Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Introduction To IT - D322 – PA Exam Question With 100% Correct Answers Introduction To IT - D322 – PA Exam Question With 100% Correct Answers
Typology: Exams
1 / 18
Which Statement Correctly Describes The Operating System? A) Allows The User To Control The Actions Of The Software, And Through The Software, To Access Hardware B) Manages Network Security And Firewall Settings C) Enables The User To Write And Compile Code D) Provides Cloud Storage Solutions Answer: A) Allows The User To Control The Actions Of The Software, And Through The Software, To Access Hardware Which Action By Application Programs Requires Support From A Networked Operating System? A) A Word Processor Generates A Report B) An Email Client Checks For New Messages C) A Photo Editor Saves An Image D) A Video Game Downloads A Patch Answer: B) An Email Client Checks For New Messages The Chief Information Officer Wants To Update The Network Server To Improve Internet Access While Also Blocking Certain Social Media Websites. What Type Of Server Will Meet This Need? A) File Server B) Proxy Server C) Web Server
D) Print Server Answer: B) Proxy Server Which Characteristic Identifies Application Software That Is Cloud-Based? A) Can Be Installed On Any Device Without Needing An Internet Connection B) Managed And Maintained By The User C) Provided By Third-Party Providers D) Requires A High Level Of Security Clearance To Access Answer: C) Provided By Third-Party Providers What Type Of Software Permits Free Temporary Use Followed By Long-Term Activation For A Fee? A) Freeware B) Open-Source Software C) Shareware D) Public Domain Software Answer: C) Shareware What Is The Purpose Of An End User License Agreement For A Commercial Software Package? A) Establishes The Software's Compatibility With Different Systems B) Establishes The Customer's Right To Use The Software C) Describes The Technical Specifications Of The Software D) Provides A Free Trial Version Of The Software Answer: B) Establishes The Customer's Right To Use The Software What Is The Difference Between Proprietary And Open-Source Software License?
A) Open-Source Software Can Be Freely Modified Whereas Proprietary Software Cannot Be Modified B) Proprietary Software Can Be Freely Modified Whereas Open-Source Software Cannot Be Modified C) Proprietary Software Is Available For Free, While Open-Source Software Requires A Fee D) Open-Source Software Is Only Available To Non-Commercial Users Answer: A) Open-Source Software Can Be Freely Modified Whereas Proprietary Software Cannot Be Modified. What Gives The Author Of A Software Package The Ability To Prevent Unauthorized Duplication For At Least 35 Years? A) A Patent B) A Copyright C) A Trademark D) A License Agreement Answer: B) A Copyright Which Two Components Are Parts Of A Central Processing Unit (CPU)? A) Storage Unit And Cache Memory B) Control Unit (CU) And Arithmetic Logic Unit (ALU) C) Hard Drive And RAM D) Sound Card And Graphics Card Answer: B) Control Unit (CU) And Arithmetic Logic Unit (ALU) An Employee Needs To Edit A Contract And Prepare A Hard Copy For The Project Team. Which Two Peripheral Devices Should Be Used? A) Keyboard And Mouse
B) Printer And Monitor C) External Hard Drive And USB Stick D) Speakers And Microphone Answer: B) Printer And Monitor Which Item Is A Storage Device? A) CPU B) Flash Drive C) Keyboard D) Monitor Answer: B) Flash Drive In Which Type Of Network Topology Is Each Networked Device Directly Connected To Every Other Networked Device? A) Bus B) Star C) Mesh D) Ring Answer: C) Mesh Which Communication Medium Should Be Used When Sending Data Transmissions From Singapore To Mexico City? A) Fiber-Optic Cables B) Radio Signals C) Satellite Signals D) Copper Wires Answer: C) Satellite Signals
What Indicates A Specific Internet Location? A) The IP Address B) The MAC Address C) The Hostname D) The DNS Name Answer: A) The IP Address Which Description Explains The Role Of A Domain Name System (DNS)? A) Translates Human-Readable Aliases Into IP Addresses B) Manages Email Routing C) Routes Data Packets Across The Internet D) Protects A Network From Malware Answer: A) Translates Human-Readable Aliases Into IP Addresses Which Part Of A Uniform Resource Locator (URL) Identifies The Location Of The Document On The Server? A) Protocol B) Resource Path ID C) Domain Name D) Port Number Answer: B) Resource Path ID Which Goal Of Information Assurance (IA) Requires That Information Is Accessible When Needed? A) Authentication B) Availability C) Confidentiality
D) Integrity Answer: B) Availability Which Technique Uses All Possible Combinations Of Letters And Numbers To Crack A Password? A) Dictionary Attack B) Brute Force C) Social Engineering D) Phishing Answer: B) Brute Force Which Is A Type Of Two-Factor Authentication? A) Password B) Smart Card C) Security Questions D) PIN Number Answer: B) Smart Card Which Is A Characteristic Of High-Level Languages? A) The Source Code Has To Be Compiled. B) The Language Directly Interacts With Hardware. C) The Program Runs Faster Than Low-Level Languages. D) It Requires No Translation To Machine Language. Answer: A) The Source Code Has To Be Compiled. How Does A Compiler Work? A) It Takes The Most Recent Instructions And Translates Them Into Machine Language. B) It Translates Line By Line During Runtime. C) It Interprets The Program Dynamically During Execution. D) It Transforms Source Code Into A Machine-Readable Binary File. Answer: D) It Transforms Source Code Into A Machine-Readable Binary File.
