CIS/207T Information Systems Fundamentals

= Purchase the Entire CIS/207T Class using this button on left, or purchase Entire Weeks below.

You may purchase tutorials by the Week below.

CIS/207T WEEK 1 APPLY: QUIZ 1
CIS/207T WEEK 1 DISCUSSION: ALIGNING NEEDS WITH A COMPUTER PURCHASE
CIS/207T WEEK 1 PRACTICE: COURSE PRE-TEST

CIS/207T Week 1

 

Everything listed for Week 1 is included in purchase!! 

Get ALL Assignments for the week for one LOW Price! 

 


Learn: Lesson 1: Core Hardware Components, Peripherals, and Connectors

1.3 Illustrate the basics of computing and processing
1.5 Compare and contrast common units of
2.3 Explain the purpose of common internal computing components
2.5 Compare and contrast storage types
1.5 Compare and contrast common units of measure
2.1 Classify common types of input/output device interfaces
2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC

 

 

Learn: Computer Fundamentals: Hardware by Daniel Lachance

 

 

Apply: Activity Lab

Assessing Computer’s RAM and Virtual Memory:

Process of configuring mouse properties:

Installing an IP printer:

Connect a keyboard, mouse, and monitor to a computer:

 

Apply: Quiz 1

  1. Rebecca points at a flat square below her keyboard on her laptop. What is it?
  2. Which of the following ports was developed by Apple and is found on MacBooks?
  3. Your boss wants you to justify your suggestion to purchase solid-state hard drives. What are advantages of solid-state drives? Each correct answer represents a complete solution. Choose three.
  4. One of your friends asks you if you have any SuperSpeed devices. What type of device is she talking about?
  5. Which of the following processor types is most likely to be found in a smartphone?
  6. There are a number of discs that are used for data storage and are available in different formats with their capacity. Which of the following combinations of disk format and capacity is not correct?
  7. Which of the following uses a 240-pin connector?
  8. Robert complains that the cursor on his laptop screen often jumps around unexpectedly when he's typing. What can he do to solve the problem?
    Which type of printer uses a powdery substance to create images on paper?
    You have a color inkjet printer. What type of ink cartridge does it most likely use?
  9. Which of the following are wireless networking technologies? (Choose two.)
    Which of the following statements is true about DVI connectors?
    Your friend Joe wants to add another hard drive to his computer. What should he check to make sure that his system will support it?
  10. Which of the following connectors does not provide digital video output?
  11. Which of the following types of monitors is most likely to have a Degauss button on it?
    You have two Mac computers running macOS, and you want to connect them into a network. Which two types of connectors can help you accomplish this?
  12. Which of the following connectors provides the faster speed?
    Which of the following devices is most likely to have a joystick port on it?
  13. What is the name of the connector that you are likely to find at the end of a twisted-pair network cable?
  14. What type of connector do you plug into a modem?
    You want to install a device in your office that allows for extra storage and has built-in fault tolerance. Which device do you need?
    What is the name of the round connector that is used for keyboards and mice?
    In comparison to read only memory (ROM), which of the following is an advantage of random access memory (RAM)?
  15. In your office, you need to set up your computer for a video teleconference with another office. What peripheral do you need to make this work?
    Which slot is designed to be a direct connection between the video circuitry and the PC's memory?
  16. A user named Monika wants to upgrade the memory in her laptop. What type of memory will she need?
  17. Which of the following ports is a keyboard and mouse interface port and also known as a PS/2 port?
  18. You want to use the video connector with the best resolution. Which one should you pick?
  19. Which of the following optical discs will store the most data?
  20. Your friend discovered a joystick in a box of his brother’s items in the attic. What type of connector might this joystick have? Each correct answer represents a complete solution. Choose two.

Discussion - Aligning Needs with a Computer Purchase

Imagine you’ve agreed to help a friend decide which computer to purchase that will fit their needs of browsing the Internet, paying bills, and occasionally playing some games.
Your friend also takes a lot of family photos and videos and wants to be able to edit them on the computer.
Respond to the following in a minimum of 175 words:
• What type of computer do you recommend your friend purchases?
• Consider such items as storage space, type of processor, graphic devices, additional external devices. How will each of these recommendations support your friend’s needs?
• Explain your rationale behind your selections.

 

 

CIS/207T WEEK 2 DISCUSSION: MOBILE OPERATING SYSTEMS
CIS/207T WEEK 2 QUIZ
CIS/207T WEEK 2 APPLY: QUIZ 2
CIS/207T WEEK 2 QUIZ

CIS/207T Week 2

Everything listed for Week 2 is included in purchase!! 

Get ALL Assignments for the week for one LOW Price! 

 

Apply: Quiz 2

  1. For which of the following tasks are gaming consoles not used? Each correct answer represents a complete solution. Choose two.
  2. Which type of IoT device is used to control the temperature in a home?
  3. Which of the following would not be considered metadata for a spreadsheet file?
  4. Which of the following accurately describes what Airplane mode does on an iPhone?
  5. Peter, a friend of yours, has a piece of software that was written for macOS. Which of the following OSs will that software run on?
  6. You just deleted a shortcut to an important work presentation. What happened to the data in the presentation?
  7. Your friend recently got a new Android phone and comes over to your house. What app does your friend use to set up a Wi-Fi connection with your wireless router?
  8. Your friend Michel just purchased a Chromebook and wants to know where his files are stored. What do you tell him?
  9. Which of the following operating systems can you freely modify if you choose?
  10. How many subdirectories are you allowed to create within a single directory in an OS?
  11. You are going to purchase a new iPhone. Which operating system will be installed on it?
  12. What common computing device typically has a screen smaller than 7 inches in size?
  13. Which common computing device generally has the fastest processor and most memory?
  14. To scroll down or change a page on a mobile device, which action do you use?
  15. A program that runs on top of the OS and allows the user to issue commands is what?
  16. ____ is an open-source workstation OS
  17. The current Macintosh OS is called _____.
  18. Microsoft's workstation OS is called _______.
  19. Google's workstation OS is called ______.
  20. The default OS on an iPad or iPhone is ____
  21. Versions of the ____ OS are named after sweet treats.
  22. The first step to storing files on a hard drive is to _____ the hard drive.
  23. The two file systems typically associated with Windows are what?
  24. A(n) _____ is a pointer to a file, designed to make it easy to open.
  25. In Windows, drivers are managed in which utility?
  26. A type of display unit that uses capacitive or resistive touch as an input mechanism without requiring separate input methods.
  27. An exposed ball that functions much like an inverted mouse.
  28. The most common computer input device for entering text with buttons labeled with the characters they represent.
  29. A computer that users use to access resources, most often a client computer on a network. Usually a desktop or laptop computer.
  30. Three common gesture-based interactions for mobile devices are what?
  31. To scroll down or change a page on a mobile device, which action do you use?
  32. To zoom in our out in a map on a mobile device, which action do you use?
  33. What is the name of the sensor that allows the screen to rotate when you turn a mobile device?
  34. What is the name of the sensor that allows a mobile device to act as a compass?
  35. When rebooting a mobile device with biometric security enabled, what must you do to unlock the device?
  36. When setting up a wireless connection on a mobile device, what is the first step?
  37. When setting up a wireless connection on a mobile device, what is the step after verifying wireless capabilities?
  38. The process of connecting two Bluetooth devices together for communication is called what?
  39. Which two options can be used to back up an iPhone or iPad?
  40. What is the name of the mode that immediately disables all wireless connections on a mobile device?
  41. What does Airplane mode do on a wireless device?
  42. The name of the app store for iOS is called?
  43. What is the name of the app store for Android?
  44. What type of server is used exclusively as a server?
  45. What type of computer is used as both a server and someone's workstation?
  46. Which type of computing device is specialized to play video games?
  47. Give two examples of IoT automation devices.
  48. What type of IoT device is best suited to watch television over the Internet?
  49. Which type of common computing device will have a touchpoint built into it?
  50. What IoT device is typically used with security systems?
  51. BlackBerry devices are known for having _____ keyboards.
  52. It is a laptop-only peripheral that is basically an extension of the motherboard of a laptop.
  53. Name power supply connectors: (List 4)
  54. Types of power cords:
  55. Features of a tablet: (List 2)
  56. CPU of a computer preforms:
  57. Functions of OS: (List 4)
  58. From the hard drive's perspective, moving a file is analogous to which of the following actions?
  59. The combination of Linux-based files that gets released as a product is called what?
  60. Which of the following OSs uses the NT kernel?
  61. Rebecca wants to get a copy of the newest game she heard about for her iPad. Where should she go to find and download it?
  62. Which one of the following devices is likely to have the least amount of storage space?
  63. Fred, a co-worker, heard about new software called Oreo. To which operating system is he referring?
  64. Fred, a co-worker, heard about new software called Lollipop. Which operating system is he referring to?
  65. On which OS would you use the Ctrl+Window Switcher key to create a screen capture?
  66. Linux is defined as a __________________, which is also the core of an operating system.
  67. An Xbox One X is an example of which type of device?
  68. You just copied a file from the Work directory to the Projects directory on your Windows PC. What happened to the file on the hard drive?
  69. What are the utilities in an OS called that enable programs such as a screen reader?
  70. You need to kill a process in Windows. Which utility should you use?
  71. You need to prepare a brand-new replacement hard drive for storage. What is the first step needed to get it ready?
  72. You need to update a Windows driver for a sound card. Which utility should you use?
  73. Which of the following is not a way to open the Start menu on a Windows-based computer?
  74. With which of the following file systems can you not rename a file when it’s open?
  75. Which of the following file systems does not have built-in security?
  76. Ronnie is configuring a new iPad to receive email from the corporate email server, which supports POP3. What port number does POP3 use?
  77. When configuring your manager's new iPad, she asks you what protocol is used by the email client to send email. What do you tell her?
  78. Which port does IMAP use by itself, and which port does it use when combined with SSL security?
  79. You are configuring an email account on an Android tablet and choose the IMAP protocol. What port number does IMAP use?
