D322 knowledge checks | 75 questions and answers
Which statement describes the Network administrators are responsible for the installation
role of a network and maintenance of hardware and software that make
administrator? up a computer network.
Which statement about the The role includes both business and technical knowledge
systems analyst role is and relies on effective communication to understand
accurate? clients' requirements.
Which statement describes the Systems administrators are responsible for supporting,
role of a systems monitoring, and maintaining workplace technology and
administrator? end users.
Which role is responsible for Web administrator
maintaining websites?
Which task describes the role Integrating data from legacy systems to newer systems
of a database and playing a role in application design and
administrator? development
What is another title for a web Web server
administrator? administrator
Webmaster
Although database True
administrators have many
responsibilities, their focus is
the design, development,
and support of database
,management systems (DBMSs).
What is the primary duty of a The computer support specialist primarily operates as a trainer and
computer support specialist? troubleshooter.
Which of the following Working the help
describes a computer desk Training help-
support specialist's desk personnel
responsibilities? Overseeing help-desk personnel
Data includes raw facts or True
observations and, given
context, becomes information.
, Facts gathered from It is cold outside
observations or from a clock
that measures time are
examples of data. What is
not an example of data?
In 2013, Target, a retail store Customer names
with an online presence, Credit and debit card
experienced a security numbers Card
breach that resulted in the verification values
loss of data affecting (CVVs)
approximately 40 million
customers. If you are not
familiar with this security
breach, read more about it in
this article (opens in a new
window), then answer the
following question. Which
types of data were stolen
during the Target credit
card hack?
Most of the data stored True
today are unstructured and
include things such as text,
blogs, clickstreams, tweets, and
audio. This data is not
organized in a way that
allows for analysis.
more complex
Which statement describes the Network administrators are responsible for the installation
role of a network and maintenance of hardware and software that make
administrator? up a computer network.
Which statement about the The role includes both business and technical knowledge
systems analyst role is and relies on effective communication to understand
accurate? clients' requirements.
Which statement describes the Systems administrators are responsible for supporting,
role of a systems monitoring, and maintaining workplace technology and
administrator? end users.
Which role is responsible for Web administrator
maintaining websites?
Which task describes the role Integrating data from legacy systems to newer systems
of a database and playing a role in application design and
administrator? development
What is another title for a web Web server
administrator? administrator
Webmaster
Although database True
administrators have many
responsibilities, their focus is
the design, development,
and support of database
,management systems (DBMSs).
What is the primary duty of a The computer support specialist primarily operates as a trainer and
computer support specialist? troubleshooter.
Which of the following Working the help
describes a computer desk Training help-
support specialist's desk personnel
responsibilities? Overseeing help-desk personnel
Data includes raw facts or True
observations and, given
context, becomes information.
, Facts gathered from It is cold outside
observations or from a clock
that measures time are
examples of data. What is
not an example of data?
In 2013, Target, a retail store Customer names
with an online presence, Credit and debit card
experienced a security numbers Card
breach that resulted in the verification values
loss of data affecting (CVVs)
approximately 40 million
customers. If you are not
familiar with this security
breach, read more about it in
this article (opens in a new
window), then answer the
following question. Which
types of data were stolen
during the Target credit
card hack?
Most of the data stored True
today are unstructured and
include things such as text,
blogs, clickstreams, tweets, and
audio. This data is not
organized in a way that
allows for analysis.
more complex