Literacy Test 4 Chapters 11 - 15

advertisement
Literacy Test 4
Chapters 11 - 15
True/False
Indicate whether the sentence or statement is true or false.
____
1. Longer passwords provide less security than shorter ones.
____
2. Unless otherwise specified by a license agreement, users do have the right to copy, loan, borrow, rent, and in
any way distribute software.
____
3. Many businesses use spyware to limit employees’ Web access.
____
4. The project team consists of users, the systems analyst, and other IT professionals.
____
5. The request for system services triggers the last phase in the system development cycle: support.
____
6. Vertical market software meets the needs of many different types of companies.
____
7. The disadvantage of direct conversion is that it requires expensive transition costs and is a slow
implementation technique.
____
8. When a steering committee discusses the system proposal and decides which alternative to pursue, it often is
deciding whether to buy packaged software from an outside source, build its own custom software, or hire an
outside firm to handle some or all of its IT needs.
____
9. Thieves often target notebook computers of company executives, so they can use the stolen computer to
access confidential company information illegally.
____ 10. Backup copies should be kept in a fireproof and heatproof safe or vault, or offsite, which means in a location
separate from the computer site.
____ 11. A machine-independent language runs on only one particular type of computer.
____ 12. RPG primarily is used for application development on IBM midrange computers.
____ 13. Although it lacks many of the features of the full Java language, JavaScript is a much more complex
language.
____ 14. Program development is an ongoing process within system development.
____ 15. In structured design, a programmer begins with the details and then expands toward a larger, general design.
____ 16. Managers at the top two levels of an organization, including the Chief Executive Officer (CEO), mainly
concern themselves with operational decisions and short-term planning.
____ 17. A decentralized approach to information technology exists when companies maintain central computers
supported by a central IT department.
____ 18. Security software allows an IT department to track Web site usage and statistics.
____ 19. Transaction processing systems were among the first computerized systems that processed business data.
____ 20. Expert systems help all levels of users make decisions.
____ 21. Without computers, very few organizations could operate in today’s economy.
____ 22. Computer certification demonstrates the mastery of a skill set and knowledge base in a specific IT area.
____ 23. Certification is a form of industry self-regulation.
____ 24. At the testing centers, certification examinations are taken using computers, which process the results as a test
is taken.
____ 25. An A+ certification is a hardware certification sponsored by IBM.
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
____ 26. A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is
triggered by a certain condition or action.
a. computer virus
c. Trojan horse
b. worm
d. all of the above
____ 27. Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user _____.
a. opens an infected file
b. runs an infected program
c. boots the computer with an infected disk in a disk drive
d. all of the above
____ 28. Each character added to a password significantly _____ it might take for someone or for a hacker’s computer
to guess the password.
a. reduces the number of combinations and the length of time
b. reduces the number of combinations but increases the length of time
c. increases the number of combinations but reduces the length of time
d. increases the number of combinations and the length of time
____ 29. To prevent repetitive strain injury, take all of the following precautions except _____.
a. place a wrist rest between the keyboard and the edge of the desk
b. use the heel of the hand as a pivot point while typing or using the mouse
c. place the mouse at least six inches from the edge of the desk
d. minimize the number of switches between the mouse and the keyboard
____ 30. Personal computers, display devices, and printers should comply with guidelines of the _____ program.
a. ENERGY STAR
c. ACCEPTABLE USE
b. SECURE ELECTRONICS
d. GREEN COMPUTING
____ 31. During the system development cycle, the systems analysts are the liaison between the _____.
a. project team and the project leader
c. users and the IT professionals
b. project leader and the users
d. project team and the steering committee
____ 32. A Gantt chart, developed by Henry Gantt, is a _____.
a. diagram that graphically shows how actors interact with an information system
b. tool that graphically shows the flow of data in a system
c. bar chart that uses horizontal bars to show project phases or activities
d. table that lists a variety of conditions and the actions that correspond to them
____ 33. On a data flow diagram, a _____ is drawn as a circle.
a. data flow
c. data store
b. source
d. process
____ 34. The advantage of custom software is that it _____.
a. matches a company’s requirements exactly
b. is less expensive and takes less time to design and implement than packaged software
c. is mass produced, copyrighted, prewritten, and available for purchase
d. all of the above
____ 35. The advantage of a prototype is that _____.
____ 36.
____ 37.
____ 38.
____ 39.
____ 40.
____ 41.
____ 42.
____ 43.
____ 44.
____ 45.
____ 46.
____ 47.
a. users always view the prototype as an initial system, which is the result of an extensive
analysis
b. users can work with the system before it is completed — to make sure it meets their needs
c. it always has adequate documentation
d. all of the above
Programmers use a variety of programming languages to write, or _____, a program.