  80. Francis is trying to change the settings on his iPhone. He opens the Settings app. In order to see them better, he turns his phone 90 degrees but nothing happens. What is the most likely cause?
  81. Which motion while using an iPhone allows you to zoom in on a map?
  82. Rachel is using her iPad to view pictures. She turns the iPad 90 degrees, and the image turns as well. Which sensor allowed this to happen?
  83. What is the term used that refers to connecting two Bluetooth devices together for communications?
  84. Which of the following is not a function of an operating system?
  85. Agi has an iPhone with a biometric scanner enabled. What methods can she use to unlock her phone?
  86. What term refers to having data stolen from your device via Bluetooth connection?
  87. Which of the following are the right protocol and port number for sending email from a wireless device?
  88. You are setting up a new Wi-Fi connection on your Android phone. What step do you take after turning on Wi-Fi?
  89. Using an Android phone, you want to scroll down. What do you do to accomplish this?
  90. You want a device to hold files for several users to access on a network. What type of device do you need?
  91. Which IoT device is typically paired with security systems?
  92. A pacemaker is an example of what type of IoT device?
  93. You want to enable backups of your new iPhone. Which two options do you have? (Choose two.)
  94. Sally is configuring an email account on an Android phone. Which two protocols are used to retrieve mail? (Choose two.)
  95. You need to find a new productivity app for your Android-based tablet. Where should you look?
  96. Your co-worker Ryan is setting up email on his director's new iPad. Ryan does not know the name of the SMTP server, but the iPad needs to be set up in the next 10 minutes. What advice should you give him?
  97. True or False. It is easy to manage all the data coming into an organization.
  98. True or False. Increasing amounts of external data need to be considered in making organizational decisions.
  99. True or False. Data rot refers to the quality of the data itself.
  100. True or False. There is no difference between master data and transaction data.
  101. True or False. Big Data is easy to define.
  102. True or False. Big Data has three distinct characteristics that distinguish it from traditional data.
  103. True or False. Today, large corporations are able to process big data but only at great expense.
  104. True or False. It is important for applications and data to be dependent on each other.
  105. True or False. A negative value for a student’s grade point average is an example of a data integrity problem.
  106. True or False. An entity is a person, place, thing, or event about which information is maintained.
  107. Which of the following is not a source for external data?
  108. Which of the following is not a reason why managing data is difficult over time?
  109. Which of the following are requirements under the Sarbanes-Oxley act? (check all that apply)
  110. The amount of data produced worldwide is increasing by ___% each year.
  111. What are the three distinct characteristics that distinguish big data from traditional data?
  112. _____ refers to the range of frequencies available in any communications channel.
  113. Which of the following are advantages of computer networks?
  114. The components of a local area network include which of the following?
  115. Which of the following is not a component of a local area network?
  116. A _____ connects dissimilar networks.
  117. True or False. A local area network connects two or more communicating devices in a limited geographical area.
  118. True or False. Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
  119. True or False. The network interface card typically houses the LAN’s network operating system.
  120. True or False. Wide-area networks have a large capacity, and they typically use a single communications channel.
  121. True or False. Digital signals are continuous waves that transmit information by altering the characteristics of the waves.
  122. True or False. Digital signals have two parameters: frequency and amplitude.
  123. True or False. The U.S. public telephone system was designed as an analog network to carry voice signals.
  124. True or False. Cable media use wires or cables to transmit data and information.
  125. True or False. Twisted-pair wire is the least-used form of communications wiring.
  126. True or False. Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.
  127. B2B e-commerce comprises about _____ percent of e-commerce volume.
  128. Buy-side marketplaces use _______________ auctions and are suitable for ___________.
  129. Your textbooks are examples of a _____________ for your education.
  130. _____________________ exchanges connect buyers and sellers across many industries.
  131. The goal of group purchasing in the buy-side marketplace is to ____________.
  132. The sell-side marketplace is similar to the _________ model.
  133. True or False. Buy-side marketplaces use reverse auctions.
  134. When organizations come to a company’s Web site for procurement, such business is classified as a(n):
  135. Information Systems for marketing incorporate the following functions: (check all that apply)
  136. Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)
  137. Which of the following is not a function of functional area information systems?
  138. providing information to managers in the functional areas
  139. True or False. Functional information systems support the entire enterprise or major portions of it.
  140. True or False. Exception reports show a greater level of detail than is included in routine reports.
  141. _____ reports show a greater level of detail than is included in routine reports.
  142. GM’s new service lane automation application is a type of ___________ system.
  143. ______________________ are often populated with data from source data automation technologies such as bar code scanners.
  144. Sentiment analysis extracts _________ information in source materials, which is particularly useful in __________.
  145. Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________ to classify online content as positive, negative, or neutral.
  146. The entertainment industry primarily uses sentiment analysis to improve their ______.
  147. True or False. BI encompasses applications, processes, and technology.
  148. True or False. BI can support organizational transformation.
  149. ____________ is NOT categorized as BI.
  150. ___________ is a subset of BI according to Thomas Davenport.
  151. Which of the following is NOT a requirement of TPSs?
  152. _____ reports contain special information not found in routine reports.

 

 

Discussion - Mobile Operating Systems (Includes Question and Answer)

One of the biggest debates among cell phone users is - which is the best, Apple or Android?
Respond to the following in a minimum of 175 words:

  • Declare your favorite device and share 2-3 of the best features of that brand’s mobile operating system.
  • Share how these features are an advantage over the competing mobile operating systems.
  • How do these key features support the consumer?

 

 

 

 

CIS/207T WEEK 3 DISCUSSION: SEAMLESS INTEGRATION
CIS/207T WEEK 3 APPLY: QUIZ 3
CIS/207T WEEK 3 APPLY: QUIZ 3
CIS/207T WEEK 3 QUIZ

CIS/207T Week 3

Everything listed for Week 3 is included in purchase!! 

Get ALL Assignments for the week for one LOW Price! 

 

 

Apply: Quiz 3

  1. Word processing, spreadsheets, and presentation software are examples of what?
  2. Which of the following is not an example of productivity software?
    When thinking of software compatibility, which two factors matter most? Each correct answer represents a complete solution. Choose two.
  3. Which of the following does not require users to pay for the software?
    A programmer wants to write code that directly accesses the computer’s hardware. Which is the best type of language for the programmer to use?
  4. A user calls to tell you that every time he browses the Internet, multiple browser windows keep appearing on his screen even though he has not opened them. In this scenario, what should you do to fix the problem?
  5. You visit a website that is supposed to be secure. Your web browser shows the web address in a red font, and you do not see a lock icon. What is the most likely cause of this?
  6. You are visiting a website to order a product, but you keep seeing old information that you know is outdated. Which of the following will most likely fix the problem?
  7. Looping logic makes use of which of the following statements?
    Which of the following is not generally included in a two-tier architecture model?
  8. Name two object-oriented programming languages.
  9. Which of the following statements is true regarding arrays and vectors?
  10. A developer needs to use a code designation for non-English letters. Which notational system does the developer need to use?
  11. In object-oriented programming, which of the following are integral parts of objects? Each correct answer represents a complete solution. Choose two.
  12. What type of programming language is designed to retrieve data from a database?
  13. A program shows the number 11010.11. Which data type is this?
  14. A programmer is writing a program that needs to accept an input of someone's name. What type of variable should the programmer create?
  15. Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given this scenario, what is her best course of action to use it more than 16 additional times?
  16. You need to set up software for five users on a network. They all need to have access to and edit the same Excel files. Which is the best type of software for them to use?
  17. Which of the following application delivery methods requires Internet access?
  18. In a File Explorer, from which tab can select a different view?
  19. What is the on/off flag for a file?
  20. What utility in macOS basks up user files automatically?
  21. What file property makes a search faster for content within files?
  22. What is another term used to refer to a field?
  23. Which of the following are examples of interpreted languages? Each correct answer represents a complete solution. Choose two.
  24. You have created an array that can hold 15 items, all of the integer data type. You want to add a 16th integer. Which of the following is the best approach to doing this?
  25. Which of the following types of software licenses requires the user to pay yearly?
  26. You want to visit a web page and make sure that the website does not steal any information about your identity. In that scenario, which of the following should you use?
  27. You have just plugged in a new HP printer to your Mac. You can’t find a printer driver. What should you do given the circumstances?
  28. You are trying to enter registration information into a website. When you click the Submit button, nothing happens. You try again and still nothing. What is the most likely cause of this problem?
    Which of the following programming language types is the lowest-level language?
  29. Which of the following numbers is written in hexadecimal format?
  30. Interpret the following logic. A law enforcement agency has received data indicating that there are ten current threats to public safety. What should the threat level be?
  31. Interpret the following logic. For data input on someone who is 20 years old, which category will they fall into?
  32. Which of the following terms describe concepts related to breaking code into smaller, repeatable sections? (Choose two.)
  33. Which of the following file formats indicates a program that can be run on a Macintosh computer?
  34. You have just purchased licensed software and want to install it. Which of the following are required to enter to install this software?
  35. Which file format is used on optical media, such as CD-ROMs?
  36. John purchases a single-user software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true?
  37. Which of the following image formats produces the best quality images?
  38. Mac OS X disk image files have what extension?
  39. What software is designed to let the OS talk to hardware?
  40. Which one of the following compression file extensions doesn't actually use compression?
  41. Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in this scenario?
  42. Which of the following file extensions is a worksheet created in a Microsoft spreadsheet application likely to have?
  43. You just installed an antivirus program on your laptop computer. Given a scenario in which you want to maintain proper levels of security, how often should you update the software?
  44. Which file extension is used for files that execute multiple commands from within a Windows command prompt?
  45. Your boss calls you on the phone while he is trying to install software. It is telling him that he needs a product key. Where should you tell him to look for it? (Choose two.)
  46. Which of the following is an example of a markup language?
  47. You want to understand the sequence of a program, from start to finish. Which of the following is the best to use for this purpose?
  48. Flowcharts depict which one of the following?
  49. A .ppt file is what type of file?
  50. Michael receives an email from an unknown user with a file attachment in it that has an .exe extension. What should Michael do in this situation?
    Place the different types of computer networks in size order, ranging from smallest to largest.
  51. ________ are high speed central networks to which multiple smaller networks connect.
  52. True or False. Networks enable organizations to meet rapidly changing business conditions
  53. A network that connects computing devices within the same building is
  54. A high-speed network that connects a firm’s _____ and _________ is backbone network.
  55. The following can be considered as broadband technologies (choose all that are correct):
  56. A collection of the following devices — two desktop computers, three laptops, two smart phones and a printer — can be described as a(n):
  57. True or False. A legacy IT system can be easily transferred to cloud computing.
  58. Least privilege is a concept associated with ____________.
