WGU D075 Information Technology EXAM STUDY BUNDLE 2023 – 2024 (COMPLETE PACKAGE)(Verified)

WGU D075 Information Technology EXAM STUDY BUNDLE 2023 – 2024 (COMPLETE PACKAGE)(Verified)

WGU D075 Practice Test Questions and Answers
2023 – 2024 (Verified Answers)

  1. Computer processing power doubles every 18 months. This is
    expressed by which prediction in observation from 1965?
    Moore’s hypothesis
    Hardware stability
    Moore’s law
    Pricing scalability ANS Moore’s law
  2. Which hardware component execute most of the instructions on a
    com- puter and is considered the brains of the computer?
    Hardware
    Central processing
    unit Operating system
    Motherboard ANS Central Processing Unit (CPU)
  3. Data and information exchange is provided electronically and helps
    make decisions. It can be categorized as which of the following?

Collaborative software
Telecommunication services
Electronic computing tools
Management tools ANS Electronic computing tools

  1. Which of the items below can be described as an efficient and optimal
    way of completing a task for process in a data management process?
    Data governance
    Cloud computing
    Best practice
    IT management ANS Best practice
  2. Which type of memory allows data to be accessed, is fast, and has
    short term working memory that the CPU access is directly?
    Register memory
    Caché memory
    Random access memory
    Virtual memory ANS Random Access Memory (RAM)
  3. Which of the following is an example of an operating system, often
    called a platform?

Microsoft Word
Adobe acrobat
Norton antivirus
macOS ANS
macOS
7.A printer or scanner that is connected to a computer via a wire or Wi-Fi
is a? ANS Peripheral device

  1. Managers use improved processes and tools to increase efficiency
    and effectiveness. Which activities are these?
    Cost of business
    Value added
    Budget constraints
    Cost of production ANS Value added
  2. What is the name of the component, also referred to as a Wi-Fi
    adapter, necessary for computers to connect to the network?
    Media access
    control Peripheral
    device

1 / 15
WGU D075 Test Questions and Answers
2023 – 2024 (Verified Answers)

  1. What is the purpose of a universal serial bus (USB) on a laptop or
    desktop computer?
    It provides a wired ethernet connection to the network.
    It serves as an internal transmission bus between components within the
    computer.
    It allows for universal data transmission to various types of wireless networks.
    It allows the computer to connect peripheral devices. ANS It allows the
    computer to connect peripheral devices.
    2.What is the name of the law that states a doctor cannot share a patients
    results/records? ANS Health Insurance Portability and Accountability
    Act A federal law that provides data privacy and implements security
    provisions to safeguard an individual’s medical information. A HIPAA
    form is signed each time you visit a new doctor so they can
    understand who they can share that information with.

2 / 15
3.FERPA—Family Educational Rights and Privacy Act ANS FERPA—
Family Edu- cational Rights and Privacy Act A federal law that
protects the rights of students’ educational records. Information about
grades, attendance, disciplinary records, report cards, transcripts, and
so forth cannot be given to anyone not specifically listed on a FERPA
form that is signed when a student enters a school.

  1. Which part of a computer executes the computations required by
    the software?
    The central processing
    unit The operating system
    The motherboard
    The random-access memory ANS The central processing unit
  2. Which category of software includes programs such as word
    processors and PDF document readers?
    Utility software
    Application software
    Project software
    System software ANS Application software
  3. What is the major function of a computer operating
    system? Data management
    Application program
    management Network
    management

3 / 15
Computer resource management ANS Computer resource management

1 / 5
WGU D075 Information Technology Unit 2 – 5 Tests
2023 – 2024

  1. UNIT 2
    Each computer attached to the internet or a corporate network is
    uniquely identified so that it can be sent the information directed to it.
    What is this unique identifier known as ANS UNIT 2
    Media Access Control address (MAC)
    2.What is the most important qualification that a Chief Information Officer
    (CIO) must possess ANS Business and leadership experience
  2. A company has recently discovered that unauthorized users have
    ac- cessed data on the company intranet.
    Which IT professional should investigate this concern ANS Information
    security analyst
    4.What do all the applications in a productivity software suite have in
    com- mon ANS The same graphical user interface

2 / 5
5.What is the purpose of a network switch ANS To direct data to the
intended target location.

