WGU C182 – Flashcards
Unlock all answers in this set
Unlock answersquestion
Which risk assessment question is part of the Initiation Phase?
answer
Could the end user reject the outcome of the project?
question
Planning
answer
In what phase of the project does estimation occur?
question
Initiation Phase #
answer
Phase 1 of 4 in planning
question
Planning Phase #
answer
Phase 2 of 4 in planning
question
Executing & Controlling Phase #
answer
Phase 3 of 4 in planning
question
Closing Phase #
answer
Phase 4 of 4 in planning
question
Initiation key elements
answer
Problem definition, resource allocation and risk assessment
question
Planning key elements
answer
Determine objectives and activities, organize the activities, and estimate time and cost required to successfully complete the project
question
Executing & Controlling key elements
answer
Ensuring that the project is progressing properly and may involve hiring or training personnel, purchase hardware, and developing, testing, and deploying a product or service
question
Closing key elements
answer
Once all deliverables are met, a project is considered closed. May include a final report detailing the processes strengths and successes and obstacles that were encountered
question
Why is it important to ensure that data support business goals?
answer
To aid in making strategic decisions
question
Data type needed to order names and numbers in a database
answer
String data
question
What effect does scope creep have on a project?
answer
In increases unplanned costs for the project
question
Scope Creep
answer
Additional features are needed or could be beneficial which can impact the allocation of resources (i.e., time and capital), and put the project at risk
question
In which category of the DIKW hierarchy would BI be located?
answer
Knowledge
question
DIKW
answer
Describes the transition for data, information, knowledge to wisdom
question
D in DIKW
answer
Data, inputs directly received by a computer
question
I in DIKW
answer
Information, transform data into a useful form (using algebraic laws)
question
K in DIKW
answer
Knowledge, is gained experience from using information (knowing which algebraic laws to use in a given situation)
question
W in DIKW
answer
Wisdom, social setting to knowledge or the understanding of "why". Wisdom is the ultimate goal for a human in that it improves the person's ability to function in the modern world and to make informed decisions that take into account beliefs and values.
question
Which system requirement is an example of considering user needs in the design of an information system?
answer
Allowing easy access to customer account information
question
Which field must contain a unique value in order for a relational database table to function?
answer
Primary key
question
N-Tier
answer
Indicate that the number of tiers a system will be broken down into will vary between different software development projects. In typical n-tier development projects, the tiers are divided between the presentation tier, the logic tier, and the data tier
question
Presentation N-Tier
answer
User interface is developed
question
Logic N-Tier
answer
Where the system performs its logic processing
question
Data N-Tier
answer
Where data is stored, retrieved, and updated from database tables
question
Benefit of separating database from application?
answer
Data can change without the need to change the application, scale more easy, removes the need for users to interact directly with data
question
How does a compiler work?
answer
It takes the most recent instructions and translated them into machine language
question
What is the characteristic of high-level languages?
answer
Language translator programs are required
question
Which is a type of two-factor authentication?
answer
Biometrics
question
End users assisted by developers; systems tested with simulated data
answer
Alpha testing
question
End user test the system in operational setting to see if it's useful
answer
User Acceptance
question
End user tests the system without help from developers; using actual data
answer
Beta testing
question
SDLC
answer
Software Development Life Cycle
question
SDLC aka
answer
Staircase or most referred to as waterfall
question
Preliminary Investigation Step #
answer
Step 1 in SDLC
question
Analysis Step #
answer
Step 2 in SDLC
question
Logical Design Step #
answer
Step 3 in SDLC
question
Physical Design Step #
answer
Step 4 in SDLC
question
Implementation Step #
answer
Step 5 in SDLC
question
Maintenance Step #
answer
Step 6 in SDLC
question
SDLC - Preliminary Investigation
answer
Problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology
question
SDLC - Analysis
answer
Determine user requirements for new system and develop logical system models (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes)
question
SDLC - Logical Design
answer
Models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step
question
SDLC - Physical Design
answer
Logical models converted but are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system
question
SDLC - Implementation
answer
Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users
question
SDLC - Maintenance
answer
Modifications or corrections to the system are made
question
Three main categories of a database?
answer
Flat file, relational and hierarchical
question
Flat file
answer
One large single table without the relations between tables that a relational format provides
question
Relational Database
answer
Multiple tables (relations) with interrelated fields
question
Hierarchical Databases
answer
Organizes data using a tree-like or organizational chart type structure (the child can only have one parent)
question
MVC stands for?
