherals are connected to the computer through a port?<\/a><\/p>\n\n\n\n<p><a>External microphone and USB flash drive<\/a><\/p>\n\n\n\n<p><a>Which term is defined as a collection of information used to support management of an organization?<\/a><\/p>\n\n\n\n<p><a>Information system<\/a><\/p>\n\n\n\n<p><a>A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?<\/a><\/p>\n\n\n\n<p><a>Data<\/a><\/p>\n\n\n\n<p><a>A dept. manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?<\/a><\/p>\n\n\n\n<p><a>Timely<\/a><\/p>\n\n\n\n<p><a>Which two are parts of an information system?<\/a><\/p>\n\n\n\n<p><a>Databases and Networks.<\/a><\/p>\n\n\n\n<p><a>What is the difference between processing and storage?<\/a><\/p>\n\n\n\n<p><a>Processing collects and translates data into useful information, while storage places the translated data in specific locations.<\/a><\/p>\n\n\n\n<p><a>Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?<\/a><\/p>\n\n\n\n<p><a>Costs for hardware resources are decreased<\/a><\/p>\n\n\n\n<p><a>A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.<\/a><\/p>\n\n\n\n<p><a>Virtual machines<\/a><\/p>\n\n\n\n<p><a>Each computer is roughly equal to every other computer.<\/a><\/p>\n\n\n\n<p><a>Peer-to-peer<\/a><\/p>\n\n\n\n<p><a>One computer will request information from another computer, which responds with requested information.<\/a><\/p>\n\n\n\n<p><a>Client-server<\/a><\/p>\n\n\n\n<p><a>Allows the user to control the actions of the software, and through the software, to access hardware.<\/a><\/p>\n\n\n\n<p><a>Operating System<\/a><\/p>\n\n\n\n<p><a>Which action by application programs requires support from a networked operating system?<\/a><\/p>\n\n\n\n<p><a>An Internet browser displays a web page.<\/a><\/p>\n\n\n\n<p><a>The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need?<\/a><\/p>\n\n\n\n<p><a>Proxy server<\/a><\/p>\n\n\n\n<p><a>Which characteristic identifies application software that is cloud-based?<\/a><\/p>\n\n\n\n<p><a>Provided by third-party providers<\/a><\/p>\n\n\n\n<p><a>What type of software permits free temporary use followed by long-term activation for a fee?<\/a><\/p>\n\n\n\n<p><a>Shareware<\/a><\/p>\n\n\n\n<p><a>What is the purpose of an End User License Agreement for a commercial software package?<\/a><\/p>\n\n\n\n<p><a>Establishes the customer&#8217;s right to use the software.<\/a><\/p>\n\n\n\n<p><a>What is the difference between proprietary and open-source software license?<\/a><\/p>\n\n\n\n<p><a>Proprietary software has a cost whereas open-source software is free.<\/a><\/p>\n\n\n\n<p><a>What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?<\/a><\/p>\n\n\n\n<p><a>A copyright<\/a><\/p>\n\n\n\n<p><a>Which two components are parts of a central processing unit (CPU)?<\/a><\/p>\n\n\n\n<p><a>Control unit (CU), and Arithmetic logic unit (ALU)<\/a><\/p>\n\n\n\n<p><a>An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used?<\/a><\/p>\n\n\n\n<p><a>Printer and Monitor<\/a><\/p>\n\n\n\n<p><a>Which item is a storage device?<\/a><\/p>\n\n\n\n<p><a>flash drive<\/a><\/p>\n\n\n\n<p><a>What indicates a specific Internet location?<\/a><\/p>\n\n\n\n<p><a>IP address<\/a><\/p>\n\n\n\n<p><a>Which description explains the role of a domain name system (DNS)?<\/a><\/p>\n\n\n\n<p><a>Translates human-readable aliases into IP addresses<\/a><\/p>\n\n\n\n<p><a>Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?<\/a><\/p>\n\n\n\n<p><a>Resource path ID<\/a><\/p>\n\n\n\n<p><a>Which goal of Information Assurance (IA) requires that information is accessible when needed?<\/a><\/p>\n\n\n\n<p><a>Availability<\/a><\/p>\n\n\n\n<p><a>Which technique uses all possible combinations of letters and numbers to crack a password?<\/a><\/p>\n\n\n\n<p><a>Brute force<\/a><\/p>\n\n\n\n<p><a>Which is a type of two-factor authentication?<\/a><\/p>\n\n\n\n<p><a>Smart Card<\/a><\/p>\n\n\n\n<p><a>In which type of network topology is each networked device directly connected to every other networked device?<\/a><\/p>\n\n\n\n<p><a>Mesh<\/a><\/p>\n\n\n\n<p><a>Which communication medium is should be used when sending data transmissions from Singapore to Mexico City?<\/a><\/p>\n\n\n\n<p><a>Radio signals<\/a><\/p>\n\n\n\n<p><a>Which is a characteristic of high-level languages?<\/a><\/p>\n\n\n\n<p><a>The source code has to be complied.<\/a><\/p>\n\n\n\n<p><a>How does a compiler work?<\/a><\/p>\n\n\n\n<p><a>It takes the most recent instructions and translates them into machine language<\/a><\/p>\n\n\n\n<p><a>What is true of compiled and interpreted computer language?<\/a><\/p>\n\n\n\n<p><a>A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.<\/a><\/p>\n\n\n\n<p><a>Which language is often used for rapid prototyping and the creation of GUIs?<\/a><\/p>\n\n\n\n<p><a>TCL<\/a><\/p>\n\n\n\n<p><a>What is true of databases and the applications that interact with them?<\/a><\/p>\n\n\n\n<p><a>Applications are interdependent of the database.<\/a><\/p>\n\n\n\n<p><a>What is another term for a formula that outlines how to execute a task?<\/a><\/p>\n\n\n\n<p><a>Algorithm<\/a><\/p>\n\n\n\n<p><a>Which data type is used to represent product order code that comprises alphanumeric characters?<\/a><\/p>\n\n\n\n<p><a>String data<\/a><\/p>\n\n\n\n<p><a>Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database?<\/a><\/p>\n\n\n\n<p><a>Character string<\/a><\/p>\n\n\n\n<p><a>Why is it important to ensure that data support business goals?<\/a><\/p>\n\n\n\n<p><a>To aid in making strategic decisions.<\/a><\/p>\n\n\n\n<p><a>In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?<\/a><\/p>\n\n\n\n<p><a>Knowledge<\/a><\/p>\n\n\n\n<p><a>Which field must contain a unique value in order for a relational database table to function?<\/a><\/p>\n\n\n\n<p><a>primary key<\/a><\/p>\n\n\n\n<p><a>What are the three main categories of databases?<\/a><\/p>\n\n\n\n<p><a>Flat file, relational, hierarchal<\/a><\/p>\n\n\n\n<p><a>What is the database administrators role in security?<\/a><\/p>\n\n\n\n<p><a>To institute protocols to protect the databases from external threats.<\/a><\/p>\n\n\n\n<p><a>Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?<\/a><\/p>\n\n\n\n<p><a>What type of information processing allows input data to be accepted as a set of records and processed as a unit?<\/a><\/p>\n\n\n\n<p><a>Batch<\/a><\/p>\n\n\n\n<p><a>What is the role of drivers in facilitating communication between applications and databases?<\/a><\/p>\n\n\n\n<p><a>They allow the application to interact with the database.<\/a><\/p>\n\n\n\n<p><a>Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?<\/a><\/p>\n\n\n\n<p><a>FROM<\/a><\/p>\n\n\n\n<p><a>What is the role of the systems administrator?<\/a><\/p>\n\n\n\n<p><a>To install and maintain network resources.<\/a><\/p>\n\n\n\n<p><a>What is the purpose of an IT department?<\/a><\/p>\n\n\n\n<p><a>It helps the organization achieve strategic goals.<\/a><\/p>\n\n\n\n<p><a>Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?<\/a><\/p>\n\n\n\n<p><a>Expanding the infrasturcture to support additional locations.<\/a><\/p>\n\n\n\n<p><a>What step should be taken by a business when a third-party solution is found that will benefit a project?<\/a><\/p>\n\n\n\n<p><a>Contact the group to arrange a demo of their product.<\/a><\/p>\n\n\n\n<p><a>Which risk assessment question is part of the initiation phase?<\/a><\/p>\n\n\n\n<p><a>Could the end users reject the outcome of the project?<\/a><\/p>\n\n\n\n<p><a>In what phase of a project does time estimation occur?<\/a><\/p>\n\n\n\n<p><a>Planning<\/a><\/p>\n\n\n\n<p><a>What effect does scope creep have on a project?<\/a><\/p>\n\n\n\n<p><a>It increases unplanned costs for the project.<\/a><\/p>\n\n\n\n<p><a>Which system requirement is an example of considering user needs in the design of an information system?<\/a><\/p>\n\n\n\n<p><a>Allowing secure access to customer account information.<\/a><\/p>\n\n\n\n<p><a>Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?<\/a><\/p>\n\n\n\n<p><a>User Acceptance<\/a><\/p>\n\n\n\n<p><a>Which type of systems conversion involves starting the conversion with a portion of end users?<\/a><\/p>\n\n\n\n<p><a>Pilot<\/a><\/p>\n\n\n\n<p><a>What are two necessary elements of business continutiy planning?<\/a><\/p>\n\n\n\n<p><a>Identifying risks that may occur.<br>Assessing key organizational activities.<\/a><\/p>\n\n\n\n<p><a>Which action would support confidentiality?<\/a><\/p>\n\n\n\n<p><a>Updating security software.<\/a><\/p>\n\n\n\n<p><a>Which disaster recovery strategy is used to save information to multiple hard drives at the same time?<\/a><\/p>\n\n\n\n<p><a>Data mirroring<\/a><\/p>\n\n\n\n<p><a>Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?<\/a><\/p>\n\n\n\n<p><a>Security Breach Notification laws<\/a><\/p>\n\n\n\n<p><a>How can an organization assist employees with the ethical use of information technology?<\/a><\/p>\n\n\n\n<p><a>By developing policies for information usage.<\/a><\/p>\n\n\n\n<p><a>What is part of the role of an It professional?<\/a><\/p>\n\n\n\n<p><a>Provides professional standards for ethical behavior.<br>Engages in best practices for information systems<\/a><\/p>\n\n\n\n<p><a>Marcus has a summer job working at a real estate agency. He is entering client addresses into the company&#8217;s computer system. At which stage of the DIKW hierarchy is Marcus working?<\/a><\/p>\n\n\n\n<p><a>Data<\/a><\/p>\n\n\n\n<p><a>Which software is run automatically rather than by the end user?<\/a><\/p>\n\n\n\n<p><a>System software<\/a><\/p>\n\n\n\n<p><a>Which account is also referred to as root or superuser?<\/a><\/p>\n\n\n\n<p><a>The Administrator Account<\/a><\/p>\n\n\n\n<p><a>Which of the following best describes a hierarchical database format?<\/a><\/p>\n\n\n\n<p><a>Data are modeled using parent-child relationships.<\/a><\/p>\n\n\n\n<p><a>What are the responsibilities of the system administrator?<\/a><\/p>\n\n\n\n<p><a>Providing support to users<br>Creating new user accounts<br>Installing new file server hardware and software<\/a><\/p>\n\n\n\n<p><a>Which of the following is an example of a relational database?<\/a><\/p>\n\n\n\n<p><a>A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University&#8217;s system.<\/a><\/p>\n\n\n\n<p><a>Which of the following describes the duties of a web administrator?<\/a><\/p>\n\n\n\n<p><a>Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.