Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) Milestone Final Introduction To IT Sophia

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
13-01-2022
Written in
2021/2022

Exam (elaborations) Milestone Final Introduction To IT Sophia Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams? Lean Prototyping Cascading/V-model RAD RATIONALE Prototyping is the software development methodology used by the Game Changer teams. Prototyping is a method in which a prototype (i.e., an early approximation of a final system or product) is built, tested, and reworked as necessary until an acceptable prototype is produced. The acceptable prototype is used to develop a complete system or product. CONCEPT Software Development Methodologies 2 Mark, Sean, and Jackie are members of a software development team. Mark creates the documentation that outlines requirements for the development of new software. Sean creates the system architecture, and builds software applications based on system requirements. Jackie evaluates the new software by running tests to identify bugs and other problems. What is Mark's role on the software development team? Project Manager Software Quality Assurance Milestone Final Introduction to IT Sophia Software Designer Software Analyst RATIONALE Software Analysts translate business needs and constraints into software requirements, and share the requirements with other members of the development team. CONCEPT The Software Development Team 3 Select the sign of computer addiction that indicates a lack of control. While driving his car, Mitch rear-ended another car when he was checking his social media account. Ever since his mother died, Charlie stays up late every night playing an online game. Even though she knows that she should, Jacqueline cannot stop playing her favorite online game. After moving to a new town, Sal spends most of his time online to keep his mind off the friends he misses. RATIONALE Jacqueline is experiencing a lack of control. She cannot stop playing her favorite online game, even though she understands that she should. CONCEPT Computer Addiction 4 Harriet implements policies and prevents unauthorized access to the network, and to the data stored on the network. Harriet holds the position of __________ in the organization. Database Administrator Network Administrator Computer Operator Security Administrator RATIONALE Harriet is a Security Administrator who protects the technological assets of the organization (i.e., infrastructure, systems, and data). CONCEPT IT Specialists and their Roles 5 Brad launches a program in order to see all of his files, folders, and programs in one place. Which element of the Microsoft Windows operating system is Brad using? File Explorer (formerly Windows Explorer) Windows Shell Security and Maintenance Taskbar RATIONALE Windows users can view and organize files and folders with the File Explorer application (called Windows Explorer in earlier versions of Windows). CONCEPT The Microsoft Windows Operating System 6 Information systems consist of five components: hardware, software, data, process, and __________. data management people monitors peripherals RATIONALE Information systems consist of five components: hardware, software, data, process, and people. An information system (IS) is an organized system that is used to collect, organize, store, and communicate information. It is the study of complementary networks that people and organizations use to collect, filter, process, create, and distribute data. CONCEPT Information Systems 7 Which of the following statements about the relationship between hardware and software is FALSE? Both hardware and software are needed for the computer to function effectively. Computer hardware cannot be used without an operating system. Computer hardware controls the computer's software by telling it what to do. Computer hardware can be physically touched, while computer software is intangible. RATIONALE Computer hardware does not control the computer's software. The reverse is true: the software controls the hardware and tells it what to do. The other statements are all true. Hardware is tangible, and software is intangible. Hardware and software are co-dependent: both are needed for the computer to function, and one cannot operate without the other. CONCEPT The Relationship Between Hardware and Software 8 Select the scenario that demonstrates plagiarism. Allison makes a video of herself using sound effects that she clipped from the soundtrack of a popular action movie to market her business. Summer finds a recent magazine article about an issue that she wants to discuss with her class, so she makes copies of it for the students. Joseph finds a written passage about a new idea to stop cyberbullying and pastes it into his blog entry without giving credit to its author. Dylan contributes some of his own research to an entry on Wikipedia, and includes a citation for his recent book. RATIONALE Joseph is guilty of plagiarism because he copied a written passage about a new idea to stop cyberbullying into his own blog entry without citation. It is important to cite sources when referring to the work of another. Allison could be guilty of copyright infringement because she used the soundtrack of a popular action movie without prior consent. Because she is sharing a recent article with students, Summer's actions likely fall under fair use. Dylan is not at risk for copyright infringement because he cites his own work. CONCEPT Ethical Behavior in the Digital World 9 Which of the following is a best practice for maintaining a safe and healthy workstation? Reaching to the left to access the keyboard Adjusting the chair so that the user can stretch his or her legs straight out Placing the monitor screen seven inches from the face Adjusting the back of the chair so that a person's lower back is supported and perpendicular to the floor RATIONALE Adjusting the back of the chair so that a person's back is supported and perpendicular to the floor is one of the recommended best practices to maintain a safe and healthy workstation. CONCEPT Workstation Safety 10 Which task is suitable for an automated process? Astor plans to test her software only twice. Kanta’s company requires human review to identify and correct errors. Tanya plans to modify her software, and will retest it many times. Mai's company has a limited testing budget. RATIONALE Tanya plans to modify her software, and will retest it many times. The recurrent aspect of her test plan justifies the use of automated testing, which can optimize Tanya's investments of time and effort. Due to budget concerns, a small number of tests, and the need for human review to identify errors, the other answer choices describe tasks that are better-suited for manual processes. CONCEPT The Impacts of Automation 11 Malouka participates in a research project for a large consumer behavior research firm. Each time she purchases items in a grocery store, she scans the barcodes of her products into an app, which sends her purchase data to the firm for analysis. Malouka is working with an example of automation known as __________. importing/exporting data billing advertising and marketing textfill/autocorrect RATIONALE Malouka is working with an example of automation called importing/exporting data. By scanning the barcode associated with the product she purchased, and using the mobile app, she provides the research firm with a large amount of information (e.g., product data, time, location, quantity, her age, gender, etc.). CONCEPT Process Automation and Computers 12 Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated? Principle 6: Profession Principle 7: Colleagues Principle 8: Self Principle 3: Product RATIONALE Victor violated the "Colleagues" principle of the Software Engineering Code of Ethics. According to the code, software engineers shall be fair to, and supportive of, their colleagues. Additionally, this principle includes an annotation that explicitly addresses Victor's unethical behavior: Software engineers shall fully credit the work of others, and refrain from taking undue credit. CONCEPT Professional Code of Ethics 13 Identify the statement about Windows tasks that is FALSE. The boot process is the process for powering off a computer. A common way to shut down the computer’s operating system is by using the Start menu. To launch an application, click the Windows icon, select "All Programs," and then click an application. Users log into their accounts on the Welcome screen, before Windows is ready to use. RATIONALE A common way to shut down the computer’s operating system is by using the power icon in the Start menu. Clicking on the Windows icon, and then selecting "All Programs" will launch an application. The Welcome screen prompts users to log into their accounts before accessing Windows. However, the boot process is NOT the process for powering off a computer. The boot process is used to power on a computer. CONCEPT Using the Microsoft Windows Operating System 14 Which of the following correctly describes a record? A record contains all the qualitative data in a database. A record represents a single type of information found in a database. A record is an organized collection of data associated with other data in a database. A record contains all the data about one instance of an item in a database. RATIONALE A record contains all the data about one instance of an item in a database. Each record in the database is a row from a table that has information corresponding to each field or column in the table. CONCEPT Introduction to Databases 15 Select the scenario that describes a bottom-up approach to data warehouse design. Charley’s Wholesalers combines data from its produce, meat, and dry goods vendors into a single data warehouse, and distributes it among several data marts. Dave’s Appliances, which has five locations in the city, combines data from each store to a single database, and distributes it to three new data marts. Hollywood Advertising combines data marts from its San Diego, Los Angeles, and San Francisco offices into a single data warehouse. Jaime’s Research Consulting Firm combines data from its clients into a central database, then shares the data with several individual contractors. RATIONALE Hollywood Advertising is designing a bottom-up data warehouse. Bottom-up design first builds data marts for different departments, then merges the data marts into a single data warehouse. The other answer choices use a top-down data warehouse design. Top-down design collects data from several data marts into a central database, then redistributes the data into new data marts when necessary. CONCEPT Data Warehousing 16 Which of the following components is used for data processing? Scanner USB flash drive Network interface card (NIC) Solid-state drive (SSD) RATIONALE A network interface card (NIC) is used for data processing because it enables computers to connect to a network. Flash drives and solid-state drives are used for data storage. A scanner is a peripheral input device. CONCEPT Computer Components and Roles 17 All of the following would appear as records in a database table, EXCEPT: Last Name Armstrong Information Technology Specialist Little Rock, AR RATIONALE "Armstrong", "Little Rock, AR", and "Information Technology Specialist" represent records in a database table for a specific individual. "Last Name" would be a column in the table, because it identifies the type of information that is contained in that column. CONCEPT Introduction to Databases 18 Suzi is a writer who is using her keyboard to type a story. When she saves her work, her computer issues a command and returns the results, which she checks to ensure that her work has been saved properly. The __________ in Suzi's computer is responsible for the operation sent to it by the software. keyboard CPU ROM RAM RATIONALE When Suzi clicks to save her work, this command is sent to the computer's central processing unit (CPU). The CPU manages the operations or instructions it receives from software programs. Random-access memory (RAM) and read-only memory (ROM) indicate the locations where the data is stored in the computer, but do not manage instructions sent to them by software. CONCEPT The Primary Functions of a Computer 19 Select the true statement about network protocols. Communication cannot take place unless the protocol is executed in the same way on all devices. One function of a protocol is to decompress data when it is delivered to the receiving computer. Using a protocol other than TCP/IP can result in data loss. Computers that are distributed across a large geographic area need a special protocol to resolve errors. RATIONALE A protocol is a system of rules that enables two or more entities (computer devices) in a communications system to send and receive information. Communication cannot take place unless the protocol is executed in exactly the same way on all devices. CONCEPT Introduction to Computer Networks 20 Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
January 13, 2022
Number of pages
12
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$6.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMBANK12 Harvard University
Follow You need to be logged in order to follow users or courses
Sold
81
Member since
4 year
Number of followers
73
Documents
27
Last sold
2 months ago

4.3

11 reviews

5
6
4
3
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions