Certified Information Technology Manager (CITM) Questions and Answers
Which of the following is a ninth step in Systems Design Life Cycle?
Options:
Conversion
Building
System Analysis
Operations
Answer:
AExplanation:
Conversion is the process of changing the existing system to the new system. It involves transferring data, installing hardware and software, training users, and decommissioning the old system. Conversion is the ninth step in the Systems Design Life Cycle, according to the CITM study guide1 References: 1 CITM Study Guide, Chapter 4: System Development Life Cycle, page 4-14.
Which clause lists the attributes desired in answer to the query?
Options:
From
Select
Edit
Where
Answer:
BExplanation:
The select clause corresponds to the projection operation of the relational algebra. It is used to list the attributes desired in the result of a query. For example, the query select name, age from student will return the name and age attributes of all tuples in the student relation12. References: 1: CSE132A F05 SQLpart1 - University of California, San Diego 2: Basic Operations - RDBMS Questions and Answers - Sanfoundry
DBMS stands for
Options:
Data Base Marginal System
Directory Based Management System
Data Base Management System
Dual Base Management System
Answer:
CExplanation:
A DBMS is software that monitors and maintains accurate, quality data in a data structure. It helps organizations optimize, store, retrieve and manage data in a database. A DBMS consists of a group of programs that manipulate the database and accept requests for data from an application or user. A DBMS can also provide security, redundancy, abstraction, and multiple views of the data. A DBMS that stores data in tables and uses relationships between them is called a relational DBMS or RDBMS. Some examples of popular DBMS software are PostgreSQL, Oracle Database, Microsoft SQL Server, MySQL, SQLite, IBM Db2, etc. References: What is DBMS? Database Management Systems, Explained, What Is a DBMS? - LearnSQL.com, Database management system (DBMS) | Definition & Facts.
Which key is used to create a link and relationship between tablesin a relational database?
Options:
Primary Key
Secondary Key
Foreign Key
Answer:
CExplanation:
A foreign key is a column or a set of columns in one table that references the primary key of another table. It is used to create a link and relationship between tables in a relational database. A foreign key ensures that the values in the referencing table match the values in the referenced table, thus maintaining the referential integrity of the database12. A foreign key can also be used to implement constraints such as cascading updates or deletes3. References: 1: CITM Study Guide, Chapter 3: Database Management Systems, Page 41. 2: Types of Keys in Relational Model (Candidate, Super, Primary, Alternate and Foreign) 3: Database Keys: The Complete Guide (Surrogate, Natural, Composite & More)
__________ describes a group of objects with similar properties.
Options:
Classes
Objects
Links
Procedures
Answer:
AExplanation:
Classes are a fundamental concept in object-oriented programming and modeling. A class describes a group of objects that share the same features, constraints, semantics, and behavior. A class is shown as a rectangle with the class name and optionally with compartments for attributes and operations. Classes can be used to model real-world entities or system components. Classes can also have relationships with other classes, such as generalization, association, aggregation, or composition. References: 1
Classes are a fundamental concept in object-oriented programming and modeling. A class describes a group of objects that share the same features, constraints, semantics, and behavior. A class is shown as a rectangle with the class name and optionally with compartments for attributes and operations. Classes can be used to model real-world entities or system components. Classes can also have relationships with other classes, such as generalization, association, aggregation, or composition. References:
Knowledge isa strategic resource for manyorganizations.
Options:
True
False
Answer:
AExplanation:
Knowledge is a strategic resource for many organizations because it enables them to create value, innovate, and compete in the knowledge economy. Knowledge management is the process of acquiring, creating, sharing, and applying knowledge to achieve organizational goals and objectives. Knowledge strategies are the plans and actions that align the knowledge resources and capabilities of an organization with its intellectual requirements and strategic direction. A knowledge strategy defines how anorganization intends to use knowledge as a source of competitive advantage and how it will manage its knowledge assets and processes effectively and efficiently. References:
- Knowledge Strategies - Cambridge University Press & Assessment1
- Strategic knowledge management: theory, practice and future challenges - Emerald Insight2
- Managing organizational knowledge as a strategic asset - Emerald Insight3
In a database, each row is called a
Options:
record
column
information
Answer:
AExplanation:
In a database, each row represents a single, implicitly structured data item in a table. A row is also called a record or a tuple. A record contains multiple fields, each one defined in a different column. A field is the intersection of a row and a column, and it holds a single value. A column is also called an attribute or a field name, and it defines the type and constraints of the data in that column. References:
Which type of knowledge is represented by facts?