<\/a><\/p>\n\n\n\n<p><a>Which of the following statements accurately describe IT certifications?<\/a><\/p>\n\n\n\n<p><a>Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.<\/a><\/p>\n\n\n\n<p><a>What are important characteristic of an IT professional?<\/a><\/p>\n\n\n\n<p><a>Ability to troubleshoot<br>Desire to continually learn.<br>Good communication skills &#8211; both oral and written<\/a><\/p>\n\n\n\n<p><a>As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working?<\/a><\/p>\n\n\n\n<p><a>Knowledge<\/a><\/p>\n\n\n\n<p><a>What describes the difference between information systems and information technology?<\/a><\/p>\n\n\n\n<p><a>An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software.<\/a><\/p>\n\n\n\n<p><a>What best represents the relevant characteristic of quality data?<\/a><\/p>\n\n\n\n<p><a>The data used applies to the question being answered.<\/a><\/p>\n\n\n\n<p><a>What is\/are true of the IPOS cycle?<\/a><\/p>\n\n\n\n<p><a>Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.<\/a><\/p>\n\n\n\n<p><a>What is an accurate definition of a computer system?<\/a><\/p>\n\n\n\n<p><a>A computer system is a collection of hardware and software components that work together to meet the needs of the user.<\/a><\/p>\n\n\n\n<p><a>What is the difference between software and hardware?<\/a><\/p>\n\n\n\n<p><a>Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.<\/a><\/p>\n\n\n\n<p><a>What would require the use of a network?<\/a><\/p>\n\n\n\n<p><a>Computers in an office sharing the same printer.<br>Schools turning in attendance files to the district office.<br>Gourmet chocolate being sold on the Internet.<\/a><\/p>\n\n\n\n<p><a>Which type of software includes programs such as Microsoft Word and PowerPoint?<\/a><\/p>\n\n\n\n<p><a>Application<\/a><\/p>\n\n\n\n<p><a>What is a program that will allow a computer to easily access the hardware and software of the computer system?<\/a><\/p>\n\n\n\n<p><a>Operating system<\/a><\/p>\n\n\n\n<p><a>__________ software works with hardware to provide a network service<\/a><\/p>\n\n\n\n<p><a>Windows Server<\/a><\/p>\n\n\n\n<p><a>What is another term that defines a script?<\/a><\/p>\n\n\n\n<p><a>Interpreted program<\/a><\/p>\n\n\n\n<p><a>In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan.<\/a><\/p>\n\n\n\n<p><a>Design<\/a><\/p>\n\n\n\n<p><a>During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders.<\/a><\/p>\n\n\n\n<p><a>User Acceptance Testing<\/a><\/p>\n\n\n\n<p><a>In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released.<\/a><\/p>\n\n\n\n<p><a>Beta<\/a><\/p>\n\n\n\n<p><a>___________ is ephemeral, meaning data stored is lost when the computer is powered off.<\/a><\/p>\n\n\n\n<p><a>RAM<\/a><\/p>\n\n\n\n<p><a>In a SQL query, the __________ operation combines two tables together?<\/a><\/p>\n\n\n\n<p><a>JOIN<\/a><\/p>\n\n\n\n<p><a>__________ uses the concept of reflection of light through a core made up of glass or plastic.<\/a><\/p>\n\n\n\n<p><a>Optical Wire<\/a><\/p>\n\n\n\n<p><a>The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document.<\/a><\/p>\n\n\n\n<p><a>URL<\/a><\/p>\n\n\n\n<p><a>This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications<\/a><\/p>\n\n\n\n<p><a>PaaS (Platform as a Service)<\/a><\/p>\n\n\n\n<p><a>With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere<\/a><\/p>\n\n\n\n<p><a>IaaS (Infrastructure as a Service)<\/a><\/p>\n\n\n\n<p><a>What is the correct order of project phase for Project Management?<\/a><\/p>\n\n\n\n<p><a>Initiation, Planning, Executing, Closing<\/a><\/p>\n\n\n\n<p><a>During this phase of Project Management, the projects scope and requirements are defined<\/a><\/p>\n\n\n\n<p><a>Initiation phase<\/a><\/p>\n\n\n\n<p><a>The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP<\/a><\/p>\n\n\n\n<p><a>web server<\/a><\/p>\n\n\n\n<p><a>This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols)<\/a><\/p>\n\n\n\n<p><a>eMail server<\/a><\/p>\n\n\n\n<p><a>In this network topology ALL devices have a single point-to-point connection with a central device<\/a><\/p>\n\n\n\n<p><a>STAR network<\/a><\/p>\n\n\n\n<p><a>This type of software is made freely available as source code.<\/a><\/p>\n\n\n\n<p><a>open source software<\/a><\/p>\n\n\n\n<p><a>This software protection will protect an individuals original work (tangible form)for the authors life + 70 years<\/a><\/p>\n\n\n\n<p><a>Copyright<\/a><\/p>\n\n\n\n<p><a>This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing<\/a><\/p>\n\n\n\n<p><a>Patent<\/a><\/p>\n\n\n\n<p><a>The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table\/relation they can be found in).<\/a><\/p>\n\n\n\n<p><a>SELECT<\/a><\/p>\n\n\n\n<p><a>The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.<\/a><\/p>\n\n\n\n<p><a>FROM<\/a><\/p>\n\n\n\n<p><a>The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.<\/a><\/p>\n\n\n\n<p><a>WHERE clause<\/a><\/p>\n\n\n\n<p><a>All of the following are compiled languages<\/a><\/p>\n\n\n\n<p><a>BASIC<br>Java<br>C++<\/a><\/p>\n\n\n\n<p><a>Which of the following is the correct function of the compiler?<\/a><\/p>\n\n\n\n<p><a>Translates the entire program, creating an executable program, which can be run at a later time.<\/a><\/p>\n\n\n\n<p><a>A program written in a high-level language must be converted into __________ code to be executed by the computer.<\/a><\/p>\n\n\n\n<p><a>Machine<\/a><\/p>\n\n\n\n<p><a>Which two are both types of scripting languages?<\/a><\/p>\n\n\n\n<p><a>ASP and Python<\/a><\/p>\n\n\n\n<p><a>This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations).<\/a><\/p>\n\n\n\n<p><a>Relational<\/a><\/p>\n\n\n\n<p><a>This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure)<\/a><\/p>\n\n\n\n<p><a>Hierarchal<\/a><\/p>\n\n\n\n<p><a>Which of the following types of information present a threat to someone&#8217;s privacy?<\/a><\/p>\n\n\n\n<p><a>Student ID and credit card numbers<\/a><\/p>\n\n\n\n<p><a>The __________________ is the electronic circuit responsible for executing computer program instructions.<\/a><\/p>\n\n\n\n<p><a>Central Processing Unit<\/a><\/p>\n\n\n\n<p><a>Learning about social engineering and how to protect passwords is ___.<\/a><\/p>\n\n\n\n<p><a>Education<\/a><\/p>\n\n\n\n<p><a>________________ is a general term that describes any attack that takes advantage of humans&#8217; trusting nature.<\/a><\/p>\n\n\n\n<p><a>Social engineering<\/a><\/p>\n\n\n\n<p><a>A local area network (LAN)<\/a><\/p>\n\n\n\n<p><a>Allows hardware sharing within one office<\/a><\/p>\n\n\n\n<p><a>Which device permits packet switching so that a message can be routed to the next link in a network?<\/a><\/p>\n\n\n\n<p><a>router<\/a><\/p>\n\n\n\n<p><a>What best describes the Internet?<\/a><\/p>\n\n\n\n<p><a>The Internet is a global network of networks.<\/a><\/p>\n\n\n\n<p><a>All of the following are parts of a URL<\/a><\/p>\n\n\n\n<p><a>Protocol<br>Host name<br>TLD<\/a><\/p>\n\n\n\n<p><a>Which of the following statements is not part of the path a message takes from one computer to another?<\/a><\/p>\n\n\n\n<p><a>All messages require a response from the destination machine to the sending device.<\/a><\/p>\n\n\n\n<p><a>Your site&#8217;s Internet point of presence is called a:<\/a><\/p>\n\n\n\n<p><a>Gateway<\/a><\/p>\n\n\n\n<p><a>What aligns IT goals and organization goals?<\/a><\/p>\n\n\n\n<p><a>IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly<\/a><\/p>\n\n\n\n<p><a>What is IT management responsible for?<\/a><\/p>\n\n\n\n<p><a>Being the project manager<\/a><\/p>\n\n\n\n<p><a>A ____________ is also known as a datasheet<\/a><\/p>\n\n\n\n<p><a>Database Table<\/a><\/p>\n\n\n\n<p><a>IT personnel who understand both the technical IT infrastructure and management of the business fill which role?<\/a><\/p>\n\n\n\n<p><a>IT management<\/a><\/p>\n\n\n\n<p><a>What is an advantage of outsourcing?<\/a><\/p>\n\n\n\n<p><a>Cost-effective if time is constrained<\/a><\/p>\n\n\n\n<p><a>A company&#8217;s ability to recover after a disaster is directly related to which of the following?<\/a><\/p>\n\n\n\n<p><a>Business continuity plan<\/a><\/p>\n\n\n\n<p><a>When a disaster happens that impacts a company, ________________ help define how to resume services to customers and vital business operations, while auxiliary services may remain offline?<\/a><\/p>\n\n\n\n<p><a>Business Continuity Plans<\/a><\/p>\n\n\n\n<p><a>An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?<\/a><\/p>\n\n\n\n<p><a>Data mirroring<\/a><\/p>\n\n\n\n<p><a>What is the definition of a Platform as a Service (PaaS)?<\/a><\/p>\n\n\n\n<p><a>A Platform as a Service is the ability to quickly and consistently develop and deliver applications.<\/a><\/p>\n\n\n\n<p><a>The use of IT has allowed businesses to have __________.<\/a><\/p>\n\n\n\n<p><a>More tools for communicating<\/a><\/p>\n\n\n\n<p><a>During which generation did computers begin to see widespread use in business?<\/a><\/p>\n\n\n\n<p><a>Third generation<\/a><\/p>\n\n\n\n<p><a>Which of the following high-level programming languages was created to be business-oriented?<\/a><\/p>\n\n\n\n<p><a>COBOL<\/a><\/p>\n\n\n\n<p><a>What of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.<\/a><\/p>\n\n\n\n<p><a>CPU<\/a><\/p>\n\n\n\n<p><a>What best describes the differences between memory and the hard drive?<\/a><\/p>\n\n\n\n<p><a>Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.<\/a><\/p>\n\n\n\n<p><a>What best describes the purpose of expansion slots in modern computers?<\/a><\/p>\n\n\n\n<p><a>Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.<\/a><\/p>\n\n\n\n<p><a>carries out the instructions of a computer program and is often referred to as the &#8220;chip&#8221;?<\/a><\/p>\n\n\n\n<p><a>Central Processing Unit<\/a><\/p>\n\n\n\n<p><a>What best defines the CPU?<\/a><\/p>\n\n\n\n<p><a>The CPU controls the speed at which instructions are retrieved and processed in the computer.<\/a><\/p>\n\n\n\n<p><a>What is an example of what 1 GB would store?<\/a><\/p>\n\n\n\n<p><a>Thousands of books<\/a><\/p>\n\n\n\n<p><a>Which of the following statements accurately describes random access memory (RAM)?<\/a><\/p>\n\n\n\n<p><a>RAM is short-term memory.<\/a><\/p>\n\n\n\n<p><a>Which is found on the motherboard and stores information but the information is not permanent?