SOPHIA PATHWAYS Introduction to Information Technology Unit 4 Milestone 4.pdf

This preview shows page 1 - 4 out of 8 pages.

SOPHIA PATHWAYS Introduction to Information Technology You passed this Milestone 4 15 questions were answered correctly. 1 Malouka participates in a research project for a large consumer behavior research firm. Each time she purchases items in a grocery store, she scans the barcodes of her products into an app, which sends her purchase data to the firm for analysis. Malouka is working with an example of automation known as __________. billing advertising and marketing importing/exporting data textfill/autocorrect RATIONALE Malouka is working with an example of automation called importing/exporting data. By scanning the barcode associated with the product she purchased, and using the mobile app, she provides the research firm with a large amount of information (e.g., product data, time, location, quantity, her age, gender, etc.). CONCEPT Process Automation and Computers 2 Kim is quickly building a working model of a new software. As she does so, she collects feedback from users, and uses it to update the model.
Which software development methodology is Kim using?
CONCEPT Software Development Methodologies 3 Zehra works with a software development team. One of his tasks is to define the overall structure of an application and divide it into components to be developed. What is Zehra's role on the software development team? Software Designer Programmer Software Analyst Project Manager RATIONALE Zehra's role on the software development team is Software Designer. Software Designers use scientific and mathematical principles to develop applications for multiple purposes (e.g., games, operating systems, and applications). They determine what a program should do, based on user needs, then create and test it to ensure its functionality. CONCEPT The Software Development Team 4 Harriet implements policies and prevents unauthorized access to the network, and to the data stored on the network. Harriet holds the position of __________ in the organization.
Computer Operator Network Administrator Database Administrator Security Administrator RATIONALE Harriet is a Security Administrator who protects the technological assets of the organization (i.e., infrastructure, systems, and data).

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture