Which of the following best suits the statement below? It's the main memory of the computer system and is volatile
Answer : A
RAM, or Random Access Memory, is the best fit for the statement because it is the main memory of the computer system and is volatile. RAM is a type of computer memory that is used to store data that is currently being used by the computer's operating system and applications. RAM is volatile because it loses its contents when the power supply to the computer is turned off or interrupted. RAM is also faster and more expensive than other types of memory, such as ROM, PROM, or hard disk, which are non-volatile and can retain data without power. RAM is divided into two types: static RAM (SRAM) and dynamic RAM (DRAM), which differ in their speed, power consumption, and design.Reference
https://en.wikipedia.org/wiki/Volatile_memory
https://www.bbc.co.uk/bitesize/guides/zfyyb82/revision/1
https://www.proprofs.com/quiz-school/story.php?title=information-technology-quiz_7
________________ interdependence occurs when the output of one unit is the input to another.
_______________ interdependence occurs when two organizations depend on each other.
A malicious program that records a user's keystrokes is an example of:
Answer : A
A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.
The other options are not correct because:
Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.
An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.
A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.
CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132
What Is a keylogger and how to detect keystroke logging - Norton
How many techniques are available to the design team for collecting data?
Answer : C
Observations: This technique involves watching and recording the behavior, actions, or events of interest. Observations can be either direct or indirect, structured or unstructured, participant or non-participant.
Interviews: This technique involves asking questions to individuals or groups of people who have relevant knowledge or experience on the topic. Interviews can be either structured, semi-structured, or unstructured, depending on the level of flexibility and standardization of the questions.
Surveys: This technique involves administering a set of questions to a sample of respondents who represent the population of interest. Surveys can be either quantitative or qualitative, depending on the type and scale of the questions.
Focus groups: This technique involves gathering a small group of people who share some common characteristics or opinions on the topic and facilitating a discussion among them. Focus groups can be used to explore attitudes, perceptions, feelings, or preferences of the participants.
Documents: This technique involves reviewing and analyzing existing documents or records that are relevant to the topic. Documents can be either primary or secondary, depending on the source and authenticity of the information.
1: 7 Data Collection Methods and Techniques | SafetyCulture
3: Data Collection Methods | Step-by-Step Guide & Examples - Scribbr
4: Data Collection - Methods Types and Examples - Research Method
Which model extends the waterfall approach by recognizing the different cycles?
Answer : D
The spiral model is a software development lifecycle model that extends the waterfall approach by recognizing the different cycles of planning, risk analysis, engineering, and evaluation. The spiral model allows for iterative and incremental development, where each cycle produces a prototype or a deliverable that can be evaluated by the customer and the project team. The spiral model also incorporates risk management throughout the project, as each cycle involves identifying and resolving potential risks before proceeding to the next cycle. The spiral model is suitable for large, complex, and uncertain projects that require frequent feedback and adaptation.Reference:
Spiral Model vs. Waterfall Model: Definitions and Differences
Waterfall Methodology: The Ultimate Guide to the Waterfall Model