Options:
Explicit Knowledge
Tactic Knowledge
Business Knowledge
Strategic Knowledge
Answer:
AExplanation:
Explicit knowledge is the type of knowledge that can be easily articulated, expressed, and recorded in the form of text, number, symbol, code, formula, or musical note. It is the knowledge that is based on facts, data, and rules that can be shared and communicated. Examples of explicit knowledge are company policies, process documents, research reports, etc12345 References:
- 1: Different Types of Knowledge: Implicit, Tacit, and Explicit | Bloomfire
- 2: Tacit Knowledge Vs. Explicit Knowledge - Association for Intelligent Information Management
- 3: Tacit Knowledge: Definition, Examples, and Importance - Helpjuice
- 4: Explicit Knowledge: Definition, Examples, and Methods - Document360
- 5: Difference Between Explicit Knowledge and Tacit Knowledge - Key Differences
Which of the following is a sixth step in Systems Design Life Cycle?
Options:
Training
Installation
Operations
Building
Answer:
BExplanation:
evelopment, testing, installation, and maintenance12 The installation stage is the sixth and final stage of the SDLC, where the system is deployed to the target environment and made available to the end users. This stage involves activities such as hardware and software installation, configuration, data migration, user training, and documentation. The installation stage ensures that the system is functional, secure, and meets the user expectations34 References: 1: Systems development life cycle - Wikipedia 2: System Design Life Cycle | SDLC (Design) - GeeksforGeeks 3: System Design Life Cycle | SDLC (Design) 4: System Development Life Cycle - GeeksforGeeks
A malicious program that records a user’s keystrokes is an exampleof:
Options:
a Trojan horse.
adware.
an anti-virus program.
a performance monitor.
Answer:
AExplanation:
A malicious program that records a user’s keystrokes is an example of a Trojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim’s device. A keylogger is a specific type of Trojan horse that captures and sends the user’skeystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.
The other options are not correct because:
- Adware is a type of malware that displays unwanted advertisements on the user’s device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user’s keystrokes, although some adware may have keylogging capabilities.
- An anti-virus program is a software that protects the user’s device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user’s keystrokes, but rather scans and removes any malicious programs that may do so.
- A performance monitor is a software that measures and displays the performance of the user’s device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user’s keystrokes, but rather provides useful information for troubleshooting or optimizing the device.
References:
- CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132
- What Is a keylogger and how to detect keystroke logging - Norton
- Keylogger: how to recover the infected pc? - Panda Security
Who looks for a quantitative information?
Options:
Analytic Decision Maker
Heuristic Decision Maker
Answer:
AExplanation:
An analytic decision maker looks for quantitative information, or data that can be counted or measured in numerical values. An analytic decision maker uses logic, facts, and statistics to make decisions, and prefers objective and structured data. A heuristic decision maker, on the other hand, looks for qualitative information, or data that is descriptive and not expressed numerically. A heuristic decision maker uses intuition, experience, and judgment to make decisions, and prefers subjective and unstructured data. References: CITM Study Guide, page 8, section 2.3; What is Quantitative Data?, paragraph 2.
Processed or Meaningful data can be defined as ___________
Options:
Metadata
Information
Raw Data
Artifacts
Answer:
BExplanation:
Processed or meaningful data can be defined as information, which is data that has been organized, processed, or structured in a meaningful way according to the given requirement. Information is processed data which includes data that possess context, relevance, and purpose. Information is also the output of data processing, which is the collection and transformation of raw data into useful information. Information can be used for decision-making, analysis, or communication purposes. References:
A program that translates from a lower level language to a higherlevel language is a _____________
Options:
complier
decompiler
translator
mediator
Answer:
BExplanation:
A decompiler is a program that translates from a low-level language to a higher level one. A low-level language is one that is close to the machine code, such as assembly or binary. A higher level language is one that is more abstract and human-readable, such as C++ or Java. A decompiler can reverse-engineer the source code from an executable file, which can be useful for debugging, analysis, or modification purposes. However, decompilation is not always possible or accurate, as some information may be lost or obfuscated during the compilation process12. References: 1: What is a compiler? How source code becomes machine code12: How does an interpreter/compiler work2
Which one of the following is the third step in System Analysis?
Options:
Feasibility Study
Select an Alternative
Recommendation Review
Analysis and Design
Answer:
DExplanation:
System analysis is the process of understanding and specifying the requirements of a system. The third step in system analysis is analysis and design, which involves creating models and diagrams to represent the system’s structure, behavior, and interactions. Analysis and design also includes identifying and evaluating alternative solutions, and selecting the best one based on criteria such as cost, feasibility, and user satisfaction. References: Certified Information Technology Manager (CITM) - gaqm.org, Module 3 – System Analysis and Design; CITM 305 - Systems Analysis and Design - Toronto Metropolitan University, Course Description and Sample Course Outline.
