• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/239

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

239 Cards in this Set

  • Front
  • Back
Which factor contributed to the development of the first generation of computers?
The need to easily calculate missile trajectories
During which generation did computers begin to see widespread use in business?
Third generation
Which of the following technologies was introduced in the fourth generation of computers?
Microprocessors
Which of the following high-level programming languages was created to be business orientated?
COBOL
Which of the following programming languages first introduced the concept of object-orientated programming?
Smalltalk
Which accurately describes the advantages of high-level programming languages over low-level programming languages?
High level languages use English words
What components represents the basic structure of the computer system?
CPU, memory, I/O subsystem, and bus
What main component of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer.
CPU
Which main component of a computer is described by this statement: This component facilitates the flow of information / communication between components and peripheral devices.
Bus
Fill in the blank: The _____________ connects or stores all of the components in a computer.
motherboard
What best describes the difference between memory and the hard drive?
Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time.
Fill in the blank: The _________ is a part of the motherboard and carries out the basic instructions that operate the PC.
processor
What best describes the differences between memory slots and expansion slots?
Memory slots contain electronic components that store instructions and data; whereas expansion slots may hold adapter cards, video cards, or wireless network cards.
What best describes the purpose of expansion slots in modern computers?
Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices.
Power connectors are responsible for what?
Taking current from external wall outlets
What carries out the instructions of a computer program and is often referred to as the "chip"?
Central Processing Unit
What statement best defines the ALU?
The ALU processes the raw computer data, including mathematical calculations and logical operations.
What statement best defines the CU?
The CU retrieves the instructions of a computer program and the raw data that is input.
What statement accurately describes memory?
A computer can only run programs if it has a sufficient amount of memory.
What is an example of what 1 GB would store?
Thousands of books
What does RAM stand for?
Random access memory
What statement accurately describes BIOS RAM?
Runs tests of memory and the CPU, and intializes hardware components.
With RAM, how much time should it take to access any address, no matter which address is sent?
The same amount of time.
What does RAM do with your data before it is processed and sent to your screen or printer?
RAM temporarily stores the data
Is RAM short term or long term memory?
short term memory
ROM is short term or long term memory?
long term memory
What does ROM stand for?
Read only memory
What is found on the motherboard and stores information but the information is not permenant?
RAM
Name three storage systems.
CD, External hard drive, Flash drive
Name three input systems:
Scanner, Webcam, Keyboard
Read/write disks, thumb drives, external hard drives, and cloud storage are peripheral devices for what system?
Storage
A scanner is a peripheral device for what system?
I/O (input / output)
A monitor is a peripheral device for what system?
I/O (input / output)
What peripheral component houses CDs and DVD?
Bays
What external component will allow peripherals to be connected to the system unit and insert modem cards, wireless-access cards, and other PC cards?
Slots
What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices?
Ports
Which computer has a system unit that is easily distinguished from the peripherals?
Desktop
Which computer will use a docking station to function like a desktop?
Notebook
Which computer has the most performance capability?
Desktop
Which computer has the least performance capability?
Handheld
Which computer has the mid performance capability?
Laptop
Which software is run automatically rather than by the end user?
System
Which type of software includes programs such as Microsoft Word and PowerPoint?
Application
Which software consists of programs such as daemons and a scheduler?
System
What is a program that will allow a computer to easily access the hardware and software of the computer system?
Operating system
Fill in the blank: Today's operating systems are _______________________.
easier to use
An operating system will issue commands using the command line prompt by?
Typing in commands
Which of the operating systems is for workstations?
Windows 7/8
Which of the operating systems is for mobile devices?
Android
Which of the operating systems is for servers?
Windows Server
Which layer of the operating system will handle process management, resource management, and memory management?
Kernel
Which layer of the operating system provides access to the kernel?
Shell
Which layer of the operating system run in the background and will handle an event?
Services
What is a role of an administrator account?
Manipulate system files
Which account is also referred to as root or superuser?
Administrator
Adding/deleting user accounts is the role of which account?
Administrator
Fill in the blank: Android, Chrome, and iOS are operating systems for _____________.
mobile devices
Fill in the blank: Windows 7/8, Linux, and Mac OS X are operating systems for ____________________.
workstations
Windows Server 8 is an operating system for which type of device?