<\/a><\/p>\n\n\n\n<p><a>RAM<\/a><\/p>\n\n\n\n<p><a>input systems<\/a><\/p>\n\n\n\n<p><a>Keyboard<br>Scanner<br>Webcam<\/a><\/p>\n\n\n\n<p><a>A scanner is a peripheral device for what system?<\/a><\/p>\n\n\n\n<p><a>I&amp;O<\/a><\/p>\n\n\n\n<p><a>What peripheral component houses CDs and DVD?<\/a><\/p>\n\n\n\n<p><a>bays<\/a><\/p>\n\n\n\n<p><a>What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?<\/a><\/p>\n\n\n\n<p><a>Ports<\/a><\/p>\n\n\n\n<p><a>Which computer will use a docking station to function like a desktop?<\/a><\/p>\n\n\n\n<p><a>Notebook<\/a><\/p>\n\n\n\n<p><a>An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the?<\/a><\/p>\n\n\n\n<p><a>Project<\/a><\/p>\n\n\n\n<p><a>Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?<\/a><\/p>\n\n\n\n<p><a>Planning<\/a><\/p>\n\n\n\n<p><a>The team will write a final report detailing the processes and outcomes of the project in which project phase?<\/a><\/p>\n\n\n\n<p><a>Closing<\/a><\/p>\n\n\n\n<p><a>Project planning includes developing a road map that everyone follows. This phase starts with setting the project goals, commonly using the ____________ frameworks.<\/a><\/p>\n\n\n\n<p><a>SMART or CLEAR<\/a><\/p>\n\n\n\n<p><a>Determining the project scope or the work that needs to be completed is in what project phase?<\/a><\/p>\n\n\n\n<p><a>Initiation<\/a><\/p>\n\n\n\n<p><a>The scope of the project is?<\/a><\/p>\n\n\n\n<p><a>The work that needs to be done<\/a><\/p>\n\n\n\n<p><a>The ___________ is at the center of what makes a computer work. It houses the CPU and serves as the brain of the system allocating resources, such as power, and communicating with all other components.<\/a><\/p>\n\n\n\n<p><a>Motherboard<\/a><\/p>\n\n\n\n<p><a>During implementation, how is alpha testing different from beta testing?<\/a><\/p>\n\n\n\n<p><a>Alpha testing uses simulated data<\/a><\/p>\n\n\n\n<p><a>During implementation, which testing assesses whether the system functions and is useful?<\/a><\/p>\n\n\n\n<p><a>User Acceptance<\/a><\/p>\n\n\n\n<p><a>Which term involves replacing the old system with a new system?<\/a><\/p>\n\n\n\n<p><a>System conversion<\/a><\/p>\n\n\n\n<p><a>Why is it essential to know what information will be needed from the database from the outset of development?<\/a><\/p>\n\n\n\n<p><a>By knowing the purpose, the developer can determine how many fields are needed in the database.<br>The purpose determines the structure of the database.<br>The developer can determine which data types would help fulfill the purpose.<\/a><\/p>\n\n\n\n<p><a>Which of the following are operations used to alter the data within a relation of a database?<\/a><\/p>\n\n\n\n<p><a>update , Delete , Insert<\/a><\/p>\n\n\n\n<p><a>Which of the following are the three main categories of databases?<\/a><\/p>\n\n\n\n<p><a>Hierarchical , Flat File, Relational<\/a><\/p>\n\n\n\n<p><a>Database administrators might be involved with the integration of data from where?<\/a><\/p>\n\n\n\n<p><a>Older systems to new<\/a><\/p>\n\n\n\n<p><a>in a __________ shell forward slash (\/) is used to express directory paths;?<\/a><\/p>\n\n\n\n<p><a>Linux<\/a><\/p>\n\n\n\n<p><a>What is the definition of business intelligence?<\/a><\/p>\n\n\n\n<p><a>Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources<\/a><\/p>\n\n\n\n<p><a>Which of the following interacts between a database and an application?<\/a><\/p>\n\n\n\n<p><a>driver<\/a><\/p>\n\n\n\n<p><a>Which of the following operators is used to select all of a certain data?<\/a><\/p>\n\n\n\n<p>*<\/p>\n\n\n\n<p><a>What is outside of the role of an IT professional?<\/a><\/p>\n\n\n\n<p><a>Writes laws dealing with information technology<\/a><\/p>\n\n\n\n<p><a>Which motherboard component helps cool the cpu?<\/a><\/p>\n\n\n\n<p><a>heat sink<\/a><\/p>\n\n\n\n<p><a>which is a characteristic of high level languages?<\/a><\/p>\n\n\n\n<p><a>language translator programs are required.<\/a><\/p>\n\n\n\n<p><a>how does a compiler work?<\/a><\/p>\n\n\n\n<p><a>It requires the components of the software to be defined from the onset.<\/a><\/p>\n\n\n\n<p><a>A single chip process developed in 1974 by IBM<\/a><\/p>\n\n\n\n<p><a>microprocessor<\/a><\/p>\n\n\n\n<p><a>What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?<\/a><\/p>\n\n\n\n<p><a>Moore&#8217;s law<\/a><\/p>\n\n\n\n<p><a>How long has Moore&#8217;s law continued to be a trend?<\/a><\/p>\n\n\n\n<p><a>from 1965 to the present<\/a><\/p>\n\n\n\n<p><a>Is moore&#8217;s law an observation or a physical law?<\/a><\/p>\n\n\n\n<p><a>observation<\/a><\/p>\n\n\n\n<p><a>The fetch-execute cycle is performed in an overlapped fashion on several instructions.<\/a><\/p>\n\n\n\n<p><a>pipelines cpu<\/a><\/p>\n\n\n\n<p><a>a programming language that is a lengthy list of 1s and 0s.<\/a><\/p>\n\n\n\n<p><a>machine language<\/a><\/p>\n\n\n\n<p><a>An early language translator that would translate an assembly program into machine language.<\/a><\/p>\n\n\n\n<p><a>assemblers<\/a><\/p>\n\n\n\n<p><a>Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.<\/a><\/p>\n\n\n\n<p><a>high level language<\/a><\/p>\n\n\n\n<p><a>What was the operation system called in the early 1960s?<\/a><\/p>\n\n\n\n<p><a>a resident monitor<\/a><\/p>\n\n\n\n<p><a>Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?<\/a><\/p>\n\n\n\n<p><a>GOTO<\/a><\/p>\n\n\n\n<p><a>When a programmer enters a command, what converts that command to machine language and executes it?<\/a><\/p>\n\n\n\n<p><a>the interpreter<\/a><\/p>\n\n\n\n<p><a>perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?<\/a><\/p>\n\n\n\n<p><a>scripting languages<\/a><\/p>\n\n\n\n<p><a>What generation used vacuum tubes in computers?<\/a><\/p>\n\n\n\n<p><a>first generation<\/a><\/p>\n\n\n\n<p><a>What generation of computers began to use transistors?<\/a><\/p>\n\n\n\n<p><a>second<\/a><\/p>\n\n\n\n<p><a>what type of computer still uses silicon chips?<\/a><\/p>\n\n\n\n<p><a>tablet<\/a><\/p>\n\n\n\n<p><a>What generation of computers introduced operating systems?<\/a><\/p>\n\n\n\n<p><a>third<\/a><\/p>\n\n\n\n<p><a>What do integrated circuits need to function?<\/a><\/p>\n\n\n\n<p><a>silicon chip<\/a><\/p>\n\n\n\n<p><a>The myriad of types of devices that can and will be connected to the internet in the next few years.<\/a><\/p>\n\n\n\n<p><a>the internet of things (IoT)<\/a><\/p>\n\n\n\n<p><a>What does RFID stand for?<\/a><\/p>\n\n\n\n<p><a>Radio frequency identification device<\/a><\/p>\n\n\n\n<p><a>Refers to data sets that are so large and complex that they will require more advanced database management\/processing tools than we currently use.<\/a><\/p>\n\n\n\n<p><a>big data<\/a><\/p>\n\n\n\n<p><a>what does ipos stand for?<\/a><\/p>\n\n\n\n<p><a>input, process, output, storage<\/a><\/p>\n\n\n\n<p><a>also referred to as &#8220;the chip&#8221;<\/a><\/p>\n\n\n\n<p><a>CPU<\/a><\/p>\n\n\n\n<p><a>What does BIOS stand for<\/a><\/p>\n\n\n\n<p><a>Basic input output system<\/a><\/p>\n\n\n\n<p><a>Houses CDs and DVDs, typically located on the front of the system unit for easy access.<\/a><\/p>\n\n\n\n<p><a>bays<\/a><\/p>\n\n\n\n<p><a>computer that has the least amount of performance<\/a><\/p>\n\n\n\n<p><a>handheld<\/a><\/p>\n\n\n\n<p><a>computer that has the mid amount of performance capability<\/a><\/p>\n\n\n\n<p><a>laptop<\/a><\/p>\n\n\n\n<p><a>computer with the most amount of performance capability<\/a><\/p>\n\n\n\n<p><a>desktop<\/a><\/p>\n\n\n\n<p><a>consists of applications that are usefule to everyone such as word processor, presentation software, spreadsheet program, database mgmt systems, calendar program, address book, and data organizer.<\/a><\/p>\n\n\n\n<p><a>productivity software<\/a><\/p>\n\n\n\n<p><a>Pieces of the operating system that run in the background all of the time<\/a><\/p>\n\n\n\n<p><a>daemons or services<\/a><\/p>\n\n\n\n<p><a>works with hardware to provide a network service, types of software includes web servers, email servers, and database servers<\/a><\/p>\n\n\n\n<p><a>server software<\/a><\/p>\n\n\n\n<p><a>software stored on an individual computer<\/a><\/p>\n\n\n\n<p><a>local application<\/a><\/p>\n\n\n\n<p><a>the ability to have computation anywhere at any time<\/a><\/p>\n\n\n\n<p><a>ubiquitous computing<\/a><\/p>\n\n\n\n<p><a>dedicated computers within a network whose function is to respond to network requests and provide a network service<\/a><\/p>\n\n\n\n<p><a>server<\/a><\/p>\n\n\n\n<p><a>loaded when the computer is first booted, included components that handle process mgmt, resource mgmt, and memory mgmt<\/a><\/p>\n\n\n\n<p><a>kernel<\/a><\/p>\n\n\n\n<p><a>sits on top of the hardware and is the interface between hardware and software<\/a><\/p>\n\n\n\n<p><a>the kernel<\/a><\/p>\n\n\n\n<p><a>an interface for the user that provides access to the kernel<\/a><\/p>\n\n\n\n<p><a>the shell<\/a><\/p>\n\n\n\n<p><a>hat is the role of a web server<\/a><\/p>\n\n\n\n<p><a>to respond to HTTP requests<\/a><\/p>\n\n\n\n<p><a>What does http stand for?<\/a><\/p>\n\n\n\n<p><a>hypertext transfer protocol<\/a><\/p>\n\n\n\n<p><a>data that has been processed<\/a><\/p>\n\n\n\n<p><a>information<\/a><\/p>\n\n\n\n<p><a>in the dikw, what is data?<\/a><\/p>\n\n\n\n<p><a>data is the input directly received by human or computer.<\/a><\/p>\n\n\n\n<p><a>in dikw, what is information?<\/a><\/p>\n\n\n\n<p><a>information is inferred from data, meaning that one or many processes have been applied to the data to tranform it into a more useful form.<\/a><\/p>\n\n\n\n<p><a>in dikw, what is knowledge?<\/a><\/p>\n\n\n\n<p><a>refined information that hte user of the knowledge is able to call forth only relevant portions of information when needed.<\/a><\/p>\n\n\n\n<p><a>in dikw, what is wisdom?<\/a><\/p>\n\n\n\n<p><a>having both knowledge and experience<\/a><\/p>\n\n\n\n<p><a>A set of rules established to govern how people behave and interact with each other<\/a><\/p>\n\n\n\n<p><a>a protocol<\/a><\/p>\n\n\n\n<p><a>a requirment of all computers to communicate over the internet<\/a><\/p>\n\n\n\n<p><a>transmission control protocol\/ internet protocol or TCP\/IP<\/a><\/p>\n\n\n\n<p>Marcus has a summer job working at a real estate agency. He is entering client addresses into the company&#8217;s computer system. At which state of the DIKW is Marcus working?<br>Data<\/p>\n\n\n\n<p>Which software is run automatically rather than by the end user<br>System software<\/p>\n\n\n\n<p>Which account is also referred to as root or superuser?