WGU IT D075

Ace your homework & exams now with Quizwiz!

In the following "IF" statement, what is "C2>B2" called? =IF(C2>B2,"Over Budget","Under Budget") 1.Cellular reference 2.Comparative reference 3.Argument 4.Absolute reference

Argument

What is a private computer network for sharing corporate information, collaboration tools, and computing services? 1.Campus area network (CAN) 2.Intranet 3.Peer-to-peer network 4.Extranet

Intranet

A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties. Which technology is the hospital using for these wristbands? 1.RFID 2.IoT 3.Cloud services 4.Bluetooth

IoT

Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs? 1.Applied research 2.Basic research 3.Business intelligence research 4.Development research

Applied research

What is the distinguishing feature that differentiates data from information? 1.Data that have been verified for correctness become information. 2.Data that have been recorded in a computer become information. 3.Data that have been structured become information. 4.Data that have been given context become information.

Data that have been given context become information.

Charlotte finds that the airport spends more than $100,000 each month on electricity for lighting and the heating and cooling system in the airport. How could Charlotte use IoT to reduce her airport's power bill? 1.Light dimmers and thermostats that report passenger traffic through the terminals in real time 2.Door sensors that beep when a door is left open 3.Thermostats that turn down the heat at 10 p.m. each night. 4.Motion sensors to turn the lights on and off in restrooms

Light dimmers and thermostats that report passenger traffic through the terminals in real time

An analyst at a furniture company wants to use the company's relational database to find out which customers have made purchases in the past six months. What is an appropriate tool for the data analyst to use to find this information? 1.ETL 2.Data mining 3.Data structuring 4.SQL

SQL

Which level of management gets the most detailed reports directly from the transaction processing system? 1.Supervisors 2.Laborers 3.Executive 4.Managers

Supervisors

Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code? 1.A trademark for each algorithm 2.A trade secret for each algorithm 3.A patent for each algorithm 4.A copyright on each algorithm

A copyright on each algorithm

Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose? 1.A knowledge management system (KMS) 2.A spreadsheet 3.A customer relationship management (CRM) system 4.A database

A database

The algorithms developed by Sparkit programmers need to be cataloged and shared among the programmers in all three locations and need to be easily accessible. Which type of software system can Sparkit use to enable this? 1.A relational database 2.A productivity software suite 3.A document management system (DMS) 4.A knowledge management system (KMS)

A knowledge management system (KMS)

Which category of software includes programs such as word processors and PDF document readers? 1.System software 2.Application software 3.Utility software 4.Project software

Application software

Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? 1.File transfer 2.Object linking 3.Cut and paste 4.Object embedding

Cut and paste

Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid? 1.Data analytics 2.Data scrubbing 3.Data normalization 4.Data governance

Data governance

Which term is used to refer to the process of combining structured, unstructured, and semistructured data into a data warehouse structure? 1.Data extraction 2.Data governance 3.Data scrubbing 4.Data mining

Data scrubbing

A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company? 1.Distributed database 2.Managed database 3.Cloud database 4.Relational database

Cloud database

What is the major function of a computer operating system? 1.Data management 2.Network management 3.Computer resource management 4.Application program management

Computer resource management

Which tool allows large data sets to be stored and processed across multiple servers? 1.Structured Query Language (SQL) 2.Enterprise resource planning (ERP) 3.Tableau 4.Hadoop

Hadoop

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? 1.Internet Protocol version 6 (IPv6) 2.Transmission Control Protocol (TCP) 3.User Datagram Protocol (UDP) 4.Hypertext transfer protocol (HTTP)

Internet Protocol version 6 (IPv6)

A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize? 1.Executive reporting 2.Predictive reporting 3.Financial reporting 4.Strategic reporting

Predictive reporting

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? 1.Sarbanes-Oxley Act 2.Freedom of Information Act 3.Santini-Burton Act 4.Fair Labor Standards Act

Sarbanes-Oxley Act

Which type of device is an ethernet card? 1.Network operating system (NOS) 2.Network firewall hardware 3.Network interface controller (NIC) 4.Network server hardware

Network interface controller (NIC)

Where does IoT data collection begin? 1.The cloud 2.The database 3.The internet 4.The edge

The edge

What is the defining characteristic of application software? 1.It runs in the background with no user intervention. 2.It performs a specific task for the user. 3.It needs no system software running in the background.

It performs a specific task for the user.

A company creates a new product in response to demand from a small but diverse group of customers with a specific shared interest. What is the most important reason to advertise this product on social media? 1.Targeted advertising 2.Low cost 3.Large audience 4.Customer feedback

Targeted advertising

A bus topology or linear bus

network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints. Data are transmitted between the two endpoints and the nodes are connected to the backbone. One advantage of a bus topology is that all nodes can receive data virtually simultaneously. A disadvantage, however, is that if the backbone is down, all nodes on the backbone are down as well.

A ring topology

is shaped like a ring. In this kind of topology, each computer (node) is connected to two other computers in the network with the first and last computers being connected to each other. Data are transmitted between computers in a circular manner. Ring topologies are the least used topology with microcomputers. In a ring topology, if the traffic cannot flow in one direction, then it can try to flow in the other direction around the ring. This makes it more robust in the sense that there is no hub through which all the traffic flows.

A star topology

is named for the star shape created by nodes that radiate around a central node in a spoke-like fashion. The center of the star is the hub that attaches to the nodes with spokes. Star topologies have similar disadvantages to the linear bus configuration; if the central hub fails, every node attached to the hub will also fail. Star topologies are the most common of all topologies.

