In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?
- Critical Path Method (CPM)
- Gantt Chart
- Kanban
- Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.
In wireless networks, what does the term "SSID" stand for?
- Secure System Identifier
- Signal Strength Indicator
- Service Set Identifier
- Subnet Specification
"SSID" stands for "Service Set Identifier" (Option c). It is a unique name used to identify a wireless network. When connecting to a Wi-Fi network, users select the network with the matching SSID. This helps users distinguish between different networks.
In ITSM, a _______ is a standard or set of guidelines for how something might be accomplished, but without mandating a particular tool or method.
- Best Practice
- Change Request Form
- Process Model
- Service Catalog
In IT Service Management (ITSM), a 'best practice' refers to a standard or set of guidelines for achieving a specific objective or task effectively. It provides recommendations and proven methods, but it doesn't require the use of a particular tool or approach. A Process Model outlines how a specific process works, a Service Catalog lists available services, and a Change Request Form is used to request changes in IT services.
The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.
- Cloud Bursting
- Multi-Tenancy
- Single-Tenancy
- Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.
The concept in ERP where data is entered once and is then accessible from multiple applications without redundancy is referred to as _______.
- Data Aggregation
- Data Duplication
- Data Integration
- Data Normalization
The concept described is 'Data Integration' in ERP. It ensures that data is entered once and can be accessed by multiple applications without duplication. This enhances data accuracy and consistency across the organization.
When visualizing data with a large number of categories, a _______ chart can help in displaying the data in a compact and organized manner.
- Bar
- Line
- Pie
- Treemap
For data visualization with many categories, a 'Treemap' chart is useful. It displays hierarchical data in a compact way, with nested rectangles representing different categories.
In object-oriented programming, what concept involves hiding the internal states and requiring all interaction to be performed through well-defined interfaces?
- Abstraction
- Encapsulation
- Inheritance
- Polymorphism
'Encapsulation' is a key concept in object-oriented programming that involves bundling the internal state and methods into a single unit (a class) and allowing interaction through well-defined interfaces, thus hiding implementation details.
Which ITSM process aims to minimize the negative impact of changes to the IT infrastructure?
- Asset Management
- Change Management
- Incident Management
- Problem Management
'Change Management' in ITSM focuses on controlling and managing changes to the IT infrastructure. It aims to minimize the negative impact of changes, ensuring that they are planned and implemented effectively.
In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is called _______.
- Accountability
- Compliance
- Equity
- Transparency
In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is 'equity.' This means that the interests and concerns of all stakeholders are fairly addressed, promoting fairness and inclusivity.
The process of gathering information about a target system to find vulnerabilities that can be exploited is called _______.
- Debugging
- Encryption
- Hacking
- Scanning
The process of gathering information about a target system to find vulnerabilities is known as 'Scanning.' It's a critical phase in penetration testing and security assessment.