What Statement Is True Concerning Compiled And Interpreted Computer Language? A) A Compiler Translates An Entire Program Into An Executable Program, Which Can Be Run At A Later Time, While The Interpreter Does This Incrementally. B) A Compiler Executes Code Immediately, While An Interpreter Must Compile The Code First. C) A Compiler And An Interpreter Work The Same Way, Both Translating Code Line By Line. D) A Compiler Is Slower Than An Interpreter. Answer: A) A Compiler Translates An Entire Program Into An Executable Program, Which Can Be Run At A Later Time, While The Interpreter Does This Incrementally. Which Language Is Often Used For Rapid Prototyping And The Creation Of Guis? A) Javascript B) TCL C) Python D) C++ Answer: B) TCL Which Is True Of Databases And The Applications That Interact With Them? A) Applications Are Independent Of The Database. B) Applications Are Interdependent Of The Database. C) Applications Cannot Modify The Database. D) Applications Only Retrieve Data From The Database But Do Not Update It. Answer: B) Applications Are Interdependent Of The Database. What Is Another Term For A Formula That Outlines How To Execute A Task? A) Model B) Algorithm C) Prototype D) Blueprint
Answer: B) Algorithm What Is The Purpose Of An IT Department? A) To Control All Business Finances B) To Help The Organization Achieve Strategic Goals C) To Oversee The Human Resources Department D) To Manage The Supply Chain And Procurement Answer: B) To Help The Organization Achieve Strategic Goals What Is A Role Of The Systems Administrator? A) To Install And Maintain Network Resources B) To Manage The Company’s Finances C) To Design Software Applications D) To Create Marketing Strategies Answer: A) To Install And Maintain Network Resources Which Action Would Be Important For The IT Department To Take In Order To Help Their Business Meet The Goal Of Increased Expansion? A) Expanding The Infrastructure To Support Additional Locations B) Restricting Access To The Company's Website C) Reducing The Number Of Devices On The Network D) Implementing Stricter Security Protocols For Existing Locations Answer: A) Expanding The Infrastructure To Support Additional Locations What Step Should Be Taken By A Business When A Third-Party Solution Is Found That Will Benefit A Project? A) Contact The Group To Arrange A Demo Of Their Product B) Immediately Purchase The Solution C) Reject The Solution And Develop An Internal Alternative D) Implement The Solution Without Consulting Stakeholders Answer: A) Contact The Group To Arrange A Demo Of Their Product
Which Risk Assessment Question Is Part Of The Initiation Phase? A) Could The End Users Reject The Outcome Of The Project? B) What Will Be The Impact Of The Project On The Company's Revenue? C) How Will The Project Affect Customer Satisfaction? D) Who Will Be The Stakeholders In This Project? Answer: A) Could The End Users Reject The Outcome Of The Project? In What Phase Of A Project Does Time Estimation Occur? A) Execution B) Planning C) Initiation D) Closure Answer: B) Planning What Effect Does Scope Creep Have On A Project? A) It Decreases Unplanned Costs For The Project. B) It Results In More Efficient Resource Management. C) It Increases Unplanned Costs For The Project. D) It Leads To Faster Project Completion. Answer: C) It Increases Unplanned Costs For The Project. Which System Requirement Is An Example Of Considering User Needs In The Design Of An Information System? A) Allowing Secure Access To Customer Account Information B) Restricting Access To Internal Data Only To IT Staff C) Creating A Backup System For Data Storage D) Reducing The Cost Of Hardware For The System Answer: A) Allowing Secure Access To Customer Account Information
