Literacy Test 4 Chapters 11 - 15 True/False Indicate whether the sentence or statement is true or false. ____ 1. Longer passwords provide less security than shorter ones. ____ 2. Unless otherwise specified by a license agreement, users do have the right to copy, loan, borrow, rent, and in any way distribute software. ____ 3. Many businesses use spyware to limit employees’ Web access. ____ 4. The project team consists of users, the systems analyst, and other IT professionals. ____ 5. The request for system services triggers the last phase in the system development cycle: support. ____ 6. Vertical market software meets the needs of many different types of companies. ____ 7. The disadvantage of direct conversion is that it requires expensive transition costs and is a slow implementation technique. ____ 8. When a steering committee discusses the system proposal and decides which alternative to pursue, it often is deciding whether to buy packaged software from an outside source, build its own custom software, or hire an outside firm to handle some or all of its IT needs. ____ 9. Thieves often target notebook computers of company executives, so they can use the stolen computer to access confidential company information illegally. ____ 10. Backup copies should be kept in a fireproof and heatproof safe or vault, or offsite, which means in a location separate from the computer site. ____ 11. A machine-independent language runs on only one particular type of computer. ____ 12. RPG primarily is used for application development on IBM midrange computers. ____ 13. Although it lacks many of the features of the full Java language, JavaScript is a much more complex language. ____ 14. Program development is an ongoing process within system development. ____ 15. In structured design, a programmer begins with the details and then expands toward a larger, general design. ____ 16. Managers at the top two levels of an organization, including the Chief Executive Officer (CEO), mainly concern themselves with operational decisions and short-term planning. ____ 17. A decentralized approach to information technology exists when companies maintain central computers supported by a central IT department. ____ 18. Security software allows an IT department to track Web site usage and statistics. ____ 19. Transaction processing systems were among the first computerized systems that processed business data. ____ 20. Expert systems help all levels of users make decisions. ____ 21. Without computers, very few organizations could operate in today’s economy. ____ 22. Computer certification demonstrates the mastery of a skill set and knowledge base in a specific IT area. ____ 23. Certification is a form of industry self-regulation. ____ 24. At the testing centers, certification examinations are taken using computers, which process the results as a test is taken. ____ 25. An A+ certification is a hardware certification sponsored by IBM. Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ 26. A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. a. computer virus c. Trojan horse b. worm d. all of the above ____ 27. Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user _____. a. opens an infected file b. runs an infected program c. boots the computer with an infected disk in a disk drive d. all of the above ____ 28. Each character added to a password significantly _____ it might take for someone or for a hacker’s computer to guess the password. a. reduces the number of combinations and the length of time b. reduces the number of combinations but increases the length of time c. increases the number of combinations but reduces the length of time d. increases the number of combinations and the length of time ____ 29. To prevent repetitive strain injury, take all of the following precautions except _____. a. place a wrist rest between the keyboard and the edge of the desk b. use the heel of the hand as a pivot point while typing or using the mouse c. place the mouse at least six inches from the edge of the desk d. minimize the number of switches between the mouse and the keyboard ____ 30. Personal computers, display devices, and printers should comply with guidelines of the _____ program. a. ENERGY STAR c. ACCEPTABLE USE b. SECURE ELECTRONICS d. GREEN COMPUTING ____ 31. During the system development cycle, the systems analysts are the liaison between the _____. a. project team and the project leader c. users and the IT professionals b. project leader and the users d. project team and the steering committee ____ 32. A Gantt chart, developed by Henry Gantt, is a _____. a. diagram that graphically shows how actors interact with an information system b. tool that graphically shows the flow of data in a system c. bar chart that uses horizontal bars to show project phases or activities d. table that lists a variety of conditions and the actions that correspond to them ____ 33. On a data flow diagram, a _____ is drawn as a circle. a. data flow c. data store b. source d. process ____ 34. The advantage of custom software is that it _____. a. matches a company’s requirements exactly b. is less expensive and takes less time to design and implement than packaged software c. is mass produced, copyrighted, prewritten, and available for purchase d. all of the above ____ 35. The advantage of a prototype is that _____. ____ 36. ____ 37. ____ 38. ____ 39. ____ 40. ____ 41. ____ 42. ____ 43. ____ 44. ____ 45. ____ 46. ____ 47. a. users always view the prototype as an initial system, which is the result of an extensive analysis b. users can work with the system before it is completed — to make sure it meets their needs c. it always has adequate documentation d. all of the above Programmers use a variety of programming languages to write, or _____, a program. a. compile c. interpret b. code d. execute _____ is a set of technologies from Microsoft that allows almost any type of program to run on the Internet or an internal business network. a. .JIT c. .NET b. .RPG d. .VPE When programmers correct errors or add enhancements to an existing program they are said to be _____ the program. a. executing c. coding b. maintaining d. validating The _____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition is met. a. sequence control structure c. repetition control structure b. selection control structure d. compliance control structure Dead code is _____. a. the program instructions that will be converted to machine language b. any program instructions that a program executes c. the program instructions that have been converted to machine language d. any program instructions that a program never executes _____, which include(s) the highest positions in a company, focus(es) on the long-range direction of the company. a. Nonmanagement employees c. Operational management b. Middle management d. Executive management Nonmanagement employees have access to the information to make decisions that previously were made by managers — a trend called _____ users. a. farming c. empowering b. mirroring d. striping The _____ department makes technology decisions for an enterprise. a. IT c. manufacturing b. customer service d. human resources A(n) _____ identifies data outside of a normal condition. a. external report c. exception report b. detailed report d. summary report In a disaster recovery plan, the recovery plan specifies _____. a. information for simulating various levels of disasters and recording an organization’s ability to recover b. the steps to be taken immediately after a disaster strikes c. the actions to be taken to restore full information processing operations d. how a company uses backup files and equipment to resume information processing Job titles in the management area of an IT department include all of the following except _____. a. project leader c. project manager b. desktop publisher d. network administrator Leading software companies include all of the following except _____. a. Computer Associates and Macromedia c. AMD and Logitech b. Intuit and Adobe d. Sybase and Symantec ____ 48. An advantage of attending a trade school is _____ than college or university programs. a. time; students often complete trade school programs in a shorter time b. attainment; students often attain a higher degree in trade school programs c. proximity; students always attend trade schools at a closer location d. all of the above ____ 49. A primary way to keep up-do-date on industry trends and technologies and to develop new skills in the computer industry is through _____. a. professional organizations and certifications b. computer publications and Web sites c. continuing education activities d. all of the above ____ 50. IT certification can do all of the following except _____. a. enhance employees’ careers b. provide employees with added credibility among peers and employers c. increase employee salaries d. guarantee job security Literacy Test 4 Answer Section Chapters 11 - 15 TRUE/FALSE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: F F F T F F F T T T F T F T F F F F T T T T T T F DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: P P P P S S S S P S S P P P P P S S P P S P P S S REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 566 571 587 623 627 637 645 636 569 576 665 674 681 685 687 717 717 725 726 730 778 792 793 795 798 OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: 3 5 11 2 3 7 10 7 4 8 1 4 6 8 9 1 1 2 3 3 1 6 6 7 9 DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: P S P P P P S S P P S S P REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 558 559 566 588 590 623 623 632 637 642 664 671 685 OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: 2 2 3 12 12 2 3 6 7 8 1 4 8 MULTIPLE CHOICE 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: C D D B A C C D A B B C B 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: C D D C A C C B C A D D DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: S S P S S S S P S P S P REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 689 696 718 718 725 728 748 780 783 785 789 792 OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: 10 10 1 1 2 3 8 2 2 3 5 6