WGU D322 Intro to IT: Pre-Assessment

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:58 PM on 1/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

65 Terms

1
New cards

What is the definition of information technology?

It is a system of dependent parts working separately to accomplish information goals

It is a system indirectly used to support and improve particular aspects of a department

It is the technology used to create data, configure servers, and construct buildings

It is the technology used to create, maintain and make information accessible

It is the technology used to create, maintain and make information accessible

2
New cards

Which IT position has the responsibility of working with routers and switches?

Network administrator

Systems administrator

Database administrator

Website administrator

Network Administrator

3
New cards

In which generation were silicon chips first used in computers?

First generation

Second generation

Third generation

Fourth generation

Third generation

4
New cards

Which low-level language corresponds one-to-one with assembly?

Translator language

Machine language

Compiler language

Programming language

machine language

5
New cards

What is a cloud model that delivers third-party software such as email or games through the internet?

LaaS

SaaS

RFID

PaaS

SaaS

6
New cards

What is one of IT's roles in globalization?

It provides support for JIT manufacturing.

It allows companies to achieve ISO 9001:2008 certification.

It provides tax havens for companies.

t allows companies to reach a wider customer base.

It allows companies to reach a wider customer base

7
New cards

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?

Handheld

Laptop

Desktop

Mainframe

Desktop

8
New cards

Which two software application packages would be classified as productivity software? Choose 2 answers

E-mail

Word Processor

Spreadsheet program

FTP client

Word processor and spreadsheet program

9
New cards

Which two computer peripherals are connected to the computer through a port? Choose 2 answers

DVD

PC Card

External Microphone

Camera Card

USB flash drive

External Microphone and USB flashdrive

10
New cards

Which term is defined as a collection of information used to support management of an organization?

Information Technology

Information Security

Information System

Information Archiving

Information system

11
New cards

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days, minimum and maximum hits for each country and region, and popularity of certain browsers among visitors.

What is the timestamp considered in this scenario?

Data

Information

Knowledge

Wisdom

Data

12
New cards

A departmental manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decisions for the next year have to be made.

Which characteristic of valuable data is the manager considering?

Timely

Thorough

Accurate

Reliable

Timely

13
New cards

Which two are parts of an information system? Choose 2 answers

Oscilloscope

Customers

Networks

Databases

Networks and Databases

14
New cards

What is the difference between processing and storage?

Information is received by processing, while data is received by storage.

Processing handles data and information, while storage is restricted to handling data.

Processing collects and translates data into useful information, while storage places the translated data in specific locations.

Users are responsible for processing, while computers are responsible for storage.

Processing collects and translates data into useful information, while storage places the translated data in specific locations

15
New cards

Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers?

Costs for hardware resources are decreased

Security of information is increased

Data integrity is increased

Internet usage by employees for non-business tasks is decreased

Costs for hardware resources are decreased

16
New cards

Which statement correctly describes the operating system?

Consists of programs that end users run to accomplish some tasks and is sometimes referred to as horizontal software

Works with hardware to provide a network service that can be distributed across several machines on the network

Requires the user to have specialized training concerning specific commands that must be entered with proper syntax

Allows the user to control the actions of the software, and through the software, to access hardware

Allows the user to control the actions of the software, and through the software, to access hardware

17
New cards

Which action by application programs requires support from a networked operating system?

A word processor program edits texts within a file.

An Internet browser displays a web page.

A photo editing software enhances a picture.

A payroll program computes federal tax of an employee.

An internet browser displays a web page

18
New cards

The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites.What type of server will meet this need?

Web server

Proxy Server

Database Server

File server

Proxy server

19
New cards

Which characteristic identifies application software that is cloud-based?

Hosted on an individual computer

Hosted in the internal business network

Provided by servers in the internal business network

Provided by third-party providers

Provided by third-party providers

20
New cards

What type of software permits free temporary use followed by long-term activation for a fee?

Proprietary

Public Domain

Open Source

Shareware

Shareware

21
New cards

What is the purpose of an End User License Agreement for a commercial software package?