<br>The Administrator Account<\/p>\n\n\n\n<p>Which of the following best describes a hierarchical database format?<br>Data are modeled using parent-child relationships<\/p>\n\n\n\n<p>Which of the following would NOT be the responsibility of the system administrator?<br>Answering e-mails from potential customers<\/p>\n\n\n\n<p>Which of the following is an example of a relational database?<br>A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University&#8217;s system.<\/p>\n\n\n\n<p>Which of the following describes the duties of a web administrator?<br>Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server.<\/p>\n\n\n\n<p>Which of the following statements accurately describe IT certifications?<br>Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area.<\/p>\n\n\n\n<p>Which of the following is NOT an important characteristic of an IT professional?<br>Strong math background and programming skills<\/p>\n\n\n\n<p>As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working?<br>Knowledge<\/p>\n\n\n\n<p>Which of the following statements describes the difference between information systems and information technology?<br>An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software.<\/p>\n\n\n\n<p>Which of the following statements best represents the relevant characteristic of quality data?<br>The data used applies to the question being answered.<\/p>\n\n\n\n<p>Which of the following is\/are true of the IPOS cycle?<br>Once words, numbers or images are entered, a computer processes the data into usable information that can then be accessed to answer questions or meet specific needs.<\/p>\n\n\n\n<p>Which of the following is an accurate definition of a computer system?<br>A computer system is a collection of hardware and software components that work together to meet the needs of the user.<\/p>\n\n\n\n<p>Which of the following would NOT be considered hardware?<br>Word processor.<\/p>\n\n\n\n<p>Select the statement that best describes the difference between software and hardware.<br>Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.<\/p>\n\n\n\n<p>Which of the following would NOT require the use of a network?<br>Loading a statistical program on your personal computer.<\/p>\n\n\n\n<p>Which type of software includes programs such as Microsoft Word and PowerPoint?<br>Application<\/p>\n\n\n\n<p>What is a program that will allow a computer to easily access the hardware and software of the computer system?<br>Operating system<\/p>\n\n\n\n<p><strong>_<\/strong> software works with hardware to provide a network service<br>Windows Server<\/p>\n\n\n\n<p>What is another term that defines a script?<br>Interpreted program<\/p>\n\n\n\n<p>In the <strong>_<\/strong> design phase of the SDLC (system development life cycle) the system is described in abstract terms using modeling tools such as flowcharts, UML and entity-relationship diagrams.<br>Logical<\/p>\n\n\n\n<p>Software testing conducted by a client or a specific department within an organization, is called:<br>Alpha<\/p>\n\n\n\n<p>This phase of testing consists of using actual (i.e., live) data in the real working environment<br>Beta<\/p>\n\n\n\n<p><strong><em>_ _<\/em><\/strong> occurs when the old system is &#8220;turned off&#8221; and the new system is &#8220;turned on&#8221; at a specific date and time.<br>Direct Conversion<\/p>\n\n\n\n<p>For the following scenario, which government regulation would be relevant?<br>Andrea is employed by the Deming Foundation, a non-profit seeking to help increase graduation rates in rural communities. She has been working hard to identify and recruit donations from wealthy businessmen and companies and is seeing a great deal of success. While she quickly runs into the grocery store for a few items, someone steals her laptop from her car, containing all her work files.<br>Security Breach Notification Laws.<\/p>\n\n\n\n<p>During <strong><em>_ _<\/em><\/strong> the output of the new system is compared with the output of the old system<br>Parallel Conversion<\/p>\n\n\n\n<p>During <strong><em>_ _<\/em><\/strong> the old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively.<br>Phased Conversion<\/p>\n\n\n\n<p>This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications<br>Paas (Platform as a Service)<\/p>\n\n\n\n<p>With <strong>_<\/strong> an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere<br>Iaas (Infrastructure as a Service)<\/p>\n\n\n\n<p>What is the correct order of project phase for Project Management?<br>Initiation, Planning, Executing &amp; Controlling, Closing<\/p>\n\n\n\n<p>During this phase of Project Management, the projects scope and requirements are defined<br>Initiation phase<\/p>\n\n\n\n<p>The role of a <strong><em>_ _<\/em><\/strong> is to respond to requests most typically come from web browsers, such as HTTP<br>web server<\/p>\n\n\n\n<p>This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols)<br>email server<\/p>\n\n\n\n<p>In this network topology ALL devices have a single point-to-point connection with a central device<br>STAR network<\/p>\n\n\n\n<p>This type of software is made freely available as source code<br>open source software<\/p>\n\n\n\n<p>This software protection will protect an individuals original work (tangible form) for the authors life + 70 years<br>Copyright<\/p>\n\n\n\n<p>This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing<br>patent<\/p>\n\n\n\n<p>The <strong>_<\/strong> keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table\/relation they can be found in).<br>SELECT<\/p>\n\n\n\n<p>The <strong>_<\/strong> keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined.<br>FROM<\/p>\n\n\n\n<p>The <strong>_<\/strong> keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query<br>WHERE<\/p>\n\n\n\n<p>All of the following are high-level languages except for:<br>Javascript<\/p>\n\n\n\n<p>Which of the following is the correct function of the compiler?<br>Translates the entire program, creating an executable program, which can be run at a later time.<\/p>\n\n\n\n<p>A program written in a high-level language must be converted into <strong>_<\/strong> code to be executed by the computer.<br>Machine<\/p>\n\n\n\n<p>A collection of organized databases is called:<br>a data warehouse<\/p>\n\n\n\n<p>Which two are both types of scripting languages<br>ASP and Python<\/p>\n\n\n\n<p>This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations).<br>Relational<\/p>\n\n\n\n<p>This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure)<br>Hierarchal<\/p>\n\n\n\n<p>Which of the following types of information present a threat to someone&#8217;s privacy?<br>Student ID and credit card numbers<\/p>\n\n\n\n<p>In strategic risk analysis, what is the final step?<br>Develop and enact policies against threats<\/p>\n\n\n\n<p>Learning about social engineering and how to protect passwords is <strong>_<\/strong><br>Education<\/p>\n\n\n\n<p>File access rights<br>Will include files that the user can access<\/p>\n\n\n\n<p>A local area network (LAN)<br>Allows hardware sharing within one office<\/p>\n\n\n\n<p>Which device permits packet switching so that a message can be routed to the next link in a network?<br>Router<\/p>\n\n\n\n<p>Which of the following best describes the Internet?<br>The Internet is a global network of networks.<\/p>\n\n\n\n<p>All of the following are parts of a URL except for:<br>LAN<\/p>\n\n\n\n<p>Which of the following statements is not part of the path a message takes from one computer to another?<br>All messages require a response from the destination machine to the sending device.<\/p>\n\n\n\n<p>Your site&#8217;s Internet point of presence is called a:<br>Gateway<\/p>\n\n\n\n<p>Which of the following aligns IT goals and organization goals?<br>IT goals include cloud computing and organization goals include real-time communications to contain costs while scaling quickly<\/p>\n\n\n\n<p>What is IT management responsible for?<br>Being the project manager<\/p>\n\n\n\n<p>IT personnel who understand both the technical IT infrastructure and management of the business fill which role?<br>IT management<\/p>\n\n\n\n<p>What is an advantage of outsourcing?<br>Cost-effective if time is constrained<\/p>\n\n\n\n<p>A company&#8217;s ability to recover after a disaster is directly related to which of the following?<br>Business continuity plan<\/p>\n\n\n\n<p>Which of the following is the final step in creatinf a BCP plan?<br>Testing the plan<\/p>\n\n\n\n<p>An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following?<br>Data mirroring<\/p>\n\n\n\n<p>What is the definition of a Platform as a Service (PaaS)?<br>A Platform as a Service is the ability to quickly and consistently develop and deliver applications.<\/p>\n\n\n\n<p>The use of IT has allowed businesses to have <strong>_<\/strong>.<br>More tools for communicating<\/p>\n\n\n\n<p>During which generation did computers begin to see widespread use in business?<br>Fourth generation<\/p>\n\n\n\n<p>Which of the following high-level programming languages was created to be business-oriented?<br>COBOL<\/p>\n\n\n\n<p>Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.<br>CPU<\/p>\n\n\n\n<p>Which of the following best describes the differences between memory and the hard drive?<br>Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.<\/p>\n\n\n\n<p>Which of the following best describes the purpose of expansion slots in modern computers?<br>Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.<\/p>\n\n\n\n<p>Which of the following carries our the instructions of a computer program and is often referred to as the &#8220;chip&#8221;?<br>Central Processing Unit<\/p>\n\n\n\n<p>Which of the following statements best defines the CPU?<br>The CPU controls the speed at which instructions are retrieved and processed in the computer.<\/p>\n\n\n\n<p>Which of the following is an example of what 1 GB would store?<br>Thousands of books<\/p>\n\n\n\n<p>Which of the following statements accurately describes random access memory (RAM)?<br>RAM is short-term memory.<\/p>\n\n\n\n<p>Which is found on the motherboard and stores information but the information is not permanent?<br>RAM<\/p>\n\n\n\n<p>All of the following are input systems except:<br>Speaker<\/p>\n\n\n\n<p>A scanned is a peripheral device for what system?