WGU IT D075
In the following "IF" statement, what is "C2>B2" called? =IF(C2>B2,"Over Budget","Under Budget") 1.Cellular reference 2.Comparative reference 3.Argument 4.Absolute reference
Argument
What is a private computer network for sharing corporate information, collaboration tools, and computing services? 1.Campus area network (CAN) 2.Intranet 3.Peer-to-peer network 4.Extranet
Intranet
A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties. Which technology is the hospital using for these wristbands? 1.RFID 2.IoT 3.Cloud services 4.Bluetooth
IoT
Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs? 1.Applied research 2.Basic research 3.Business intelligence research 4.Development research
Applied research
What is the distinguishing feature that differentiates data from information? 1.Data that have been verified for correctness become information. 2.Data that have been recorded in a computer become information. 3.Data that have been structured become information. 4.Data that have been given context become information.
Data that have been given context become information.
Charlotte finds that the airport spends more than $100,000 each month on electricity for lighting and the heating and cooling system in the airport. How could Charlotte use IoT to reduce her airport's power bill? 1.Light dimmers and thermostats that report passenger traffic through the terminals in real time 2.Door sensors that beep when a door is left open 3.Thermostats that turn down the heat at 10 p.m. each night. 4.Motion sensors to turn the lights on and off in restrooms
Light dimmers and thermostats that report passenger traffic through the terminals in real time
An analyst at a furniture company wants to use the company's relational database to find out which customers have made purchases in the past six months. What is an appropriate tool for the data analyst to use to find this information? 1.ETL 2.Data mining 3.Data structuring 4.SQL
SQL
Which level of management gets the most detailed reports directly from the transaction processing system? 1.Supervisors 2.Laborers 3.Executive 4.Managers
Supervisors
Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code? 1.A trademark for each algorithm 2.A trade secret for each algorithm 3.A patent for each algorithm 4.A copyright on each algorithm
A copyright on each algorithm
Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose? 1.A knowledge management system (KMS) 2.A spreadsheet 3.A customer relationship management (CRM) system 4.A database
A database
The algorithms developed by Sparkit programmers need to be cataloged and shared among the programmers in all three locations and need to be easily accessible. Which type of software system can Sparkit use to enable this? 1.A relational database 2.A productivity software suite 3.A document management system (DMS) 4.A knowledge management system (KMS)
A knowledge management system (KMS)
Which category of software includes programs such as word processors and PDF document readers? 1.System software 2.Application software 3.Utility software 4.Project software
Application software
Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? 1.File transfer 2.Object linking 3.Cut and paste 4.Object embedding
Cut and paste
Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid? 1.Data analytics 2.Data scrubbing 3.Data normalization 4.Data governance
Data governance
Which term is used to refer to the process of combining structured, unstructured, and semistructured data into a data warehouse structure? 1.Data extraction 2.Data governance 3.Data scrubbing 4.Data mining
Data scrubbing
A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company? 1.Distributed database 2.Managed database 3.Cloud database 4.Relational database
Cloud database
What is the major function of a computer operating system? 1.Data management 2.Network management 3.Computer resource management 4.Application program management
Computer resource management
Which tool allows large data sets to be stored and processed across multiple servers? 1.Structured Query Language (SQL) 2.Enterprise resource planning (ERP) 3.Tableau 4.Hadoop
Hadoop
Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? 1.Internet Protocol version 6 (IPv6) 2.Transmission Control Protocol (TCP) 3.User Datagram Protocol (UDP) 4.Hypertext transfer protocol (HTTP)
Internet Protocol version 6 (IPv6)
A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize? 1.Executive reporting 2.Predictive reporting 3.Financial reporting 4.Strategic reporting
Predictive reporting
An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? 1.Sarbanes-Oxley Act 2.Freedom of Information Act 3.Santini-Burton Act 4.Fair Labor Standards Act
Sarbanes-Oxley Act
Which type of device is an ethernet card? 1.Network operating system (NOS) 2.Network firewall hardware 3.Network interface controller (NIC) 4.Network server hardware
Network interface controller (NIC)
Where does IoT data collection begin? 1.The cloud 2.The database 3.The internet 4.The edge
The edge
What is the defining characteristic of application software? 1.It runs in the background with no user intervention. 2.It performs a specific task for the user. 3.It needs no system software running in the background.
It performs a specific task for the user.
A company creates a new product in response to demand from a small but diverse group of customers with a specific shared interest. What is the most important reason to advertise this product on social media? 1.Targeted advertising 2.Low cost 3.Large audience 4.Customer feedback
Targeted advertising
A bus topology or linear bus
network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints. Data are transmitted between the two endpoints and the nodes are connected to the backbone. One advantage of a bus topology is that all nodes can receive data virtually simultaneously. A disadvantage, however, is that if the backbone is down, all nodes on the backbone are down as well.
A ring topology
is shaped like a ring. In this kind of topology, each computer (node) is connected to two other computers in the network with the first and last computers being connected to each other. Data are transmitted between computers in a circular manner. Ring topologies are the least used topology with microcomputers. In a ring topology, if the traffic cannot flow in one direction, then it can try to flow in the other direction around the ring. This makes it more robust in the sense that there is no hub through which all the traffic flows.
