Study Plan Flashcards

(55 cards)

1
Q

What role investigates business problems and create information systems to provide solutions?

A

Systems Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What role is responsible for installing, administering, and troubleshooting network security issues?

A

Security Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ________ contains the operating system components that perform the basic functions required by the computer installation.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provides services, such as website hosting and routing, for other devices?

A

The server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Project Management frameworks ensures that projects are well defined with what?

A

Clear attainable goals AND
Resources in place for successful completion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What client is responsible for licensing the operating system and managing back-end networking?

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which network topology best handles downed links without losing connectivity between devices?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a business continuity plan?

A

To enable an organization to continue offering critical services in the event of disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two roles of firewalls?

A

Block outgoing messages to specified destinations AND
Block incoming messages from untrustworthy sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which data management tool deals with analyzing specific categories of historical information and making decisions based on that information?

A

Data and business intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What role is responsible for supporting, monitoring, and maintaining workplace technology and end users?

A

Systems Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of plan specifies how the business will keep providing products and services and generate revenue after an event?

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of systems testing includes having developers test internal structures of software?

A

White-box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the name, address, and account balance of each individual patient in Mei’s office known as?

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP addresses are traditionally written in ________ notation.

A

Dotted Decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role integrates data from legacy systems to newer systems and plays a role in application design and development?

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the collection of names, addresses, and account balances of all the patients of Mei’s office more technically known as?

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where are the basic functions of the operating system located?

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mei and her team analyze the needs of the users of their new software application.
Which phase of the software development life cycle does this describe?

A

Requirements Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the tool used to encode a document while focusing on appearance known as?

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What includes the protocol, domain, and all subdomains, as well as the resource path ID and the name of the document?

A

The URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

As a new sales manager, Edgar is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Edgar working?

A

Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In what phase of the SDLC does the architect think about the components that they would need to solve the problem or implement the plan?

24
Q

What are the three pars of the URL?

A

Host Name
Protocol
TLD

25
In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released.
Beta
26
What are two other titles for a web administrator?
Webmaster Web Server Administrator
27
The advantage of a _________ network topology is that it is reliable because each node is connected directly to other devices. Because devices connect to other devices, you'll experience little to no problems caused by data traffic.
Mesh
28
Which device receives a message, examines its destination IP address, and sends the message on to the next location in the network (could also be called a gateway)?
Router
29
30
What are the 5 criteria for determining storage? All Cats Enjoy Good Snacks
Accessibility Cost Environment Geographic Area Security
31
What defines thousands of integrated circuits on a single chip?
Microprocessor
32
What defines mini transistors on a silicon chip called semi conductors?
Integrated Circuits
33
What years represent the first generation of computers?
1946-1959
34
What years represent the second generation of computers?
1959-1965
35
What years represent the third generation of computers?
1965-1971
36
What years represent the fourth generation of computers?
1971-currrent
37
This topology connects all devices to a single line of communication. There is a single point of failure if this communication line fails
Bus topology
38
Topology that connects devices to a central hub or switch. If the hub fails, the entire network goes down.
Star topology
39
Topology where each device connects to two other devices as a peer. W break between peers will break the communication in the network.
Ring topology
40
Topology that connects every device in a network to every other device. Best redundancy.
Mesh topology
41
Device that extends the range of cabling types so connections can be made by increasing the strength of the network signal.
Repeaters
42
Device that connects to different types of networks and provide management of the message.
Bridges
43
Device used to reduce network traffic by management of network messages. Only sends one message to a specific destination.
Switch
44
This device makes the internet possible; also known as a gateway. Manages the network traffic by having a table of known devices.
Router
45
Does not combine or connect networks. Converts incoming analog data into digital, and outgoing digital data into analog.
Modem
46
Security tool that blocks outgoing messages with certain destination addresses; or blocks messages from untrustworthy sources. Acts like a security guard at a gate.
Firewall
47
Security tool that acts as an intermediary between a client and a server to shield the client from adverse actions of the server. Hides and protects your identity, this tool talks for you so you are not directly at risk.
Proxy Server
48
Security tool that monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively mitigate unwanted occurrences. Acts as a network detective.
Network Auditing Software
49
Security took that detects and removes known viruses from the network. Protects against malware and other threats by scanning and removing harmful code.
Antivirus software
50
What documents are included in the planning phase of the project management life cycle?
Scope statement Work breakdown structure Milestones Communication plan Risk management plan
51
What marks the beginning of the execution phase within the project management life cycle?
A kickoff meeting
52
What are the 3 broad categories of risk?
Risk in execution Risk in integration Risk of the unknown
53
This layer of the DBMS communicates with the end user and can be fairly complex, handling user interactions. Consists of programs and services within a server that queries the database on behalf of the client.
Application Layer
54
DBMS layer that manages the actual storage, retrieval, and organization of data in the database.
Database Management Layer
55
What 3 documents are included in the initiation phase of the project management life cycle?
Business case Feasibility study Project charter