Which Type Of Systems Testing Includes Having The Customer Test The System In An Operational Setting To See If It Is Useful? A) Alpha Testing B) Beta Testing C) User Acceptance D) Integration Testing Answer: C) User Acceptance Which Type Of Systems Conversion Involves Starting The Conversion With A Portion Of End Users? A) Parallel Conversion B) Phased Conversion C) Pilot Conversion D) Direct Conversion Answer: C) Pilot Conversion What Are Two Necessary Elements Of Business Continuity Planning? A) Assessing Key Organizational Activities, Identifying Risks That May Occur B) Conducting User Training, Managing Hardware Resources C) Writing Marketing Strategies, Documenting User Manuals D) Reducing Operational Costs, Increasing Team Size Answer: A) Assessing Key Organizational Activities, Identifying Risks That May Occur Which Disaster Recovery Strategy Is Used To Save Information To Multiple Hard Drives At The Same Time? A) Data Mirroring B) Data Archiving C) Data Encryption D) Data Replication Answer: A) Data Mirroring
Which Action Would Support Confidentiality? A) Updating Security Software B) Encrypting Data C) Backing Up Data Regularly D) Creating An Inventory Of All Hardware Answer: B) Encrypting Data Which Regulation Governs The Actions Of A Company In The Case Of Data Records Being Compromised, Lost, Or Stolen? A) Security Breach Notification Laws B) HIPAA (Health Insurance Portability And Accountability Act) C) GDPR (General Data Protection Regulation) D) PCI-DSS (Payment Card Industry Data Security Standard) Answer: A) Security Breach Notification Laws How Can An Organization Assist Employees With The Ethical Use Of Information Technology? A) By Developing Policies For Information Usage B) By Restricting Employee Access To Technology C) By Providing Financial Incentives For Compliance D) By Hiring An External Auditor For Technology Use Answer: A) By Developing Policies For Information Usage What Is The Definition Of Information Technology (IT)? A) It Is The Technology Used To Create, Maintain, And Make Information Accessible. B) It Is The Process Of Securing Data Against Unauthorized Access. C) It Is The Management Of Hardware Devices In An Organization. D) It Is The Practice Of Managing Financial Data Within A Company. Answer: A) It Is The Technology Used To Create, Maintain, And Make Information Accessible.
Which IT Position Has The Responsibility Of Working With Routers And Switches? A) Network Administrator B) Systems Analyst C) Database Administrator D) Security Specialist Answer: A) Network Administrator In Which Generation Were Silicon Chips First Used In Computers? A) First Generation B) Second Generation C) Third Generation D) Fourth Generation Answer: C) Third Generation Which Low-Level Language Corresponds One-To-One With Assembly? A) Machine Language B) High-Level Language C) Object-Oriented Language D) Intermediate Language Answer: A) Machine Language What Is A Cloud Model That Delivers Third-Party Software Such As Email Or Games Through The Internet? A) Iaas (Infrastructure As A Service) B) Paas (Platform As A Service) C) Saas (Software As A Service) D) Daas (Data As A Service) Answer: C) Saas (Software As A Service) What Is One Of IT's Roles In Globalization? A) It Allows Companies To Restrict Access To Their Information.