<br>I\/O<\/p>\n\n\n\n<p>What peripheral component houses CDs and DVD?<br>Bays<\/p>\n\n\n\n<p>What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?<br>Ports<\/p>\n\n\n\n<p>Which computer will use a docking station to function like a desktop?<br>Notebook<\/p>\n\n\n\n<p>An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the?<br>Project<\/p>\n\n\n\n<p>Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?<br>Planning<\/p>\n\n\n\n<p>The team will write a final report detailing the processes and outcomes of the project in which project phase?<br>Closing<\/p>\n\n\n\n<p>Which project phase determines what resources are available to meet the projects needs?<br>Initiation<\/p>\n\n\n\n<p>Determining the project scope or the work that needs to be completed is in what project phase?<br>Initiation<\/p>\n\n\n\n<p>The scope of the project is?<br>The work that needs to be done<\/p>\n\n\n\n<p>During analysis, which system requirements prevents unauthorized users from accessing data?<br>Security<\/p>\n\n\n\n<p>During implementation, how is alpha testing different from beta testing?<br>Alpha testing uses simulated data<\/p>\n\n\n\n<p>During implementation, which testing assesses whether the system functions and is useful?<br>User Acceptance<\/p>\n\n\n\n<p>Which term involves replacing the old system with a new system?<br>System conversion<\/p>\n\n\n\n<p>Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply.<br>By knowing the purpose, the developer can determine how many fields are needed in the database.<\/p>\n\n\n\n<p>The purpose determines the structure of the database.<\/p>\n\n\n\n<p>The developer can determine which data types would help fulfill the purpose.<\/p>\n\n\n\n<p>Which of the following are operations used to alter the data within a relation of a database?<br>Update, Delete, Insert<\/p>\n\n\n\n<p>Which of the following are the three main categories of databases?<br>Hierarchical, Flat File, Relational<\/p>\n\n\n\n<p>Database administrators might be involved with the integration of data from where<br>Older systems to new<\/p>\n\n\n\n<p>Which of the following statements applies to a business intelligence system?<br>Used when making long-term decisions.<\/p>\n\n\n\n<p>What is the definition of business intelligence?<br>Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.<\/p>\n\n\n\n<p>Which of the following interacts between a database and an application?<br>A driver<\/p>\n\n\n\n<p>Which of the following operators is used to select all of a certain data?<br>*<\/p>\n\n\n\n<p>Information Technology<br>The technology used in creating, maintaining, and making information accessible.<\/p>\n\n\n\n<p>IT Professional Roles<br>Administration and Support<\/p>\n\n\n\n<p>System Administrator<br>Maintains all aspects of the system including hardware, software, and programming.<\/p>\n\n\n\n<p>Network Administrator<br>In charge of all aspects of the computer network<\/p>\n\n\n\n<p>Database Administrator<br>Focuses on the design, development, and support of database management systems (DBMSs).<\/p>\n\n\n\n<p>Security Administrator<br>Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.<\/p>\n\n\n\n<p>Web Administrator<br>Installs, configures, maintains, secures, and troubleshoots web severs.<\/p>\n\n\n\n<p>Support IT Professionals<br>Help desk and training.<\/p>\n\n\n\n<p>Information<br>Processed data.<\/p>\n\n\n\n<p>DIKW Hierarchy<br>Defines the transition of data to information to knowledge to wisdom. (Data Information Knowledge Wisdom)<\/p>\n\n\n\n<p>Data in DIKW<br>The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.<\/p>\n\n\n\n<p>Information in DIKW<br>Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.<\/p>\n\n\n\n<p>Knowledge in DIKW<br>Information that has been put to use; information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.<\/p>\n\n\n\n<p>Wisdom in DIKW<br>Provides a social setting to knowledge; an understanding of the &#8220;why&#8221;. Can only come by having both knowledge and experience.<\/p>\n\n\n\n<p>Information Systems<br>A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.<\/p>\n\n\n\n<p>Characteristics of Quality Data<br>Relevance &#8211; the data being used must apply directly to the decision being made<\/p>\n\n\n\n<p>Timely &#8211; data must be efficient and must be provided in a timely manner<\/p>\n\n\n\n<p>Thorough &#8211; the data must be complete<\/p>\n\n\n\n<p>Accurate &#8211; data should be captured only once, where possible and should be captured as close to the point of activity as possible.<\/p>\n\n\n\n<p>Reliable &#8211; data should reflect stable and consistent data collection processes across collections points and over time<\/p>\n\n\n\n<p>IPOS<br>The Input-Procession-Output-Storage Cycle<\/p>\n\n\n\n<p>Input<br>Raw data is entered by the user.<\/p>\n\n\n\n<p>Processing<br>Raw data is organized or structured for usefulness.<\/p>\n\n\n\n<p>Output<br>Information is output so user can see results.<\/p>\n\n\n\n<p>Storage<br>Processed information is stored for permanent record.<\/p>\n\n\n\n<p>Computer System<br>A collection of components that work together to meet the needs of the user; typically categorized as either hardware, software, networks, or users.<\/p>\n\n\n\n<p>Hardware<br>Physical components of a computer system which include the system unit and its components and peripheral devices; tangible aspects of the computer.<\/p>\n\n\n\n<p>Software<br>Computer programs that tell the computer what to do&#8211;how to execute commands and process information<\/p>\n\n\n\n<p>Network<br>A collection of computers and resources connected by various media so that they can communicate with each other.<\/p>\n\n\n\n<p>User<br>Those who use a computer.<\/p>\n\n\n\n<p>Software Categories<br>Systems Software and Applications Software<\/p>\n\n\n\n<p>Evolution of Users<br>First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.<\/p>\n\n\n\n<p>Protocol<br>Rules provided by which networks communicate with each other.<\/p>\n\n\n\n<p>TCP\/IP<br>Transmission Control Protocol\/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.<\/p>\n\n\n\n<p>Protocol Stack<br>A collection of protocols. TCP\/IP is an example.<\/p>\n\n\n\n<p>Components of a Computer<br>CPU, Memory and Storage, Peripheral Devices<\/p>\n\n\n\n<p>CPU<br>Executes programs&#8217; instructions and commands various components in the computer. Referred to as the &#8220;chip&#8221;.<\/p>\n\n\n\n<p>Memory<br>Stores the programs being executed and the data they are using.<\/p>\n\n\n\n<p>I\/O Subsystem<br>All peripheral devices where long term storage devices are used.<\/p>\n\n\n\n<p>Bus<br>Permits information to move between each component; electrical channels that enable communication among the electronic components<\/p>\n\n\n\n<p>System Unit<br>Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.<\/p>\n\n\n\n<p>Internal Components of the System Unit<br>Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots\/Cards<\/p>\n\n\n\n<p>Parts of the CPU<br>Control Unit (CU) &#8211; retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU<\/p>\n\n\n\n<p>Arithmetic Logic Unit (ALU) &#8211; does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen<\/p>\n\n\n\n<p>System Clock<br>Controls the speed at which instructions are processed.<\/p>\n\n\n\n<p>RAM<br>Stands for Random Access Memory.<\/p>\n\n\n\n<p>It temporarily stores data before it is processed and sent to your screen or printer.<\/p>\n\n\n\n<p>It is volatile (means data or information stored disappears when the computer is turned off or loses power).<\/p>\n\n\n\n<p>You can choose the amount of RAM your computer has.<\/p>\n\n\n\n<p>Types of RAM<br>Dynamic RAM (DRAM) &#8211; typically called main memory<\/p>\n\n\n\n<p>Static RAM (SRAM) &#8211; cache memory and registers<\/p>\n\n\n\n<p>BIOS ROM<br>BIOS stands for Basic Input Output System; ROM stands for Read Only Memory.<\/p>\n\n\n\n<p>Typically stored in ROM chip on the motherboard.<\/p>\n\n\n\n<p>Is software not hardware, (&#8220;basic&#8221; operating system that runs when the computer is first turned on).<\/p>\n\n\n\n<p>Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk.<\/p>\n\n\n\n<p>Can&#8217;t choose the amount or contents.<\/p>\n\n\n\n<p>1st Generation of Computers<br>Vacuum tubes, relay switches, the need to program in machine language<\/p>\n\n\n\n<p>2nd Generation of Computers<br>Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers<\/p>\n\n\n\n<p>3rd Generation of Computers<br>Silicon chips (known as ICs &#8211; integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals<\/p>\n\n\n\n<p>4th Generation of Computers<br>Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use<\/p>\n\n\n\n<p>Moore&#8217;s Law<br>Doubling of transistor count roughly every 18 &#8211; 24 months (exponential increase); observation, not physical law<\/p>\n\n\n\n<p>Evolution of Storage<br>Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage<\/p>\n\n\n\n<p>Machine\/Low-level Language<br>Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time<\/p>\n\n\n\n<p>Assembly Language<br>Easier than machine but still required detailed, precise low level instructions<\/p>\n\n\n\n<p>Language Translator Programs<br>Function is to translate one program language into another; take source code and convert it to another form; source code by itself cannot be read by a computer<\/p>\n\n\n\n<p>Complier<br>Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more effcient<\/p>\n\n\n\n<p>Structured Programming<br>Programmer is limited to high level control constructs such as while loops, for loops, and if\/else statements and not allowed to use primitive GOTO statements<\/p>\n\n\n\n<p>Object Oriented Programming<br>Initially introduced in Smalltalk in 1970&#8217;s and early 80&#8217;s<\/p>\n\n\n\n<p>Interpreted Code<br>Runs inside a special environment; is better for testing<\/p>\n\n\n\n<p>Shell Scripting<br>Small programs that place Linux commands or DOS batch files into a file<\/p>\n\n\n\n<p>Local Computer<br>The computer that the user is using; physically present with<\/p>\n\n\n\n<p>Remote Computer<br>A computer being accessed over the network<\/p>\n\n\n\n<p>Network Hub<br>Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network<\/p>\n\n\n\n<p>Network Switch<br>More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it<\/p>\n\n\n\n<p>Router<br>Connects multiple networks together; can be used to directly connect computers to a network; will relay messages to computers with appropriate IP addresses<\/p>\n\n\n\n<p>Wireless Access Point<br>Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable<\/p>\n\n\n\n<p>Circuit Switched Network<br>Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission<\/p>\n\n\n\n<p>Packet Switched Network<br>A message&#8217;s pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic<\/p>\n\n\n\n<p>Workstations<br>Creates and maintains client network connections to remote servers<\/p>\n\n\n\n<p>Virtual Machine (VM)<br>A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.