Which strategy is helpful in seeking global efficiency whileretaining local responsiveness?
Options:
Transitional Strategy
Risk Strategy
Multinational Strategy
International Strategy
Answer:
AExplanation:
A transitional strategy is helpful in seeking global efficiency while retaining local responsiveness because it combines the benefits of both standardization and adaptation. A transitional strategy aims to achieve high levels of global integration and local responsiveness by leveraging the interdependence and learning among different units of the organization. A transitional strategy requires a complex and flexible organizational structure, a strong global culture, and effective coordination and communication mechanisms12. References: 1: CITM Study Guide, Chapter 4: Global IT Strategy 2: Balancing Global Synergies and Local Responsiveness | SpringerLink
------------------------------is a property that describes variouscharacteristics of an entity
Options:
ER Diagram
Column
Relationship
Attribute
Answer:
DExplanation:
An attribute is a property that describes various characteristics of an entity. For example, an entity type called Employee may have attributes such as name, age, salary, department, etc. An attribute can also be a primary key that uniquely identifies an entity instance, or a foreign key that references another entity type. An attribute can have a data type, a domain, and a constraint that define its format, range, and validity. An attribute is represented by an oval in an ER diagram, and by a column in a table. References: 3, EXIN EPI Certified Information Technology Manager - EXIN (page 23)
Which type of cost is considered as actual costs of analysis, design,and installation for the system?
Options:
Service cost
Maintenance cost
Operating cost
Development cost
Answer:
DExplanation:
Development cost is the type of cost that is considered as actual costs of analysis, design, and installation for the system. Development cost includes the expenses incurred during the planning, designing, building, testing, and deploying of a system. Development cost is usually estimated before the start of a project and is used to measure the feasibility and profitability of a system. Development cost is also used to monitor the progress and performance of a project and to control the scope and quality of a system. References: CITM Course Outline, Module 4, Corporate IT Strategy, page 9. CITM Training Course, Cost, page 14. CITM Certification Overview, Exam Information, Course Outline, Module 4.
Which of the following best suitsthe statement below? It's themain memory of the computer system and is volatile
Options:
Ram
Rom
Prom
Hard disk
Answer:
AExplanation:
RAM, or Random Access Memory, is the best fit for the statement because it is the main memory of the computer system and is volatile. RAM is a type of computer memory that is used to store data that is currently being used by the computer’s operating system and applications. RAM is volatile because it loses its contents when the power supply to the computer is turned off or interrupted. RAM is also faster and more expensive than other types of memory, such as ROM, PROM, or hard disk, which are non-volatile and can retain data without power. RAM isdivided into two types: static RAM (SRAM) and dynamic RAM (DRAM), which differ in their speed, power consumption, and design. References
Which three are the advantages ofDistributed Database? (Choosethree)
Options:
Increase Availability
Easier Expansion
Easy to scale
Improved Performance
Answer:
A, B, DExplanation:
Distributed databases provide several advantages over centralized databases, including improved scalability, availability, performance, flexibility, fault tolerance, and security1. Here are some of the advantages of distributed databases:
- Increased availability: Distributed databases can tolerate failures of individual nodes or sites without affecting the overall system functionality. Users can access data from other sites if their local site is down or unreachable. Data replication and backup mechanisms can also enhance data availability and recovery2.
- Easier expansion: Distributed databases can be scaled horizontally by adding more nodes to the network. This allows for increased capacity and performance as data and user demand grow. Adding new sites or units to the distributed system does not require significant efforts or disruption in the existing functions2.
- Improved performance: Distributed databases can offer faster response and lower communication costs by locating data near the users who normally use that data. Distributed query processing and transaction management can also optimize the use of network and computing resources. Furthermore, distributed databases can exploit the parallelism of multiple nodes to execute operations concurrently13.
References: What Is a Distributed Database? {Features, Benefits & Drawbacks}, Advantage and Disadvantage of Distributed Database Management System (DDBMS) - Bench Partner, Advantages of Distributed database - GeeksforGeeks
How many stages are involved in System Analysis?