  59. Safe harbors address the concerns associated with__________.
  60. Anonymity on the internet enhances the problems associated with__________.
  61. Web services are applications delivered over___________ that MIS professionals can select and combine through almost any device.
  62. A collection of web services constitutes a ______________.
  63. Which of the following is NOT a web service protocol?
  64. _________________describes how data should look on a web site; _________describes data being exchanged between business partners.
  65. ________________is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.
  66. ____________________is used to create the XML document that describes the tasks performed by the various web services.
  67. _______________is a registry for searching web services.
  68. True or False. Utility computing service providers charge a flat rate for the computer services they provide.
  69. True or False. The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.
  70. True or False. PCI compliance addresses reliability issues in cloud computing.
  71. True or False. HTML and XML are both used to design web pages.
  72. True or False. The traditional IT department owns their hardware, software and networks
  73. True or False. In cloud computing, multiple virtual servers can be created on a single physical server
  74. All of the following are cloud computing security issues except
  75. Which of the following is the correct order of the evolution of the modern IT infrastructure, from latest to earliest?
  76. This stage in the evolution of the modern IT infrastructure was characterized by IT personnel being the only one with access.
  77. This stage in the evolution of the modern IT infrastructure was characterized by remote job entry.
  78. This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon.
  79. This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems.
  80. Systems like ERP, CRM, and SCM were introduced in the _________ stage in the evolution of the modern IT infrastructure.
  81. This stage in the evolution of the modern IT infrastructure was characterized by sharing pools of resources over a network, usually the internet.
  82. Users began bringing their own PCs to work in the ______ to improve their _________.
  83. Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today.
  84. Enterprise computing was introduced in the _____________________.
  85. Which of the following is NOT a characteristic of cloud computing?
  86. Cloud computing _____________________, which means a customer can access needed computing resources automatically.
  87. _____________________ computing makes scalability easier.
  88. SaaS is a type of __________ computing.
  89. ______________________ is NOT a benefit of virtualization.
  90. Public clouds are ______________________.
  91. Google Drive is an example of a ___________ cloud.
  92. ________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications.
  93. A ________________ cloud is also called a corporate cloud.
  94. ____________ clouds are the least expensive.
  95. ______________ clouds are the most secure because they can be placed behind an organization’s firewall.
  96. Vertical clouds are similar to ___________.
  97. IaaS, PaaS, and SaaS shift IT from a(n) _________________ expense, which means IT is ____________ cost.
  98. _____________________________ is a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model.
  99. With ____________, the customer manages the operating system.
  100. With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking.
  101. With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking.
  102. _____________________ allows customers to both run existing applications and to develop and test new applications.
  103. With _______________, the user has no control of software beyond user configuration.
  104. With _________, the vendor manages the applications and data.
  105. Which of the following is NOT a reason cloud computing has a positive impact on employees?
  106. Cloud computing can enable companies to shift from capital expenses to operational expenses. This characterizes which of the following benefits of cloud computing?
  107. Cloud computing can enable companies to collect massive amounts of data and then use sophisticated algorithms to make sense of that data to create better products and services. This characterizes which of the following benefits of cloud computing?
  108. Which of the following is a benefit of cloud computing?
  109. Cloud computing delivers computing services ___________ on-premise computing.
  110. Scalability benefits organizations by ______________.
  111. If your IT department doesn’t want to move to cloud computing because they don’t want to learn how to manage and maintain a new system, this reflects the following cloud computing concern:
  112. When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of ________.
  113. Unlike private clouds, public clouds have a problem with ________.
  114. Moving legacy systems to the cloud is difficult.  Which of the following does NOT explain this phenomenon?
  115. Least privilege is a concept associated with ___________________.
  116. Safe harbors address the concerns associated with __________.
  117. Anonymity on the internet enhances the problems associated with _______.
  118. Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device.
  119. A collection of web services constitutes a ___________.
  120. Which of the following is NOT a web service protocol?
  121. _______ describes how data should look on a web site; ______ describes data being exchanged between business partners.
  122. __________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.
  123. __________  the XML document that describes the tasks performed by the various web services.
  124. _________ is a registry for searching web services.
  125. True or False. The stand-alone mainframe is synonymous with legacy systems.
  126. True or False. Utility computing service providers charge a flat rate for the computer services they provide.
  127. True or False. Private clouds are access through an intranet.
  128. True or False. DaaS is a type of SaaS.
  129. True or False. Cloud computing allows organizations to shift from capital expenses to operational expenses.
  130. True or False. The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.
  131. True or False. PCI compliance addresses reliability issues in cloud computing.
  132. True or False. HTML and XML are both used to design web pages.
  133. We are currently in the _____________________________________ stage in the evolution of the modern IT infrastructure.
  134. _______________ is a technology that uses software-based partitions to create multiple virtual servers on a single physical server.
  135. ______________________________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations).
  136. In the _________ ____-as-a-service model, customers rent servers, operating systems, storage, a database, software development technologies, and network capacity over the internet.
  137. IT ____________ expenses tend to be more expensive than routine IT __________ expenses.
  138. Cloud computing poses a major threat to _______________because the providers control, and thus lawfully or unlawfully monitor, the data and communication stored between the user and the host company.
  139. ___________________________ markup language is used to design the “look and feel” of a web page.

