Package deal
PURDUE CNIT TESTS COMPILATION BUNDLE
PURDUE CNIT TESTS COMPILATION BUNDLE
[Show more]PURDUE CNIT TESTS COMPILATION BUNDLE
[Show more]Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. 
 
A. enterprise applications 
B. network operating systems (NOS) 
C. operating applications 
D. legacy systems correct answer: Answer: A 
 
Over 40 years ago,...
Preview 4 out of 64 pages
Add to cartExamples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. 
 
A. enterprise applications 
B. network operating systems (NOS) 
C. operating applications 
D. legacy systems correct answer: Answer: A 
 
Over 40 years ago,...
3x sold
If you wanted to add new features to Linux, would you be able to legally publish those changes? 
a. Yes, because Linux is open source 
b. Yes, because Linux is free software 
c. No, because the original Linux is owned by someone else 
d. No, because Linux is copyrighted 
e. None of the above correct...
Preview 2 out of 15 pages
Add to cartIf you wanted to add new features to Linux, would you be able to legally publish those changes? 
a. Yes, because Linux is open source 
b. Yes, because Linux is free software 
c. No, because the original Linux is owned by someone else 
d. No, because Linux is copyrighted 
e. None of the above correct...
1. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. correct answer: A. enterprise applications 
 
2. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would ...
Preview 3 out of 21 pages
Add to cart1. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. correct answer: A. enterprise applications 
 
2. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would ...
1x sold
T/F A Packet Filter is hardware that limits connectivity correct answer: F (Software) 
 
Packet filters block _______ and ______ traffic correct answer: ingress, egress 
 
Packet filters use ____ based filtering correct answer: rule 
 
Packet filter rules are combined into ________ correct answer...
Preview 3 out of 22 pages
Add to cartT/F A Packet Filter is hardware that limits connectivity correct answer: F (Software) 
 
Packet filters block _______ and ______ traffic correct answer: ingress, egress 
 
Packet filters use ____ based filtering correct answer: rule 
 
Packet filter rules are combined into ________ correct answer...
T/F: 192.168.1.IN-ADDR.ARPA is the typical name of the reverse address zone for the 192.168.1.0/24 network. correct answer: False 
 
T/F: ICANN is responsible for creating top-level domains. correct answer: True 
 
T/F: Best practice is to use your Internet DNS domain for your Active Directory. co...
Preview 2 out of 10 pages
Add to cartT/F: 192.168.1.IN-ADDR.ARPA is the typical name of the reverse address zone for the 192.168.1.0/24 network. correct answer: False 
 
T/F: ICANN is responsible for creating top-level domains. correct answer: True 
 
T/F: Best practice is to use your Internet DNS domain for your Active Directory. co...
In data and process modeling, a ____ model shows what the system must do, regardless of how it will be implemented physically. correct answer: Logical Model 
 
A ___ shows how a system transforms input data into useful information correct answer: DFD 
 
A ___ process is a process that has no input...
Preview 2 out of 9 pages
Add to cartIn data and process modeling, a ____ model shows what the system must do, regardless of how it will be implemented physically. correct answer: Logical Model 
 
A ___ shows how a system transforms input data into useful information correct answer: DFD 
 
A ___ process is a process that has no input...
When project initiation begin? correct answer: When someone in the organization identifies some 
business need and value that can be gained from 
using IT 
 
Project sponsor correct answer: Primary point of contact for the project 
 
Business need correct answer: Reason prompting the project 
 
B...
Preview 2 out of 9 pages
Add to cartWhen project initiation begin? correct answer: When someone in the organization identifies some 
business need and value that can be gained from 
using IT 
 
Project sponsor correct answer: Primary point of contact for the project 
 
Business need correct answer: Reason prompting the project 
 
B...
Virtualization correct answer: running multiple systems simultaneously on one physical computer 
 
System Virtualization correct answer: The process of emulating hardware so it can 
be made available to multiple logical systems 
 
