WGU C182 FInal Exam Study Set actual questions with 100% accurate solutions + rationales (PASSED)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/177

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

178 Terms

1
New cards

What is the definition of information technology?

It is the technology used to create, maintain, and make information accessible.

2
New cards

Which IT position has the responsibillity of working with routers and switches?

Network Administrator

3
New cards

In which generation were silicon chips first used in computers?

Third generation

4
New cards

Which low-level language corresponds one to one with assembly?

machine language

5
New cards

What allows an organization to use software through the internet?

Saas or Software as a Service

6
New cards

What is one of IT's role in golobalization?

It allows companies to reach a wider customer base.

7
New cards

Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive?

Desktop

8
New cards

Which two software application packages would be classified as productivity software?

Spreadsheet program and word processor

9
New cards

Which two computer peripherals are connected to the computer through a port?

External microphone and USB flash drive

10
New cards

Which term is defined as a collection of information used to support management of an organization?

Information system

11
New cards

A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio?

Data

12
New cards

a dept manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering?

Timely

13
New cards

Which two are parts of an information system?

Databases and Networks.

14
New cards

What is the difference between processing and storage?

Processing involves temporary information, while storage involves permenant information.

15
New cards

What type of information processing allows input data to be accepted as a set of records and processed as a unit?

Batch processing

16
New cards

What is the role of the systems administrator?

To install and maintain network resources.

17
New cards

Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion?

Expanding the infrasturcture to support additional locations.

18
New cards

What step should be taken by a business when a third-party solution is found that will benefit a project?

Contact the group to arrange a demo of their product.

19
New cards

Which risk assessment question is part of the initiation phase?

Could the end users reject the outcome of the project?

20
New cards

In what phase of a project does time estimation occur?

Planning

21
New cards

What effect does scope creep have on a project?

It increases unplanned costs for the project.

22
New cards

Which system requirement is an example of considering user needs in the design of an information system?

Allowing easy access to customer account information.

23
New cards

Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful?

User Acceptance

24
New cards

Which type of systems conversion involves starting the conversion with a portion of end users?

Pilot

25
New cards

What are two necessary elements of business continuity planning?

Identifying risks that may occur; Assessing key organizational activities

26
New cards

Which disaster recovery strategy is used to save information to multiple hard drives at the same time?

Data mirrorring

27
New cards

Which action would support confidentiality?

Updating security software.

28
New cards

Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen?

Security Breach Notification laws

29
New cards

How can an organization assist employees with the ethical use of information technology?

By developing policies for information usage.

30
New cards

What is part of the role of an It professional assocation?

Provides professional standards for ethical behavior; Engages in best practices for information systems.

31
New cards

What is outside of the rold of an IT professional assocation?

Writes laws dealing with information technology

32
New cards

Which benefit is provided by a computer network in a business?

Cost for hardware resources are decreased.

33
New cards

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing mutiple computers.

virtual machines

34
New cards

Each computer is roughly equal to every other computer.

Peer-to-peer

35
New cards

One computer will request information from another computer, which responds with requested information.

Client-server

36
New cards

Allows the user to control the actions of the software and through the software, to access hardware.

The operating system

37
New cards

Which action by application programs requires support from an operating system?

An internet browser displays a web page.

38
New cards

What is true about the Linux operating system?

Linux runs on both servers and workstations

39
New cards

Which characteristic identifies application sotware that is cloud based?

provided by third party providers

40
New cards

What type of software permits free temporary use followed by long term activation for a fee?

Shareware

41
New cards

What is the purpose of the End User License Agreement for a commercial software package?

Establishes the customer's right tot use the software.

42
New cards

What is the difference between proprietary and open-source software license?

Proprietary software has a cost whereas open-source software is free.

43
New cards

Which two components are parts of a central processing unit?

Control Unit (CU); Arithmetic Logic Unit (ALU)

44
New cards

An employee needs to edit a contract and prepare a hard copy for a project team. Which two peripheral devices should be used?

printer; monitor

45
New cards

Which motherboard component helps cool the cpu?

heat sink

46
New cards

Which item is a storage device?

flash drive

47
New cards

In which type of network topology is each networked device directly connectd to every other networked device?

Mesh

48
New cards

Which communication medium is typically used when sending data transmissions over very long distances?

Radio signals

49
New cards

What indicates a specific internet location?

The ip address

50
New cards

Translates human readable aliases into IP addresses

domain name system (DNS)

51
New cards

Which part of a Uniform Resource Locator identifies the location of the document on the server?

Resource path id

52
New cards

Which goal of information Assurance (IA) requires that information is accessible when needed?