Server
Define Cloud computng:
It allows for the offloading of computation and storage from your local computer.
A company's internal email system is an example of what?
intranet
This scenerio describes which stage of the DIKW model: A management decision on how many people to hire after observing current employee levels and upcoming marketing promotions.
The knowledge stage
As a new sales manager, Sylvia is studying the sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working?
Information stage
Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working?
Data stage
Which of the following demonstrate an information system? Select all that applyShania is creating a printed handbook of company policies for new employees.Ian is making updates to the company website to include the latest product information.Tyra is using the computer to create a birthday card for her friend.Ahmad is installing new software to improve the ease of accessing the database.
Shania, Ian, and Ahmad
Fill in the blank: An __________________ system is different than Information Technology.
information
Fill in the blank: An ________________________________ does not need to involve technology.
information system
What is the difference between information systems and information technology?
An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software.
What is an example that best describes the reliable characteristic of quality data?
Each year, the annual sales data was gathered for the same time period, using the same instruments and collection processes.
What is an example that best describes the accuracy of quality data?
Customer satisfaction data was captured immediately following the sales presentation and has been inputted correctly.
What is an example that best describes the relevant characteristic of quality data?
The data used applies to the question being answered.
What does the acronym IPOS stand for?
Input, process, output, storage
Describe how a computer uses the IPOS cycle.
Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs.
Which of the following are elements of a computer system? Select all that apply.Network cables, motherboard, flash drive, and wrist supports.Monitor, print drivers, operating system, and mouse.Operating system, fans, printer, and printer ink.CPU, users, keyboard, and memory.
Monitor, print drivers, operating system, and mouse.CPU, users, keyboard, and memory.
What is an accurate definition of a computer system?
A computer system is a collection of hardware and software components that work together to meet the needs of the user.
Fill in the blank: A computer system needs ____________ to be able to communicate with users as well as other computers.
software
Fill in the blank: The software in a computer system may be __________________ if the system is a part of a network.
shared
What must be part of a computer system in order for the system to be usefule?
software
The following scenario needs the best hardware or software solution for the situation:Teachers in the Lincoln County School District are complaining about the speed of the internet in their classrooms. Marcus, the IT coordinator, has a limited amount of money to spend to address the issue.
Marcus determines the school's routers that transmit information from the internet across the district are slow and outdated, so he will use the money to replace them.
What is the difference between software and hardware?
Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives.
Describe the timeline of computer development.
First, computers built and programmed by engineers. Next, limited use of computers by large organizations. Next, introduction of personal computers. Lastly, Graphical User Interface systems are introduced.
Fill in the blank: The development of new hardware and software requires _____________________.
special training
What are some examples of Graphical User Interface systems?
GPS systems, ATM machines, and tablets and smart phones.
Fill in the blank: The capabilities and complexities of _________________ have grown substantially, but the ease of use has also made them ________________.
computers, user friendly
How have computer users changed over the last 75 years?
Almost anyone can be a computer user today whereas in the past only computer scientists and those with specialized training used computers.
Why are network protocols necessary?
Network protocols are necessary for computers to communicate with each other.
Why do businesses use networks?
To reduce costs, customer support, and data sharing.
What is a proprietary software license?
Software purchased from a vendor and gives you the right to use the software but is not yours to own.
What is an open source software license?
Software made freely available as a source code to enhance and distribute the software.
Which two types of software licenses are free?
Freeware and Open Source
What will protect the original work and the creation of inventive concepts?
Patent
What will prevent others from making, selling, or using an invention for 20 years?
Patent
What do copyrights protect?
The original work for the duration of the author's life plus 70 years.
When must a software license agreement be accepted when using proprietary software?
After downloading but before using the software
Proprietary software license agreement gives the purchase the right to what?
Use the software
What will violate a proprietary software agreement?
Using the software after rejecting the agreement.
Between whom is the End User License Agreement a contract?
Between the Licensor and the purchaser.
What rights does the End User License Agreement for proprietary software typically give to purchasers?q
The right to use the software
The End User License Agreement for proprietary software does what?
Limits modifying the software.
What is true of computer networks?
