What stores the program(s) being executed and the data that each program is using? CPU Motherboard Memory Bus
Memory
Susan works for a local company in Tulsa, has been asked to setup a solution to allow her project team to share files, templates, and reports. She setup a file share and must be sure the files are restricted to only the project team. What method would you recommend she use?
Susan should use permissions to restrict access
The Southern Georgia clinic is a small practice. There are just 12 employees, but they anticipate growing over the next 3 – 5 years. The IT consultant is recommending creating a network by having the PCs branch out around a hub. This is an example of what type of network topology?
Star
Which characteristic identifies application software that is cloud-based?
Provided by third-party providers
Which of the following is NOT a major components of an IT infrastructure?
Information
A collection of business computer application programs of associated functionality that share a common GUI is know as __________________?
Productivity Suite
A research company has been asked to review vaccine research to verify its authenticity. The data is sensitive and if it falls into the wrong hands, the company could face legal consequences and their public image could be tarnished. What role is responsible for implementing the security permissions to protect this data?
Network Administrator
The Southern Georgia clinic is concerned about how best to establish a barrier between their secured and controlled internal network and untrusted outside networks, such as the Internet.Which is their best option?
Firewall
The Georgia Widget Company has been growing over the last 2 years which has led for the need to find a new way to share information about their community services programs and HR benefits. Which of the following would work best for this situation?
A knowledge management system
Which two software application packages would be classified as productivity software?
Word processor
Spreadsheet program
The corner coffee shop is in trouble. Recently, customers have been posting negative reviews online and the owner of the shop needs to figure out the root cause so they can take action. The owner requested all subscribers to the coffee shop mailing list complete a survey. What process describes cataloging common themes for analysis?
Topic analytics
Robbie recently was hired as the Operations Manger for Southern Regional Hospital. After meeting with the department leaders Robbie has learned that departments within the hospital are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data. Robbie recommends using the same software in all departments. Who is responsible for designing a detailed plan to address this issue?
IT portfolio manager
__________a controlled private network that allows access to partners, vendors, and suppliers.
Extranet
A list of test grades for a student in one class is an example of ______?
Data
Which of the following refers to integrity of a dataset? Volume
Variety
Veracity
Viability
Veracity
Jay, the owner of a small accounting firm, has set a goal of increasing his business over the next year. To achieve this goal he is planning to leverage social meeting to drive customers to his website. What would be the main financial benefit of using cloud web services vs upgrading their current web server?
Pay for specific services as needed
Which level of management receive highly detailed information that is generated directly fromthetransactionprocessingsystem?
Supervisory
Dream Vacation Inc. wants to implement a tracking system of everyone who logs in and searches their listings of vacation rentals for rent, capturing information on who logs in, when, and what listing they review. Which piece of IT infrastructure should they implement to help automate this process?
A customer relationship management system
\_\_\_\_\_\_\_\_ memory is faster than RAM but has minimal storage capacity. ROM RAM Virtual Cache
Cache
___________ is defined as the necessary core activities required to operate a successful business.
Business functional behaviors
A clothing store recently is planning to use a transaction processing systems (TPS) to gather data on which products are sold andwhen they are sold, and customer information. If the TPS data is related to the store’s finances, inventory, and customers, which type of network configuration would be most appropriate for the implementation of a TPS?
Intranet
Which is NOT oneof the four main components of a network?
Operating system
The HR department has set a goal of working with IT to purchase and install a Human Resources Information System (HRIS) database this fiscal year. The IT project manager would like you to draft out how you would like the data to be organized. What have you been asked to create?
Database scheme
Within the HRIS there will be two table. One table will include current employees the other table will include terminated employees. What is needed to link these two tables together?
A foreign key that refers to the primary key in another table