Chapter 1
- The system administrator is responsible for each of the following tasks except
- Installing software
- Troubleshooting hardware
- Securing a web site
- Updating the operating system
- Training users
- If users use passwords containing non-alphabetic characters or a combination of upper and letter case
- promotes computer security
- ensures proper file protection
- helps the system administrator with troubleshooting
- helps the system administrator track user access
- helps users remember their passwords
letters, this
- Organizations typically only have one system administrator who will be responsible for all aspects of
administering the computer systems.
- List 2 tasks for a web server administrator.
- If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device
is.
- Most people who work in IT have 4-year IT degrees.
- Which of the following is the largest storage capacity?
- 100 Megabytes
- 10,000 Kilobytes
- 3,000,000 bytes
- 4 Gigabytes
- 1,000,000 bits
- Which is bigger, 1 bit or 1 byte?
- Rank these sizes from smallest to largest: Megabyte, Terabyte, Byte, Kilobyte, Gigabyte.
- How do hospitals use IT?
- Although an IT student may not learn a variety of programming languages, it is likely that the IT
student will learn to program.
- System administrators will be expected to provide support in the form of documentation and training
to the organization’s users.
- The system administrator of a company would not be responsible for installing software on individual
employee’s computers.
(Information Technology, 1e Richard Fox) (Test Bank, Answer at the end of each Chapter) 1 / 4
- A security administrator would be responsible for administering which of the following?
- A web server
- A database server
- A web site
- An operating system
- A firewall
- List 3 activities that a network administrator would be involved with in his/her job.
- Web developers and web administrators share most of the same tasks.
- System administrators should know more than one operating system.
- Which of the following skills would an IT person employ to find and fix a problem with the operating
- System level programming
- System security
- Hardware troubleshooting
- System troubleshooting
- Soft skills
system?
- As a system administrator, which of the following behaviors might be considered as unethical?
- Reading employees’ emails
- Accessing other people’s files
- Changing data files in the organization’s system for your own gain
- Setting up backdoor accounts
- All of the above
- Detecting that a computer is running slowly because of a computer virus infection would be an
- knowledge of operating systems
- software installation
- system level programming
- system security
- troubleshooting
example of which type of IT skill?
- As an IT person, you should be someone who enjoys learning on your own.
- An IT person in general would not be expected to handle which of the following tasks?
- Train other employees
- Monitor employees’ files and web browsing behavior to ensure compliance with
- Be on call 24/7
- Make recommendations on computer purchases
- All of the above are tasks that an IT person might be asked to perform
organizational IT policies
- An IT person would probably be expected to study each of the following topics except for
- operating systems
- programming
- networking
- ethics 2 / 4
- the IT person would be expected to study them all
- The only difference between a handheld unit such as a tablet device or a smart phone differs from a
laptop or desktop computer is that the laptop/desktop has full sized peripheral devices and the handheld unit uses touch screens.
- A smart phone should not be considered a computer.
- You can store a number between 0 and 255 in 1 bit.
- Software that we run to accomplish some task is called _______ software.
- The concept of translating a program from a more readable language like Python or Java into the
- processing
- storage
- input
- compilation
- assembly
computer’s native machine language is called
- Which of the following could be called a peripheral device?
- CPU
- memory
- memory chips
- printer
- power supply unit
- The system unit houses the CPU and memory chips, all placed on
- an expansion slot
- a motherboard
- ROM
- a monitor
- none of the above, the system unit houses the CPU but not memory
- A computer system consists of the hardware, software and
- network
- peripheral devices
- programs
- users
- all of the above
- Which of the following types of files would come closest to about 1 MByte in size?
- A textfile with 1 page of text
- A small black and white image file
- A long song stored in an mp3 file
- A highly compressed movie
- An uncompressed movie
- Handheld devices like smart phones often use which of the following for storage?
- DRAM (main memory)
- Flash memory 3 / 4
- Hard disk drive
- Network storage
- None of the above, they have no form of storage at all
- Volatility is a property of which of the following?
- Users
- Processors
- Memory
- Hard disk storage
- All of the above
- It is the user who initiates when and what a computer should do.
- As computer technology has improved and thus become more complex, the ability to use the
computer has been made easier.
- Computers today are more easily identifiable than computers in the past.
- Approximately when did home Internet access become commercially available?
- 1969
- 1975
- 1984
- 1995
- 2006
- Define information technology.
- Briefly explain how, in program could, you would input two numbers and output whether the two
numbers are the same.
Answers:
- c
- a
- false
- install web server, configure web server, secure web server, work with developers
- true
- false
- d
- 1 byte
- Byte, Kilobyte, Megabyte, Gigabyte, Terabyte
- Patient record keeping, medical devices, insurance records and tracking
- true
- true
- false
- e
- purchase, configure, and connect computer network; maintain computer network; troubleshoot
- false
- true
- / 4
network; secure network from intrusion