Ana sayfa
/
Teknoloji
/
28. __ is the term for a set of hardware , software, data, people, and procedures that work together to produce information? A) Information system B)Information literacy C) Information technology D) Information resource 29. The term for any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability? A) Digital security risk B) Cybercrime C) Malware D) Firewall movely 30 __ is the name of a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device? A) Adware B) Rootkit C) Trojan horse D)Worm 31. What is the technique of making a network or Internet transmission appear legitimate to a firewall? A) Back door B)Spoofing C)Botnet D)DoS attack 32. Which of the following technology jobs is responsible for the security of data and information stored on computers and mobile devices within an organization? A) Computer security incident responder B) Computer security specialist C) Digital forensics examiner D) Network security administrator 33. What is the name of the process of planning scheduling, and then controlling the activities during system development? A) Project management B)Feasibility assessment C) Documentation D) Data and information gathering 34. The name of the conversion strategy that involves running the old system alongside the new system for a specified time is? A) Direct conversion B)Parallel conversion C) Phased conversion D) Pilot conversion 35. What is the name of the test that verifies that all programs in an application work together properly? A) Unit test B)Systems test C) Integration test D) Acceptance test 36. The following technolog jobs writes and develops web content and website layouts so that they will appear at the beginning of search results when users search for content? A) Customer relationship management specialist B) Internet/social media marketing specialist C) Search engine optimization expert D) User experience designer 37. Which of the following is not a technology career field according to the document? A) Technology equipment B)Technology service and repair C) Technology education and training D) Technology entertainment 38. What is the difference between installed and Web-based software? a) Installed software runs on the computer, while Web-based software runs on the Internet b) Installed software is purchased in physical form while Web-based software is downloaded from the Internet. c) Installed software must be installed on the computer before it can be run, while Web-based software can be run directly from the Internet d) Installed software is always commercial software, while Web-based software is always freeware. 39. Is the name of the programmed formula that performs mathematical operations on the content of other cells in a spreadsheet? a) Function b) Formula c) Constant d) Label 40. The term for a collection of related data that is stored in a manner enabling information to be retrieved as needed? a) Database b)Spreadsheet c) Table d)Record __ of the following technology jobs uses analytics and other Big Data techniques to interpret a company's data from a variety of sources to better understand its performance , make recommendations for improvement, and predict future outcomes? A) Data scientist B) Database administrator C) Database analyst D) Web analytics expert

Soru

28. __
is the term for a set of hardware , software, data, people, and procedures that work together to
produce information?
A) Information system B)Information literacy C) Information technology D) Information resource
29. The term for any event or action that could cause a loss of or damage to a computer or mobile device
hardware, software, data, information or processing capability?
A) Digital security risk B) Cybercrime C) Malware D) Firewall
movely
30 __
is the name of a program that hides in a computer or mobile device and allows someone from a
remote location to take full control of the computer or device?
A) Adware B) Rootkit C) Trojan horse D)Worm
31. What is the technique of making a network or Internet transmission appear legitimate to a firewall?
A) Back door B)Spoofing C)Botnet D)DoS attack
32. Which of the following technology jobs is responsible for the security of data and information stored on
computers and mobile devices within an organization?
A) Computer security incident responder B) Computer security specialist C) Digital forensics examiner
D) Network security administrator
33. What is the name of the process of planning scheduling, and then controlling the activities during system
development?
A) Project management B)Feasibility assessment C) Documentation D) Data and information
gathering
34. The name of the conversion strategy that involves running the old system alongside the new system for a
specified time is?
A) Direct conversion B)Parallel conversion C) Phased conversion D) Pilot conversion
35. What is the name of the test that verifies that all programs in an application work together properly?
A) Unit test B)Systems test C) Integration test D) Acceptance test
36. The following technolog jobs writes and develops web content and website layouts so that they will
appear at the beginning of search results when users search for content?
A) Customer relationship management specialist B) Internet/social media marketing specialist
C) Search engine optimization expert D) User experience designer
37. Which of the following is not a technology career field according to the document?
A) Technology equipment B)Technology service and repair C) Technology education and training
D) Technology entertainment
38. What is the difference between installed and Web-based software?
a) Installed software runs on the computer, while Web-based software runs on the Internet
b) Installed software is purchased in physical form while Web-based software is downloaded from the
Internet.
c) Installed software must be installed on the computer before it can be run, while Web-based software
can be run directly from the Internet
d) Installed software is always commercial software, while Web-based software is always freeware.
39. Is the name of the programmed formula that performs mathematical operations on the content of other
cells in a spreadsheet?
a) Function b) Formula c) Constant d) Label
40. The term for a collection of related data that is stored in a manner enabling information to be retrieved as
needed? a) Database b)Spreadsheet c) Table d)Record
__ of the following technology jobs uses analytics and other Big Data techniques to interpret a
company's data from a variety of sources to better understand its performance , make recommendations
for improvement, and predict future outcomes?
A) Data scientist B) Database administrator C) Database analyst D) Web analytics expert