 

 

 

Discussion - Seamless Integration

You are consulting for a friend who owns a small business with about 20 employees. She is in the process of standardizing all the software her employees use. They use a lot of productivity software, specifically presentation software, spreadsheets, and word processing applications. In addition, they quite often share the files with external agencies that collaborate on work with them. Your friend wants to keep costs down, but she also wants seamless integration with her external agencies.

Respond to the following in a minimum of 175 words:

  • Which productivity software options do you advise her to choose?
  • Provide 1-2 reasons for your advice.

 

CIS/207T WK4 DISCUSSION: DATABASE MANAGEMENT
CIS/207T WEEK 4 QUIZ
CIS/207T WEEK 4 APPLY: QUIZ 4
CIS/207T WEEK 4 QUIZ

CIS/207T Week 4

Everything listed for Week 4 is included in purchase!! 

Get ALL Assignments for the week for one LOW Price! 

 


Apply: Quiz 4

  1. Kate, a database administrator, needs to add records into a database. Which command should she use?
  2. A database developer is working on generating queries. If the developer needs to ensure that the output of the query has data persistence, to where should the data be written?
  3. Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?
  4. Joe creates a database. What does he need to do next to make it usable?
  5. By definition, what is an SSID?
  6. When configuring a wireless router, which of the following should you always do? Each correct answer represents a complete solution. Choose two.
  7. George needs to remove a customer’s information completely from a table. Which command should he use?
  8. Which one of the following types of network connections can give you the highest data transfer rates?
  9. Oscar’s user account has been granted permissions to view a database. Nathan then uses the deny command in an attempt to deny Oscar the ability to view the database and applies it to a group to which Oscar belongs. Which of the following statements is true?
  10. You have a scenario where you need to disable the guest network on your wireless router. You try to login, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?
  11. On Monday, you log into your computer at work, but you are not able to access any network resources. You run "ipconfig" and see what your IP Address is 169.254.18.53. What is the most likely cause of the problem?
  12. What command would you use on a Mac to determine your TCP/IP configuration information?
  13. This question refers to the scenario at the end of the chapter, in "Configuring a Small Office Network." When connecting client computers to the network, what password do they need to enter?
  14. You are helping a friend who is opening a small tax preparation firm. She needs to set up an office network for five users. Her office will need Internet access, and because she is dealing with confidential financial information, security is a big concern. Your friend wants the tax prep agents to be able to let clients connect their wireless devices to the network. Which password should she tell the agents to give to clients?
  15. This question refers to the scenario at the end of this chapter. Your friend wants the tax prep agent to be able to let clients connect the wireless devices to the network. Which password should she tell the agents to give to clients?
  16. Which one of the following addresses is considered a private IP address?
  17. Which of the following descriptions best describes the type of structure that stores values as blobs?
  18. You have created a relational database. Which of the following elements uniquely identifies a record in the database?
  19. Which one of these connection types has the longest delay?
  20. Which of the following are activities that a hacker might attempt?
  21. Which of the following are threats to data availability? (Choose two.)
  22. What is the name of an application that appears to look like a helpful application but instead does harm to your computer?
    Someone was recently caught sifting through your company's trash looking for confidential information. What is this an example of?
    You have been asked to lead a class on preventing social engineering. What two topics should you be sure to cover? (Choose two.)
  23. You have invented a new toy that will be the most popular toy for children this year. What type of intellectual property protection should you get?
  24. You have an address book for a small business with contact information for about 100 clients. The address book is used by two people. Which solution should you use to store the data?
  25. Which of the following consists of columns and rows of numerical or text data?
  26. A user, Ann, is granted permissions to access a database. What is this an example of?
  27. A medical office needs to create a solution to manage patient records. They have about 10,000 patients and eight staff, they want to include notes from medical professionals, emails to and from patients, and images such as X-ray. What should they create?
  28. Mary, an administrator, creates a field and designates it to hold integer data. Joe, a user, tries to enter his name into the field, but it doesn’t let him save the data. What is this an example of?
  29. Peter is accessing a database using a JDBC connection. Which of the following terms best describes the type of access he is using?
  30. A school has a database with four tables, but it needs a fifth table. Which command is used to accomplish this task?
  31. Michael, an administrator, needs to add a column to an existing table. Which command should he use?
  32. Your friend Michael is setting up a wireless network and ask you which security option he should choose to make the network the most secure. What do you suggest?
  33. You need to set up a wireless network. Which standard will give you the highest speed?
  34. Your friend Barbara needs to set up an Internet connection. In this scenario, which of the following options will give her the best speed? (Choose 2)
  35. Laura, your manager, instructs you to remove a table from a database permanently. Which command should you use?
  36. Which of the following statements most accurately describes what a primary key refers to?
  37. Henry wants to understand which of his customers has purchased part number BB8. Which command should he use?
  38. An employee at your office just got married and changed their last name. Which command do you use to change their last name in the employee database?
  39. Your friend Maria asks you which router feature provides for guaranteed bandwidth. What do you tell her?
  40. True or False. Wireless computing does not really affect productivity.
  41. True or False. Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
  42. True or False. Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.
  43. True or False. Short message service allows users to send short text messages on digital cell phones. 
  44. True or False. Microwave transmissions are affected by environmental conditions such as storms.