answer
Model-View-Controller
question
What is MVC?
answer
Software development technique used in the implementation of user interfaces which include the model, the view and the controller
question
Model in MVC
answer
Software logic, business rules and application data
question
View in MVC
answer
User interface (i.e.; colors, fields...ect)
question
Controller in MVC
answer
Communication between the user and the model
question
Which component facilitates communication between the other two components in the MVC architecture model?
answer
View
question
Types of system conversion (SDLC)
answer
Direct, Parallel, Pilot, Phased
question
Direct Conversion
answer
The old system is "turned off" and the new system is "turned on" at a specific date and time
question
Parallel Conversion
answer
Period of time in which both systems (the old and the new) are operating concurrently
question
Pilot Conversion
answer
Starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization
question
Phased Conversion
answer
Deploys a subset of the system first, rather than deploying the whole system at once
question
Which type of system conversion involves starting the conversion with a portion of the end users?
answer
Pilot
question
What is the database administrator's role in security?
answer
To eliminate data redundancy when integrating old with new systems
question
Administrator
answer
Someone who is in charge of some portion of the IT infrastructure
question
System Administrator
answer
Process of maintaining the operating system of a computer system (including network of computers)
question
Network Administrator
answer
Physically laying down cable, making connections, working with hardware (for instance, routers and switches) and configure the individual machines to be able to communicate via the network
question
Database Administrator
answer
Design, development, support, installation, maintenance, performance analysis, and troubleshooting
question
Difference between compiler and interpreter
answer
Translates an entire program into executable, which can be run at a later time, while other does it incrementally
question
Which data communication medium is used over very long distances?
answer
Radio signals since cable is too expensive
question
Most common form of network connection used today?
answer
UTP (Un-shielded Twisted [wire] Pair) and fiber optic cables
question
Coaxial Cable & UTP have in common?
answer
Transmit information using electromagnetic waves
question
Fiber Optic
answer
Transmit information using light pulses
question
Radio signals
answer
Sent via radio towers, cell phone towers, and bounced off of satellites in orbit
question
Types of network topographies
answer
Bus, Star, Mesh and Ring
question
Bus Network
answer
Connected through a "T" connected along a single cable (simplest and most common)
question
Star Network
answer
Connected to a central device, such as a hub or switch
question
Mesh Network
answer
Connected directly to every other device in the network
question
Ring Network
answer
Connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached
question
Which item is a storage device?
answer
Flash Drive
question
Heat Sink
answer
Motherboard component helps to cool the CPU
question
Two necessary elements of business continuity planning
answer
Identifying risks that may occur and ensuring continuity in the sequence of staffing schedules
question
Real Time Data
answer
Data is gathered as soon as it's available
question
Event-Driven Data
answer
Responds to preset conditions
question
Batch
answer
Data accepted as a set of records and processed as a unit
question
Languages used for automation vs software development
answer
COBOL & C++
question
High Level Languages (write programs)
answer
BASIC, C, C++, Java and Python
question
Types of programming language classes
answer
Assembly languages, high-level compiled languages, and high-level interpreted languages
question
Types of language translators
answer
Assembler for Assembly, Compiler for high-level, and Interpreter for high-level interpreted languages
question
Shareware Software
answer
Software permits free temporary use followed by long-term activation fee
question
Proprietary Software
answer
Purchased from a vendor (software house)
question
What 3 things are received with purchasing proprietary software?
answer
1) Executable 2) License to use (not yours to own) 3) Helpful resources like manuals or technical support
question
Freeware Software
answer
Software that has become obsolete because a newer software has replaced it, or is software that the original producer (whether an individual or a company) no longer wishes to maintain and provide support for. You are bound by some agreements when you install it, but otherwise you are free to use it as if you purchased it
question
Public Domain Software
answer
Software that has been moved into the public domain. Like freeware, this is software that no one wishes to make money off of or support. Anything found in the public domain can be used however you feel; no one is claiming any rights for it
question
Open Source Software
answer
Made freely available as source code. You may obtain the software for free; you may enhance the software; you may distribute the software. However, you have to abide by the copyright (copyleft) provided with the software - must remain free (good faith)
question
Application the is cloud-based
answer
Is provided by servers in the internal business network
question
Proxy Server
answer
Used to route internet access including blocking of sites
question
Linux
answer
Can run on both servers and workstations
question
Requires support from an operating system
answer
Internet browser displays a web page
question
Operating System
answer
Allows the user to control actions of the software, and through the software, to access hardware
question
One computer will request information from another and will respond with requested info
answer
Client-Server
question
Each computer is roughly equal to others
answer
Peer-to-Peer
question
Software emulator program that permits a computer user to use multiple computers and platforms without the expense of purchasing multiple computers
answer
Virtual Machine
question
Which disaster recovery strategy is used to save information to multiple hard drives at the same time?
