deck_17074759 Flashcards

(33 cards)

1
Q

What is the primary benefit of IoT in everyday life?
a. Reducing the number of connected devices
b. Increasing the number of manual processes
c. Automating processes and improving efficiency
d. Limiting internet access to specific devices

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is one of the primary benefits of AI?
a. Job description
b. Enhances precision
c. Privacy concerns
d. Dependence

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three certifications that make up the COMPTIA trifecta?
a. A+,B+,C+,D+
b. A+, Network+, Security+
c. Core 100, Core 200, Core 300
d. ISDS 411, ISDS 454, ISDS 402

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of the benefits of using a virtual machine?
a. Slower deployment times
b. Ability to run multiple operating systems simultaneously
c. Increased hardware costs
d. Limited scalability

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a type of cloud computing service?
a. SaaS
b. PaaS
c. IaaS
d. DNS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What classifies a device as IOT?
a. It has sensors/ software/ the ability to connect to a system
b. Costs over $100
c. It is a very user friendly device

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are improper ways of working with data as it relates to information pollution?
a. Writing illegible, complicated code
b. Not organizing or cleansing data
c. Allowing duplication and redundancy in data sets
d. All of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three main parts of machine learning algorithms?
a. Linear Regression, Logistics Regression, Decision Trees
b. Robotics, Neutral Networks, Deep Learning
c. Decision Process, Error Function, Optimization Process
d. Supervised Learning, Unsupervised Learning, Semi-supervised Learning

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is automation?
a. The process of performing tasks manually without the use of technology
b. The use of technology to perform tasks with minimal human intervention
c. A method of increasing the workforce by hiring more employees
d. The practice of outsourcing tasks to external companies for efficiency

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four types of NoSQL databases?
a. Graph-oriented, key-value, columnless, relational
b. Documented, key-oriented, graphical , wide-column
c. Graph, wide-column, key-value, document-oriented
d. Object-oriented, keyless-value, SQL, graphical

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common type of cyber threat?
a. Fishing
b. Phishing
C. Hacking
D. Spam

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When was the term “Big Data” coined?
a. 2005
b. 1805
c. 2055
d. 1929

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the most basic form of analytics?
    a. Descriptive Analytics
    b. Prescriptive Analytics
    c. Predictive Analytics
    d. None of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Cybersecurity career deals with breaking into your own systems to find vulnerabilities?
a. Compliance Analyst
b. Ethical Hacker
c. Risk Analyst
d. Incident Response Analyst

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All of the following are examples of cyberattacks except:
a. Credential Theft
b. Distributed Denial-Of-Service (DDOS
c. Disaster Recovery
d. Cryptojacking

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which industry is currently seeing the highest growth in digital entrepreneurship?
a. Travel
b. E-commerce
c. Real Estate
d. Traditional Retail

17
Q

What is the main difference between a White-Hat and Black-Hat Hacker?
a. Black-hat hackers are good and White-Hats are malicious
b. Black-hat hackers are authorized and White-Hats are not
c. Black-Hat hackers are not authorized and White-Hats are
d. They wear different colored hats

18
Q

What might someone choose to pursue an IT certification instead of a bachelor degree
a. It takes less time to complete
b. It is more cost-effective.
c. It provide specialized, hands-on skills
d. All of the above

19
Q

What is NOT the benefit of project time management?
a. Ensures timely project completion
b. Helps manage project control
c. Controlled budgets
d. Lack of oversight

20
Q

Which of the following is an example of a cloud computing service?
a. Microsoft Word
b. Google Drive
c. Calculator app on your phone
d. Photoshop ( installed on your computer)

21
Q

How does Bitcoin differ from traditional government-issued currencies?

A) Bitcoin is centralized and controlled by a government.
B) Bitcoin is decentralized, meaning it is not controlled by a central authority.
C) Bitcoin can only be used in specific countries.
D) Bitcoin has a fixed supply determined by the government.

22
Q

What is one key benefit of obtaining IT certifications?

A) Demonstrating verified skills to potential employers.
B) Increasing your social media presence.
C) Gaining access to exclusive online forums.
D) Guaranteeing a higher salary regardless of experience.

23
Q

Which of the following is a common sign of IT addiction?

A) Neglecting daily responsibilities.
B) Regularly completing all tasks on time.
C) Engaging in outdoor activities.
D) Setting strict time limits for device use.

24
Q

What is a recommended strategy to manage IT addiction?

A) Set specific time limits for device use.
B) Increase the number of devices you use.
C) Use devices while doing other tasks.
D) Avoid talking about technology with others.

25
Who was the appointed chairman of the FCC who effectively killed Net Neutrality in 2017? A) Tom Wheeler B) Ajit Pai C) Julius Genachowski D) Michael Powell
B
26
Which of the following is a common sign of information technology addiction? A. Using information technology for less than one hour a day B. Feeling anxious or irritable when not using information technology. C. Using information technology only for educational purposes D. Having no interest in using information technology
B
27
How are cloud computing products/services delivered? A. Over the internet B. Through land C. Through water D. Through Ba-sing-se
A
28
IT addiction can be defined as which of the following? A) The excessive and compulsive use of the internet or online activities that lead to negative consequences in various aspects of an individual's life. B) Regular and balanced use of technology for work and leisure. C) The occasional use of social media for entertainment. D) Engaging in online activities for educational purposes only
A
29
What are the qualities of a strong password? A) At least 12 characters long B) A mix of uppercase and lowercase letters, numbers, and special characters C) Not easily guessable (e.g., not using personal information) D) All of the above
D
30
Which physical health issue is commonly linked to IT addiction? A) Eye strain B) Improved vision C) Enhanced flexibility D) Increased stamina
A
31
What is the main goal of data integration in BI systems? A) To store data in multiple locations B) To bring data from carious sources into a central location for a unified view C) To delete redundant data D) To separate data from different departments
B
32
What does CIA stand for in the context of information security? a. Confidentiality, Integrity, Availability b. Confidentiality, Information Assurance, Access c. Control, Integrity, Availability d. Compliance, Integrity, Access
A
33
What is Information Technology? A) The development, implementation, and maintenance of computer hardware and software systems to organize and communicate information electronically: IT. B) The use of paper to manage, process, protect, and exchange information. C) The use of people to manage, process, protect, and exchange information. D) The use of money to manage, process, protect, and exchange information.
A