WGU - C182 2022/2023 COMPLETE SOLUTION PACKAGE (BUNDLE) $35.45 Add To Cart
6 Items
WGU C182 questions and correct answers (2022/2023).
WGU C182 questions with correct answers 2022/2023 Which risk assessment question is part of the Initiation Phase? - correct answer Could the end user re... [Show More] ject the outcome of the project? Planning - correct answer In what phase of the project does estimation occur? Initiation Phase # - correct answer Phase 1 of 4 in planning Planning Phase # - correct answer Phase 2 of 4 in planning Executing & Controlling Phase # - correct answer Phase 3 of 4 in planning Closing Phase # - correct answer Phase 4 of 4 in planning Initiation key elements - correct answer Problem definition, resource allocation and risk assessment Planning key elements - correct answer Determine objectives and activities, organize the activities, and estimate time and cost required to successfully complete the project Executing & Controlling key elements - correct answer Ensuring that the project is progressing properly and may involve hiring or training personnel, purchase hardware, and developing, testing, and deploying a product or service Closing key elements - correct answer Once all deliverables are met, a project is considered closed. May include a final report detailing the processes strengths and successes and obstacles that were encountered Why is it important to ensure that data support business goals? - correct answer To aid in making strategic decisions Data type needed to order names and numbers in a database - correct answer String data What effect does scope creep have on a project? - correct answer In increases unplanned costs for the project Scope Creep - correct answer Additional features are needed or could be beneficial which can impact the allocation of resources (i.e., time and capital), and put the project at risk In which category of the DIKW hierarchy would BI be located? - correct answer Knowledge DIKW - correct answer Describes the transition for data, information, knowledge to wisdom D in DIKW - correct answer Data, inputs directly received by a computer I in DIKW - correct answer Information, transform data into a useful form (using algebraic laws) K in DIKW - correct answer Knowledge, is gained experience from using information (knowing which algebraic laws to use in a given situation) W in DIKW - correct answer Wisdom, social setting to knowledge or the understanding of "why". Wisdom is the ultimate goal for a human in that it improves the person's ability to function in the modern world and to make informed decisions that take into account beliefs and values. Which system requirement is an example of considering user needs in the design of an information system? - correct answer Allowing easy access to customer account information Which field must contain a unique value in order for a relational database table to function? - correct answer Primary key N-Tier - correct answer Indicate that the number of tiers a system will be broken down into will vary between different software development projects. In typical n-tier development projects, the tiers are divided between the presentation tier, the logic tier, and the data tier Presentation N-Tier - correct answer User interface is developed Logic N-Tier - correct answer Where the system performs its logic processing Data N-Tier - correct answer Where data is stored, retrieved, and updated from database tables Benefit of separating database from application? - correct answer Data can change without the need to change the application, scale more easy, removes the need for users to interact directly with data How does a compiler work? - correct answer It takes the most recent instructions and translated them into machine language What is the characteristic of high-level languages? - correct answer Language translator programs are required Which is a type of two-factor authentication? - correct answer Biometrics End users assisted by developers; systems tested with simulated data - correct answer Alpha testing End user test the system in operational setting to see if it's useful - correct answer User Acceptance End user tests the system without help from developers; using actual data - correct answer Beta testing SDLC - correct answer Software Development Life Cycle SDLC aka - correct answer Staircase or most referred to as waterfall Preliminary Investigation Step # - correct answer Step 1 in SDLC Analysis Step # - correct answer Step 2 in SDLC Logical Design Step # - correct answer Step 3 in SDLC Physical Design Step # - correct answer Step 4 in SDLC Implementation Step # - correct answer Step 5 in SDLC Maintenance Step # - correct answer Step 6 in SDLC SDLC - Preliminary Investigation - correct answer Problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology SDLC - Analysis - correct answer Determine user requirements for new system and develop logical system models (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes) SDLC - Logical Design - correct answer Models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step SDLC - Physical Design - correct answer Logical models converted but are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system SDLC - Implementation - correct answer Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users SDLC - Maintenance - correct answer Modifications or corrections to the system are made Three main categories of a database? - correct answer Flat file, relational and hierarchical Flat file - correct answer One large single table without the relations between tables that a relational format provides Relational Database - correct answer Multiple tables (relations) with interrelated fields Hierarchical Databases - correct answer Organizes data using a tree-like or organizational chart type structure (the child can only have one parent) MVC stands for? - correct answer Model-View-Controller What is MVC? - correct answer Software development technique used in the implementation of user interfaces which include the model, the view and the controller Model in MVC - correct answer Software logic, business rules and application data