76 Multiple choice questions
1. What is the role of drivers in facilitating communication between applications and databases?
A. It impacts the allocat... [Show More] ion of resources for the project. B.
NAME
They allow the application to interact with the database.
C. It allows companies to reach a wider customer base.
D. Establishes the customer's right to use the software
2. Which data type is used to represent product order code that comprises alphanumeric characters?
A. Resource Path ID B.
String
C. Data mirroring
D. Brute force
3. Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?
A. Controller
B. Mesh
C. Brute force D.
FROM
4. Which service allows users to use a software application installed on a remote server?
A.
SaaS (Software as a Service)
B. An Internet browser displays a web page. External microphone.
C. USB flash drive.
D. Provided by third-party providers
5. Allowing easy access to customer account information
A. Which communication medium is typically used when sending data transmissions over very long dinstances? B.
Which system requirement is an example of considering user needs in the design of an information system?
C. What is the role of drivers in facilitating communication between applications and databases? D.
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territories/regions?
6. In which generation were silicon chips first used in computers?
A.
Third generation.
B. To aid in making strategic decisions
C. Knowledge Networks.
D. Databases.
7. One computer will request information from another computer, which responds with requested information.
A. Virtual Machines
B. What statement is true concerning compiled and interpreted computer language? C.
Client-server
D. Peer-to-peer
8. It impacts the allocation of resources for the project.
A. What is the purpose of an End User License Agreement for a commercial software package? B.
What effect does scope creep have on a project?
C. Which port is the HDMI port on the laptop?
D. What is the database administrator's role in security?
9. What is one of IT's roles in globalization?
A.
It allows companies to reach a wider customer base.
B. Translate human-redable aliases into IP addresses
C. It is the technology used to create, maintain, and make information accessible.
D. They allow the application to interact with the database.
10. What is true about the Linux operating system?
A. Flat file, relational, hierarchal
B. To institute protocols to protect the databases from external threats
C. Processing involves temporary information, while storage involves permanent information. D.
Linux runs on both servers and workstations.
11. What is the purpose of an End User License Agreement for a commercial software package?
A. Applications are interdependent with the database. Control unit (CU).
B. Arithmetic logic unit (ALU)
C. It is the technology used to create, maintain, and make information accessible. D.
Establishes the customer's right to use the software
12. Timely
A. Which data type is used to represent product order code that comprises alphanumeric characters?
B. In which type of network topology is each networked device directly connected to every other networked device? C.
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made.
Which characteristic of valuable data is the manager considering?
D. Which type of systems conversion involves starting the conversion with a portion of end users?
13. Control unit (CU). Arithmetic logic unit (ALU)
A. What is the purpose of an End User License Agreement for a commercial software package?
B.
What are the two components a part of a central processing unit (CPU)?
C. What are the three main categories of databases?
D. What is the difference between proprietary and open-source software license?
14. Data
A. What type of information processing allows input data to be accepted as a set of records and processed as a unit? B.
A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors.
What is the timestamp considered in this scenario? C.
A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made.
Which characteristic of valuable data is the manager considering? D.
Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number.
Which data type will be required in order to create his database?
15. To institute protocols to protect the databases from external threats
A. What is true about the Linux operating system? B.
What is the database administrator's role in security?
C. What is the definition of information technology (IT)?
D. What is the role of drivers in facilitating communication between applications and databases?
16. Security Breach Notification laws
A. Which two languages have traditionally been used for automation rather than software development? B.
Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?
C. Which characteristic identifies application software that is cloud-based?
D. Which two computer peripherals are connected to the computer through a port?
17. An employee needs to edit a contract and prepare a hard copy for the project team.
Which two peripheral devices should be used?
A. Data mirroring
B. Brute force
C. Machine language D.
Printer.
Monitor.
18. What is the difference between proprietary and open-source software license?
A. To institute protocols to protect the databases from external threats
B. Applications are interdependent with the database.
C. It is the technology used to create, maintain, and make information accessible. D.
Proprietary software has a cost whereas open-source software is free.