a. compile
c. interpret
b. code
d. execute
_____ is a set of technologies from Microsoft that allows almost any type of program to run on the Internet or
an internal business network.
a. .JIT
c. .NET
b. .RPG
d. .VPE
When programmers correct errors or add enhancements to an existing program they are said to be _____ the
program.
a. executing
c. coding
b. maintaining
d. validating
The _____ enables a program to perform one or more actions repeatedly as a loop as long as a certain
condition is met.
a. sequence control structure
c. repetition control structure
b. selection control structure
d. compliance control structure
Dead code is _____.
a. the program instructions that will be converted to machine language
b. any program instructions that a program executes
c. the program instructions that have been converted to machine language
d. any program instructions that a program never executes
_____, which include(s) the highest positions in a company, focus(es) on the long-range direction of the
company.
a. Nonmanagement employees
c. Operational management
b. Middle management
d. Executive management
Nonmanagement employees have access to the information to make decisions that previously were made by
managers — a trend called _____ users.
a. farming
c. empowering
b. mirroring
d. striping
The _____ department makes technology decisions for an enterprise.
a. IT
c. manufacturing
b. customer service
d. human resources
A(n) _____ identifies data outside of a normal condition.
a. external report
c. exception report
b. detailed report
d. summary report
In a disaster recovery plan, the recovery plan specifies _____.
a. information for simulating various levels of disasters and recording an organization’s
ability to recover
b. the steps to be taken immediately after a disaster strikes
c. the actions to be taken to restore full information processing operations
d. how a company uses backup files and equipment to resume information processing
Job titles in the management area of an IT department include all of the following except _____.
a. project leader
c. project manager
b. desktop publisher
d. network administrator
Leading software companies include all of the following except _____.
a. Computer Associates and Macromedia
c. AMD and Logitech
b. Intuit and Adobe
d. Sybase and Symantec
____ 48. An advantage of attending a trade school is _____ than college or university programs.
a. time; students often complete trade school programs in a shorter time
b. attainment; students often attain a higher degree in trade school programs
c. proximity; students always attend trade schools at a closer location
d. all of the above
____ 49. A primary way to keep up-do-date on industry trends and technologies and to develop new skills in the
computer industry is through _____.
a. professional organizations and certifications
b. computer publications and Web sites
c. continuing education activities
d. all of the above
____ 50. IT certification can do all of the following except _____.
a. enhance employees’ careers
b. provide employees with added credibility among peers and employers
c. increase employee salaries
d. guarantee job security
Literacy Test 4
Answer Section
Chapters 11 - 15
TRUE/FALSE
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
F
F
F
T
F
F
F
T
T
T
F
T
F
T
F
F
F
F
T
T
T
T
T
T
F
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
P
P
P
P
S
S
S
S
P
S
S
P
P
P
P
P
S
S
P
P
S
P
P
S
S
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
566
571
587
623
627
637
645
636
569
576
665
674
681
685
687
717
717
725
726
730
778
792
793
795
798
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
3
5
11
2
3
7
10
7
4
8
1
4
6
8
9
1
1
2
3
3
1
6
6
7
9
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
P
S
P
P
P
P
S
S
P
P
S
S
P
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
558
559
566
588
590
623
623
632
637
642
664
671
685
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
2
2
3
12
12
2
3
6
7
8
1
4
8
MULTIPLE CHOICE
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
C
D
D
B
A
C
C
D
A
B
B
C
B
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
C
D
D
C
A
C
C
B
C
A
D
D
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
S
S
P
S
S
S
S
P
S
P
S
P
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
689
696
718
718
725
728
748
780
783
785
789
792
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
10
10
1
1
2
3
8
2
2
3
5
6
Download