<\/p>\n\n\n\n<p>Server<br>Computers that have greater hard disk storage, faster response time and are used to respond to request from other computers on the network<\/p>\n\n\n\n<p>Client-server Network<br>Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers<\/p>\n\n\n\n<p>File Server<br>Sends files over the network at the request of clients.<\/p>\n\n\n\n<p>Responds over LAN, within one location\/site.<\/p>\n\n\n\n<p>Support both application software and data files.<\/p>\n\n\n\n<p>Web Server<br>Stores data files (web pages) and programs (scripts).<\/p>\n\n\n\n<p>Responds from anywhere on the Internet.<\/p>\n\n\n\n<p>Database Server<br>Responds to queries by pulling from the database.<\/p>\n\n\n\n<p>Typically only to local clients.<\/p>\n\n\n\n<p>Print Server<br>Monitors print jobs<\/p>\n\n\n\n<p>Mail Server<br>Two email servers communicate with each other<\/p>\n\n\n\n<p>FTP Server<br>Like web server or file server in that requests are for files and responses are the files<\/p>\n\n\n\n<p>Point-to-Point Network<br>Link between two resources.<\/p>\n\n\n\n<p>Simplest for of a network.<\/p>\n\n\n\n<p>Limits how devices can communicate with each other<\/p>\n\n\n\n<p>Bus Network<br>Devices connected along a single cable.<\/p>\n\n\n\n<p>Size of network is restricted.<\/p>\n\n\n\n<p>Star Network<br>Each device is connected to a central devices such as a hub or switch.<\/p>\n\n\n\n<p>Ring Network<br>Each device is connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached.<\/p>\n\n\n\n<p>Mesh Network<br>Every device is connected directly to every other device in the network.<\/p>\n\n\n\n<p>Domain Name Server (DNS)<br>Used to translate from an IP alias to an IP address<\/p>\n\n\n\n<p>Parts of URL (Uniform Resource Locator)<br>Protocol, Domain name, Resource\/Filename<\/p>\n\n\n\n<p>Domain Name<br>Identifies the server on which the web page can be found<\/p>\n\n\n\n<p>Domain Name Parts<br>Top level domain (TLD) name and Host name<\/p>\n\n\n\n<p>Host Name<br>Identifies the organization that is responsible for the information on the page or provides the server space where the information is stored<\/p>\n\n\n\n<p>TLD(Top Level Domain) Name<br>Always ends with a period and a three or two letter extension which signifies the type of organization or country associated with the page<\/p>\n\n\n\n<p>Resource\/Filename ID<br>Indicates the name of the file you are accessing, or the location of the document on the server<\/p>\n\n\n\n<p>CIA<br>Confidentiality, Integrity, Availability<\/p>\n\n\n\n<p>Confidentiality<br>Requires that data bet kept secure so that they are not accidentally provided or obtained by unauthorized users<\/p>\n\n\n\n<p>Integrity<br>Requires that data is correct<\/p>\n\n\n\n<p>Availability<br>Requires that information is available when needed<\/p>\n\n\n\n<p>Data Integrity Efforts<br>1st &#8211; Must include a component that ensures the accuracy of the collected data<\/p>\n\n\n\n<p>2nd &#8211; Must be entered into the system accurately<\/p>\n\n\n\n<p>3rd &#8211; Data modification must be tracked<\/p>\n\n\n\n<p>Strategic Risk Analysis<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Identify the organization&#8217;s information assets<\/li>\n\n\n\n<li>Identify vulnerabilities of each asset<\/li>\n\n\n\n<li>Determine threats<\/li>\n\n\n\n<li>Prioritizing risks<\/li>\n\n\n\n<li>Develop and enact policies that will reduce threats<\/li>\n<\/ol>\n\n\n\n<p>Information Security Classifications<br>Public &#8211; available through public sources; includes names and addresses<\/p>\n\n\n\n<p>Sensitive &#8211; not considered a threat to a person&#8217;s privacy if others learn of it; include email addresses<\/p>\n\n\n\n<p>Private &#8211; information that could be a threat if disclosed to others; includes social security and credit card numbers<\/p>\n\n\n\n<p>Confidential &#8211; information that an organization will keep secret; includes patentable information and business plans<\/p>\n\n\n\n<p>Defense in Depth<br>Protecting every layer that surrounds data<\/p>\n\n\n\n<p>Phishing<br>Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information<\/p>\n\n\n\n<p>SQL Injection<br>An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company&#8217;s website; web server might pass the command onto the database which then allows potentially anything to be done to the database<\/p>\n\n\n\n<p>Buffer Overflow<br>Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code<\/p>\n\n\n\n<p>Hacking<br>When an individual obtains unauthorized access to a host<\/p>\n\n\n\n<p>White Hat Hacker<br>Informs companies of potential problems with software so companies can fix<\/p>\n\n\n\n<p>Black Hat Hacker<br>Individuals with malicious intent who violate security in order to commit crimes or acts of terrorism<\/p>\n\n\n\n<p>Grey Hat Hacker<br>Engage in both white and black hat types of hacking activities<\/p>\n\n\n\n<p>Packet Sniffing<br>Allows you to obtain anything being sent over a network if the data being transmitted isn&#8217;t encrypted<\/p>\n\n\n\n<p>Virus<br>Software that attaches itself to another legitimate software application<\/p>\n\n\n\n<p>Worms<br>Self contained programs that do not need other programs to propagate across computers and computer networks<\/p>\n\n\n\n<p>Trojan Horse<br>Type of virus that completely replaces an existing application and takes the name of the taken over file<\/p>\n\n\n\n<p>Denial of Service (DOS)<br>One or more attackers attempt to flood a server with so many incoming messages that the server is unable to handle legitimate business<\/p>\n\n\n\n<p>Firewalls<br>Can be either software or hardware; hardware is a dedicated server; software contains a list of the rules that describe the types of messages that should either be permitted to make it through, or those that should be blocked<\/p>\n\n\n\n<p>Anti-viral Software<br>Attempts to identify if a file contains a virus or some form of malware<\/p>\n\n\n\n<p>Redundancy<br>Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline<\/p>\n\n\n\n<p>Encryption<br>Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information<\/p>\n\n\n\n<p>Symmetric Key Encryption<br>Uses the same key for performing the encryption and decryption<\/p>\n\n\n\n<p>Public Key Encryption<br>Uses two keys, a public and private key for performing encryption and decryption<\/p>\n\n\n\n<p>Security Education<br>Users learn how to protect their passwords and other security measures<\/p>\n\n\n\n<p>Authentication<br>Proving you are who you say you are which can be done by: what you know, what you have (two factor authentication)<\/p>\n\n\n\n<p>Role-based Access Control<br>Ensures that the user gains access only to the resources that the user should be able to access<\/p>\n\n\n\n<p>Computer Network Advantages<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Cost savings benefits<\/li>\n\n\n\n<li>Increased efficiency and productivity<\/li>\n\n\n\n<li>Increased facilitation of communication<\/li>\n<\/ol>\n\n\n\n<p>Application Software<br>Consists of programs that end users run to accomplish tasks<\/p>\n\n\n\n<p>System Software<br>Consists of programs that make up the OS; software that directly supports the computer system itself<\/p>\n\n\n\n<p>Server Software<br>Works with hardware to provide a network service<\/p>\n\n\n\n<p>Local Applications<br>Software that is stored on an individual computer<\/p>\n\n\n\n<p>Intranet<br>A LAN that uses the Internet Protocol<\/p>\n\n\n\n<p>Cloud Computing<br>Offers, as a service, the ability to offload computation and storage from your local computer<\/p>\n\n\n\n<p>Operating Systems<br>Primary task is to allow a computer user to easily access the hardware and software of a computer system<\/p>\n\n\n\n<p>Kernel<br>Core components of the OS that is loaded when the computer is first booted.<\/p>\n\n\n\n<p>Device Drivers<br>Provide specific interfaces between the OS running a computer and hardware devices.<\/p>\n\n\n\n<p>Shell<br>An interface for the user, often personalized for that given user, that provides access to the kernel.<\/p>\n\n\n\n<p>Services<br>Os programs that are usually started when the OS is loaded and initialized, but they run in the background. Also called daemons.<\/p>\n\n\n\n<p>Utility Programs<br>Programs that allow the user to monitor and improve system performance.<\/p>\n\n\n\n<p>Proxy Server<br>Acts as a giant cache of web pages that anyone in the organization has recently retrieved<\/p>\n\n\n\n<p>Proprietary Software<br>Software purchased from a vendor; also known as commercial<\/p>\n\n\n\n<p>Shareware<br>Provides a trial version of the software.<\/p>\n\n\n\n<p>Freeware<br>Usually software that has become obsolete; is free<\/p>\n\n\n\n<p>Public Domain<br>Software that has been moved into the public domain; can be used however you feel<\/p>\n\n\n\n<p>Open Source<br>Created in the Open Source Community and made freely available as source code<\/p>\n\n\n\n<p>Copyrights<br>Protect an original work (in its tangible, expressed form), but not the ideas behind the work for the duration of the author&#8217;s life plus 70 years.