19. What benefit is provided by a computer network in a business?
A.
Applications are interdependent with the database.
B. Could the end users reject the outcome of the project?
C. Part of the role of an IT professional association D.
Costs for hardware resources are decreased
20. Which motherboard component helps cool the CPU?
A. Presentation
B. Flash Drive
C. Brute force D.
Heat Sink
21. Network administrator.
A. Which communication medium is typically used when sending data transmissions over very long dinstances? B.
Which IT position has the responsibility of working with routers and switches?
C. Which service allows users to use a software application installed on a remote server?
D. Which port is the HDMI port on the laptop?
22. User Acceptance
A. Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
B. Which technique uses all possible combinations of letters and numbers to crack a password?
C. Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen? D.
Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?
23. Which two software application packages would be classified as productivity software?
A. SaaS (Software as a Service) B.
Word processor. Spreadsheet program.
C. An Internet browser displays a web page.
D. Network administrator.
24. Which is a type of two-factor authentication?
A. String
B. Brute force
C. To install and maintain network resources D.
Smart card
25. Which item is a storage device?
A. Heat Sink
B. Brute force
C. Availability D.
Flash Drive
26. What indicates a specific Internet location?
A. Data mirroring
B. Shareware
C. Flash Drive D.
The IP address
27. Algorithm
A. Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
B. What is the purpose of an End User License Agreement for a commercial software package? C.
What is another term for a formula that outlines how to execute a task?
D. Which IT position has the responsibility of working with routers and switches?
28. Processing involves temporary information, while storage involves permanent information.
A. What is the difference between proprietary and open-source software license? B.
What is the difference between processing and storage?
C. Which port is the HDMI port on the laptop?
D. What is true about the Linux operating system?
29. In what phase of a project does time estimation occur?
A. Knowledge
B. Presentation C.
Planning
D. Heat Sink
30. Operating System
A. Each computer is roughly equal to every other computer.
B. To institute protocols to protect the databases from external threats C.
Allows the user to control the actions of the software, and through the software, to access hardware
D. Part of the role of an IT professional association
31. What are two necessary elements of business continuity planning?
A. Proprietary software has a cost whereas open-source software is free. Control unit (CU).
B. Arithmetic logic unit (ALU)
C. It is the technology used to create, maintain, and make information accessible. D.
Assessing key organizational activities.
Identifying risks that may occur.
32. Outside of the role of an IT professional association
A. What effect does scope creep have on a project? B.
Writes laws dealing with information technology
C. What is a role of the systems administrator?
D. Engages in best practices for information systems
33. Machine language
A. Which goal of Information Assirance and Security (IAS) requires that information is accessible when needed?
B. Which port is the HDMI port on the laptop?
C. In which generation were silicon chips first used in computers? D.
Which low-level language corresponds one-to-one with assembly?
34. Resource Path ID
A.
Which part of a Uniform Resource Locator (URL) identifies the location of a document on a server?
B. Which type of systems conversion involves starting the conversion with a portion of end users?
C. Which service allows users to use a software application installed on a remote server?
D. Which goal of Information Assirance and Security (IAS) requires that information is accessible when needed?
35. Applications are interdependent with the database.
A. What is the difference between proprietary and open-source software license? B.
Which is true of databases and the applications that interact with them?
C. Which action by application programs requires support from an operating system?
D. Which risk assessment question is part of the Initiation Phase?
36. What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?
A. Algorithm B.
A copyright
C. Controller
D. Data mirroring
37. Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?
A. Resource Path ID
B. Data mirroring
C. String D.
Desktop
38.
A. What indicates a specific Internet location?
B. Which risk assessment question is part of the Initiation Phase?
C. Which is a characteristic of high-level languages? D.
Which port is the HDMI port on the laptop?
