Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Lesson 10 2nd Part
Test Description: Review for Lesson 10 quiz
Instructions: Answer all questions to get your test result.
1) Which result reflects an IT project that is properly managed?
A
Employees become frustrated and angry because training on new systems usually lags behind project completion.
B
Animosity among departments occurs because the success of the IT project overshadows the accomplishments of the other departm
C
Employee productivity is adversely affected.
D
Employee productivity loss is minimized.
2) Project management software often contains Gantt charts. What is the purpose of Gantt charts?
A
To graphically display the project tasks and corresponding deadlines
B
To graphically display the project tasks and task durations
C
To graphically display problems that need to be escalated for resolution
D
To graphically display stages of task completion and cost status of the project
3) Which of the following is generally used in non-interactive Web events?
A
Webcast
B
Webinar
C
Voice conference
D
Web conference
4) What is a project constraint?
A
A factor that is considered to be real or certain for planning purposes
B
A document that contains the project goals and specifies how those goals will be met
C
A factor, such as budget or time, that limits a project manager's options
D
A document that displays the planned dates for performing tasks and meeting deadlines
5) One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000:
A
identifies nine topic areas, each of which provides a set of principles and techniques to help project managers manage proje
B
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
C
outlines the rights of IT professionals and their responsibilities to the organizations for which they work.
D
details the segregation of duties that project team members should employ to independently verify that project tasks were com
6) In project management, a resource is:
A
a unit of work that must be accomplished.
B
a sequence of work units that must be accomplished within a defined time frame.
C
the appointment of a person, department or device to a unit of work.
D
a person, department or device needed to accomplish a unit of work.
7) Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
A
to call, text or IM James before opening the attachment, to verify that he intended to send it.
B
to make back-up copies of important files so that she can recover them in case of an incident.
C
to use anti-virus software to scan the system's hard disk before opening the attachment.
D
to open the file attachment and use anti-virus software to scan it.
8) What does anti-virus software do?
A
It fortifies computer systems over time by repeated exposure to weak but similar viruses, building immunity to newer viruses
B
It detects viruses by recognizing patterns called signature profiles, and warns you if your system is infected so you avoid t
C
It prevents you from opening a program or file sent to you via e-mail or instant messaging.
D
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
9) Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attac
A
Perform regular backups of your hard drive.
B
Update the definitions on your anti-virus application frequently.
C
Open e-mail attachments only from unknown senders.
D
Disable your Web browser's automatic security settings so you can manually control the content you download.
10) Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
A
Private key
B
Digital signature
C
Certificate authority
D
Secure authentication
11) Which term is used to describe the process that converts data into an unreadable form of text?
A
Encryption
B
Decryption
C
Authentication
D
Certification
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?