<\/p>\n\n\n\n<p>Patents<br>Protect the creation of inventive concepts as well as the tangible work product for 20 years from the filing date<\/p>\n\n\n\n<p>End User License Agreement (EULA)<br>Gives the purchaser the right to use the software<\/p>\n\n\n\n<p>Decimal<br>Uses base 10 to represent numbers (0 &#8211; 9)<\/p>\n\n\n\n<p>Binary<br>Uses base 2 system (0 and 1)<\/p>\n\n\n\n<p>Byte<br>8 bits; a single character of text in a computer<\/p>\n\n\n\n<p>Octal<br>Every value is represented with some combination of 8 digits (0 &#8211; 7)<\/p>\n\n\n\n<p>Hexadecimal<br>Uses a base 16<\/p>\n\n\n\n<p>Character Representation<br>ASCII and Unicode<\/p>\n\n\n\n<p>Language Translators<br>A program that takes one program, written in a high level language, and creates a machine language program as output<\/p>\n\n\n\n<p>Compiled Language<br>Translates the entire program, creating an executable program which can be run at a later time<\/p>\n\n\n\n<p>Interpreted Language<br>Takes the most recently entered instruction, translates it into machine language, and executes it<\/p>\n\n\n\n<p>Script<br>Sometimes uses to refer to a small program that have been traditionally used for automation<\/p>\n\n\n\n<p>Algorithms<br>A formula or procedure for solving a problem. Can also be described as a set of steps that are followed in order to complete a process<\/p>\n\n\n\n<p>Multi-tier Development<br>Separation of different aspect of a system<\/p>\n\n\n\n<p>N-tier Development<br>Often used to indicate that the number of tiers a system will be broken down into will vary between different software development projects<\/p>\n\n\n\n<p>Presentation Tier<br>Tier where the user interface for the system is developed; shields the user from the underlying logic of the systems as well as the underlying data structures<\/p>\n\n\n\n<p>Logic Tier<br>Tier that sits between the user interface and the data.<\/p>\n\n\n\n<p>Data Tier<br>Tier where data is stored, retrieved and updated from database tables<\/p>\n\n\n\n<p>Model-View-Controller (MVC)<br>Is a development technique used in the implementation of user interfaces<\/p>\n\n\n\n<p>The Model<br>Can take on different forms depending on the complexity of the application; in certain instances, it is an actual object that is an actual implementation of the application<\/p>\n\n\n\n<p>The View<br>The part of the application that represents the user interface; used to capture input from the user to be passed on via the controller to the model<\/p>\n\n\n\n<p>The Controller<br>The part of an application that interacts with the user and passes the user requests to the model<\/p>\n\n\n\n<p>Data Validation<br>Ensuring that users enter the correct data type<\/p>\n\n\n\n<p>String Data<br>Alphanumeric or text character<\/p>\n\n\n\n<p>Floating-point<br>Number with a decimal point<\/p>\n\n\n\n<p>Boolean\/Logical<br>True\/False<\/p>\n\n\n\n<p>Flat File Database<br>One large single table; used if the amount of data that is being recorded is fairly minimal<\/p>\n\n\n\n<p>Relational Database<br>Has multiple tables (relations) with interrelated fields; most common structure for databases<\/p>\n\n\n\n<p>Hierarchical Database<br>Organizes data using a tree like or organizational chart type structure<\/p>\n\n\n\n<p>Database Management System (DBMS)<br>Used to create, manipulate, and access the data in a database<\/p>\n\n\n\n<p>Relation<br>Often presented as a table<\/p>\n\n\n\n<p>Tuples<br>Rows of a relation<\/p>\n\n\n\n<p>Attributes<br>Columns of the relation<\/p>\n\n\n\n<p>Field<br>Contains the data of an attribute for a record within a relation<\/p>\n\n\n\n<p>Query<br>A search of data in the relation or relations that fit specific parameters<\/p>\n\n\n\n<p>Projection<br>A query that returns all of the records from the relation, but only select attributes or fields<\/p>\n\n\n\n<p>Sort<br>Sorting records based on some field(s) such as ascending order by last name<\/p>\n\n\n\n<p>Join<br>Withdraws information from multiple relations<\/p>\n\n\n\n<p>Primary Key<br>A field int he relations that contains a unique value<\/p>\n\n\n\n<p>Business Intelligence<br>A specific information system to help an organization reach its strategic goals<\/p>\n\n\n\n<p>Data Warehouse<br>A collection of organized databases<\/p>\n\n\n\n<p>Database Information Processing (OLAP)<br>Data is processed through a suite of analysis software tools<\/p>\n\n\n\n<p>Slicing<br>Creates a subset of the data by reducing the data from multiple dimensions to one dimension<\/p>\n\n\n\n<p>Dicing<br>Same as slicing except that the result can be in multiple dimensions<\/p>\n\n\n\n<p>Drilling up and down<br>Shifts the view of the data; down provides more detail, up provides summarized data<\/p>\n\n\n\n<p>Rolling up<br>Similar to drilling up but it collapses the data from multiple items into a single value<\/p>\n\n\n\n<p>Pivot<br>Rotates data to view the data from a different perspective<\/p>\n\n\n\n<p>Online Data Processing (OLDP)<br>Deals with data in real time<\/p>\n\n\n\n<p>Event-driven Processing<br>Uses business event to trigger messages to be sent by middleware between software modules that are completely independent of one another<\/p>\n\n\n\n<p>Batch Processing<br>Processing large amounts of data all in one batch when the computer system is not busy<\/p>\n\n\n\n<p>ODBC (Open Database Connectivity)<br>Interacts with a database via a database driver<\/p>\n\n\n\n<p>Structured Query Language (SQL)<br>A standard query language that is used to communicate in may DBMSs<\/p>\n\n\n\n<p>Database Interacting Format<br>SELECT fields FROM tables WHERE fields from tables match criteria<\/p>\n\n\n\n<p>SELECT<br>Used to inform the DBMS what fields or attributes are of interest<\/p>\n\n\n\n<p>FROM<br>Used to inform the DBMS what tables are to be interrogated by the query and if more than one table, how they are to be combined or joined<\/p>\n\n\n\n<p>WHERE<br>Used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query<\/p>\n\n\n\n<p>Project phases<br>Initiation, planning, executing and controlling, and closing<\/p>\n\n\n\n<p>Project Initiation<br>Problem definition, resource allocation, risk assessment<\/p>\n\n\n\n<p>Project Planning<br>Organize activities, time estimation, cost estimation<\/p>\n\n\n\n<p>Project Executing and Controlling Reports<br>Variance reports, Status reports, Resource Allocation reports<\/p>\n\n\n\n<p>Scope Creep<br>Adding to the scope of the project; can impact the allocation of resources.<\/p>\n\n\n\n<p>Unnecessary Requirements<br>Requirements that are not actually needed but are &#8220;nice to have&#8221;<\/p>\n\n\n\n<p>System Development Life Cycle (SDLC)<br>A process for planning, creating, testing, and deploying information systems, including hardware and software<\/p>\n\n\n\n<p>Common Steps in SDLC<br>Preliminary investigation, Analysis, Logical design, Physical design, Implementation, Maintenance<\/p>\n\n\n\n<p>Preliminary investigation<br>Assesses the feasibility of the proposed project and selects a development methodology<\/p>\n\n\n\n<p>Analysis<br>Determines the user requirements for the new system and develops logical models of the system<\/p>\n\n\n\n<p>Logical design<br>Logical models are revised to ensure that the new system will meet the user requirements identified in the first step<\/p>\n\n\n\n<p>Physical design<br>Logical models are converted into physical models<\/p>\n\n\n\n<p>Implementation<br>Begin converting the models from the previous steps into the actual system; this step also includes installing hardware, testing the system, and training the end users<\/p>\n\n\n\n<p>Maintenance<br>Modifications or corrections to the system are made<\/p>\n\n\n\n<p>Alpha Testing<br>System developers assist end users as they interact with new system; simulated data is used<\/p>\n\n\n\n<p>Beta Testing<br>Performed by the end user without any assistance from the system developers; live data in a real working environment is used.<\/p>\n\n\n\n<p>User Acceptance Testing<br>Employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user<\/p>\n\n\n\n<p>System Deployment<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>System Conversion<\/li>\n\n\n\n<li>Final Documentation<\/li>\n\n\n\n<li>End User Training<\/li>\n<\/ol>\n\n\n\n<p>Direct Conversion<br>Old system is turned off and the new system is turned on at a specific data and time<\/p>\n\n\n\n<p>Parallel Conversion<br>There is a period of time in which both systems are operating concurrently<\/p>\n\n\n\n<p>Pilot Conversion<br>Involves starting the conversation with a portion of end users<\/p>\n\n\n\n<p>Phased Conversion<br>Deploys a subset of the system first, rather than deploying the whole system at once<\/p>\n\n\n\n<p>Business Continuity<br>The activity performed by an organization to ensure that critical business functions will be available to customer, suppliers, regulators, and other entities that must have access to those functions.<\/p>\n\n\n\n<p>Image backups<br>Create a copy of everything that is on a hard drive<\/p>\n\n\n\n<p>Full backup<br>Everything on the hard drive is copied each and every time a backup is performed<\/p>\n\n\n\n<p>Incremental backup<br>An initial full backup is completed and then subsequent backups only capture the changes since the last backup<\/p>\n\n\n\n<p>Data mirroring<br>The OS writes data (and changes to data) to multiple hard drives at the same time.<\/p>\n\n\n\n<p>Off-Site Storage<br>A secure location for storing backup media<\/p>\n\n\n\n<p>Hot Site<br>Physical location where an organization can move its operations that includes everything for normal business operations; quickest return to business but very expensive.<\/p>\n\n\n\n<p>Cold Site<br>Physical location like a shell that can be used for operations should the need arise; not equipped with hardware, servers, etc.; cheaper to have<\/p>\n\n\n\n<p>Site Sharing<br>Having multiple data centers located in disparate regions; typically used by large organizations.<\/p>\n\n\n\n<p>The Internet of Things (IoT)<br>Refers to the myriad types of devices that can and will be connected to the Internet in the next few years.<\/p>\n\n\n\n<p>Big Data<br>Refers to data sets that are so large and complex that they will require more advanced database management\/processing tools.<\/p>\n\n\n\n<p>SaaS<br>Software as a Service. Can access and use software through the Internet.<\/p>\n\n\n\n<p>PaaS<br>Platform as a Service. Intention is to be able to quickly and reliably develop and deliver applications.<\/p>\n\n\n\n<p>LaaS<br>Infrastructure as a Service. All resources an IT dept. needs are located outside of the organization and are accessible by anyone, anywhere.<\/p>\n\n\n\n<p>Ethics<br>A code of moral conduct or a set of principles that govern behavior.