39. Contact the group to arrange a demo of their product
A. Which term is defined as a collection of information used to support management of an organization? B.
The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.
What type of server will meet this need? C.
What step should be taken by a business when a third-party solution is found that will benefit a project?
D. Which port is the HDMI port on the laptop?
40. Which risk assessment question is part of the Initiation Phase?
A. Costs for hardware resources are decreased B.
Could the end users reject the outcome of the project?
C. Applications are interdependent with the database.
D. It is the technology used to create, maintain, and make information accessible.
41. It helps the organization achieve strategic goals.
A. Which system requirement is an example of considering user needs in the design of an information system? B.
What is the purpose of an IT department?
C. How can an organization assist employees with the ethical use of information technology?
D. What step should be taken by a business when a third-party solution is found that will benefit a project?
42. In which type of network topology is each networked device directly connected to every other networked device?
A. Batch B.
Mesh
C. FROM
D. Knowledge
43. Information System
A.
Which term is defined as a collection of information used to support management of an organization?
B.
The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.
What type of server will meet this need?
C. Which part of a Uniform Resource Locator (URL) identifies the location of a document on a server?
D. Which port is the HDMI port on the laptop?
44. They use object-oriented programs.
A. Which is true of databases and the applications that interact with them? B.
Which is a characteristic of high-level languages?
C. Which characteristic identifies application software that is cloud-based?
D. What is true about the Linux operating system?
45. Which field must contain a unique value in order for a relational database table to function?
A. Brute force
B. Controller C.
Primary key
D. Presentation
46. Which action by application programs requires support from an operating system?
A. Security Breach Notification laws
B. Applications are interdependent with the database. C.
An Internet browser displays a web page.
D. Provided by third-party providers
47. Peer-to-peer
A. Expanding the infrastructure to support additional locations
B. They allow the application to interact with the database. C.
Each computer is roughly equal to every other computer.
D. Could the end users reject the outcome of the project?
48. Enabling file encryption
A. Which low-level language corresponds one-to-one with assembly?
B. Which is a characteristic of high-level languages? C.
Which action would support confidentiality?
D. Which is a type of two-factor authentication?
49. A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
A. What is the definition of information technology (IT)?
B. How does a compiler work?
C. What are two necessary elements of business continuity planning? D.
Virtual Machines
50. Which characteristic identifies application software that is cloud-based?
Word processor.
A. Spreadsheet program.
B.
Provided by third-party providers
C.
They use object-oriented programs.
External microphone.
D. USB flash drive.
51. Presentation
A.
On which tier of an N-Tier architecture model are user interfaces developed?
B. Which two languages have traditionally been used for automation rather than software development?
C. Which field must contain a unique value in order for a relational database table to function?
D. Which motherboard component helps cool the CPU?
52. Which communication medium is typically used when sending data transmissions over very long dinstances?
A. Controller
B. Resource Path ID
C. Data mirroring D.
Radio Signals
53. Data mirroring
A.
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
B. Which component facilitates communication between the other two components in the MVC architecture model?
C. Which port is the HDMI port on the laptop?
D. Which data type is used to represent product order code that comprises alphanumeric characters?
54. Which goal of Information Assirance and Security (IAS) requires that information is accessible when needed?
A.
Availability
TCL.
B. Python.
C. User Acceptance
D. Resource Path ID
55. Pilot
A. What type of information processing allows input data to be accepted as a set of records and processed as a unit? B.
Which type of systems conversion involves starting the conversion with a portion of end users?
C. In which type of network topology is each networked device directly connected to every other networked device?
D. What type of software permits free temporary use followed by long-term activation for a fee?
56. Expanding the infrastructure to support additional locations
A. Which action by application programs requires support from an operating system? B.
Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territories/regions?
C. What is the role of drivers in facilitating communication between applications and databases?
D. What are two necessary elements of business continuity planning?
57. Knowledge
A. Which characteristic identifies application software that is cloud-based?
B. In which generation were silicon chips first used in computers? C.
In which category of the DIKW hierarchy would business intelligence be located?