Availability

53
New cards

Which technique uses all possible combination of letters and numbers to crack a password?

brute force

54
New cards

which is a characterisc of high level languages?

language translator programs are required.

55
New cards

how does a compiler work?

It requires the components of the software to be defined from the onset.

56
New cards

On which tier of the n tier architecture model are user interfaces developed?

presentation

57
New cards

Which component facilitates communication between the other two components in the MVC architecture model?

controller

58
New cards

What is the difference between a compiled and interpreted computer language?

compiler translates an entire program into executable progam which can be run at a later time, while the interpreter does this incrementally.

59
New cards

Which two languages have traditionally been used for automation rather than software development?

TCL and Python because they are scripting languages

60
New cards

Which is true of databases and the application that interact with them?

Applications are interdependent with the database.

61
New cards

What is another term for a formula that outlines how to execute a task?

Algorithm

62
New cards

What is the role of drivers in facilitating communication between application and databases?

They allow the ODBC to be used for interactions with the database and applications.

63
New cards

Which sql clause is used to inform the database management system which table should be interrograted by the query?

FROM

64
New cards

Which data type is used to represent product order code that comprises alphanumeric characters?

String data

65
New cards

Why is it important to ensure that data support business goals?

To aid in making strategic decisions.

66
New cards

In which category of the DIKW hierarchy would business intelligence be located?

Knowledge

67
New cards

Which field must contain a unique value in order for a relational database table to function?

primary key

68
New cards

What are the three main categories of databases?

Flat file, relational, and hierarchal

69
New cards

What is the database administrators role in security?

To institute protocols to protect the databases from external threats.

70
New cards

A single chip process developed in 1974 by IBM

microprocessor

71
New cards

Over the years, the number of transisters that can be placed on a chip has increased by how much?

By orders of maginitude rather than linearly

72
New cards

What is the phenomenon observed that the number of transistors on a chip doubles every year and will continue for at least the next ten years?

Moore's law

73
New cards

How long has Moore's law continued to be a trend?

from 1965 to the present

74
New cards

Is moore's law an observation or a physical law?

observation

75
New cards

The fetch-execute cycle is performed in an overlapped fashion on several instructions.

pipelines cpu

76
New cards

a programming language that is a lengthy list of 1s and 0s.

machine language

77
New cards

An early language translator that would translate an assembly program into machine language.

assemblers

78
New cards

Language that consists of English words, mathematical notation, and familiar syntax such as a semicolon used to end statements.

high level language

79
New cards

What was the operation system called in the early 1960s?

a resident monitor

80
New cards

Which statement allowed the programmer to transfer control from any location in a progam to anywhere else in the program?

GOTO

81
New cards

What does the GOTO statement create?

spaghetti code

82
New cards

What replaced the GOTO statement with high level control constructs such as while loops, and if-else statements, and is not allowed to use the GOTO statement?

structured programming

83
New cards

A stand alone entity that would be programmed to handle its own internal methods as well as messages received from other objects.

An object

84
New cards

What is the main difference between a compiled language and an interpreted language?

An interpreted language runs inside of a special environment called the interpreter.

85
New cards

When a programmer enters a command, what converts that command to machine language and executes it?

the interpreter

86
New cards

perl, php, ruby, python, and asp are interpreted languages that are also what other type of language?

scripting languages

87
New cards

Relies on a session and allows you to test out an idea because they are executed as they're written.

interpreter

88
New cards

Requires that the componenets of the software all be defined from the onset and is considered to have more efficient code.

compiler

89
New cards

What generation used vacuum tubes in computers?

first generation

90
New cards

What generation of computers began to use transistors?

second

91
New cards

what generation of computers introduced the silicon chip?

third

92
New cards

what type of computer still uses silicon chips?

tablet

93
New cards

What generation of computers introduced operating systems?

third

94
New cards

What do integrated circuits need to function?

silicon chip

95
New cards

a location beacon that uses bluetooth technology and can be embedded in any location aware mobile device.

iBeacons

96
New cards

The myriad of types of devices that can and will be connected to the internet in the next few years.

the internet of things (IoT)

97
New cards

What does RFID stand for?

Radio frequency identification device

98
New cards

Refers to data sets that are so large and complex that they will require more advanced database management/processing tools than we currently use.

big data

99
New cards

what cloud service provides access and use of software to businesses through the internet?

Saas or software as a service

100
New cards

which form of cloud computing enables teams of developers to quickly and reliably develop and deliver applications by accessing the same environment in real-time.

Paas or Platform as a Service