B) It Facilitates Worldwide Communication And Commerce. C) It Ensures Local Compliance For Global Businesses. D) It Provides Centralized Control Of Company Operations. Answer: B) It Facilitates Worldwide Communication And Commerce. Which Category Of Computer Has An External Flat Screen Monitor, Optical Disk Drive, And A Large Capacity Hard Drive? A) Laptop B) Desktop C) Server D) Tablet Answer: B) Desktop Which Two Software Application Packages Would Be Classified As Productivity Software? A) Word Processor, Spreadsheet Program B) Image Editor, Video Editor C) Web Browser, Email Client D) Database Management System, Project Management Software Answer: A) Word Processor, Spreadsheet Program Which Two Computer Peripherals Are Connected To The Computer Through A Port? A) External Microphone, USB Flash Drive B) Wireless Keyboard, Bluetooth Mouse C) Internal Hard Drive, CPU D) External Speaker, Printer Answer: A) External Microphone, USB Flash Drive Which Term Is Defined As A Collection Of Information Used To Support Management Of An Organization? A) Database
B) Information System C) Management Information System (MIS) D) Network Answer: B) Information System A Website Logs The Timestamp, Location, And Browser Of Every Visitor. It Then Aggregates This Content Into Peak Traffic Times And Days, Minimum And Maximum Hits For Each Country And Region, And Popularity Of Certain Browsers Among Visitors. What Is The Timestamp Considered In This Scenario? A) Data B) Information C) Knowledge D) Wisdom Answer: A) Data A Departmental Manager Is Creating A Budget Estimate For The Upcoming Year. The Manager Would Like To Determine Whether The Data Will Be Available When The Decisions For The Next Year Have To Be Made. Which Characteristic Of Valuable Data Is The Manager Considering? A) Timeliness B) Accuracy C) Consistency D) Completeness Answer: A) Timeliness Which Two Are Parts Of An Information System? A) Networks, Databases B) Software, Hardware C) Data, Cloud Storage D) People, Applications Answer: A) Networks, Databases
What Is The Difference Between Processing And Storage? A) Processing Collects And Translates Data Into Useful Information, While Storage Places The Translated Data In Specific Locations. B) Processing Involves Data Entry, While Storage Handles Calculations. C) Processing Is Used For Temporary Storage, While Storage Involves Long-Term Management Of Data. D) Storage Involves Operations On Data, While Processing Is Limited To Retrieval. Answer: A) Processing Collects And Translates Data Into Useful Information, While Storage Places The Translated Data In Specific Locations. Which Is A Benefit Of Multiple Interconnected Computers (Distributed) Versus Mainframes Or Large Computers? A) Costs For Hardware Resources Are Decreased B) Performance Is Significantly Higher C) Security Risks Are Reduced D) Simpler System Maintenance Answer: A) Costs For Hardware Resources Are Decreased Which Data Type Is Used To Represent Product Order Code That Comprises Alphanumeric Characters? A) Integer B) String C) Boolean D) Date Answer: B) String Armando Is A Freelance Graphic Designer. He Has Decided To Create A Database Of The Artwork He Has Done Throughout The Years. Each Of His Pieces Of Art Is Sorted Using An Assigned Name And Number. Which Data Type Will Be Required In Order To Create His Database?
A) Integer B) Character String C) Boolean D) Date Answer: B) Character String Why Is It Important To Ensure That Data Support Business Goals? A) To Comply With Legal Regulations B) To Aid In Making Strategic Decisions C) To Increase The Storage Capacity Of The System D) To Ensure That Systems Are Secure Answer: B) To Aid In Making Strategic Decisions In Which Category Of The Data, Information, Knowledge, Wisdom (DIKW) Hierarchy Would Business Intelligence Be Located? A) Data B) Information C) Knowledge D) Wisdom Answer: C) Knowledge Which Field Must Contain A Unique Value In Order For A Relational Database Table To Function? A) Foreign Key B) Primary Key C) Index Key D) Unique Key Answer: B) Primary Key What Are The Three Main Categories Of Databases? A) Flat File, Relational, Object-Oriented
B) Flat File, Relational, Hierarchical C) Document, Relational, Distributed D) Hierarchical, Network, Object-Oriented Answer: B) Flat File, Relational, Hierarchical What Is The Database Administrator’s Role In Security? A) Designing Backup Strategies B) Managing User Access Control And Data Protection C) Writing SQL Queries For Data Extraction D) Conducting Business Intelligence Analysis Answer: B) Managing User Access Control And Data Protection What Is The Role Of Drivers In Facilitating Communication Between Applications And Databases? A) They Allow The Application To Interact With The Database. B) They Convert Data From SQL Format To Machine Code. C) They Store Data In The Database. D) They Optimize Database Queries For Performance. Answer: A) They Allow The Application To Interact With The Database. Which SQL Clause Is Used To Inform The Database Management System (DBMS) Which Tables Should Be Interrogated By The Query? A) SELECT B) WHERE C) FROM D) JOIN Answer: C) FROM