True or False: Each system is independent of all others correct ans...
Preview 3 out of 20 pages
Add to cartVirtualization correct answer: running multiple systems simultaneously on one physical computer 
 
System Virtualization correct answer: The process of emulating hardware so it can 
be made available to multiple logical systems 
 
True or False: Each system is independent of all others correct ans...
1x sold
if you know how to administer one flavor of unix you know how to administer them all. TRUE or FALSE correct answer: False 
 
where input to the application is sourced correct answer: stdin 
 
where output from the application is sourced correct answer: stdout 
 
where error messages are sent corr...
Preview 2 out of 10 pages
Add to cartif you know how to administer one flavor of unix you know how to administer them all. TRUE or FALSE correct answer: False 
 
where input to the application is sourced correct answer: stdin 
 
where output from the application is sourced correct answer: stdout 
 
where error messages are sent corr...
1x sold
A Primary Key having the fewest number of attributes to make it unique is called. correct answer: Minimization 
 
If the child entity requires the primary key of the parent entity for its unique identity, then you create ______. correct answer: Identifying Relationship 
 
If each child record has ...
Preview 2 out of 11 pages
Add to cartA Primary Key having the fewest number of attributes to make it unique is called. correct answer: Minimization 
 
If the child entity requires the primary key of the parent entity for its unique identity, then you create ______. correct answer: Identifying Relationship 
 
If each child record has ...
OpenVAS Report Sections correct answer: Summary, Vulnerability detection result, Impact, Solution, Affected software/OS, Vulnerability insight, Vulnerability detection method, Product detection result, References 
 
OpenVAS Predefined Scan Profiles correct answer: Discover, Full & Fast, Full & Fas...
Preview 3 out of 24 pages
Add to cartOpenVAS Report Sections correct answer: Summary, Vulnerability detection result, Impact, Solution, Affected software/OS, Vulnerability insight, Vulnerability detection method, Product detection result, References 
 
OpenVAS Predefined Scan Profiles correct answer: Discover, Full & Fast, Full & Fas...
_____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information correct answer: Information Technology 
 
Moore's Law predicts computer processing power would double about every _____ correct answer: 2 years (24 months) 
 
When pla...
Preview 2 out of 10 pages
Add to cart_____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information correct answer: Information Technology 
 
Moore's Law predicts computer processing power would double about every _____ correct answer: 2 years (24 months) 
 
When pla...
____ is a widely used method of visualizing and documenting an information system. 
 
A. UML 
B. Java 
C. UNIX correct answer: A. UML 
 
An object has certain ____, like the make, model, and color of a car. 
 
A. keys 
B. attributes 
C. indices 
D. packets correct answer: B. Attributes 
 
An objec...
Preview 3 out of 21 pages
Add to cart____ is a widely used method of visualizing and documenting an information system. 
 
A. UML 
B. Java 
C. UNIX correct answer: A. UML 
 
An object has certain ____, like the make, model, and color of a car. 
 
A. keys 
B. attributes 
C. indices 
D. packets correct answer: B. Attributes 
 
An objec...
How has technology influenced crime and society correct answer: 1. Lessens social interaction 
 
2. Lowers Inhibitions 
 
3. Accessibility to other like-minded people 
 
4. Decreases boundaries 
 
5. Increased anonymity 
 
crime correct answer: carries legal sanctions 
 
Cyberspace correct answer:...
Preview 3 out of 24 pages
Add to cartHow has technology influenced crime and society correct answer: 1. Lessens social interaction 
 
2. Lowers Inhibitions 
 
3. Accessibility to other like-minded people 
 
4. Decreases boundaries 
 
5. Increased anonymity 
 
crime correct answer: carries legal sanctions 
 
Cyberspace correct answer:...
T/F: Authorization determines the permissions that you as a user have to access something. correct answer: True 
 
T/F: Authentication determines how much of a resource you are using. correct answer: False. Accounting measures the amount of a resource used. 
 
