Introduction to IT - C182 - Pre-Assessment 4.8 (24 reviews) Students also studied Terms in this set (76) Western Governors UniversityIT C182 Save WGU C182 Introduction to IT 230 terms kbsing76Preview Introduction to IT - D322/ Pre-asses...70 terms quique218Preview
WGU C182
57 terms ChristiAnnaBanana Preview WGU C 255 term rwd Practice questions for this set Learn1 / 7Study using Learn How can an organization assist employees with the ethical use of information technology?What is the definition of information technology (IT)? It is the technology used to create, maintain, and make information accessible.Which IT position has the responsibility of working with routers and switches?Network administrator.Choose an answer 1 By developing policies for information usage 2 By implementing strict monitoring of employee activities 3 By restricting access to certain software applications 4 By providing mandatory training on technical skills only Don't know?
In which generation were silicon chips first used in computers?Third generation.Which low-level language corresponds one-to-one with assembly?Machine language Which service allows users to use a software application installed on a remote server?SaaS (Software as a Service) What is one of IT's roles in globalization?It allows companies to reach a wider customer base.Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?Desktop Which two software application packages would be classified as productivity software?Word processor.Spreadsheet program.Which two computer peripherals are connected to the computer through a port?External microphone.USB flash drive.Which term is defined as a collection of information used to support management of an organization?Information System A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors.What is the timestamp considered in this scenario?Data A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made.Which characteristic of valuable data is the manager considering?Timely What are two parts of an information system?Networks.Databases.What is the difference between processing and storage? Processing involves temporary information, while storage involves permanent information.What benefit is provided by a computer network in a business?Costs for hardware resources are decreased
Virtual MachinesA software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.Peer-to-peerEach computer is roughly equal to every other computer.Client-serverOne computer will request information from another computer, which responds with requested information.Operating SystemAllows the user to control the actions of the software, and through the software, to access hardware Which action by application programs requires support from an operating system?An Internet browser displays a web page.What is true about the Linux operating system?Linux runs on both servers and workstations.The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.What type of server will meet this need?Proxy server Which characteristic identifies application software that is cloud-based?Provided by third-party providers What type of software permits free temporary use followed by long-term activation for a fee?Shareware What is the purpose of an End User License Agreement for a commercial software package?Establishes the customer's right to use the software What is the difference between proprietary and open- source software license?Proprietary software has a cost whereas open-source software is free.What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?A copyright What are the two components a part of a central processing unit (CPU)?Control unit (CU).Arithmetic logic unit (ALU) An employee needs to edit a contract and prepare a hard copy for the project team.Which two peripheral devices should be used?Printer.Monitor.Which port is the HDMI port on the laptop?
Which motherboard component helps cool the CPU? Heat Sink Which item is a storage device?Flash Drive In which type of network topology is each networked device directly connected to every other networked device?Mesh Which communication medium is typically used when sending data transmissions over very long dinstances?Radio Signals What indicates a specific Internet location?The IP address Explain the role of a domain name system (DNS). Translate human-redable aliases into IP addresses Which part of a Uniform Resource Locator (URL) identifies the location of a document on a server?Resource Path ID Which goal of Information Assirance and Security (IAS) requires that information is accessible when needed?Availability Which technique uses all possible combinations of letters and numbers to crack a password?Brute force Which is a type of two-factor authentication?Smart card Which is a characteristic of high-level languages? They use object-oriented programs.How does a compiler work?It requires the components of the software to be defined from the onset.On which tier of an N-Tier architecture model are user interfaces developed?Presentation Which component facilitates communication between the other two components in the MVC architecture model?Controller What statement is true concerning compiled and interpreted computer language?A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.Which two languages have traditionally been used for automation rather than software development?TCL.Python.Which is true of databases and the applications that interact with them?Applications are interdependent with the database.What is another term for a formula that outlines how to execute a task?Algorithm