View in MVC - correct answer User interface (i.e.; colors, fields...ect) Controller in MVC - correct answer Communication between the user and the model Which component facilitates communication between the other two components in the MVC architecture model? - correct answer View Types of system conversion (SDLC) - correct answer Direct, Parallel, Pilot, Phased Direct Conversion - correct answer The old system is "turned off" and the new system is "turned on" at a specific date and time Parallel Conversion - correct answer Period of time in which both systems (the old and the new) are operating concurrently Pilot Conversion - correct answer Starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization Phased Conversion - correct answer Deploys a subset of the system first, rather than deploying the whole system at once Which type of system conversion involves starting the conversion with a portion of the end users? - correct answer Pilot What is the database administrator's role in security? - correct answer To eliminate data redundancy when integrating old with new systems Administrator - correct answer Someone who is in charge of some portion of the IT infrastructure System Administrator - correct answer Process of maintaining the operating system of a computer system (including network of computers) Network Administrator - correct answer Physically laying down cable, making connections, working with hardware (for instance, routers and switches) and configure the individual machines to be able to communicate via the network Database Administrator - correct answer Design, development, support, installation, maintenance, performance analysis, and troubleshooting Difference between compiler and interpreter - correct answer Translates an entire program into executable, which can be run at a later time, while other does it incrementally Which data communication medium is used over very long distances? - correct answer Radio signals since cable is too expensive Most common form of network connection used today? - correct answer UTP (Un-shielded Twisted [wire] Pair) and fiber optic cables Coaxial Cable & UTP have in common? - correct answer Transmit information using electromagnetic waves Fiber Optic - correct answer Transmit information using light pulses Radio signals - correct answer Sent via radio towers, cell phone towers, and bounced off of satellites in orbit [Show Less]
WGU C182 QUESTION AND ANSWERS (2022/2023) (LATEST AND UPDATED) 1. Match each action with the corresponding category. a. Provides professional standar... [Show More] ds for ethical behavior i. Part of the role of IT b. Writes laws dealing with information technology. i. Outside the role of IT c. Engages in best practices for information systems. i. Part of the role of IT ... 2. How can an organization assist employees with the ethical use of information technology? a. By ensuring databases are backed up b. By monitoring network throughput c. By developing policies for information usage d. By establishing optimal server performance c. By developing policies for information usage 3. Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen? a. Digital Signature and Electronic Authorization laws b. Security Breach Notification Laws c. The Electronic Communication Privacy Act of 1986 d. Computer Matching and Primary Protection Act of 198 Security Breach Notification Laws 4. Which action would support confidentiality? a. Checking that data is correct b. Enabling file encryption c. Ensuring that software is properly licensed d. Making sure data is available when needed Enabling file encryption 5. Which disaster recovery strategy is used to save info to multiple hard drives at the same time? a. Site sharing b. Cold site storage c. Data mirroring d. Storing tape backups Data mirroring 6. What two necessary elements of business continuity planning? a. Identifying risks that may occur b. Assessing key organizational activities c. Ensuring continuity in the sequence of staffing schedules d. Hiring an outside consultant to develop a plan identifying risks that may occur Ensuring continuity in the sequence of staffing schedules 7. Which type of systems conversation involves starting the conversion with a portion of end users? a. Phased b. Pilot c. Direct d. Parallel Pilot 8. Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? a. User acceptance b. Beta c. Alpha d. Analysis User acceptance 9. Which system requirement is an example of considering user needs in the design of an information system? a. Allowing easy access to customer account information b. Including an eye-tracking device for an input device c. Incorporating a program that can translate text into spoken words d. Ensuring that insertions into the buffer are limited in size Allowing easy access to customer account information 10. What effect does scope creep have on a project? a. It moves up the deadline of the project b. It includes unqualified team members on the project c. It impacts the allocation of resources for the project d. It adds non-essential features to the project It impacts the allocation of resources for the project 11. In what phase of a project does time estimation occur? a. Closing b. Planning c. Initiation d. Executing and controlling Planning 12. Which risk assessment question is part of the initiation phase? a. Was the project completed within budget b. Did the scope change after the induction of the project? c. Could the end users reject the outcome of the project? d. What were the strengths of the project? Could the end users reject the outcome of the project? 13. What step should be taken by a business when a third-party solution is found that will benefit a project? a. Build the software with in house resources b. Begin coding the solution with estimated parameters c. Contact the group to arrange a demo of their product d. Suggest that the company continues to explore options Contact the group to arrange a demo of their product 14. Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territories/regions? a. Supporting the continuation of the current infrastructure. b. Expanding the infrastructure to support additional locations c. Scheduling their own internal meetings to discuss department goals d. Working independently from business management to achieve company goals Expanding the infrastructure to support additional locations 15. Which is the role of the systems administrator? a. To develop and maintain the websites on the company web server b. To install and maintain the website c. To install and maintain network resources d. To design networks To install and maintain network resources 16. What is the purpose of the IT department? a. It hires employees for the organization b. It promotes the firm's products c. It oversees funds flowing through the organization d. It helps the organization achieve strategic goals It helps the organization achieve strategic goals 17. What type of information processing allows input data to be accepted as a set of records and processed as a unit? a. Just in time b. Real time c. Batch d. Event driven Batch 18. What is the database administrator's role in security? a. To eliminate data redundancy when integrating old with new systems b. To institute protocols to protect the databases from external threats c. To set ports on the router to secure the transport of data d. To create a redundant server architecture To institute protocols to protect the databases from external threats 19. What are the three main categories of databases? a. Flat file, relational, hierarchal b. Table query report c. Relation join project d. Spreadsheet simple complex Flat file, relational, hierarchal 20. Which filed must contain a unique value in order for a relational database table to function? a. Name b. Record number c. ID Number d. Primary Key . Primary Key 21. In which category of the DIKW hierarchy would business intelligence be located? a. Information b. Knowledge c. Data d. Wisdom Knowledge 22. Why is it important to ensure that data support business goals? a. To ensure raw data is captured b. To provide opportunities for communication c. To establish needs of users d. To aid in making strategic decisions To aid in making strategic decisions 23. Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? a. Boolean b. Floating Point c. String data d. Numeric Integer String data 24. Which data type is used to represent product order code that comprises alphanumberic characters? a. Fixed-Point b. String c. Boolean d. Floating-point String 25. Which SQL clause is used to inform the database management system (DMBS) which tables should be interrogated by the query? a. FROM b. HERE c. SELECT d. WHERE FROM 26. What is the role of drivers in facilitating communication between applications and databases? a. They allow all the data to be communicated via the network. b. They allow the application to interact with the database c. They allow ODBC to be used for interactions with the database and applications d. They allow SQL to manage communications between applications and databases. They allow ODBC to be used for interactions with the database and applications 27. What is another term for a formula that outlines how to execute a task? a. User-Defined function b. Process c. Pseudocode d. Algorithm d. Algorithm 28. Which is true of databases and the applications that interact with them? a. Applications store data in their own files b. The database determines the application classes c. Applications are interdependent with the database. d. The database can support at most one application. Applications are interdependent with the database. 29. Which two languages have traditionally been used for automation rather than software development? a. TCL b. PYTHON c. C++ d. COBOL TCL PYTHON 30. What statement is true concerning compiled and interpreted computer language? a. Both compiled and interpreted languages are written in binary code. b. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. c. An interpreted language program runs faster than a compiled language program. d. A compiled language-program is portable and can be run on multiple types of system, whereas an interpreted program runs on a single type of system. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. 31. Which component facilitates communication between the other two components in the MVC architecture model? a. View b. Model c. Presentation d. Controller Controller 32. On which tier of an N-Tier architecture model are user interfaces developed? a. Logic b. Application c. Data d. Presentation Presentation [Show Less]
WGU C182 Practice Tests-questions and answers (2022/2023) What is the definition of information technology? It is the technology used to create, main... [Show More] tain, and make information accessible. Which IT position has the responsibillity of working with routers and switches? Network Administrator In which generation were silicon chips first used in computers? Third generation Which low-level language corresponds one to one with assembly? machine language What allows an organization to use software through the internet? Saas or Software as a Service What is one of IT's role in golobalization? It allows companies to reach a wider customer base. Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive? Desktop Which two software application packages would be classified as productivity software? Spreadsheet program and word processor Which two computer peripherals are connected to the computer through a port? External microphone and USB flash drive Which term is defined as a collection of information used to support management of an organization? Information system A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio? Data A dept. manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering? Timely Which two are parts of an information system? Databases and Networks. What is the difference between processing and storage? Processing collects and translates data into useful information, while storage places the translated data in specific locations. Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers? Costs for hardware resources are decreased A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. Virtual machines Each computer is roughly equal to every other computer. Peer-to-peer One computer will request information from another computer, which responds with requested information. Client-server Allows the user to control the actions of the software, and through the software, to access hardware. Operating System Which action by application programs requires support from a networked operating system? An Internet browser displays a web page. The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need? Proxy server Which characteristic identifies application software that is cloud-based? Provided by third-party providers What type of software permits free temporary use followed by long-term activation for a fee? Shareware What is the purpose of an End User License Agreement for a commercial software package? Establishes the customer's right to use the software. What is the difference between proprietary and open-source software license? Proprietary software has a cost whereas open-source software is free. What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years? A copyright Which two components are parts of a central processing unit (CPU)? Control unit (CU), and Arithmetic logic unit (ALU) An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Printer and Monitor Which item is a storage device? flash drive What indicates a specific Internet location? IP address Which description explains the role of a domain name system (DNS)? Translates human-readable aliases into IP addresses Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? Resource path ID Which goal of Information Assurance (IA) requires that information is accessible when needed? Availability Which technique uses all possible combinations of letters and numbers to crack a password? Brute force Which is a type of two-factor authentication? Smart Card In which type of network topology is each networked device directly connected to every other networked device? Mesh Which communication medium is should be used when sending data transmissions from Singapore to Mexico City? Radio signals Which is a characteristic of high-level languages? The source code has to be complied. How does a compiler work? It takes the most recent instructions and translates them into machine language What is true of compiled and interpreted computer language? A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. Which language is often used for rapid prototyping and the creation of GUIs? TCL What is true of databases and the applications that interact with them? Applications are interdependent of the database. What is another term for a formula that outlines how to execute a task? Algorithm Which data type is used to represent product order code that comprises alphanumeric characters? String data Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? Character string Why is it important to ensure that data support business goals? To aid in making strategic decisions. In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located? Knowledge Which field must contain a unique value in order for a relational database table to function? primary key What are the three main categories of databases? Flat file, relational, hierarchal What is the database administrators role in security? To institute protocols to protect the databases from external threats. Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? ... What type of information processing allows input data to be accepted as a set of records and processed as a unit? Batch What is the role of drivers in facilitating communication between applications and databases? They allow the application to interact with the database. Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query? FROM What is the role of the systems administrator? To install and maintain network resources. What is the purpose of an IT department? It helps the organization achieve strategic goals. Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion? Expanding the infrasturcture to support additional locations. What step should be taken by a business when a third-party solution is found that will benefit a project? Contact the group to arrange a demo of their product. Which risk assessment question is part of the initiation phase? Could the end users reject the outcome of the project? In what phase of a project does time estimation occur? Planning What effect does scope creep have on a project? It increases unplanned costs for the project. Which system requirement is an example of considering user needs in the design of an information system? Allowing secure access to customer account information. Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? User Acceptance Which type of systems conversion involves starting the conversion with a portion of end users? Pilot What are two necessary elements of business continutiy planning? Identifying risks that may occur. Assessing key organizational activities. Which action would support confidentiality? Updating security software. Which disaster recovery strategy is used to save information to multiple hard drives at the same time? Data mirroring Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen? Security Breach Notification laws How can an organization assist employees with the ethical use of information technology? By developing policies for information usage. What is part of the role of an It professional? Provides professional standards for ethical behavior. Engages in best practices for information systems Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working? Data Which software is run automatically rather than by the end user? System software Which account is also referred to as root or superuser? The Administrator Account Which of the following best describes a hierarchical database format? Data are modeled using parent-child relationships. What are the responsibilities of the system administrator? Providing support to users Creating new user accounts Installing new file server hardware and software Which of the following is an example of a relational database? A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system. Which of the following describes the duties of a web administrator? Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server. Which of the following statements accurately describe IT certifications? Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area. What are important characteristic of an IT professional? Ability to troubleshoot Desire to continually learn. Good communication skills - both oral and written As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working? Knowledge What describes the difference between information systems and information technology? An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software. What best represents the relevant characteristic of quality data? The data used applies to the question being answered. What is/are true of the IPOS cycle? Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs. What is an accurate definition of a computer system? A computer system is a collection of hardware and software components that work together to meet the needs of the user. What is the difference between software and hardware? Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives. What would require the use of a network? Computers in an office sharing the same printer. Schools turning in attendance files to the district office. Gourmet chocolate being sold on the Internet. Which type of software includes programs such as Microsoft Word and PowerPoint? Application What is a program that will allow a computer to easily access the hardware and software of the computer system? Operating system __________ software works with hardware to provide a network service Windows Server What is another term that defines a script? Interpreted program In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan. Design During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders. User Acceptance Testing In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released. Beta ___________ is ephemeral, meaning data stored is lost when the computer is powered off. RAM In a SQL query, the __________ operation combines two tables together? JOIN __________ uses the concept of reflection of light through a core made up of glass or plastic. Optical Wire The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document. URL This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications PaaS (Platform as a Service) With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere IaaS (Infrastructure as a Service) What is the correct order of project phase for Project Management? Initiation, Planning, Executing, Closing During this phase of Project Management, the projects scope and requirements are defined Initiation phase The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP web server This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols) eMail server In this network topology ALL devices have a single point-to-point connection with a central device STAR network This type of software is made freely available as source code. open source software This software protection will protect an individuals original work (tangible form)for the authors life + 70 years Copyright This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing Patent The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in). SELECT The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined. FROM The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query. WHERE clause All of the following are compiled languages BASIC Java C++ Which of the following is the correct function of the compiler? Translates the entire program, creating an executable program, which can be run at a later time. A program written in a high-level language must be converted into __________ code to be executed by the computer. Machine [Show Less]
WGU C182 Practice Tests-questions and answers (2022/2023) What is the definition of information technology? It is the technology used to create, main... [Show More] tain, and make information accessible. Which IT position has the responsibillity of working with routers and switches? Network Administrator In which generation were silicon chips first used in computers? Third generation Which low-level language corresponds one to one with assembly? machine language What allows an organization to use software through the internet? Saas or Software as a Service What is one of IT's role in golobalization? It allows companies to reach a wider customer base. Which category of computer has an external flat screen monitor, optical disk drive, and a large capacity hard drive? Desktop Which two software application packages would be classified as productivity software? Spreadsheet program and word processor Which two computer peripherals are connected to the computer through a port? External microphone and USB flash drive Which term is defined as a collection of information used to support management of an organization? Information system A website logs the timestamp, location, and browser of every visitor. It then aggregates this content into peak traffic times and days,minimum and maximum hits for each country and region, and popularity of certain browsers among visitors. What is the timestamp considered in this scenerio? Data A dept. manager is creating a budget estimate for the upcoming year. The manager would like to determine whether the data will be available when the decision for the next year have to be made. Which characteristic of valuable data is the manager considering? Timely Which two are parts of an information system? Databases and Networks. What is the difference between processing and storage? Processing collects and translates data into useful information, while storage places the translated data in specific locations. Which is a benefit of multiple interconnected computers (distributed) versus mainframes or large computers? Costs for hardware resources are decreased A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. Virtual machines Each computer is roughly equal to every other computer. Peer-to-peer One computer will request information from another computer, which responds with requested information. Client-server Allows the user to control the actions of the software, and through the software, to access hardware. Operating System Which action by