• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D075 Information Technology (Tests)

Latest WGU Jan 13, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D075 Information Technology (Tests) 5.0 (1 review) Students also studied Terms in this set (40) Science Computer Science Save

WGU D075 OA

54 terms mid619Preview D075 Unit 3 10 terms mario_gomez60 Preview D075 Pre-Assessment 54 terms Adan_MPreview Informa 70 terms wtf

UNIT 2

Media Access Control address (MAC)

UNIT 2

Each computer attached to the internet or a corporate network is uniquely identified so that it can be sent the information directed to it.What is this unique identifier known as?Business and leadership experienceWhat is the most important qualification that a Chief Information Officer (CIO) must possess?Information security analystA company has recently discovered that unauthorized users have accessed data on the company intranet.Which IT professional should investigate this concern?The same graphical user interfaceWhat do all the applications in a productivity software suite have in common?To direct data to the intended target location. What is the purpose of a network switch?Network AdministratorPolicies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection.Who is the IT professional responsible for enacting these policies?MainframesWhat is the term used to refer to a massive, room-sized computer that processes and stores enormous amounts of bulk data and information?

StarIn which network topology is each client computer connected directly to the hub?ClientsWhat is the term used to refer to end-user computers on a network?IT ManagerA company is planning several IT projects including a major software development project. The software development project will be organized using the software development life cycle (SDLC) methodology.Which IT professional should be called upon to create a detailed project plan for this effort?

UNIT 3

Velocity

UNIT 3

A data analyst is working with a very large set of data and trying to calculate the amount of data processing that needs to be completed each week.Which attribute of big data is this analyst addressing?HadoopWhich tool allows large data sets to be stored and processed across multiple servers?Data scrubbingWhich term is used to refer to the process of combining structured, unstructured, and semistructured data into a data warehouse structure?SegmentationWhich technique is used to ensure data accuracy for a mailing campaign?SQLAn analyst at a furniture company wants to use the company's relational database to find out which customers have made purchases in the past six months.What is an appropriate tool for the data analyst to use to find this information?Data that have become outdatedWhich type of data are referred to as "decayed"?Business intelligence softwareAn analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using?Foreign keyA database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database.What is this field called?System-level securityWhich level of security is required to protect the hardware and communications equipment that support a database?NormalizationA data analyst is using the ETL process to enter data into the company's relational database. The data contain many redundancies. Which process will the data analyst need to use before loading the extracted data into the database?

UNIT 4

An extranet

UNIT 4

A large company uses a system that provides information to its suppliers to maintain the supply chain process.Which type of system is this company using?Make the IT department independent.A company's IT department is currently a subunit of the accounting department, reporting to the accounting manager. The reason for this is that accounting is the single largest consumer of the company's IT services. The company's president decides that due to widespread disorganization and poor communication, she wants to reorganize all business units.What is the best recommendation for placement of IT within the company?StrategyWhich function of a customer relationship management system helps a company identify opportunities to increase its business?Transaction processingA company makes personal computers and sells them directly to the public. At present, all business processes are completed manually by employees, lengthening the time from customer order to shipment.Which business process would deliver the most immediate customer satisfaction and reduced costs if automated?Mobile appsWhich function or feature has allowed mobile phones to replace PCs for many small-business functions?Share the records only after receiving authorization from Jack's son.Jack meets with the university dean to discuss his 18-year-old son's progress. Jack's son is a freshman at the university. Jack wants to know if his son is performing well in his classes. The dean has access to the computer systems containing the academic records for Jack's son but is also aware of constraints set by the Family Educational Rights and Privacy Act (FERPA).What should the dean do?Cost savingsWhich advantage does a business gain by using cloud web hosting (CWH) rather than local hosting?Auditing to remove unlicensed softwareBusinesses are expected to comply with ethical business practices in every department.What is an example of an information technology (IT) business practice that promotes ethical behavior?The Internet of Things (IoT)Which technology necessitated the development and implementation of Internet Protocol version 6 (IPv6)?Research and developmentWhich core business department is primarily responsible for business intelligence?

UNIT 5

IoT devices require constant Wi-Fi connectivity.

UNIT 5

Establishing a large network of IoT devices can improve the operation of a manufacturing business by automating many aspects of the manufacturing process.What is the main vulnerability to production due to use of IoT devices?RFIDA hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner.Which technology did the hospital implement to perform this service?IoTBullzai Meat Company has freezer warehouses across the southern United States to hold meat until it is purchased by restaurants and schools. Bullzai needs to monitor the atmosphere and temperature quality of each of its freezers but cannot afford to have personnel perform this on a continual basis.Which technology implementation will allow the company to accomplish this goal?The edgeIoT devices observe and gather data but have limited intelligence for analysis.With respect to the design of an IoT network, where are the IoT devices located?It is tailored to a specific group or industry.What is the defining characteristic of function-specific software?Social mediaWhat is the term used to describe technologies that enable, facilitate, and enhance people's ability to share digital content?An app that is preinstalled on a mobile deviceWhat is a native app?File synchronization servicesMaria has accumulated on her PC a lot of data that are pertinent to her job. She is investigating automated backup functions, rather than the manual systems she is currently using, to make sure her data are safe.What is the term for these automated systems?Monetized the appA mobile app developer has developed a game that users can download and play for free. However, once users reach the one hundredth level, they must pay to unlock additional levels.What has the developer done by requiring app users to unlock additional levels?File synchronization serviceWhat is the term used to describe a file sharing system that uses cloud-based technology?

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document provided step-by-step guides, which helped me ace my presentation. Absolutely superb!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 13, 2026
Description:

D075 Information Technology (Tests) 5.0 (1 review) Students also studied Terms in this set Science Computer Science Save WGU D075 OA 54 terms mid619 Preview D075 Unit 3 10 terms mario_gomez60 Previ...

Unlock Now
$ 11.00