Establishes the customer's right to use the software

Establishes the customer's right to resell the software

Establishes the customer's right to modify the source code

Establishes the customer's right to purchase without paying user fees

Establishes the customer's right to use the software

22
New cards

What is the difference between proprietary and open-source software license?

Proprietary software has a cost whereas open-source software is free.

Open-source software lacks technical support whereas proprietary software provides this assistance.

Open-source software can be freely modified whereas proprietary software cannot be modified.

Proprietary software can be copyrighted by the business that uses it whereas open-source software cannot be copyrighted.

Proprietary software has a cost whereas open-source software is free

23
New cards

What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years?

A patent

A copyright

A trademark

A trade secret

A copyright

24
New cards

Which two components are parts of a central processing unit (CPU)? Choose 2 answers

Control Unit (CU)

Read only memory (ROM)

Arithmetic logic unit (ALU)

Random Access memory (RAM)

CU and ALU

25
New cards

An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Choose 2 answers

Printer

Monitor

Scanner

Web Camera

Printer and monitor

26
New cards

Which item is a storage device?

Scanner

Printer

Flash Drive

Monitor

Flash drive

27
New cards

In which type of network topology is each networked device directly connected to every other networked device?

BUS

STAR

RING

MESH

Mesh

28
New cards

Which transmission medium should be used when sending data transmissions from Singapore to Mexico City?

Coaxial cable

Twisted pair cable

Shielded twisted pair

Radio signals

Radio signals

29
New cards

What indicates a specific Internet location?

The IP address

The interrupt vector

The packet identifier

The media access control (MAC)

The IP address

30
New cards

Which description explains the role of a domain name system (DNS)?

Decodes packet addresses

Transforms network nodes into URLs

Renders host responses as sender directions

Translates human-readable aliases into IP addresses

Translates human-readable aliases into IP addresses

31
New cards

Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server?

Protocol

IP address

Domain name

Resource path ID

Resource path ID

32
New cards

Which goal of Information Assurance (IA) requires that information is accessible when needed?

Confidentiality

Availability

Integrity

Stability

Availability

33
New cards

Which technique uses all possible combinations of letters and numbers to crack a password?

Brute force

Packet sniffing

Dictionary attack

Password generator

Brute force

34
New cards

Which is a type of two-factor authentication?

Smart card

Least privilege

Packet sniffing

Access right

Smart card

35
New cards

Which is a characteristic of high-level languages?

They are machine dependent.

Code is more difficult to write than low-level language

.The source code has to be complied.

The instructions interact directly with registers and memory.

The source code has to be compiled

36
New cards

How does a compiler work?

It relies on a session to complete its task

It allows a programmer to easily test out changes to code.

It takes the most recent instructions and translates them into machine language.

It interprets instructions into pseudo code.

It takes the most recent instructions and translates them into machine language

37
New cards

What statement is true concerning compiled and interpreted computer language?

Both compiled and interpreted languages are written in binary code.

A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.

A compiled language program is portable and can be run on multiple types of systems, whereas an interpreted program runs on a single type of system.

An interpreted language program runs faster than a compiled language program.

A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally.

38
New cards

Which language is often used for rapid prototyping and the creation of GUIs?

TCL

C++

COBOL

Python

TCL

39
New cards

Which is true of databases and the applications that interact with them?

The database can support at most one application.

The database determines the application classes.

Applications store data in their own files.

Applications are interdependent of the database.

Applications store data in their own files

40
New cards

What is another term for a formula that outlines how to execute a task?

Process

User-defined function

Algorithm

Pseudocode

Algorithm

41
New cards

Which data type is used to represent product order code that comprises alphanumeric characters?

String

Fixed-point

Floating-point

Boolean

String

42
New cards

Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number.

Which data type will be required in order to create his database?

Numeric integer

Floating point

Boolean

Character string

Character String

43
New cards

Why is it important to ensure that data support business goals?

To provide opportunities for communication

To ensure raw data is captured

To establish needs of users

To aid in making strategic decisions

To aid in making strategic decisions

44
New cards

In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located?