  1. Policies must be enacted and enforced to protect corporate assets.
    These policies include strong passwords, safe web browsing protocols,
    firewall implementations, and malware protection.
    Who is the IT professional responsible for enacting these policies ANS
    Network Administrator
    7.What is the term used to refer to a massive, room-sized computer that
    processes and stores enormous amounts of bulk data and information
    ANS – Mainframes
    8.In which network topology is each client computer connected directly
    to the hub ANS Star
  2. What is the term used to refer to end-user computers on a network ANS-
    Clients
  3. A company is planning several IT projects including a major
    software development project. The software development project will be

1 / 10
WGU D075 Objective Assessment Retake Questions and
Answers 2023 – 2024 (Verified Answers)

  1. A large company uses a system that provides information to its
    suppliers to maintain the supply chain process.
    Which type of system is this company using? ANS An extranet
    2.Which function of a customer relationship management system helps
    a company identify opportunities to increase its business? ANS Strategy
  2. A company makes personal computers and sells them directly to the
    public. At present, all business processes are completed manually by
    em- ployees, lengthening the time from customer order to shipment.
    Which business process would deliver the most immediate customer
    satis- faction and reduced costs if automated? ANS Transaction
    processing
    4.Which function or feature has allowed mobile phones to replace PCs
    for many small-business functions? ANS Mobile apps
    5.Jack meets with the university dean to discuss his 18-year-old son’s

2 / 10
progress. Jack’s son is a freshman at the university. Jack wants to know if
his son is performing well in his classes. The dean has access to the
computer systems containing the academic records for Jack’s son but is
also aware of constraints set by the Family Educational Rights and Privacy
Act (FERPA). What should the dean do? ANS Share the records only after
receiving authorization from Jack’s son.
6.Which advantage does a business gain by using cloud web hosting
(CWH) rather than local hosting? ANS Cost savings

  1. Businesses are expected to comply with ethical business practices
    in every department.
    What is an example of an information technology (IT) business practice
    that promotes ethical behavior? ANS Auditing to remove unlicensed
    software
    8.Which technology necessitated the development and implementation
    of Internet Protocol version 6 (IPv6)? ANS The Internet of Things (IoT)
    9.Which core business department is primarily responsible for
    business intelligence? ANS Research and development

3 / 10
10.There are six major components of an IT infrastructure. These six components work in concert with each other to provide the connectivity and
collaboration necessary for businesses to utilize IT to its best advantage,
yet each component cannot stand alone. They are distinctly intertwined
with each other and work in concert to provide IT functionality to
businesses. ANS – Hardware
Software

1 / 17
WGU D075 Information Technology Management Essentials
1.Adware: Programs that automatically display or download
advertising to a com- puter.
2.Application Software: Software that is designed for the user to
carry out a specific task.
3.Best Practice: A management process, technique, or method that
is most effective at arriving at a desired outcome or a better
outcome than any other process, technique, or method.
4.Big Data: Data that is collected from all over the internet, including
smartphone metadata, internet usage records, social media activity,
computer usage records, and countless other data sources.
5.Bus Topology: A network topology sometimes called a linear bus,
where each of a network’s nodes is connected to a common linear
backbone that has two endpoints.

2 / 17
6.Business Analytics: Attempts to make connections between data so
organiza- tions can try to predict future trends that may give them a
competitive advantage.
7.Business Intelligence (BI): Strategies and technologies used by
enterprises for the data analysis of business information.
8.Cache: A hardware or software component that stores data so
that future requests for that data can be served faster.
9.Campus Area Network (CAN): A computer network that connects two
or more LANs that are located on a campus.
10.Chief Information Officer (CIO): A job title for the board-level head of
an information technology department within a business organization.
The CIO’s job is to make sure IT assets are in place to ensure a
smooth transition.
11.Chief Information Security Officer (CISO): The CISO is generally
focused on the security of an organization’s data and information,
making sure it is backed up, deciding who gets to see it and who does

3 / 17
not, and so on.
12.Chief Security Officer (CSO): A CSO is in charge of such things as the
physical security and safety of employees, facilities, and corporate
assets and may have a law enforcement background.
13.Chief Technology Officers (CTO): The CTO runs the organization’s IT
engi- neering group and serves as the company’s top technology
architect.
14.Click Fraud: An internet fraud scheme that automatically passes a
user to an advertiser, whether they had any intention of visiting or not,
in order to collect a per-click fee.

4 / 17
15.Clients: An end user’s computer in a computer network.
16.Computer Network: Two or more computers connected together to
commu- nicate and share resources.
17.Cybersecurity: The convergence of technologies, sound practice,
and processes designed to protect networks and their devices,
programs, and data from attack or unauthorized access.
18.Data Analysis: The application of statistics and logic techniques
to define, illustrate, and evaluate data.
19.Data Management (DM): The practices, architectural techniques, and
tools for achieving consistent access to and delivery of data across the
spectrum of data subject areas and data structure types in the
enterprise.
20.Data Management Processes: The process of acquiring data, making
sure the data are valid, and then storing and processing the data into
usable information for a business.
21.Data Mapping: Extra notes about the definition of a field, its data,
and its use.
22.Data Mining: The examination of huge sets of data to find
patterns and connections and identify outliers and hidden
relationships.
23.Database Administrators (DBAs): DBAs categorize data requirements
and create the database entities and models that ensure accurate and
smooth-flowing information throughout a business.