Options:
One
Two
Three
Four
Answer:
CExplanation:
System analysis is the process of understanding problems and needs and arriving at solutions that meet them. It involves identifying, defining, and specifying the requirements of a system, as well as designing, developing, testing, and implementing the system. According to Wikipedia1, system analysis can be broken into five phases: scope definition, problem analysis, requirements analysis, logical design, and physical design. However, according to MasterStart2, there are seven stages of system development life cycle (SDLC), which include planning, requirements analysis, designing, development and testing, implementation, documentation, and evaluation. Therefore, depending on the perspective and the methodology, system analysis can involve three to seven stages, but the most common number is three: requirements analysis, logical design, and physical design. References: Wikipedia; MasterStart
Which three are examples of Systems Software? (Choose three)
Options:
Linux
Unix
Internet Explorer
Adobe Photoshop
Device Driver
Answer:
A, B, EExplanation:
Systems software is software that provides a platform for other software and manages the basic functions of a computer. Examples of systems software include operating systems, device drivers, firmware, utility software, and boot loaders. Operating systems are the most important type of systems software, as they provide the foundational framework for all other software and applications to run on the computer. Linux and Unix are examples of operating systems that are widely used in various domains, such as servers, desktops, embedded systems, and supercomputers. Device drivers are another important type of systems software, as they allow the operating system to communicate with hardware devices such as printers, scanners, and graphics cards. A device driver is a software component that acts as an interface between the hardware and the operating system, providing the necessary commands and data to control the device. Internet Explorer and Adobe Photoshop are not examples of systems software, but application software. Application software is software that allows users to perform specific tasks, such as browsing the web, editing images, creating documents, or playing games. Application software runs on top of the systems software and uses the services and resources provided by the operating system and the hardware. References: System software - Wikipedia, What is System Software? – Definition, Types, Examples and More, What is System Software: Definition, Types, Language Processors - Toppr.
Which twomanagementdepartmentsare responsible for thesuccess of information processing? (Choose two)
Options:
Stakeholders Management
Top Management
Middle Management
Bottom Level Management
Answer:
B, CExplanation:
Information processing is the exchange of information among people, processes and systems within an organization1. It is crucial for achieving business goals, making informed decisions and working efficiently2. To effectively deliver the information needed to decision makers, Management Information Systems (MIS) need to have the necessary components to collect, process, store and retrieve the information whenever it is needed3. The success of information processing depends on the alignment of MIS with the organizational strategy, structure and culture3. Therefore, the two management departments that are responsible for the success of information processing are top management and middle management. Top management is responsible for setting the vision, mission, goals and objectives of the organization, as well as defining the policies and procedures that guide the information flows3. Middle management is responsible for implementing the plans and strategies of top management, as well as coordinating and supervising the activities of lower-level managers and employees3. Both top and middle management need to ensure that the information systems are aligned with the business needs, and that the information flows are effective, efficient and secure3. References: 1: Practices for managing information flows within organizations12: Management Information Systems (MIS): Definition and How It Works23: Information management3
How many techniques are available to the design team forcollecting data?
Options:
Three
Four
Five
Six
Answer:
CExplanation:
According to the CITM course outline1, there are five data collection techniques that are commonly used in business analytics. They are:
- Observations: This technique involves watching and recording the behavior, actions, or events of interest. Observations can be either direct or indirect, structured or unstructured, participant or non-participant.
- Interviews: This technique involves asking questions to individuals or groups of people who have relevant knowledge or experience on the topic. Interviews can be either structured, semi-structured, or unstructured, depending on the level of flexibility and standardization of the questions.
- Surveys: This technique involves administering a set of questions to a sample of respondents who represent the population of interest. Surveys can be either quantitative or qualitative, depending on the type and scale of the questions.
- Focus groups: This technique involves gathering a small group of people who share some common characteristics or opinions on the topic and facilitating a discussion among them. Focus groups can be used to explore attitudes, perceptions, feelings, or preferences of the participants.
- Documents: This technique involves reviewing and analyzing existing documents or records that are relevant to the topic. Documents can be either primary or secondary, depending on the source and authenticity of the information.
References:
- 1: 7 Data Collection Methods and Techniques | SafetyCulture
- 2: CITM 500 Data and Information Management | The Chang School of Continuing Education - Toronto Metropolitan University
- 3: Data Collection Methods | Step-by-Step Guide & Examples - Scribbr
- 4: Data Collection - Methods Types and Examples - Research Method
Important decision may require more care inanalyzing data.
Options:
True
False
Answer:
AExplanation:
Important decisions may require more care in analyzing data because they have higher stakes, greater uncertainty, and more complexity. Data analysis can help managers to identify patterns, trends, correlations, and causal relationships that can inform their decision making. Data analysis can also help managers to evaluate alternatives, test hypotheses, and predict outcomes. However, data analysis is not a substitute for judgment, intuition, and creativity. Managers should also consider the quality, reliability, and validity of the data, as well as the ethical and social implications of their decisions. References: CITM Course Outline, Sample Exam - GAQM, TEST 1 2020, questions and answers - CITM 102 TEST BANKS … - Studocu