  45. True or False. The higher the orbit of a satellite, the larger its footprint.
  46. True or False. The global positioning system is supported by GEO satellites.
  47. True or False. Radio transmissions are highly secure. 
  48. True or False. Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. 
  49. True or False. A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
  50. True or False. Big Data is the same thing as huge amounts of structured data in organizational databases.
  51. Which of the following is NOT a type of Big Data?
  52. True or False. NoSQL databases can manage more different types of data than a traditional relational database.
  53. True or False. A/B experiments are so-named because there are only two possible outcomes for each experiment.
  54. Data subject to constraints is an example of
  55. A group of logically related fields is a(n)
  56. Each _________ in a relational database is a record.
  57. True or False. One of the attributes in a record must be a primary key.
  58. True or False. Normalization typically improves processing performance.
  59. True or False. When data are normalized, attributes in the table depend on the primary key and the secondary key.
  60. True or False. A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.
  61. True or False. Organizational databases access one record at a time, where data warehouses access groups of related records.
  62. True or False. Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.
  63. True or False. Data updates in a data warehouse are performed by the MIS department, NOT the users.
  64. True or False. The MOST common source system for a company’s data warehouse is its corporate operational databases.
  65. True or False. Companies often have to clean up the data before it can be imported into the data warehouse.
  66. True or False. The ETL process is now typically called data integration.
  67. The MOST common method for storing data in a data warehouse is
  68. True or False. The IT department is solely responsible for the quality of the data in the data warehouse.
  69. True or False. Governance of a data warehouse must be a collaboration between business users and IT personnel.
  70. With Web 1.0 sites, users  _________________, whereas with Web 2.0 sites, users _________________.
  71. You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?
  72. Which of the following is not an example of Web 2.0 applications?
  73. Many companies are using ________ to capture updated product features and specifications.
  74. Which of the following statements concerning blogging is false?
  75. You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
  76. The comments of consumers in the blogosphere concerning a company’s products are called ____________________.
  77. The reliability of the content in Wikipedia, the online encyclopedia, is questionable because
  78. A Web site that combines content from other Web sites to form new content is called a(n) ______.
  79. Which of the following is not a social networking site?
  80. True or False. Over time, the customer relationship with vendors has become more personal.
  81. True or False. Today, customers are becoming increasingly powerful.
  82. True or False. The real problem with interacting with customers over the Web is that the company does not have an opportunity to make a good first impression in person.
  83. True or False. CRM systems focus on marketing to masses of people.
  84. True or False. CRM means that a company should interact with its customers as a group.
  85. True or False. Properly designed CRM systems provide a single, enterprise wide view of each customer.
  86. True or False. Tweets can be used as customer touch points.
  87. True or False. Transactional CRM systems provide interactive communication with the customer throughout the organization.
  88. True or False. For purposes of efficiency, customer data are best stored in the functional areas of the organization.
  89. You are configuring a computer to participate on a network. Which of the following are mandatory? (Choose 2)
  90. You are connecting to an email server to download email. Which of the following protocols is your computer most likely using? (Choose 2)
  91. You are implementing multi-factor security on a computer. Which of the following is not a valid factor?
    If you are concerned about confidentiality of client records, which of the following should you be on the lookout for? (Choose two.)
  92. You receive an email from your bank telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information. What is this an example of?
    Which of the following connectivity options gives you the best mobility?
  93. You are configuring a wireless router to let clients get on the Internet while using private IP Addresses. In this scenario, which of the following services do you need to make sure is enabled on the router?
  94. True or False. On a network, a user needs to access three different types of systems. However, they are required to enter their username and password only when they initially log in. Which term best explains this?
    True or False. Of your internal network connection options, which one can provide the fastest speeds?
  95. True or False. You have decided to retire to a remote mountain cabin and write books. You need an Internet connection to send material to your publisher. What is the option most likely to work for you?
  96. True or False. After you have taken a particular course, your insights on how to do well in that course would be considered to be tacit knowledge.
  97. True or False. Robots are being used in a decreasing number of everyday tasks.
  98. True or False. Process and procedures are important but not critical to the effective use of computer-based information systems.
  99. True or False. An App (Application) is a computer program designed to support a specific task?

 

 

Discussion - Database Management (Includes 3 A+ Answers!)

Transactional systems are databases that record a company’s daily transactions. Three major transactional databases include Customer Relationship Management (CRM), Human Resources Management (HRM) and Enterprise Resource Planning (ERP). The register at the check-out line in the grocery store is an example of a transactional system. The information collected in this transactional system’s database helps those in charge to decide what to keep on the shelves. The collected information also helps accounting keep track of revenue and logistics keep track of inventory.

 

Respond to the following in a minimum of 175 words:

  • Identify 1 CRM, HRM, or ERP system you interact with on a regular basis.
  • Describe the type of information that this system collects and share how the identified system contributes to the success of the business.

 

CIS/207T WK5 Discussion: CompTIA IT Fundamentals Exam
CIS/207T WK5 APPLY: POST-TEST
CIS/207T WK5 EXAM
CIS/207T WEEK 5 QUIZ

CIS/207T Week 5

Everything listed for Week 5 is included in purchase!! 