application programs requires support from a networked operating system? An Internet browser displays a web page. The chief information officer wants to update the network server to improve Internet access while also blocking certain social media websites. What type of server will meet this need? Proxy server Which characteristic identifies application software that is cloud-based? Provided by third-party providers What type of software permits free temporary use followed by long-term activation for a fee? Shareware What is the purpose of an End User License Agreement for a commercial software package? Establishes the customer's right to use the software. What is the difference between proprietary and open-source software license? Proprietary software has a cost whereas open-source software is free. What gives the author of a software package the ability to prevent unauthorized duplication for at least 35 years? A copyright Which two components are parts of a central processing unit (CPU)? Control unit (CU), and Arithmetic logic unit (ALU) An employee needs to edit a contract and prepare a hard copy for the project team. Which two peripheral devices should be used? Printer and Monitor Which item is a storage device? flash drive What indicates a specific Internet location? IP address Which description explains the role of a domain name system (DNS)? Translates human-readable aliases into IP addresses Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? Resource path ID Which goal of Information Assurance (IA) requires that information is accessible when needed? Availability Which technique uses all possible combinations of letters and numbers to crack a password? Brute force Which is a type of two-factor authentication? Smart Card In which type of network topology is each networked device directly connected to every other networked device? Mesh Which communication medium is should be used when sending data transmissions from Singapore to Mexico City? Radio signals Which is a characteristic of high-level languages? The source code has to be complied. How does a compiler work? It takes the most recent instructions and translates them into machine language What is true of compiled and interpreted computer language? A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. Which language is often used for rapid prototyping and the creation of GUIs? TCL What is true of databases and the applications that interact with them? Applications are interdependent of the database. What is another term for a formula that outlines how to execute a task? Algorithm Which data type is used to represent product order code that comprises alphanumeric characters? String data Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? Character string Why is it important to ensure that data support business goals? To aid in making strategic decisions. In which category of the Data, Information, Knowledge, Wisdom (DIKW) hierarchy would business intelligence be located? Knowledge Which field must contain a unique value in order for a relational database table to function? primary key What are the three main categories of databases? Flat file, relational, hierarchal What is the database administrators role in security? To institute protocols to protect the databases from external threats. Which part of a Uniform Resource Locator (URL) identifies the location of the document on the server? ... What type of information processing allows input data to be accepted as a set of records and processed as a unit? Batch What is the role of drivers in facilitating communication between applications and databases? They allow the application to interact with the database. Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query? FROM What is the role of the systems administrator? To install and maintain network resources. What is the purpose of an IT department? It helps the organization achieve strategic goals. Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion? Expanding the infrasturcture to support additional locations. What step should be taken by a business when a third-party solution is found that will benefit a project? Contact the group to arrange a demo of their product. Which risk assessment question is part of the initiation phase? Could the end users reject the outcome of the project? In what phase of a project does time estimation occur? Planning What effect does scope creep have on a project? It increases unplanned costs for the project. Which system requirement is an example of considering user needs in the design of an information system? Allowing secure access to customer account information. Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? User Acceptance Which type of systems conversion involves starting the conversion with a portion of end users? Pilot What are two necessary elements of business continutiy planning? Identifying risks that may occur. Assessing key organizational activities. Which action would support confidentiality? Updating security software. Which disaster recovery strategy is used to save information to multiple hard drives at the same time? Data mirroring Which regulation governs the actions of a company in case of data records being compromised, lost, or stolen? Security Breach Notification laws How can an organization assist employees with the ethical use of information technology? By developing policies for information usage. What is part of the role of an It professional? Provides professional standards for ethical behavior. Engages in best practices for information systems Marcus has a summer job working at a real estate agency. He is entering client addresses into the company's computer system. At which stage of the DIKW hierarchy is Marcus working? Data Which software is run automatically rather than by the end user? System software Which account is also referred to as root or superuser? The Administrator Account Which of the following best describes a hierarchical database format? Data are modeled using parent-child relationships. What are the responsibilities of the system administrator? Providing support to users Creating new user accounts Installing new file server hardware and software Which of the following is an example of a relational database? A database containing student records with fields such as Student ID, First Name, Last Name, Major, GPA that links to other databases in the University's system. Which of the following describes the duties of a web administrator? Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server. Which of the following statements accurately describe IT certifications? Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area. What are important characteristic of an IT professional? Ability to troubleshoot Desire to continually learn. Good communication skills - both oral and written As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working? Knowledge What describes the difference between information systems and information technology? An information system does not have to use computer hardware; whereas information technology requires the use of hardware and software. What best represents the relevant characteristic of quality data? The data used applies to the question being answered. What is/are true of the IPOS cycle? Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs. What is an accurate definition of a computer system? A computer system is a collection of hardware and software components that work together to meet the needs of the user. What is the difference between software and hardware? Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives. What would require the use of a network? Computers in an office sharing the same printer. Schools turning in attendance files to the district office. Gourmet chocolate being sold on the Internet. Which type of software includes programs such as Microsoft Word and PowerPoint? Application What is a program that will allow a computer to easily access the hardware and software of the computer system? Operating system __________ software works with hardware to provide a network service Windows Server What is another term that defines a script? Interpreted program In the _______ phase of the SDLC (system development life cycle), architects think about the components that they would need to solve the problem or implement the plan. Design During _______ users test the system in an operational setting to make sure the system continues to align with business objectives and meet the goals of the stakeholders. User Acceptance Testing In this phase of testing the system is given to a segment of end users for testing from their perspective before the final version is released. Beta ___________ is ephemeral, meaning data stored is lost when the computer is powered off. RAM In a SQL query, the __________ operation combines two tables together? JOIN __________ uses the concept of reflection of light through a core made up of glass or plastic. Optical Wire The _______ includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document. URL This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications PaaS (Platform as a Service) With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere IaaS (Infrastructure as a Service) What is the correct order of project phase for Project Management? Initiation, Planning, Executing, Closing During this phase of Project Management, the projects scope and requirements are defined Initiation phase The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP web server This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols) eMail server In this network topology ALL devices have a single point-to-point connection with a central device STAR network This type of software is made freely available as source code. open source software This software protection will protect an individuals original work (tangible form)for the authors life + 70 years Copyright This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing Patent The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in). SELECT The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined. FROM The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query. WHERE clause All of the following are compiled languages BASIC Java C++ Which of the following is the correct function of the compiler? Translates the entire program, creating an executable program, which can be run at a later time. A program written in a high-level language must be converted into __________ code to be executed by the computer. Machine [Show Less]
WGU - C182 2022/2023 - Quiz with Verified Answers 1. Match each action with the corresponding category. a. Provides professional standards for ethica... [Show More] l behavior i. Part of the role of IT b. Writes laws dealing with information technology. i. Outside the role of IT c. Engages in best practices for information systems. i. Part of the role of IT - answer 2. How can an organization assist employees with the ethical use of information technology? a. By ensuring databases are backed up b. By monitoring network throughput c. By developing policies for information usage d. By establishing optimal server performance - answerc. By developing policies for information usage 3. Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen? a. Digital Signature and Electronic Authorization laws b. Security Breach Notification Laws c. The Electronic Communication Privacy Act of 1986 d. Computer Matching and Primary Protection Act of 198 - answerSecurity Breach Notification Laws 4. Which action would support confidentiality? a. Checking that data is correct b. Enabling file encryption c. Ensuring that software is properly licensed d. Making sure data is available when needed - answerEnabling file encryption 5. Which disaster recovery strategy is used to save info to multiple hard drives at the same time? a. Site sharing b. Cold site storage c. Data mirroring d. Storing tape backups - answerData mirroring 6. What two necessary elements of business continuity planning? a. Identifying risks that may occur b. Assessing key organizational activities c. Ensuring continuity in the sequence of staffing schedules d. Hiring an outside consultant to develop a plan - answeridentifying risks that may occur Ensuring continuity in the sequence of staffing schedules 7. Which type of systems conversation involves starting the conversion with a portion of end users? a. Phased b. Pilot c. Direct d. Parallel - answerPilot 8. Which type of systems testing includes having the customer test the system in an operational setting to see if it is useful? a. User acceptance b. Beta c. Alpha d. Analysis - answerUser acceptance 9. Which system requirement is an example of considering user needs in the design of an information system? a. Allowing easy access to customer account information b. Including an eye-tracking device for an input device c. Incorporating a program that can translate text into spoken words d. Ensuring that insertions into the buffer are limited in size - answerAllowing easy access to customer account information 10. What effect does scope creep have on a project? a. It moves up the deadline of the project b. It includes unqualified team members on the project c. It impacts the allocation of resources for the project d. It adds non-essential features to the project - answerIt impacts the allocation of resources for the project 11. In what phase of a project does time estimation occur? a. Closing b. Planning c. Initiation d. Executing and controlling - answerPlanning 12. Which risk assessment question is part of the initiation phase? a. Was the project completed within budget b. Did the scope change after the induction of the project? c. Could the end users reject the outcome of the project? d. What were the strengths of the project? - answerCould the end users reject the outcome of the project? 13. What step should be taken by a business when a third-party solution is found that will benefit a project? a. Build the software with in house resources b. Begin coding the solution with estimated parameters c. Contact the group to arrange a demo of their product d. Suggest that the company continues to explore options - answerContact the group to arrange a demo of their product 14. Which action would be important for the IT department to take in order to help their business meet the goal of increased expansion into new territories/regions? a. Supporting the continuation of the current infrastructure. b. Expanding the infrastructure to support additional locations c. Scheduling their own internal meetings to discuss department goals d. Working independently from business management to achieve company goals - answerExpanding the infrastructure to support additional locations 15. Which is the role of the systems administrator? a. To develop and maintain the websites on the company web server b. To install and maintain the website c. To install and maintain network resources d. To design networks - answerTo install and maintain network resources 16. What is the purpose of the IT department? a. It hires employees for the organization b. It promotes the firm's products c. It oversees funds flowing through the organization d. It helps the organization achieve strategic goals - answerIt helps the organization achieve strategic goals 17. What type of information processing allows input data to be accepted as a set of records and processed as a unit? a. Just in time b. Real time c. Batch d. Event driven - answerBatch 18. What is the database administrator's role in security? a. To eliminate data redundancy when integrating old with new systems b. To institute protocols to protect the databases from external threats c. To set ports on the router to secure the transport of data d. To create a redundant server architecture - answerTo institute protocols to protect the databases from external threats 19. What are the three main categories of databases? a. Flat file, relational, hierarchal b. Table query report c. Relation join project d. Spreadsheet simple complex - answerFlat file, relational, hierarchal 20. Which filed must contain a unique value in order for a relational database table to function? a. Name b. Record number c. ID Number d. Primary Key - answer. Primary Key 21. In which category of the DIKW hierarchy would business intelligence be located? a. Information b. Knowledge c. Data d. Wisdom - answerKnowledge 22. Why is it important to ensure that data support business goals? a. To ensure raw data is captured b. To provide opportunities for communication c. To establish needs of users d. To aid in making strategic decisions - answerTo aid in making strategic decisions 23. Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? a. Boolean b. Floating Point c. String data d. Numeric Integer - answerString data 24. Which data type is used to represent product order code that comprises alphanumberic characters? a. Fixed-Point b. String c. Boolean d. Floating-point - answerString 25. Which SQL clause is used to inform the database management system (DMBS) which tables should be interrogated by the query? a. FROM b. HERE c. SELECT d. WHERE - answerFROM 26. What is the role of drivers in facilitating communication between applications and databases? a. They allow all the data to be communicated via the network. b. They allow the application to interact with the database c. They allow ODBC to be used for interactions with the database and applications d. They allow SQL to manage communications between applications and databases. - answerThey allow ODBC to be used for interactions with the database and applications 27. What is another term for a formula that outlines how to execute a task? a. User-Defined function b. Process c. Pseudocode d. Algorithm - answerd. Algorithm [Show Less]
$35.45
184
0
Beginner
Reviews received
$35.45
DocMerit is a great platform to get and share study resources, especially the resource contributed by past students.
Northwestern University
I find DocMerit to be authentic, easy to use and a community with quality notes and study tips. Now is my chance to help others.
University Of Arizona
One of the most useful resource available is 24/7 access to study guides and notes. It helped me a lot to clear my final semester exams.
Devry University
DocMerit is super useful, because you study and make money at the same time! You even benefit from summaries made a couple of years ago.
Liberty University