Which three benefits does a customer relationship management system (CRM) provide to a business? Choose 3 answers. 1.It facilitates marketing strategies to increase business. 2.It is a primary sales channel to existing customers. 3.It is a process for returns and customer service. 4.It is a process to capture information about the business's customers. 5.It is an order processing system. 6.It provides communication tools and channels.

1.It facilitates marketing strategies to increase business. 4.It is a process to capture information about the business's customers. 6.It provides communication tools and channels.

What is a peripheral device in a network? 1.A handheld device such as a phone or tablet 2.A device shared by multiple end users in a network 3.A computer that accesses a network remotely 4.A client computer that is connected to a network

A device shared by multiple end users in a network

Which component must each client computer in the office have in order to install the new network? 1.A network interface controller 2.An internal network server 3.A network switch 4.An internal network

A network interface controller

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? 1.A password 2.A MAC address 3.An encryption key 4.A digital signature

A password

Which type of computer runs a network operating system (NOS)? 1.A router 2A client computer on a network 3.A mainframe computer 4.A server

A server

Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? 1.A linear bus topology 2.A mesh topology 3.A ring topology 4.A star topology

A star topology

How can the Internet of Things (IoT) be used to improve supply chain management in the automotive industry? 1.By placing internet-connected sensors on every part in order to monitor inventory 2.By using blockchain technology to record all transactions on a shared ledger 3.By using real-time communication technology to improve coordination with vendors 4.By employing artificial intelligence to look for potential cost saving opportunities

By placing internet-connected sensors on every part in order to monitor inventory

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? 1.Chief technology officer 2.Chief information security officer 3.Chief operating officer 4.Chief cybersecurity officer

Chief information security officer

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect? 1.Chief information security officer (CISO) 2.IT project manager 3.Chief technology officer (CTO) 4.Chief information officer (CIO)

Chief technology officer (CTO)

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer initial copyright protection of these marketing images? 1.Publishing the marketing images 2.Declaring the images to be copyrighted 3.Creating the marketing images 4.Registering the images with a copyright office

Creating the marketing images

A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? 1.SQL 2.Tableau 3.Hadoop 4.ETL

ETL

A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, who is responsible for designing a detailed plan to address the incompatibility issue? 1.IT portfolio manager 2.IT architect 3.Chief information officer 4.Computer systems administrator

IT portfolio manager

How have online web development tools benefitted small businesses? 1.Simplified programming education for business owners 2.Increased user control of the organization's website 3.Simplified HTML coding on business websites 4.Increased search engine rankings for small businesses

Increased user control of the organization's website

By segmenting data in a data management system, a business achieves a significant advantage over nonsegmentation. What is that advantage? 1.It keeps data valid 2.It targets the right customers. 3.It makes SQL easier. 4.It increases return on investment (ROI).

It targets the right customers.

What is the purpose of the primary key in a database? 1.It is the primary encryption key for a secure database. 2.It is the record number of each record in a table. 3.It uniquely identifies the records in a specific table. 4.It uniquely identifies the tables in a database.

It uniquely identifies the records in a specific table.

Which category do Google Docs and Dropbox fall within? 1.Social networking apps 2.Utility apps 3.Lifestyle apps 4.Productivity apps

Productivity apps

Which type of software is designed to easily generate Gantt charts? 1.Project management software 2.Database management software 3.Graphing software 4.Spreadsheet software

Project management software

Which technique is used to ensure data accuracy for a mailing campaign? 1.Creating data marts 2.Indexing of data 3.Segmentation 4.Normalization

Segmentation

While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? 1.Client 2.Hub 3.Server 4.Router

Server

IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit? 1.Marketing 2.Operations 3.Supply chain 4.Manufacturing

Supply chain

A data analyst wants to search though unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics are appropriate for this task? 1.Topic analytics 2.Predictive analytics 3.Decision analytics 4.Text analytics

Text analytics

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? 1.The camera 2.The interior light 3.The door lock 4.The exterior light

The door lock

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? 1.The cloud web hosting (CWH) system 2.source of the data used by this DSS? The cloud web hosting (CWH) system The business intelligence (BI) system 3.The customer relationship management system (CRM) 4.The transaction processing system (TPS)

The transaction processing system (TPS)

Which attribute of big data relates to whether the data are structured or unstructured? 1.Veracity 2.Velocity 3.Variety 4.Volume

Variety

A data analyst is working with a very large set of data and trying to calculate the amount of data processing that needs to be completed each week. Which attribute of big data is this analyst addressing? 1.Volume 2.Variety 3.Veracity 4.Velocity

Velocity

Which type of application can Lucas implement to allow for real-time business collaboration? 1.Video conferencing 2.File sharing 3.Email 4.Discussion boards

Video conferencing

Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem? 1.Wi-Fi-connected drones with GPS and camera 2.Satellite mapping systems with real-time updates 3.Airplanes that use heat sensors and GPS to map fires 4.Wi-Fi headsets that facilitate real-time communication

Wi-Fi-connected drones with GPS and camera

True or False Microsoft Project is classified as presentation software.

false

True or false: Implementation of the IoT in the healthcare industry will increase the need for hospital staff to monitor and record data to be analyzed.

false


Related study sets

Principles of Microeconomics FGCU CH.5

View Set

Streetcar named desire- light quotes

View Set

Physics Practice Test - Gravity and Tides

View Set

Lecture exam 4 17, 18, 22, 23, 24 End of Chapter Review

View Set

Week 6 - Personality and Mood Disorders

View Set