Information Technology > Exam > Hinds Community College - IST 1124;IT final milestone_all answers 100% correct. (All)

Hinds Community College - IST 1124;IT final milestone_all answers 100% correct.

Document Content and Description Below

IT final milestone. You passed this Milestone 25 questions were answered correctly. 1 Which of the following can be controlled by copyright? • The team logo for a minor league baseball team ... • The slogan for a business • A new type of engine for pickup trucks • A writer’s new murder mystery on the New York Times bestsellers list 2 When Marco returned from a vacation in Hawaii, he uploaded several pictures and video clips that he took at the beach. After editing some of the pictures using photo editing software, he opened a video-maker program to edit footage. Shortly after he opened the video-maker, the program stopped responding. Which tool or method is best for Marco to use to solve this issue? • Task Manager • Help System • System Restore • Safe Mode 3 In which of the following scenarios can a trademark be applied? • Tiffany records a sequence of three musical notes that appear in every ad for a company. • Erik uploads a new reaction video to his YouTube channel. • Paige creates a gluten-free dessert recipe and posts it on her blog. • Randy designs a bracelet for his jewelry line. 4 Because a computer typically runs a variety of programs simultaneously, the role of the operating system is to ensure that all programs have access to the __________. • power supply • monitor • keyboard • CPU 5 Select the true statement about the CPU. • It permits the exchange of electrical signals between computer components. • It transfers data from the hard disk for processing. • It provides a central connection for computer components. • It executes commands sent by program software. 6 Which of the following is a best practice for maintaining a safe and healthy workstation? • Adjusting the back of the chair so that a person's lower back is supported and perpendicular to the floor • Adjusting the chair so that the user can stretch his or her legs straight out • Reaching to the left to access the keyboard • Placing the monitor screen seven inches from the face 7 ENIAC, which stands for Electronic Numerical Integrator and Computer, is an example of a __________ computer. • mini • mainframe • microprocessor • personal 8 Michiko works for a credit union. When a new employee is hired, the manager contacts Michiko to add a new user to the network and to set appropriate permissions for that user. What is Michiko's role in her organization? • Systems Administrator • Network Engineer • Programming Language Specialist • Database Administrator 9 Tyler works with a software development team at a large healthcare organization. His job is to identify the aspects of the software that must be tested, develop appropriate tests, run those tests, and evaluate the results. What is Tyler's role in the organization? • Quality Assurance • Software Project Manager • Software Developer • Analyst 10 Jeremiah searches his computer for movie files that he recently shot during his vacation in Belize. Select the set of file types that Jeremiah should look for. • .avi and .wmv • .mpg and .key • .mov and .ods • .wma and .mpg 11 __________ is a mobile application used primarily to share photos and videos with others. • LinkedIn • Instagram • QQ • Twitter 12 Kirby visited a sweepstakes website and agreed to download a new program. Later, when he tried to use a word processing program, his document files became corrupted. How can Kirby try to remove the offending program and prevent future attacks? • Kirby should use WPA network encryption. • Kirby should change the password on his computer. • Kirby should run an antivirus program. • Kirby should install a biometric reader. 13 __________, developed by OpenOffice, is an example of word processing software. • Writer • Numbers • Keynote • Impress 14 Which of the following is NOT an example of copyright infringement? • Chris posts a number of full-text articles onto his website without giving credit to the authors. • Melanie finds images that are in the public domain and submits them to a photography competition as her own work. • Eddie likes photos that were posted on a business's website, so he downloads them to his computer. • Katy uses Wi-Fi at Starbucks during her lunch break to check her email, and to turn in a book report. 15 Select the scenario that describes a bottom-up approach to data warehouse design. • Charley’s Wholesalers combines data from its produce, meat, and dry goods vendors into a single data warehouse, and distributes it among several data marts. • Hollywood Advertising combines data marts from its San Diego, Los Angeles, and San Francisco offices into a single data warehouse. • Dave’s Appliances, which has five locations in the city, combines data from each store to a single database, and distributes it to three new data marts. • Jaime’s Research Consulting Firm combines data from its clients into a central database, then shares the data with several individual contractors. 16 Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this. Which computer addiction symptom is Chip experiencing? • Neglect • Lack of control • Uncomfortable feelings • Downplaying 17 Select the file size that is the LARGEST. • 5 MB • 4 TB • 3,000 GB • 1,000,000 KB 18 Information systems consist of five components: hardware, software, data, process, and __________. • data management • people • monitors • peripherals 19 Paul wants to present information about a new product at the upcoming national sales meeting. Which productivity software should Paul use? • Microsoft Excel • OpenOffice Impress • IBM DB2 • Google Docs 20 Mel is a research scientist at a health sciences center. His job requires him to analyze large amounts of data in short periods of time. Select the best computer for Mel. • A handheld tablet computer • A desktop computer with two screens • A portable laptop computer • A desktop computer with a fast processor 21 Malouka participates in a research project for a large consumer behavior research firm. Each time she purchases items in a grocery store, she scans the barcodes of her products into an app, which sends her purchase data to the firm for analysis. Malouka is working with an example of automation known as __________. • textfill/autocorrect • advertising and marketing • billing • importing/exporting data 22 More than 70% of YouTube users are located outside the United States. This statement describes the trend known as __________. • social media growth • autonomous technology • personalization • mobilization 23 Alex establishes information-security policies for his organization, and oversees the implementation of those policies. Alex is employed as a __________. • Computer Engineer • Database Administrator • Computer Operator • Computer Programmer 24 Which of the following statements about the relationship between hardware and software is FALSE? • Application software, which does something useful, is a main category of software. • Hardware will not function without software, and software will not run without the appropriate hardware. • Computer software drives computer hardware by providing the instructions that tell the hardware what to do. • Application software runs independently of any hardware. 25 John is using __________, a software development management tool that easily integrates into his business’s enterprise software/information system. • MS Resource • Visual Studio • Primavera • Visio [Show More]

Last updated: 2 years ago

Preview 1 out of 14 pages

Add to cart

Instant download

OR

Reviews( 0 )

Recommended For You

 Information Technology> Exam > Kaperskey Exam. Questions and Answers. (All)

Kaperskey Exam. Questions and Answers.