1 /
WGU D075 Study Guide 2023 – 2024
1.Infrastructure: Underlying foundation of organization or project.
The basic framework.
2.What is infrastructure important? How does it support organizational
effectiveness?: Everything else is built upon it. It allows change and
evolution of the business.
3.Paradigm Shift: Total shift in thinking.
4.How does a paradigm shift support organizational effectiveness?:
Allows critical business decisions.
5.Information Technology: The study, design, mgmt. & development of
software & hardware.

2 /

  1. How does information technology support organizational
    effectiveness?-
    : Supports business processes, but is also an integral part of the
    business products produced.
    7.What are the 6 components of IT?:
    Hardware Software
    Networks
    Data
    People
    Processe
    s
    8.Hardware: The physical parts of a computer, such as the RAM, CPU &
    NIC.
    9.Software: Collection of computer programs, such as Excel &
    Photoshop.
    10.Networks: Two or more computers connected together to
    communicate & share resources.

3 /
11.What are some examples of types of networks?: LAN, MAN, CAN &
WAN
12.Data: Collection of information.
13.What is an example of data?: Internet Usage & Social Media
Activity. The most valuable asset to a business after finances.
14.People: IT Personnel & End Users
15.What is important about people?: They are the key to the IT
infrastructure.
16.Processes: Any task/activity a computer performs. Consists of the
applications a business uses in its daily operations.
17.What are 6 components of hardware?: Mainframe, Midrange & Micro
Com- puters, Desktop, Laptop & Handheld Computers

1 / 11
WGU D075 Objective Assessment Questions and Answers
2023 – 2024 (Verified Answers)

  1. A large heating and air conditioning company provides each
    employee with a small computing device that the employees use to track
    work and accept payments.
    Which term refers specifically to this type of device?
    *Peripheral computer
    *Microcomputer
    *Minicomputer
    *Handheld computer ANS Handheld computer
  2. What is the major function of a computer operating system?
    *Data management
    *Application program management
    *Network management
    *Computer resource management ANS Computer resource management
  3. Within a productivity suite, which method of selecting static data
    from one application and copying it to another application requires the
    use of temporary memory?
    *File transfer

2 / 11
*Object embedding
*Object linking
*Copy and paste ANS Copy and paste

  1. What are the basic components, in addition to computers, that are
    required for a local network to function?
    *Ethernet cards, a common protocol, ethernet cables, and a hub
    *Ethernet cards, a modem, a router, and a network database
    *Internet connection, a network interface controller, and a cabling system
    *Internet connection, a network operating system, and a network
    administra- tor ANS Ethernet cards, a common protocol, ethernet cables,and a hub
  2. Which type of device is an ethernet card?
    *Network interface controller (NIC)
    *Network firewall hardware
    *Network operating system (NOS)
    *Network server hardware ANS Network interface controller (NIC)
  3. What is the purpose of a MAC address?
    *To uniquely identify an internet URL
    *To uniquely identify a computer motherboard
    *To uniquely identify an email client

3 / 11
*To uniquely identify a computer on a network ANS To uniquely identify a
computer on a network

  1. Which topology implements a network where if the central hub fails,
    all nodes attached to the hub will also fail?
    *A mesh topology
    *A linear bus topology
    *A star topology
    *A ring topology ANS A star topology
  2. A local drafting firm has a secured local area network that uses
    Ethernet cables to connect to client computers.
    After ensuring that the computer is connected to the network, what must a
    user provide to in order to be authenticated?
    *An encryption key
    *A MAC address
    *A digital signature
    *A password ANS A password
  3. Many websites keep track of a user’s actions and information. They
    store much of this information on the user’s computer in a private folder
    on the hard drive.
    What are these very small files called?
    *Tracking URLs

1 / 6
WGU D075 Information Technology Management
Pre-Assessment Questions and Answers 2023 – 2024
(Verified Answers)
What is the purpose of a universal serial bus (USB) on a laptop or desktop
computer ANS Pre-Assessment_U_2
It allows the computer to connect peripheral devices.
1.Which part of a computer executes the computations required by
the software ANS The central processing unit
2.Which category of software includes programs such as word
processors and PDF document readers ANS Application software
3.What is the major function of a computer operating system ANS
Computer resource management

2 / 6
4.Within a productivity suite, which method of selecting static data
from one application and copying it to another application requires the
use of temporary memory ANS Cut and paste
5.Which type of device is an ethernet card ANS Network interfacecontroller (NIC)
6.What is the purpose of a MAC address ANS To uniquely identify a
computer on a network
7.Which topology implements a network where if the central hub fails,
all nodes attached to the hub will also fail ANS A star topology

  1. A local drafting firm has a secured local area network that uses
    Ethernet cables to connect to client computers.
    After ensuring that the computer is connected to the network, what must a
    user provide to in order to be authenticated ANS A password

Leave a Comment

Scroll to Top