<\/p>\n\n\n\n<p>Administrator Ethics<br>Privacy, Ownership, Control, Accuracy, Security<\/p>\n\n\n\n<p>What is the definition of information technology (IT)?<br>It is the technology used to create, maintain, and make information accessible.<\/p>\n\n\n\n<p>Which IT position has the responsibility of working with routers and switches?<br>Network administrator.<\/p>\n\n\n\n<p>In which generation were silicon chips first used in computers?<br>Third generation.<\/p>\n\n\n\n<p>Which low-level language corresponds one-to-one with assembly?<br>Machine language<\/p>\n\n\n\n<p>Which service allows users to use a software application installed on a remote server?<br>SaaS (Software as a Service)<\/p>\n\n\n\n<p>What is one of IT&#8217;s roles in globalization?<br>It allows companies to reach a wider customer base.<\/p>\n\n\n\n<p>Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?<br>Desktop<\/p>\n\n\n\n<p>Which two software application packages would be classified as productivity software?<br>Word processor.<br>Spreadsheet program.<\/p>\n\n\n\n<p>Which two computer peripherals are connected to the computer through a port?<br>External microphone.<br>USB flash drive.<\/p>\n\n\n\n<p>Which term is defined as a collection of information used to support management of an organization?<br>Information System<\/p>\n\n\n\n<p>A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors.<\/p>\n\n\n\n<p>What is the timestamp considered in this scenario?<br>Data<\/p>\n\n\n\n<p>A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made.<\/p>\n\n\n\n<p>Which characteristic of valuable data is the manager considering?<br>Timely<\/p>\n\n\n\n<p>What are two parts of an information system?<br>Networks.<br>Databases.<\/p>\n\n\n\n<p>What is the difference between processing and storage?<br>Processing involves temporary information, while storage involves permanent information.<\/p>\n\n\n\n<p>What benefit is provided by a computer network in a business?<br>Costs for hardware resources are decreased<\/p>\n\n\n\n<p>Virtual Machines<br>A software emulator program that permits a computer user to use multiple computers and multiple platforms<br>without the expense of purchasing multiple computers.<\/p>\n\n\n\n<p>Peer-to-peer<br>Each computer is roughly equal to every other computer.<\/p>\n\n\n\n<p>Client-server<br>One computer will request information from another computer, which responds with requested information.<\/p>\n\n\n\n<p>Operating System<br>Allows the user to control the actions of the software, and through the software, to access hardware<\/p>\n\n\n\n<p>Which action by application programs requires support from an operating system?<br>An Internet browser displays a web page.<\/p>\n\n\n\n<p>What is true about the Linux operating system?<br>Linux runs on both servers and workstations.<\/p>\n\n\n\n<p>The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.<\/p>\n\n\n\n<p>What type of server will meet this need?<br>Proxy server<\/p>\n\n\n\n<p>Which characteristic identifies application software that is cloud-based?<br>Provided by third-party providers<\/p>\n\n\n\n<p>What type of software permits free temporary use followed by long-term activation for a fee?<br>Shareware<\/p>\n\n\n\n<p>What is the purpose of an End User License Agreement for a commercial software package?<br>Establishes the customer&#8217;s right to use the software<\/p>\n\n\n\n<p>What is the difference between proprietary and open-source software license?<br>Proprietary software has a cost whereas open-source software is free.<\/p>\n\n\n\n<p>What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?<br>A copyright<\/p>\n\n\n\n<p>What are the two components a part of a central processing unit (CPU)?<br>Control unit (CU).<br>Arithmetic logic unit (ALU)<\/p>\n\n\n\n<p>An employee needs to edit a contract and prepare a hard copy for the project team.<\/p>\n\n\n\n<p>Which two peripheral devices should be used?<br>Printer.<br>Monitor.<\/p>\n\n\n\n<p>Which port is the HDMI port on the laptop?<\/p>\n\n\n\n<p>Which motherboard component helps cool the CPU?<br>Heat Sink<\/p>\n\n\n\n<p>Which item is a storage device?<br>Flash Drive<\/p>\n\n\n\n<p>In which type of network topology is each networked device directly connected to every other networked device?<br>Mesh<\/p>\n\n\n\n<p>Which communication medium is typically used when sending data transmissions over very long dinstances?<br>Radio Signals<\/p>\n\n\n\n<p>What indicates a specific Internet location?<br>The IP address<\/p>\n\n\n\n<p>Explain the role of a domain name system (DNS).<br>Translate human-redable aliases into IP addresses<\/p>\n\n\n\n<p>Which part of a Uniform Resource Locator (URL) identifies the location of a document on a server?<br>Resource Path ID<\/p>\n\n\n\n<p>Which goal of Information Assirance and Security (IAS) requires that information is accessible when needed?<br>Availability<\/p>\n\n\n\n<p>Which technique uses all possible combinations of letters and numbers to crack a password?<br>Brute force<\/p>\n\n\n\n<p>Which is a type of two-factor authentication?<br>Smart card<\/p>\n\n\n\n<p>Which is a characteristic of high-level languages?<br>They use object-oriented programs.<\/p>\n\n\n\n<p>How does a compiler work?<br>It requires the components of the software to be defined from the onset.<\/p>\n\n\n\n<p>On which tier of an N-Tier architecture model are user interfaces developed?<br>Presentation<\/p>\n\n\n\n<p>Which component facilitates communication between the other two components in the MVC architecture model?<br>Controller<\/p>\n\n\n\n<p>What statement is true concerning compiled and interpreted computer language?<br>A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.<\/p>\n\n\n\n<p>Which two languages have traditionally been used for automation rather than software development?<br>TCL.<br>Python.<\/p>\n\n\n\n<p>Which is true of databases and the applications that interact with them?<br>Applications are interdependent with the database.<\/p>\n\n\n\n<p>What is another term for a formula that outlines how to execute a task?<br>Algorithm<\/p>\n\n\n\n<p>What is the role of drivers in facilitating communication between applications and databases?<br>They allow the application to interact with the database.<\/p>\n\n\n\n<p>Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?<br>FROM<\/p>\n\n\n\n<p>Which data type is used to represent product order code that comprises alphanumeric characters?<br>String<\/p>\n\n\n\n<p>Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number.<\/p>\n\n\n\n<p>Which data type will be required in order to create his database?<br>String data<\/p>\n\n\n\n<p>Why is it important to ensure that data support business goals?<br>To aid in making strategic decisions<\/p>\n\n\n\n<p>In which category of the DIKW hierarchy would business intelligence be located?<br>Knowledge<\/p>\n\n\n\n<p>Which field must contain a unique value in order for a relational database table to function?<br>Primary key<\/p>\n\n\n\n<p>What are the three main categories of databases?<br>Flat file, relational, hierarchal<\/p>\n\n\n\n<p>What is the database administrator&#8217;s role in security?<br>To institute protocols to protect the databases from external threats<\/p>\n\n\n\n<p>What type of information processing allows input data to be accepted as a set of records and processed as a unit?<br>Batch<\/p>\n\n\n\n<p>What is the purpose of an IT department?<br>It helps the organization achieve strategic goals.<\/p>\n\n\n\n<p>What is a role of the systems administrator?<br>To install and maintain network resources<\/p>\n\n\n\n<p>Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territories\/regions?<br>Expanding the infrastructure to support additional locations<\/p>\n\n\n\n<p>What step should be taken by a business when a third-party solution is found that will benefit a project?<br>Contact the group to arrange a demo of their product<\/p>\n\n\n\n<p>Which risk assessment question is part of the Initiation Phase?<br>Could the end users reject the outcome of the project?<\/p>\n\n\n\n<p>In what phase of a project does time estimation occur?<br>Planning<\/p>\n\n\n\n<p>What effect does scope creep have on a project?<br>It impacts the allocation of resources for the project.<\/p>\n\n\n\n<p>Which system requirement is an example of considering user needs in the design of an information system?<br>Allowing easy access to customer account information<\/p>\n\n\n\n<p>Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?<br>User Acceptance<\/p>\n\n\n\n<p>Which type of systems conversion involves starting the conversion with a portion of end users?<br>Pilot<\/p>\n\n\n\n<p>What are two necessary elements of business continuity planning?<br>Assessing key organizational activities.<br>Identifying risks that may occur.<\/p>\n\n\n\n<p>Which disaster recovery strategy is used to save information to multiple hard drives at the same time?<br>Data mirroring<\/p>\n\n\n\n<p>Which action would support confidentiality?<br>Enabling file encryption<\/p>\n\n\n\n<p>Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?<br>Security Breach Notification laws<\/p>\n\n\n\n<p>How can an organization assist employees with the ethical use of information technology?<br>By developing policies for information usage<\/p>\n\n\n\n<p>Engages in best practices for information systems<br>Part of the role of an IT professional association<\/p>\n\n\n\n<p>Writes laws dealing with information technology<br>Outside of the role of an IT professional association<\/p>\n\n\n\n<p>Provides professional standards for ethical behavior<br>Part of the role of an IT professional association<\/p>\n","protected":false},"excerpt":{"rendered":"<p>First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.Evolution of Users Sends files over the network at the request of clients. Responds over LAN, within one location\/site. Support both application software and data files.FILE SERVER [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-110848","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=110848"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110848\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=110848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=110848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=110848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}