Computer networks allow individuals to share many types of resources.
What is a local computer?
A computer that a person is physically at.
Define a computer network.
A computer network is a collection of computers and computer resources (eg printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
Which technology is best to provide a communication path over long distances?
radio and cellphone towers
What do fiber optics use to transmit information?
light impulses
Why would it be desirable to use a switch as opposed to a hub in a network?
Because switches only transfer information to specific computers within a netowrk and not all of the computers, the bandwidth used with a switch is less than that of a hub.
What device is used to connect one network to another network?
router
What communication system hardware devices is commonly used as a wireless access point?
router
What are the characteristics of a packet-switched network?
The choice of pathway is based on network availability and amount of message traffic, and the route is established one branch at a time.
How do a router and switch differ when handling a message?
The router will purposefully drop messages if message traffic exceeds its capacity.
In a client-server network, what is the role of the server?
The role of the server is to take requests from the client and send back the requested information.
How do virtual machines support a business computing ecosystem?
A virtual machine (VM) is made available by software and permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.
Which server responds to HTTP requests on the Internet?
web server
Which server monitors requests, but doesn't send files in return?
print server
Which server can generate reports from client inquiries?
database server
What are the characteristics of a bus network topology?
Is a very reliable form of netowrk, is one of the more simple types of network topographies, and all messages travel along a single cable.
Which type of network has each device in the network connected in a single point-to-point connection with a central HUB?
star network
What is the benefit of a star network topology?
It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal.
Which device permits packet switching so that a message can be routed to the next link in a network?
router
In order to translate from an IP alias to an IP address, which of the following is used?
DNS
What is the best description of the Internet?
The Internet is a global network of networks.
What identifies the server on which a web page can be found?
Domain Name
Name the parts of a URL:
Host name, TLD, and Protocol
The abbreviation "URL" indicates:
Uniform Resource Locator
What is the path that a message takes from one computer to another?
A message is divided into one or more packets, the packet(s) are given the final destination address, and all packets of the same message are combined togerther as they arrive.
Fill in the blank: _______________________ is computed from other data contained within an IP address and stored as part of the IP packet.
A checksum
Your site's Internet point of presence is called a:
Gateway
Using a unique identifier to allow access to sensitive information is an example of what?
Confidentiality
Entering data into the system accurately is an example of:
integrity
Obtaining data from computers all over the organization is an example of:
Availability
Which of the following types of information present a threat to someone's privacy?Student ID and credit card numbersPhone numbers and email addressesSecret business plansNames and address in the phone book
Student ID and credit card numbers
What type of hacking will find vulnerabilities and fix or protect against them?
White-hat hacking
What is required to verify authenticity of the recipient?
Certificates, digital signatures, and encryption
In strategic risk analysis, what is the first step?
Identify information assets
In strategic risk analysis, what is the final step?
Develop and enact policies against threats
In strategic risk analysis, priorizing risks is before which step?
Develop and enact policies against threats.
Fill in the blank: Learning about social engineering and how to protect passwords is ___________.
Education
Name three types of authentication:
Fingerprint, Password, Key card
What is phishing?
A suspicious email asking for personal information.
What type of files are included with access rights?
Access rights will include files that the user can access and will not include files that the user should not access.
What are the advantages of a network?
Cost savings and increased productivity, effciency, and communication
A local area network (LAN) :
allows hardware and software sharing within one office.
How does a network enhance the business ecosystem?
Team members can review files on the shared drive synchronously and employees in different locations can share hardware and software.
Which number system is read and used by humans every day?
Decimal
What kind of numbering system is binary?
Base 2
Recall the IPOS (Input-Processing-Output-Storage) cycle. Which two steps of the IPOS cycle deal exclusively with binary representations of date?
Storage and Processing
What two inventions have allowed programmers to avoid writing programs in machine language?
Language Translators and High Level Progamming Languages
Name four high-level languages:
Java, C++, Ada, and BASIC
Why do high level programming languages need to be translated?
In order for the computer to understand the code.
What is the correct function of the compiler?
Translates the entire program, creating an executable program, which can be run at a later time.
What is the correct function of the interpreter?
Takes the most recently entered instruction, translates it into machine language, and executes it.