Question 1 To deploy protection in a network, you need to install Network Agents (1), install Kaspersky Endpoint Security (2), install the Administration Server (3). Select the recommended deployme...

By Kirsch 1 year ago

Exam

$11

0  

 Information Technology> Exam > Sophia – Information Technology - Unit 3 Milestone 3,100% CORRECT (All)

Sophia – Information Technology - Unit 3 Milestone 3,100% CORRECT

The standard interface technology for wireless networks is . The hardware component necessary for computers to connect to these networks is a . • transmission control protocol; IP •...

By securegrades 1 year ago

Exam

$16

0  

 Information Technology> Exam > Sophia University CS-121 / CSCI-E121 sophia milestone 2. (All)

Sophia University CS-121 / CSCI-E121 sophia milestone 2.

Sophia University CS-121 / CSCI-E121 sophia milestone 2. 1 Katelynn and Genevieve want to make flyers to advertise their school's play. They will collaborate on the flyer document online, and remote...

By Expert1 2 years ago

Exam

$9

0  

 Information Technology> Exam > SOPHIA PATHWAY IT Unit 2 Unit 2 - Milestone 2, Complete Answers (Fall 2020) (All)

SOPHIA PATHWAY IT Unit 2 Unit 2 - Milestone 2, Complete Answers (Fall 2020)

SOPHIA PATHWAY IT Unit 2 Unit 2 - Milestone 2, Complete Answers (Fall 2020) Select the data type that can only be classified as a number. • 13:30 • $1,253.12 • 11/10/11 • 83.152 De...

By Expert1 2 years ago

Exam

$15

0  

 Information Technology> Exam > Sophia_Information And Communications Technology|Unit 4 - Milestone 4 (All)

Sophia_Information And Communications Technology|Unit 4 - Milestone 4

Sophia IT Milestone 4 unit 4 Zehra works with a software development team. One of his tasks is to define the overall structure of an application and divide it into components to be developed. What...

By Expert1 2 years ago

Exam

$13

1  

 Information Technology> Exam > Georgia Institute Of Technology - ISYE 6501Midterm Quiz 2 - GT Students and Verified MM Learners _ Midterm Quiz 2 _ ISYE6501x Courseware (All)

Georgia Institute Of Technology - ISYE 6501Midterm Quiz 2 - GT Students and Verified MM Learners _ Midterm Quiz 2 _ ISYE6501x Courseware

Midterm Quiz 2 - GT Students and Veried MM Learners 90 Minute Time Limit Instructions Work alone. Do not collaborate with or copy from anyone else. You may use any of the following resources: One...

By NBS***** 1 year ago

Exam

$6

0  

 Information Technology> Exam > Sophia University - IT 100 | Sophia Intro to IT Milestone Final. (Summer 2020) Already passed. (All)

Sophia University - IT 100 | Sophia Intro to IT Milestone Final. (Summer 2020) Already passed.

Sophia Intro to IT Milestone Final Score 24/25 1 Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software develop...

By Expert1 2 years ago

Exam

$10

1  

 Information Technology> Exam > SOPHIA PATHWAY Information Technology Unit 3 - Milestone 3. (Already Passed) 100% Correct (Fall 2020) (All)

SOPHIA PATHWAY Information Technology Unit 3 - Milestone 3. (Already Passed) 100% Correct (Fall 2020)

SOPHIA PATHWAY Information Technology Unit 3 - Milestone 3. The standard interface technology for wireless networks is __________. The hardware component necessary for computers to connect to thes...

By Expert1 2 years ago

Exam

$15

0  

 Information Technology> Exam > ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University. (All)

ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University.

ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University./ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University./ISM 3541 EXAM 1/KERWIN (LATEST) Download t...

By Rixx Dennis 1 year ago

Exam

$4

2  

 Information Technology> Exam > Examen Kaspersky Certified| Latest| Download for Grade A+ (All)

Examen Kaspersky Certified| Latest| Download for Grade A+

Question 1 What happens when the extended KSN mode is enabled? 1. When the extended KSN mode is enabled, Kaspersky Security Center switches to the KSN Proxy mode and starts caching all requests se...

By Quiz Merchant 1 year ago

Exam

$12.5

0  

Exam

$19.00

Add to cart

Instant download

OR

Can't Find what you want?

PLACE CUSTOM WRITING ORDER
103
0

Document information


Connected school, study & course



About the document


Uploaded

2 years ago

Number of pages

14

Written in

All

Type

Exam

Seller


Expert1

Member since 2 years ago

799 Documents Sold


Additional information

This document has been written for:

Course

Information Technology

Paper Category

Exam

Uploaded

2 years ago

Downloads

 0

Views

 103

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·