Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Introduction-to-IT Questions and Answers

Question # 6

A person is updating procedures for handling integer data within a database. Which value is an example of this data type?

A.

An approximation of pi as 3.14159

B.

A single keystroke from a standard keyboard

C.

The number of baseball games in a season

D.

Whether a bank account does or does not have money in it

Full Access
Question # 7

What type of database uses parent-child relationships?

A.

Embedded

B.

Flat file

C.

Family file

D.

Hierarchical

Full Access
Question # 8

What is one purpose of business continuity planning?

A.

Outlining a regular schedule for preventive maintenance

B.

Creating consistency in ethical policies throughout a company

C.

Helping define how to resume services after a disruption

D.

Eliminating downtime for nonessential system services

Full Access
Question # 9

Which statement describes machine language?

A.

Code that can be run one line at a time

B.

Code commands that directly access registers

C.

Code expressed in the binary system

D.

Computer code that humans can understand

Full Access
Question # 10

Which generation of computing is associated with integrated circuits?

A.

Fifth

B.

Third

C.

Fourth

D.

Second

Full Access
Question # 11

How can the organizational culture support ethical guidelines?

A.

By outlining the protocols to support security and privacy of data

B.

By creating the system requirements for computers in the organization

C.

By creating the government regulations that apply to the organization

D.

By outlining the roles of IT specialists in the organization

Full Access
Question # 12

Which item information should be stored in a database to determine a student's previous academic year's course load?

A.

Course level

B.

Course grade

C.

Course identification number

D.

Course name

Full Access
Question # 13

Which statement best describes the purpose of a business intelligence (BI) system?

A.

A BI system integrates all departments in an organization.

B.

A BI system helps the strategic decision-making process.

C.

A BI system allows access to raw data.

D.

A BI system uses only proprietary data to maximize quality.

Full Access
Question # 14

What is the role of professional associations regarding ethics standards in the IT profession?

A.

To provide valuable ethical guidelines to IT professionals as they perform their work

B.

To address ethical expectations for all IT professionals as the industry-wide Association of IT Professionals (AITP)

C.

To engage in the development, adoption, and use of globally-accepted, industry-leading practices for all IT professionals

D.

To provide licensing and accreditation of IT professionals

Full Access
Question # 15

When would a business intelligence (BI) system be useful in making a decision?

A.

When deciding whether to promote an employee by looking at their annual sales performance

B.

When figuring out when to reorder store inventory for a particular stock keeping unit (SKU)

C.

When deciding if a restaurant should use more organic food in its menu, based on customer reviews and an analysis of current costs

D.

When determining the average salary of the company's executives

Full Access
Question # 16

What is the component of the data-information-knowledge-wisdom DIKW hierarchy that focuses on application?

A.

Data

B.

Wisdom

C.

Information

D.

Knowledge

Full Access
Question # 17

What is a function of a proxy server?

A.

It responds to HTTP requests and can execute scripts to generate dynamic pages.

B.

It responds to user queries to create, manipulate, and retrieve records from a database.

C.

It acts as a giant cache of web pages that anyone in the organization has recently retrieved.

D.

It stores files that any user of the network may wish to access.

Full Access
Question # 18

Which component comes in two varieties, one that mechanically writes binary data onto spinning magnetic disks and one that writes data with no mechanical parts?

A.

Motherboard

B.

System clock

C.

Expansion bus

D.

Hard drive

Full Access
Question # 19

Which method is frequently used to protect software?

A.

Copyrights

B.

GNU General Public License

C.

Fair use

D.

Trademarks

Full Access
Question # 20

What is the name of the wireless technology that specifically accommodates distances up to 300 feet?

A.

Wi-Fi

B.

Wide area network WAN

C.

Near field communication NFC

D.

Bluetooth

Full Access
Question # 21

What is a role of the network architect?

A.

Installing and maintaining hardware and software that makes up a computer network

B.

Accounting for the installation and maintenance of the resources on the networks

C.

Designing networks that meet the performance and capacity needs of an organization

D.

Managing application development, deployment and system security of networked file systems

Full Access
Question # 22

Which generation of computing is known for the use of operating systems to allow for shared memory and resources?

A.

Second

B.

Third

C.

Fourth

D.

Fifth

Full Access
Question # 23

Which software allows the user to easily access the hardware of a computer?

