Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Lesson 10 2nd Part
Test Description: Review for Lesson 10 quiz
Instructions: Answer all questions to get your test result.
1) Which result reflects an IT project that is properly managed?
A
Animosity among departments occurs because the success of the IT project overshadows the accomplishments of the other departm
B
Employees become frustrated and angry because training on new systems usually lags behind project completion.
C
Employee productivity loss is minimized.
D
Employee productivity is adversely affected.
2) Project management software often contains Gantt charts. What is the purpose of Gantt charts?
A
To graphically display the project tasks and task durations
B
To graphically display stages of task completion and cost status of the project
C
To graphically display the project tasks and corresponding deadlines
D
To graphically display problems that need to be escalated for resolution
3) Which of the following is generally used in non-interactive Web events?
A
Web conference
B
Voice conference
C
Webinar
D
Webcast
4) What is a project constraint?
A
A factor that is considered to be real or certain for planning purposes
B
A document that displays the planned dates for performing tasks and meeting deadlines
C
A document that contains the project goals and specifies how those goals will be met
D
A factor, such as budget or time, that limits a project manager's options
5) One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000:
A
identifies nine topic areas, each of which provides a set of principles and techniques to help project managers manage proje
B
details the segregation of duties that project team members should employ to independently verify that project tasks were com
C
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
D
outlines the rights of IT professionals and their responsibilities to the organizations for which they work.
6) In project management, a resource is:
A
a person, department or device needed to accomplish a unit of work.
B
a unit of work that must be accomplished.
C
the appointment of a person, department or device to a unit of work.
D
a sequence of work units that must be accomplished within a defined time frame.
7) Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
A
to make back-up copies of important files so that she can recover them in case of an incident.
B
to open the file attachment and use anti-virus software to scan it.
C
to use anti-virus software to scan the system's hard disk before opening the attachment.
D
to call, text or IM James before opening the attachment, to verify that he intended to send it.
8) What does anti-virus software do?
A
It detects viruses by recognizing patterns called signature profiles, and warns you if your system is infected so you avoid t
B
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
C
It prevents you from opening a program or file sent to you via e-mail or instant messaging.
D
It fortifies computer systems over time by repeated exposure to weak but similar viruses, building immunity to newer viruses
9) Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attac
A
Update the definitions on your anti-virus application frequently.
B
Perform regular backups of your hard drive.
C
Disable your Web browser's automatic security settings so you can manually control the content you download.
D
Open e-mail attachments only from unknown senders.
10) Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
A
Digital signature
B
Certificate authority
C
Secure authentication
D
Private key
11) Which term is used to describe the process that converts data into an unreadable form of text?
A
Authentication
B
Decryption
C
Certification
D
Encryption
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?