1.Which of the following is the correct function of the compiler? - ANSWERSTranslates the entire
program, creating an executable program, which can be run at a later time.
2.A company's ability to recover after a disaster is directly related to - ANSWERS
Business continuity plan - ANSWERS
3. Learning about social engineering and how to protect passwords is ___. - ANSWERSEducation
4.The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the
query and, if more than one table contains the data of interest, how they are to be combined or joined. -
ANSWERSFROM
5.A ____________ is also known as a datasheet. - ANSWERSDatabase Table
Operations used to alter the data within a relation of a database - ANSWERSUpdate , Delete , Insert
7. Best describes the differences between memory and the hard drive - ANSWERSMemory stores
instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and
files that can be accessed at a future time.
8.In a SQL query, the __________ operation combines two tables together? - ANSWERSJOIN
9.In this network topology ALL devices have a single point-to-point connection with a central device. -
ANSWERSSTAR network
, 10.Which of the four main components of a computer is described by this statement - ANSWERSThis
component executes all of the arithmetic and logic operations and is responsible for controlling
(commanding) all of the components in the computer.: CPU
11.Which of the following would NOT require the use of a network? - ANSWERSLoading a statistical
program on your personal computer.
12.Which software is run automatically rather than by the end user? - ANSWERSSystem Software
13.In a __________ shell forward slash (/) is used to express directory paths - ANSWERSLinux
14. the three main categories of databases - ANSWERSHierarchical , Flat File, Relational
15.relevant characteristic of quality data - ANSWERSThe data used applies to the question being
answered.
16.What is the definition of business intelligence? - ANSWERSBusiness intelligence is a term used to
reflect the knowledge a business can create by analyzing data gathered from multiple sources.
17. The following is true of the IPOS cycle - ANSWERSOnce words, numbers or images are entered, a
computer processes the data into useable information that can then be accessed to answer questions or
meet specific needs.
21.What is an advantage of outsourcing - ANSWERSCost-effective if time is constrained
22.The __________________ is the electronic circuit responsible for executing computer program
instructions. - ANSWERSCentral Processing Unit
23.What is the correct order of project phase for Project Management? - ANSWERSInitiation, Planning,
Executing, Closing