Which type of computer runs a network operating system (NOS)?
A server
Which type of software is designed to easily generate Gantt
... [Show More] charts?
Project management software
What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards?
Hardware
Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts?
Database software
Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business?
End-users
What is the main purpose of a firewall?
To prevent unauthorized users from accessing the network.
A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server?
Computer System Administrator
A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using?
Local area network (LAN)
What term refers to the study, design, development, implementation, support, and management of computer-based information systems?
Information Technology
An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent?
Phishing
Each computer attached to the internet or a corporate network is uniquely identified so that it can be sent the information directed to it. What is this unique identifier known as?
Media Access Control address (MAC)
What is the most important qualification that a Chief Information Officer (CIO) must possess?
Business and leadership experience
A company has recently discovered that unauthorized users have accessed data on the company intranet. Which IT professional should investigate this concern?
Information security analyst
What do all the applications in a productivity software suite have in common?
The same graphical user interface
What is the purpose of a network switch?
To direct data to the intended target location.
Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies?
Network Administrator [Show Less]