D. In what phase of a project does time estimation occur?
58. To install and maintain network resources
A.
What is a role of the systems administrator?
B. What is the database administrator's role in security?
C. Which is a type of two-factor authentication?
D. What effect does scope creep have on a project?
59. What type of information processing allows input data to be accepted as a set of records and processed as a unit?
A. User Acceptance B.
Batch
C. Pilot
D. Desktop
60. Controller
A. In which category of the DIKW hierarchy would business intelligence be located?
B. Which two languages have traditionally been used for automation rather than software development?
C. Which port is the HDMI port on the laptop? D.
Which component facilitates communication between the other two components in the MVC architecture model?
A. Establishes the customer's right to use the software B.
Part of the role of an IT professional association
C. Outside of the role of an IT professional association Control unit (CU).
D. Arithmetic logic unit (ALU)
62. What type of software permits free temporary use followed by long-term activation for a fee?
A. User Acceptance B.
Shareware
C. String
D. Pilot
63. It is the technology used to create, maintain, and make information accessible.
A.
What is the definition of information technology (IT)?
B. What is the database administrator's role in security?
C. What is the difference between processing and storage?
D. Which port is the HDMI port on the laptop?
64. What are two parts of an information system?
A. Linux runs on both servers and workstations. B.
Networks.
Databases.
C. Network administrator.
D. Third generation.
65. TCL.
Python.
A. Which component facilitates communication between the other two components in the MVC architecture model?
B. Which port is the HDMI port on the laptop? C.
Which two languages have traditionally been used for automation rather than software development?
D. Which field must contain a unique value in order for a relational database table to function?
66. Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number.
Which data type will be required in order to create his database?
A. String
B. Timely C.
String data
D. User Acceptance
67. By developing policies for information usage
A. Operating System
B. Which system requirement is an example of considering user needs in the design of an information system? C.
How can an organization assist employees with the ethical use of information technology?
D. What is the purpose of an IT department?
68. Part of the role of an IT professional association
A. What is the definition of information technology (IT)?
B. Which port is the HDMI port on the laptop? C.
Engages in best practices for information systems
D. What are the three main categories of databases?
69. The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.
What type of server will meet this need?
A. A copyright
B. Primary key C.
Proxy server
D. Information System
70. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.
A.
What statement is true concerning compiled and interpreted computer language?
B. What are the two components a part of a central processing unit (CPU)?
C. What is the difference between processing and storage?
D. Which port is the HDMI port on the laptop?
71. Flat file, relational, hierarchal
A. What is true about the Linux operating system?
B. What are two necessary elements of business continuity planning? C.
What are the three main categories of databases?
D. What is the definition of information technology (IT)?
72. Explain the role of a domain name system (DNS).
A. To institute protocols to protect the databases from external threats
B. They allow the application to interact with the database.
C. It is the technology used to create, maintain, and make information accessible. D.
Translate human-redable aliases into IP addresses
73. Brute force
A. Which two languages have traditionally been used for automation rather than software development?
B. Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? C.
Which technique uses all possible combinations of letters and numbers to crack a password?
D. Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
74. External microphone. USB flash drive.
A. Which characteristic identifies application software that is cloud-based?
B. Which port is the HDMI port on the laptop?
C. Which IT position has the responsibility of working with routers and switches? D.
Which two computer peripherals are connected to the computer through a port?
75. How does a compiler work?
A. Establishes the customer's right to use the software
B. Proprietary software has a cost whereas open-source software is free. Assessing key organizational activities.
C. Identifying risks that may occur.
D.
It requires the components of the software to be defined from the onset.
76. To aid in making strategic decisions
A. What benefit is provided by a computer network in a business?
B. Which is a characteristic of high-level languages?
C. Which is true of databases and the applications that interact with them? D.
Why is it important to ensure that data support business goals? [Show Less]