Which of the following are not forms ...
Preview 2 out of 15 pages
Add to cartT/F: Authorization determines the permissions that you as a user have to access something. correct answer: True 
 
T/F: Authentication determines how much of a resource you are using. correct answer: False. Accounting measures the amount of a resource used. 
 
Which of the following are not forms ...
Components of Communication correct answer: Message Source -> Encoder -> Transmitter -> Transmission Medium "The Channel" -> Receiver -> Decoder -> Message Destination 
 
What ISO Standard is the OSI Model? correct answer: ISO Standard 7498. 
 
(ITU-T specifies X.200-X.299 Reco...
Preview 3 out of 21 pages
Add to cartComponents of Communication correct answer: Message Source -> Encoder -> Transmitter -> Transmission Medium "The Channel" -> Receiver -> Decoder -> Message Destination 
 
What ISO Standard is the OSI Model? correct answer: ISO Standard 7498. 
 
(ITU-T specifies X.200-X.299 Reco...
Ways of Knowing correct answer: - Tenacity 
- Intuition 
- Authority 
- Discourse and Logic 
- Empiricism 
 
Rationalism and Empiricism are the ONLY good ways of knowing. 
 
What is science? correct answer: Science = Rationalism + Empiricism 
 
Ideomotor effect correct answer: A psychological phe...
Preview 2 out of 12 pages
Add to cartWays of Knowing correct answer: - Tenacity 
- Intuition 
- Authority 
- Discourse and Logic 
- Empiricism 
 
Rationalism and Empiricism are the ONLY good ways of knowing. 
 
What is science? correct answer: Science = Rationalism + Empiricism 
 
Ideomotor effect correct answer: A psychological phe...
1x sold
Which of the following words describe the c programming languages? correct answer: Compiled 
 
After compiling a C source file, a file of which type is produced correct answer: Object 
 
The code #include <stdio.h> is what type of command? correct answer: Preprocessor command 
 
How many va...
Preview 2 out of 13 pages
Add to cartWhich of the following words describe the c programming languages? correct answer: Compiled 
 
After compiling a C source file, a file of which type is produced correct answer: Object 
 
The code #include <stdio.h> is what type of command? correct answer: Preprocessor command 
 
How many va...
What is UNIX? correct answer: a collection of related operating systems 
 
What are the two major divisions of UNIX? correct answer: BSD and SVR4 
 
T/F: UNIX commands and filenames are case sensitive. correct answer: True 
 
T/F: UNIX has no native graphical user interface. correct answer: True...
Preview 3 out of 20 pages
Add to cartWhat is UNIX? correct answer: a collection of related operating systems 
 
What are the two major divisions of UNIX? correct answer: BSD and SVR4 
 
T/F: UNIX commands and filenames are case sensitive. correct answer: True 
 
T/F: UNIX has no native graphical user interface. correct answer: True...
Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. correct answer: enterprise applications 
 
Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double ab...
Preview 4 out of 33 pages
Add to cartExamples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. correct answer: enterprise applications 
 
Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double ab...
Users typically do not think in terms of data or processes; instead, they see their business as a collection of logical units that contain both - so communicating in terms of __________ improves the interaction between a user and an analyst or developer. correct answer: Objects 
 
The analysis phas...
Preview 2 out of 9 pages
Add to cartUsers typically do not think in terms of data or processes; instead, they see their business as a collection of logical units that contain both - so communicating in terms of __________ improves the interaction between a user and an analyst or developer. correct answer: Objects 
 
The analysis phas...
How has technology influenced crime and society correct answer: -Lessons social interaction 
-Lowers inhibitions 
-Decreased boundaries 
-Increased anonymity 
 
Information Age correct answer: Marked by the increased production, transmission, and consumption of and reliance on information 
 
Techn...
Preview 2 out of 10 pages
Add to cartHow has technology influenced crime and society correct answer: -Lessons social interaction 
-Lowers inhibitions 
-Decreased boundaries 
-Increased anonymity 
 
Information Age correct answer: Marked by the increased production, transmission, and consumption of and reliance on information 
 
Techn...
Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____. 
 