A star topology
is named for the star shape created by nodes that radiate around a central node in a spoke-like fashion. The center of the star is the hub that attaches to the nodes with spokes. Star topologies have similar disadvantages to the linear bus configuration; if the central hub fails, every node attached to the hub will also fail. Star topologies are the most common of all topologies.
Which three benefits does a customer relationship management system (CRM) provide to a business? Choose 3 answers. 1.It facilitates marketing strategies to increase business. 2.It is a primary sales channel to existing customers. 3.It is a process for returns and customer service. 4.It is a process to capture information about the business's customers. 5.It is an order processing system. 6.It provides communication tools and channels.
1.It facilitates marketing strategies to increase business. 4.It is a process to capture information about the business's customers. 6.It provides communication tools and channels.
What is a peripheral device in a network? 1.A handheld device such as a phone or tablet 2.A device shared by multiple end users in a network 3.A computer that accesses a network remotely 4.A client computer that is connected to a network
A device shared by multiple end users in a network
Which component must each client computer in the office have in order to install the new network? 1.A network interface controller 2.An internal network server 3.A network switch 4.An internal network
A network interface controller
A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? 1.A password 2.A MAC address 3.An encryption key 4.A digital signature
A password
Which type of computer runs a network operating system (NOS)? 1.A router 2A client computer on a network 3.A mainframe computer 4.A server
A server
Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? 1.A linear bus topology 2.A mesh topology 3.A ring topology 4.A star topology
A star topology
How can the Internet of Things (IoT) be used to improve supply chain management in the automotive industry? 1.By placing internet-connected sensors on every part in order to monitor inventory 2.By using blockchain technology to record all transactions on a shared ledger 3.By using real-time communication technology to improve coordination with vendors 4.By employing artificial intelligence to look for potential cost saving opportunities
By placing internet-connected sensors on every part in order to monitor inventory
What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? 1.Chief technology officer 2.Chief information security officer 3.Chief operating officer 4.Chief cybersecurity officer
Chief information security officer
Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect? 1.Chief information security officer (CISO) 2.IT project manager 3.Chief technology officer (CTO) 4.Chief information officer (CIO)
Chief technology officer (CTO)
A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer initial copyright protection of these marketing images? 1.Publishing the marketing images 2.Declaring the images to be copyrighted 3.Creating the marketing images 4.Registering the images with a copyright office
Creating the marketing images
A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? 1.SQL 2.Tableau 3.Hadoop 4.ETL
ETL
A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, who is responsible for designing a detailed plan to address the incompatibility issue? 1.IT portfolio manager 2.IT architect 3.Chief information officer 4.Computer systems administrator
IT portfolio manager
How have online web development tools benefitted small businesses? 1.Simplified programming education for business owners 2.Increased user control of the organization's website 3.Simplified HTML coding on business websites 4.Increased search engine rankings for small businesses
Increased user control of the organization's website
By segmenting data in a data management system, a business achieves a significant advantage over nonsegmentation. What is that advantage? 1.It keeps data valid 2.It targets the right customers. 3.It makes SQL easier. 4.It increases return on investment (ROI).
It targets the right customers.
What is the purpose of the primary key in a database? 1.It is the primary encryption key for a secure database. 2.It is the record number of each record in a table. 3.It uniquely identifies the records in a specific table. 4.It uniquely identifies the tables in a database.
It uniquely identifies the records in a specific table.
Which category do Google Docs and Dropbox fall within? 1.Social networking apps 2.Utility apps 3.Lifestyle apps 4.Productivity apps
Productivity apps
Which type of software is designed to easily generate Gantt charts? 1.Project management software 2.Database management software 3.Graphing software 4.Spreadsheet software
Project management software
Which technique is used to ensure data accuracy for a mailing campaign? 1.Creating data marts 2.Indexing of data 3.Segmentation 4.Normalization
Segmentation
While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? 1.Client 2.Hub 3.Server 4.Router
Server
IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit? 1.Marketing 2.Operations 3.Supply chain 4.Manufacturing
Supply chain
A data analyst wants to search though unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics are appropriate for this task? 1.Topic analytics 2.Predictive analytics 3.Decision analytics 4.Text analytics
Text analytics
A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? 1.The camera 2.The interior light 3.The door lock 4.The exterior light
The door lock
A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? 1.The cloud web hosting (CWH) system 2.source of the data used by this DSS? The cloud web hosting (CWH) system The business intelligence (BI) system 3.The customer relationship management system (CRM) 4.The transaction processing system (TPS)
The transaction processing system (TPS)
Which attribute of big data relates to whether the data are structured or unstructured? 1.Veracity 2.Velocity 3.Variety 4.Volume
Variety
A data analyst is working with a very large set of data and trying to calculate the amount of data processing that needs to be completed each week. Which attribute of big data is this analyst addressing? 1.Volume 2.Variety 3.Veracity 4.Velocity
Velocity
Which type of application can Lucas implement to allow for real-time business collaboration? 1.Video conferencing 2.File sharing 3.Email 4.Discussion boards
Video conferencing
Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem? 1.Wi-Fi-connected drones with GPS and camera 2.Satellite mapping systems with real-time updates 3.Airplanes that use heat sensors and GPS to map fires 4.Wi-Fi headsets that facilitate real-time communication
Wi-Fi-connected drones with GPS and camera
True or False Microsoft Project is classified as presentation software.
false
True or false: Implementation of the IoT in the healthcare industry will increase the need for hospital staff to monitor and record data to be analyzed.
false