What is a disadvantage of a compiled language?
Lack of portability
What is the main disadvantage of compiled language?
The main disadvantage of compiled language is that it is not portable.
Which language can create an executable program faster?
A compiled language
What are types of language translators?
Compiler and interpreter.
Name two types of scripting languages:
ASP and Python
What is another term that defines a script?
Interpreted program
What describes a computer program?
An elaborate algorithm
Which are examples of a non-computer scenario that represents an algorithm? Select all that applyA. Being asleepB. Building a swing setC. Solving a math problemD. Making a sandwich
B, C, D
What describes an algorithm?
Clear
How is data used in the data tier?
Data is retrieved, updated, and stored.
Fill in the blank: The presentation tier is where the ___________________ is developed.
user interface
Why is it best to keep the data independent from the application?
To shield users from the complexities of the data and to remove the need for the user to interact directly with the data.
What does MVC stand for?
Model-View-Controller
Which other model is the MVC model similar to?
N-tier model
What is one way the n-tier model differs from the MVC model?
The n-tier model has tiers that are each separate applications.
Hexadecimal numbers are on which base system?
Base 16
How many bits does a single hexadecimal digit represent?
4
Which two of these non-decimal numbers are examples of hexadecimal numbers?A. 3KF and 13B. 8G and 3KFC. 64A and 8GD. 13 and 64A
D.
Business intelligence systems are used when making what type of decisions?
Long term decisions
A business intelligence system is used by which groups of people?
High level management
What is the definition of business intelligence?
A term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources.
Which OLAP operation involves viewing the data using a different filter first?
Pivoting
What is the main difference between a data warehouse and OLDP?
OLDP deals with data in real time while a data warehouse does not.
Which of the following are examples of real-time processing? Select all that apply:A. Paying your bills onlineB. Generating monthly bank statementsC. Playing an online multiplayer video gameD. Processing payroll
A and C
What interacts between a database and an application?
A driver
What is an interface between a database and the application?
ODBC application
What does a JDBC driver allow a user to do?
Have an application interact with any database when developing in Java.
Which of the following is a SQL command? Select all that apply:A. FIXB. INSERTC. DROPD. SELECT
INSERT, DROP, SELECT
What does SQL stand for?
Structured Query Language
What operator is used to select all of a certain data in an SQL command?
*
Why is it essential to know what information will be needed from the database from the outset of development? Select all that applyA. The developer can determine which data types would help fulfill the purpose.B. The number of fields in the database determines the cost of that database, so if careful planning doesn't occur, money can be wasted.C. By knowing the purpose, the developer can determine how many fields are needed in the database.D. The purpose determines the structure of the database.
A, C, D
Which of the following statements about databases and data types are accurate. Select all that apply:A. Once the database is designed, the user doesn't need to worry about determining data types.B. Uniform data types can be search and sorted.C. Numbers can be entered as text or as numeric values.D. A customer's first name and last name must be entered as two separate fields.
A, B, C
Which of the following would be a field in a database? Select all that applyA. 63%B. SalesC. 19943-5568D. Gender
A and C
Which of the following statement about data organization are correct? Select all that apply:A. The information in each record must refer to a person.B. A relationship may exist between each individual record.C. Not all records need to contain data about every attribute.D. You cannot perform mathematical functions on string data.
B, C, D
Name two forms of queries:
projection and join
Which of the following are operations used to alter the data within a relation of a database? Select all that applyA. joinB. insertC. updateD. delete
B,C,D
In order for a database to work, at least one of the fields has to contain unique values. What is the name of this field?
Unique identifier
What are the three main categories of databases?
Flat file, Hierarchical, and Relational
Which database category is the most similar to a spreadsheet or MS Excel document?
Flat File
What examples best decribe hierarchical databases?
Parent-child relationships and a tree-like structure.
What skills are needed to assist with application design and development?
performance tuning and schema development
Database administrators might be involved with the integration of data from where?
Older systems to new
What is the focus of the list of responsibilities for database administrators?
design development and DBMS support
Which department will work with the management department to achieve strategic goals by developing applications and databases?
IT department
What are the functions of the IT department?
Make sure the company's website can handle e-commerce transactions and supports day-to=day technology needs of an organization.