28. __ is the term for a set of hardware , software, data, people, and procedures that work together to produce information? A) Information system B)Information literacy C) Information technology D) Information resource 29. The term for any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability? A) Digital security risk B) Cybercrime C) Malware D) Firewall movely 30 __ is the name of a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device? A) Adware B) Rootkit C) Trojan horse D)Worm 31. What is the technique of making a network or Internet transmission appear legitimate to a firewall? A) Back door B)Spoofing C)Botnet D)DoS attack 32. Which of the following technology jobs is responsible for the security of data and information stored on computers and mobile devices within an organization? A) Computer security incident responder B) Computer security specialist C) Digital forensics examiner D) Network security administrator 33. What is the name of the process of planning scheduling, and then controlling the activities during system development? A) Project management B)Feasibility assessment C) Documentation D) Data and information gathering 34. The name of the conversion strategy that involves running the old system alongside the new system for a specified time is? A) Direct conversion B)Parallel conversion C) Phased conversion D) Pilot conversion 35. What is the name of the test that verifies that all programs in an application work together properly? A) Unit test B)Systems test C) Integration test D) Acceptance test 36. The following technolog jobs writes and develops web content and website layouts so that they will appear at the beginning of search results when users search for content? A) Customer relationship management specialist B) Internet/social media marketing specialist C) Search engine optimization expert D) User experience designer 37. Which of the following is not a technology career field according to the document? A) Technology equipment B)Technology service and repair C) Technology education and training D) Technology entertainment 38. What is the difference between installed and Web-based software? a) Installed software runs on the computer, while Web-based software runs on the Internet b) Installed software is purchased in physical form while Web-based software is downloaded from the Internet. c) Installed software must be installed on the computer before it can be run, while Web-based software can be run directly from the Internet d) Installed software is always commercial software, while Web-based software is always freeware. 39. Is the name of the programmed formula that performs mathematical operations on the content of other cells in a spreadsheet? a) Function b) Formula c) Constant d) Label 40. The term for a collection of related data that is stored in a manner enabling information to be retrieved as needed? a) Database b)Spreadsheet c) Table d)Record __ of the following technology jobs uses analytics and other Big Data techniques to interpret a company's data from a variety of sources to better understand its performance , make recommendations for improvement, and predict future outcomes? A) Data scientist B) Database administrator C) Database analyst D) Web analytics expert

Çözüm

4.1187 Voting
avatar
Meltem
Usta · 5 yıl öğretmeni
Uzman doğrulaması

Cevap

28. A) Information system
29. A) Digital security risk
30. B) Rootkit
31. B) Spoofing
32. B) Computer security specialist
33. A) Project management
34. B) Parallel conversion
35. C) Integration test
36. C) Search engine optimization expert
37. D) Technology entertainment
38. c) Installed software must be installed on the computer before it can be run, while Web-based software can be run directly from the Internet
39. a) Function
40. a) Database
41. A) Data scientist
Derecelendirmek için tıklayın: