Filters
Question type

Study Flashcards

​Which of the following is not an example of an Information Technology Law?


A) ​United States Copyright Act
B) ​The Espionage Act of 1917
C) ​Digital Millennium Copyright Act
D) ​Children's Internet Protection Act

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

​Which of the following options offer self-study training to career-minded individuals who might not have the time or means to complete a traditional degree program?


A) ​Badge
B) ​Nanodegree
C) ​Certificate
D) ​none of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

​___________ is the obligation not to disclose willingly any information that should be kept private.

Correct Answer

verifed

verified

​Which of the following job descriptions best matches that of a systems analyst?


A) ​Analyzes a computer system's vulnerability to threats from viruses, worms, unauthorized access, and physical damage.
B) ​Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services.
C) ​Plans, installs, and maintains one or more local area networks and may also manage cloud resources.
D) ​Troubleshoots hardware and software problems. Good interpersonal skills and patience are required for this job.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

​Samuel Morse developed and patented a telegraph system.

A) True
B) False

Correct Answer

verifed

verified

​An information _________ degree programs focus on computer equipment and software used by businesses.

Correct Answer

verifed

verified

The dot-com bubble occurred between the years 2008 and 2010.​

A) True
B) False

Correct Answer

verifed

verified

​Early computers that held both programs and data in memory became known as ________ architecture.

Correct Answer

verifed

verified

​With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.

Correct Answer

verifed

verified

​A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals.

Correct Answer

verifed

verified

​A manual calculator implements algorithms autonomously.

A) True
B) False

Correct Answer

verifed

verified

​A calculation is based on a(n) ___________-the step-by-step process by which numbers are manipulated.

Correct Answer

verifed

verified

​Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States.

A) True
B) False

Correct Answer

verifed

verified

​Which of the following descriptions best matches that of computer engineering degree?


A) ​Focuses on computer architecture and how to program computers to make them work effectively and efficiently.
B) ​Focuses on applying computers to business problems.
C) ​Focuses on computer equipment and software used by businesses.
D) ​Focuses on the design of computer hardware and peripheral devices, often at the chip level.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

​The Atanasoff-Berry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.

A) True
B) False

Correct Answer

verifed

verified

​The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?


A) ​Provide identity management and trust support services
B) ​Provide disruptive technologies
C) ​Provide incident management capabilities
D) ​Provide Internet routing, access, and communications services

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

​What generation of cell phone technology was the first to offer true mobile broadband?


A) ​1G
B) ​2G
C) ​3G
D) ​4G

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

​Apple released the first Apple Macintosh computer in what year? ___________

Correct Answer

verifed

verified

​A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.

Correct Answer

verifed

verified

The growth of the ICT industry has a generally upward trend.​

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 117

Related Exams

Show Answer