Which department supports day-to-day technology needs of an organizations?
IT department
What aligns IT goals and organization goals?
IT goals include cloud computing, and organization goals include real time communication to contain costs while scaling quickly.
Fill in the blank: Individuals in every department are expected to fulfill the organization's ____________________________________.
mission, vision, and goals.
What defines the organization's goals?
Specific, measurable outcomes the organization plans to achieve.
What is IT management responsible for?
Being the project manager
What is an IT specialist responsible for?
Installation and maintenance.
IT personnel who understand both the technical IT infrastructure and management of the business fill which role?
IT management
What is an advantage of building a solution in-house?
Meeting the company's specific needs.
What is an advantage of outsourcing?
Cost-effective if time is constrained
What is an advantage of buying a solution from another company?
Faster
An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the?
Project
Problem definition, resource allocation, and risk assessment are 3 key elements of which project phase?
Initiiation
Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs?
Planning
Project managers use variance reports, status reports, and resource allocation reports in which project phase?
Executing and Controlling
The team will write a final report detailing the processes and outcomes of the project in which project phase?
Closing
Which project phase defines the problem or opportunity that the project is expected to address?
Initiation
Which project phase determines what resources are available to meet the project needs?
Initiation
Which project phase assesses the risks and benefits of a project?
Initiation
Determining the project scope or the work that needs to be completed is in what project phase?
Initiation
Scope creep can impact the allocation of which resources?
Time and capital
The scope of the project is?
The work that needs to be done.
During analysis, which system requirement includes features that will satisfy end user needs?
User needs
During analysis, which security requirement prevents unauthorized users from accessing data?
Security
During analysis, which system requirement ensures that the system is accessible to all users?
Accessibility
During implementation, how is alpha testing different from beta testing?
Alpha testing uses simulated data.
During implementation, which testing method is performed by the end user (in a limited fashion) using actual data in the real working environment?
Beta
During implementation, which testing assesses whether the system functions and is useful?
User Acceptance
When does system conversion (direct, parallel, pilot, or phased) occur?
System deployment
Which term involves replacing the old system with a new system?
System conversion
When integrating a new system within an organization, what will it interact with?
Existing systems in the organization
A company's ability to recover after a disaster is directly related to which of the following?
Business continuity plan
What is the first step in creating a BCP plan?
Assessing critical operational activities
What is the final step in creating a BCP plan?
Testing the plan
What is site sharing?
It is a form of off-site storage that involves having multiple data centers located in different regions.
How far should an off-site storage location be from the main business?
far enough away from the main business site so that it is protected in the case of a disaster.
An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes what?
Data mirroring
A form of backup that creates a copy of everything that is on a hard drive including the operating systems, programs, and configuration files. This statement best describes what?
Image backups
Which of the following would be an example of unethical behavior on the part of an IT professional? Select all that applyA. Coping a software program to numerous computers without a site license.B. Using a work computer to do personal online shopping.C. Asking permission to use a colleague's PowerPoint presentation.D. Checking that employees are following organization rules and protocol for internet usage.
A and B
Select all of the following items which can be a threat to personal and organizational privacy. Select all that applyA. Computer security softwareB. Phishing and scams attempting to get private informationC. Confidential information stored with inadequate security on a company website.D. Providing personal information on a social media website.
B,C, D
What are common security classifications?
Private, Sensitive, and Confidential
What is the best example of the availability component of computer security?
Access from multiple locations.
Which of the following are protected by federal legislation? Select all that applyA. Student recordsB. Electronic health care recordsC. Personal information on FacebookD. Copyrighted music
A, B, D
For the following scenario, which government regulation would be relevant?Andrea is employed by the Deming Foundation, a non-profit seeking to help increase graduation rates in rural communities. She has been working hard to identify and recruit donations from wealthy businessmen and companies and is seeing a great deal of success. While she quickly runs into the grocery store for a few items, someone steals her laptop from her car, containing all her work files.
Security Breach Notification laws
What is the role of IT personnel in regards to IT policies on computer and Internet use?
Making sure the policies are enforced fairly and evenly throughout an organization, giving feedback to management in the development of IT policy, and making sure others are aware of and understand policies.