A.

Application

B.

Productivity

C.

Operating system

D.

FTP client

Full Access
Question # 24

There are 30 questions on a final exam. The exam will be given in room 126 at 2:00 p.m., and students have one hour to complete it. What is the data-information-knowledge-wisdom DIKW pyramid component exemplified by the statement, "I have completed 25 questions, so I am almost done"?

A.

Wisdom

B.

Information

C.

Data

D.

Knowledge

Full Access
Question # 25

Based on the instructions on the package, a frozen pizza should be baked for 18 minutes at 400°F. Which term describes the statement, "The pizza looks done after 16 minutes, so it should be taken out," based on the data-information-knowledge-wisdom DIKW hierarchy?

A.

Information

B.

Data

C.

Wisdom

D.

Knowledge

Full Access
Question # 26

Which type of off-site storage is an empty shell that can be used for operations in the event of a natural disaster or terrorist attack?

A.

Icy site

B.

Warm site

C.

Cold site

D.

Hot site

Full Access
Question # 27

What is a characteristic of cloud computing?

A.

Cloud computing provides services ranging from simple storage to load balancingfor large-scale computational processing.

B.

Cloud computing requires client computers to download specific software.

C.

Cloud computing increases investments in IT in order to meet increasing IT demands.

D.

Cloud computing increases the need for internal IT personnel.

Full Access
Question # 28

A company uses the most up-to-date operating system developed by Microsoft for a desktop computer on its internal network. Which system software does this company's computer use?

A.

Linux

B.

Android

C.

Windows

D.

iOS

Full Access
Question # 29

A person is preparing a pizza, which needs to be baked for 18 minutes at 400°F. Which component of the data-information-knowledge-wisdom DIKW hierarchy is exemplified by the value 18 in this scenario?

A.

Knowledge

B.

Wisdom

C.

Information

D.

Data

Full Access
Question # 30

What is the hardware component that contains soldered parts and slots for other pieces of hardware that can be removed?

A.

Motherboard

B.

Hard drive

C.

System clock

D.

Expansion bus

Full Access
Question # 31

What does a modem do?

A.

Manages traffic by maintaining a table of known devices on the network

B.

Provides services, such as website hosting and routing, for various devices

C.

Serves as a connection between the customer network and the internet service provider

D.

Provides a barrier between a trusted private network and an untrusted network

Full Access
Question # 32

Which data type should be used to calculate 90% of the retail price of an item?

A.

Boolean

B.

Floating-point

C.

Auto-number

D.

String

Full Access
Question # 33

What is the arrangement of network devices in a mesh topology?

A.

All devices are connected to a single central device.

B.

Devices are connected to a common communication line.

C.

Every device is connected to every other device.

D.

Every device is connected to exactly two other devices.

Full Access
Question # 34

Which computing term describes a collection of hardware and software components that work together to meet the needs of the user?

A.

A hard drive

B.

An operating system

C.

A computer system

D.

A motherboard

Full Access
Question # 35

Why is business continuity planning essential?

A.

It ensures that the company will avoid asset loss.

B.

It allows for succession planning.

C.

It allows for the quickest return to business operations.

D.

It ensures that the company will be profitable.

Full Access
Question # 36

What are two roles of the Internet in the business ecosystem?

Choose 2 answers

A.

Connecting remote employees and offices across wide distances

B.

Allowing software to be purchased by one user and shared across the company

C.

Marketing of products and services

D.

Increasing information control and security

Full Access
Question # 37

In which generafion of computers were vacuam tubes used as one of the hardware components?

A.

First

B.

Second

C.

Third

D.

Fourth

Full Access
Question # 38

Which image represents the basic structure of a computer network?

A.

Exhibit A

B.

Exhibit B

C.

Exhibit C

D.

Exhibit D

Full Access
Question # 39

What type of software utilizes a commercial software license?

A.

Proprietary

B.

Shareware

C.

Public Domain

D.

Open Source

Full Access
Question # 40

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

A.

A desktop has more memory.

B.

A desktop has more internal storage.

C.

A handheld has more internal storage.

D.

A handheld has more memory.

Full Access
Question # 41

Which type of network is used to connect wireless headphones to a smartphone?

A.

Personal area network PAN

B.

Local area network LAN

C.

Wide area network WAN

D.

Extended area network EAN

Full Access