A. 2 months 
B. 12 months 
C. 24 months 
D. 48 months correct answer: 24 months 
 
Systems analysts use a process called ____ to represent company operations and i...
Preview 3 out of 23 pages
Add to cartOver 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____. 
 
A. 2 months 
B. 12 months 
C. 24 months 
D. 48 months correct answer: 24 months 
 
Systems analysts use a process called ____ to represent company operations and i...
5 Ways of Knowing correct answer: Empiricism, authority, intuition, rationalism, tenacity 
 
Confirmation bias correct answer: Only listening to things that back up your claim/belief 
 
Belief perserverance correct answer: Sticking to your original beliefs even after hearing new and possibly more...
Preview 2 out of 11 pages
Add to cart5 Ways of Knowing correct answer: Empiricism, authority, intuition, rationalism, tenacity 
 
Confirmation bias correct answer: Only listening to things that back up your claim/belief 
 
Belief perserverance correct answer: Sticking to your original beliefs even after hearing new and possibly more...
In data and process modeling, a ____ model shows what the system must do, regardless of how it will be implemented physically. correct answer: Logical Model 
 
A ___ shows how a system transforms input data into useful information correct answer: DFD 
 
A ___ process is a process that has no input...
Preview 3 out of 30 pages
Add to cartIn data and process modeling, a ____ model shows what the system must do, regardless of how it will be implemented physically. correct answer: Logical Model 
 
A ___ shows how a system transforms input data into useful information correct answer: DFD 
 
A ___ process is a process that has no input...
Microsoft's ____ is one of the major Web-based development environments. 
 
A) WebSphere 
B) .NET 
C) NetSphere 
D) .WEB correct answer: B 
 
A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user p...
Preview 4 out of 44 pages
Add to cartMicrosoft's ____ is one of the major Web-based development environments. 
 
A) WebSphere 
B) .NET 
C) NetSphere 
D) .WEB correct answer: B 
 
A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user p...
Benefits of Six Sigma adoption for an organization include: 
 
a) Increase of waste in processes 
b) Improved stock price 
c) Improved ability to provide customer value 
d) all of the above correct answer: c) Improved ability to provide customer value 
 
Six sigma may be defined as: 
 
a) a philo...
Preview 2 out of 12 pages
Add to cartBenefits of Six Sigma adoption for an organization include: 
 
a) Increase of waste in processes 
b) Improved stock price 
c) Improved ability to provide customer value 
d) all of the above correct answer: c) Improved ability to provide customer value 
 
Six sigma may be defined as: 
 
a) a philo...
Database Characteristics correct answer: 1. Persistent Data (stored/resting) 
2. Shared Data (Multiple users and users) 
3. Data is organized/metadata 
4. Structured Query Language (SQL) 
 
DBMS - What it stands for correct answer: Database Management System 
 
DBMS (Database Management System) co...
Preview 2 out of 7 pages
Add to cartDatabase Characteristics correct answer: 1. Persistent Data (stored/resting) 
2. Shared Data (Multiple users and users) 
3. Data is organized/metadata 
4. Structured Query Language (SQL) 
 
DBMS - What it stands for correct answer: Database Management System 
 
DBMS (Database Management System) co...
Model correct answer: One way of breaking down the layers of a computing system and thinking about how computers function 
 
Task correct answer: Write a program that does soemthing 
 
Algorithm correct answer: Breaking the task down ( Flow chart) 
 
Program correct answer: Each step of algorith...
Preview 2 out of 8 pages
Add to cartModel correct answer: One way of breaking down the layers of a computing system and thinking about how computers function 
 
Task correct answer: Write a program that does soemthing 
 
Algorithm correct answer: Breaking the task down ( Flow chart) 
 
Program correct answer: Each step of algorith...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
No, you only buy these notes for $51.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
73918 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now