answer
Data Mirroring
question
Purpose of an IT dept
answer
Helps the organization achieve strategic goals
question
True of databases and applications that interact with them
answer
They are independent
question
IP Address
answer
Indicates a specific internet location
question
Purpose of End User License Agreement
answer
Establish customer's right to use the software
question
What action supports confidentiality?
answer
Updating security software
question
Algorithm
answer
Formula that outlines how to execute a task
question
DNS (Domain Name System)
answer
Translates human-readable aliases into IP's
question
Security Breach Notification Law
answer
Since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both un-encrypted and compromised
question
Privacy Act of 1974
answer
The earliest piece of legislation that pertains to the collection and usage of personal data, this act limits actions of the federal government by blocking disclosure of data without consent of the person the data pertains to. Also, agencies must publicly make available the data they are collecting, the reason for the collection, and the ability for any individual to consult the data collected on them to ensure its integrity
question
The Family Educational Rights and Privacy Act of 1974 (FERPA)
answer
Gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization
question
Electronic Communication Privacy Act of 1986
answer
Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping)
question
Computer Matching and Privacy Protection Act of 1988
answer
Amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases. Without this act, one agency could potentially access data from other agencies to build a profile on a particular individual.
question
Drivers Privacy Protection Act of 1994
answer
Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs)
question
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
answer
Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition). Needs individual's consent
question
Digital Millennium Copyright Act of 1998 (DMCA)
answer
Implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer
question
Digital Signature and Electronic Authentication Law of 1998 (SEAL)
answer
Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures. This was followed 2 years later with the Electronic Signatures in Global and National Commerce Act.
question
Role of driver between application and database
answer
Allow ODBC to be used for interactions with database and applications
question
Protocol
answer
Part of Uniform Resource Locator (URL) that identifies the location of the document on a server
question
URL
answer
Uniform Resource Locator
question
Patent
answer
Gives author of software unauthorized duplication for 35 years
question
Parts of information system
answer
Databases & Networks
question
IT's role in globalization
answer
Allows companies to reach wider customer base
question
Allows software to be used through the internet
answer
SaaS
question
Low-level language corresponds one-to-one with assembly
answer
Translator language
question
How can organizations assist employees with the ethical use of information technology?
answer
Developing policies for information usage
question
IAS
answer
Information Assurance & Security
question
Information Assurance & Security (AIS)
answer
The IAS model combines the three components of IT—communications, hardware, and software—with the information utilized by the three components. Focusing on how information is used, IAS prescribes three goals, commonly referred to as CIA: confidentiality, integrity, and availability
question
Confidentiality (AIS)
answer
Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users
question
Integrity (AIS)
answer
Requires that data are correct. This requires at a minimum three different efforts. First, data gathering must include a component that ensures the accuracy of the collected data. Second, data must be entered into the system accurately. Third, and most importantly, data modification must be tracked
question
Availability (AIS)
answer
Requires that information is available when needed
question
Difference between processing and storage
answer
Processing involves temporary information, while storage involves permanent information
question
Writes laws dealing with information technology
answer
Outside the role of IT
question
Find Data Type = Customer Janet Jones
answer
String
question
Find Data Type = Date of order: 10/11/13
answer
Date
question
Find Data Type = Product ordered (code): 10357924
answer
String
question
Find Data Type = Price of the product: $14.75
answer
Floating-point
question
Find Data Type = Shipping status: Shipped
answer
Boolean
question
Packet Sniffing
answer
Technique that uses all possible combinations of letters and numbers to crack a password
question
Dictionary Attack
answer
Uses all words in the dictionary to break a password
question
Benefit of computer network
answer
Cost for hardware decreases
question
In which generation were silicon chips first used in computers?
answer
Third
question
Definition of information technology
answer
System of dependent parts working separately to accomplish information goals