IT101 Information Technology -
Cumulative Final Exam Q&A
3D Model Wiz is a new computer modeling software that is available for purchase online and
through major software retailers. Marty buys a group license for 10 users for his graphics team.
What type of software is 3D Model Wiz?
Select one:
a. shareware
b. open source
c. regulatory
d. proprietary - ANS-d
\A company with more than how many employees should consider building their own dedicated
IT department rather than outsourcing?
Select one:
a. 250
b. 125
c. 25
d. 75 - ANS-*Marked Wrong. Not C or D*
\As an IT professional, you notice that mobile computing is rising in importance within our daily
lives. What is your first priority after witnessing this trend?
Select one:
a. Troubleshoot potential technical problems to make the system more efficient for both system
admins and users.
b. Learn more about the technology and advocate for its wide adoption if you feel it offers
closure for the looming digital divide.
c. Evaluate how this type of technology will disrupt current business practices, and be prepared
to capitalize on emerging opportunities.
d. Conceptualize how this technology can be harnessed for the greater good and get your
organization to help lead the way. - ANS-c
\Choose the following sentence that uses the correct terminology.
Select one:
a. Our node contains eight segments (3 PCs, 3 Macs, 1 printer, and 1 router), and these
segments are divided into two networks that are each bounded by a hub (a router).
b. Our network contains eight hubs (3 PCs, 3 Macs, 1 printer, and 1 router), and these hubs are
divided into two nodes that are each bounded by a segment (a router).
c. Our network contains eight nodes (3 PCs, 3 Macs, 1 printer, and 1 router), and these nodes
are divided into two segments that are each bounded by a hub (a router).
d. Our node contains eight networks (3 PCs, 3 Macs, 1 printer, and 1 router), and these
networks are divided into two segments that are each bounded by a hub (a router). - ANS-c
\Due to protocols prevalent at the time of its development, which one of the following protocols
could be substituted for HTTP in a standard URL?
, Select one:
a. gopher
b. hound
c. UL1991
d. NT7320 - ANS-a
\Information is pulled up in a database program and displayed on the monitor. Which of the
following operations best defines this scenario?
Select one:
a. input
b. output
c. storage
d. processing - ANS-b
\Linda is an IT professional in charge of file protection, password management, and providing
documentation and training to computer users. Which of the following job titles most accurately
fits Linda's job?
Select one:
a. network administrator
b. database administrator
c. personnel administrator
d. system administrator - ANS-d
\Linux is a free operating system based on code that is readily available to developers who may
enhance or alter it to produce their own software. What type of software is Linux?
Select one:
a. open source
b. free source
c. freeware
d. proprietary - ANS-a
\On a Windows-based machine, which command would you use in order to scan for unusual
port activity?
Select one:
a. netscan-por
b. port.exe
c. netstat-ano
d. portnet.scan - ANS-c
\Sheena writes some code for a project her company is developing. She decides to use this
code as a foundation for a personal project as well. This decision would fall best under which of
the following ethical issues?
Select one:
a. privacy
b. control
c. security
d. ownership - ANS-d
\Storage media are often considered to fill a secondary role in addition to their namesake. What
is this secondary role?
Cumulative Final Exam Q&A
3D Model Wiz is a new computer modeling software that is available for purchase online and
through major software retailers. Marty buys a group license for 10 users for his graphics team.
What type of software is 3D Model Wiz?
Select one:
a. shareware
b. open source
c. regulatory
d. proprietary - ANS-d
\A company with more than how many employees should consider building their own dedicated
IT department rather than outsourcing?
Select one:
a. 250
b. 125
c. 25
d. 75 - ANS-*Marked Wrong. Not C or D*
\As an IT professional, you notice that mobile computing is rising in importance within our daily
lives. What is your first priority after witnessing this trend?
Select one:
a. Troubleshoot potential technical problems to make the system more efficient for both system
admins and users.
b. Learn more about the technology and advocate for its wide adoption if you feel it offers
closure for the looming digital divide.
c. Evaluate how this type of technology will disrupt current business practices, and be prepared
to capitalize on emerging opportunities.
d. Conceptualize how this technology can be harnessed for the greater good and get your
organization to help lead the way. - ANS-c
\Choose the following sentence that uses the correct terminology.
Select one:
a. Our node contains eight segments (3 PCs, 3 Macs, 1 printer, and 1 router), and these
segments are divided into two networks that are each bounded by a hub (a router).
b. Our network contains eight hubs (3 PCs, 3 Macs, 1 printer, and 1 router), and these hubs are
divided into two nodes that are each bounded by a segment (a router).
c. Our network contains eight nodes (3 PCs, 3 Macs, 1 printer, and 1 router), and these nodes
are divided into two segments that are each bounded by a hub (a router).
d. Our node contains eight networks (3 PCs, 3 Macs, 1 printer, and 1 router), and these
networks are divided into two segments that are each bounded by a hub (a router). - ANS-c
\Due to protocols prevalent at the time of its development, which one of the following protocols
could be substituted for HTTP in a standard URL?
, Select one:
a. gopher
b. hound
c. UL1991
d. NT7320 - ANS-a
\Information is pulled up in a database program and displayed on the monitor. Which of the
following operations best defines this scenario?
Select one:
a. input
b. output
c. storage
d. processing - ANS-b
\Linda is an IT professional in charge of file protection, password management, and providing
documentation and training to computer users. Which of the following job titles most accurately
fits Linda's job?
Select one:
a. network administrator
b. database administrator
c. personnel administrator
d. system administrator - ANS-d
\Linux is a free operating system based on code that is readily available to developers who may
enhance or alter it to produce their own software. What type of software is Linux?
Select one:
a. open source
b. free source
c. freeware
d. proprietary - ANS-a
\On a Windows-based machine, which command would you use in order to scan for unusual
port activity?
Select one:
a. netscan-por
b. port.exe
c. netstat-ano
d. portnet.scan - ANS-c
\Sheena writes some code for a project her company is developing. She decides to use this
code as a foundation for a personal project as well. This decision would fall best under which of
the following ethical issues?
Select one:
a. privacy
b. control
c. security
d. ownership - ANS-d
\Storage media are often considered to fill a secondary role in addition to their namesake. What
is this secondary role?