Get ALL Assignments for the week for one LOW Price! 

 


Apply: Post Test

  1. The first place to check when you have a device failure or question is where? The manufacturer's In addition to manufacturer documentation and websites, what are two external resources to check for technical help?
  2. To make sure you run consistent software backups, be sure to ______ them.
  3. What are three options for backup storage locations?
  4. After backing up data, what is the first thing you should do?
  5. When someone goes through the trash to obtain sensitive information, that is called _____.
  6. Looking at someone's computer to see sensitive information they type in or display is called what?
  7. Malware that attaches itself to an executable program and does damage to your computer is called what?
  8. A program that appears to be beneficial but is actually malware is called what?
  9. Malware that extorts those infected to pay a fee to remove the malware is called what?
  10. If you forget a password, what type of software can help you recover it?
  11. A(n) ____ is used for intellectual property protection of a logo, word, or words.
  12. A(n) ____ is used for intellectual property protection of an invention.
  13. What are four examples of integrity concerns?
  14. List examples of authentication factors.
  15. What security concept asks the question, "Who are you?"
  16. When users are assigned permissions based on job function and can't be assigned permissions based on their user account, that is known as a ______ access control model.
  17. Which security concept is responsible for tracking user actions on a system?
  18. Two ways to track user actions on a system are what?
  19. Needing to provide a password and present a smart card to log in is an example of _____ ______.
  20. The ability to enter login information once and have it transfer to other systems is called what?
  21. To harden a device, you can disable communications features such as ____ and ____.
  22. _____ is the process of scrambling the data in user files so that others cannot read them.
  23. The three types of accounts on a computer are what?
  24. The first place to check when you have a device failure or question is where?
  25. In addition to manufacturer documentation and websites, what are two external resources to check for technical help?
  26. To make sure you run consistent software backups, be sure to ______ them.
  27. What are three options for backup storage locations?
  28. After backing up data, what is the first thing you should do?
  29. Which expansion card might have its own GPU?
  30. What is the SQL command used to create queries?
  31. To protect a computer against viruses and spyware, install _______.
  32. Malware that attaches itself to an executable program and does damage to your computer is called what?
  33. Limitations put on a field in a database are called _____.
  34. _____ Wi-Fi networks are unsecure and should not be used.
  35. What settings would you configure if your web server needs to go through a secure server to access the Internet?
  36. When users are assigned permissions based on job function and can't be assigned permissions based on their user account, that is known as a ______ access control model.
  37. What type of software is not free and requires a license?
  38. The _____ service lets computers with private IP addresses get on the Internet.
  39. Columns in a relational database are also called what?
  40. The process of providing proper credentials to access a computer resource is called ______.
  41. The two file systems typically associated with Windows are what?
  42. In programming, what are the two types of data identifiers?
  43. What are the four basic functions of an OS?
  44. Which gives the greatest mobility: wired, wireless, or cellular?
  45. Which command creates a duplicate file in a new location on the hard drive?
  46. Which security concept is responsible for tracking user actions on a system?
  47. Requiring another form of identification in addition to a password in order to log in is known as what?
  48. Which backup storage location option is the fastest? Local, network, or cloud?
  49. Resources are able to be accessed when the users need them
  50. A method used to log into a system and avoid normal security methods.
  51. The optional communications pathway between the Northbridge and the cache controller. When the backside bus is absent, the cache controller communicates with the Northbridge over the
  52. Properties or characteristics of an object or file.
  53. A process by which a computer system verifies that a user has the proper credentials.
  54. A framework for defining access control that ensures the system knows who has logged on, what access that user has, and what actions the user attempted or completed.
  55. A feature that automatically populates fields in a form on a web page for you, such as your name, address, or credit card information.
  56. A TCP/IP standard used to configure IP-based hosts automatically, which are unable to reach a DHCP server using the 169.254.x.x IP address range with a subnet mask of 255.255.0.0.
  57. A process by which the operating system searches its manufacturer's website for software updates and downloads (and possibly installs) them automatically
  58. In the AAA access control model, authorization defines what actions the user is allowed to take.
  59. The process of making a copy of files and folders on a computer.
  60. A Type 1 hypervisor that sits directly on the hardware (as opposed to running within another operating system)
  61. A measure of the "normal" performance of your system or a component in the system.
  62. The basic input/output system for an IBM-based PC. It is the firmware that allows the computer to boot.
  63. Also known as base 2, it uses only the values 0 and 1.
  64. A Blu-ray disc; it's a newer optical disc format that holds more information than a standard DVD.


Discussion - CompTIA IT Fundamentals Exam

This course is aligned to CompTIA IT Fundamentals exam.
Respond to the following in a minimum of 175 words:

  • How could a CompTIA IT Fundamentals certification benefit you and your career goals?
  • How do you think employers view this type of certification?
  • If you feel this exam is for you, what additional coursework or information do you need before you take that exam?

Note: You may want to conduct an Internet search with the keywords “CompTIA IT Fundamentals certification” to learn more before answering the questions. For additional information on the exam, view the
website: https://www.comptia.org/certifications/it-fundamentals