Data

information

Knowledge

Wisdom

Knowledge

45
New cards

Which field must contain a unique value in order for a relational database table to function?

Record Number

ID Number

Primary Key

Name

Primary Key

46
New cards

What are the three main categories of databases?

Relation, join, project

Flat file, relational, hierarchal

Spreadsheet, simple, complex

Table, query, report

Flat File, Relational, Hierarchal

47
New cards

What is the database administrator's role in security?

To eliminate data redundancy when integrating old with new systems

To create a redundant server architecture

To institute protocols to protect the databases from external threats

To set ports on the router to secure the transport of data

To institute protocols to protect the databases from external threats

48
New cards

What type of information processing allows input data to be accepted as a set of records and processed as a unit?

Real-time

Event-driven

Batch

Just in time

Batch

49
New cards

What is the role of drivers in facilitating communication between applications and databases?

They allow the application to interact with the database.

They allow all the data to be communicated via the network.

They allow ODBC to be used for interactions with the database and applications.

They allow SQL to manage communications between applications and databases.

They allow SQL to manage communications between applications and databases

50
New cards

Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?

WHERE

FROM

HERE

SELECT

FROM

51
New cards

What is the purpose of an IT department?

It helps the organization achieve strategic goals

It promotes the firm's products.

It hires employees for the organization.

It oversees funds flowing through the organization.

It helps the organization achieve strategic goals

52
New cards

What is a role of the systems administrator?

To install and maintain the website

To design networks

To install and maintain network resources

To develop and maintain the websites on the company web server

To install and maintain network resources

53
New cards

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?

Supporting the continuation of the current infrastructure

Scheduling their own internal meetings to discuss department goals

Expanding the infrastructure to support additional locations

Working independently from business management to achieve company goals

Expanding the infrastructure to support additional locations

54
New cards

What step should be taken by a business when a third-party solution is found that will benefit a project?

Contact the group to arrange a demo of their product

Build the software with in-house resources

Suggest that the company continues to explore options

Begin coding the solution with estimated parameters

Contact the group to arrange a demo of their product

55
New cards

Which risk assessment question is part of the Initiation Phase?

Could the end users reject the outcome of the project?

Was the project completed within budget?

What were the strengths of the project?

Did the scope change after the induction of the project?

Could the end users reject the outcome of the project

56
New cards

In what phase of a project does time estimation occur?

Initiation

Planning

Executing and Controlling

Closing

Planning

57
New cards

What effect does scope creep have on a project?

It provides additional control to the project.

It increases unplanned costs for the project.

It includes unqualified team members on the project.

It adds non-essential features to the project.

It increases unplanned costs for the project

58
New cards

Which system requirement is an example of considering user needs in the design of an information system?

Including an eye-tracking device for an input device

Allowing secure access to customer account information

Ensuring that insertions into the buffer are limited in size

Incorporating a program that can translate text into spoken words

Allowing secure access to customer account information

59
New cards

Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?

Beta

Alpha

User Acceptance

Analysis

User Acceptance

60
New cards

Which type of systems conversion involves starting the conversion with a portion of end users?

Pilot

Direct

Parallel

Phased

Pilot

61
New cards

What are two necessary elements of business continuity planning?Choose 2 answers

Assessing key organizational activities

Ensuring continuity in the sequence of staffing schedules

Identifying risks that may occur

Hiring an outside consultant to develop a plan

Assessing key organization activities and identifying risks that may occur

62
New cards

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Cold site storage

Data mirroring

Storing tape backups

Site sharing

Data mirroring

63
New cards

Which action would support confidentiality?

Checking that data is correct

Making sure data is available when needed

Updating security software

Ensuring that software is properly licensed

Updating security software

64
New cards

Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?

Computer Matching and Primary Protection Act of 1988

Security Breach Notification laws

The Electronic Communication Privacy Act of 1986

Digital Signature and Electronic Authorization laws

Security breach notification laws

65
New cards

How can an organization assist employees with the ethical use of information technology?

By developing policies for information usage

By monitoring network throughput

By ensuring databases are backed up

By establishing optimal server performance

By developing policies for information usage

Explore top flashcards