• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Information Techno logy Management Essentials - D075

Latest WGU Jan 17, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Information Technology Management Essentials - D075 Leave the first rating Students also studied Terms in this set (88) Save

Module 1: Organizational Design

16 terms Keyerra_Buckley Preview WGU D075 Information Technology ...192 terms infinitedrifterPreview D075 Test Answers 76 terms savy_menkePreview Test Pre 105 term C_B A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments.Which term refers specifically to this type of device?Handheld computer What is the major function of a computer operating system?Computer resource management Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory?Copy and paste What are the basic components, in addition to computers, that are required for a local network to function?Ethernet cards, a common protocol, ethernet cables, and a hub Which type of device is an ethernet card?Network interface controller (NIC) What is the purpose of a MAC address?To uniquely identify a computer on a network Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail?A star topology A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers.After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?A password

Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive.What are these very small files called?Tracking cookies What is the purpose of a universal serial bus (USB) on a laptop or desktop computer?It allows the computer to connect peripheral devices.Which category of software includes programs such as word processors and PDF document readers?Application software What is the defining characteristic of a part of a system that is considered a point of failure?It causes everything to stop if it fails.Computer system administrators protect the organization when they require strong passwords to connect to the server, enact policies for safe internet browsing, and install malware-protection software to keep unwanted users and viruses out.Which term is used to describe this set of practices?Network security How does a Gantt chart facilitate project management? It identifies and sequences the tasks of a project.What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software?Network administrator On a day-to-day basis, what is the major focus and responsibility of a chief technology officer?Managing the IT group and designing the IT architecture What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information?Chief information security officer When using extract, transform, and load (ETL), what is done during the "transform" step?The data are normalized and structured.What is the key characteristic that differentiates a datamart from a data warehouse?A datamart is smaller and more specialized in its focus than a data warehouse.A marketing employee is tasked with mailing discount coupons to the company's top 100 customers by sales volume. The marketing employee only has lists of customers' names, customers' addresses, and the sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers?Data mining

What is the velocity of big data?The speed of data produced in a given time What is it called when an organization implements security procedures to protect the hardware, network, and software from intrusion?System-level security Which term is used to refer to data that come from many different sources in various structures?Disparate data What are scrubbed data?Data that have been validated for accuracy When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost.What is this metric called?Return on investment One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data.What is the term that describes this effort?Data governance Which level of management gets the most detailed reports directly from the transaction processing system?Supervisors A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate.What is the primary source of the data used by this DSS?The transaction processing system (TPS) What is a key capability of a decision support system? It compiles data from many systems to assist in decision-making.Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed.Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week?An extranet that provides the manufacturer access to data at Endothon The IT department of a company has been asked to provide systems for financial and investment management.Accounting Which strategy can be used to help a company's web page appear on the first page of search results in a browser?Search engine optimization Which technology enables people without computer programming skills to design and publish their own websites?Browser-based web development tools

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices.What is the designation of this new protocol?Internet Protocol version 6 (IPv6) A small online retailer has grown rapidly over the past year, and now during times of high activity, the retailer's web server is nearly at capacity. The retailer anticipates continued rapid growth but is concerned that this growth may stall if the economy goes into recession.What is an appropriate strategic planning decision for this retailer to make in order to ensure adequate server capacity?Use a cloud web hosting service A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients.Which action will give the graphic designer initial copyright protection of these marketing images?Creating the marketing images A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area.Which legal protection prohibits unethical duplication of this computer program?copyright An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law.Which law should the IT manager become familiar with?Sarbanes-Oxley Act An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author.Which type of law prohibits this kind of unethical behavior?Copyright Which communication technology has a range of approximately 30 feet and allows smartphones, tablets, and handheld product scanner devices to communicate with a network?Bluetooth What is an example of an Internet of Things (IoT) device? A light bulb that can be turned on or off with a smartphone Where does IoT data collection begin?The edge

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured in-depth analysis that helped me ace my presentation. Such an outstanding resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 17, 2026
Description:

Information Technology Management Essentials - D075 Leave the first rating Students also studied Terms in this set Save Module 1: Organizational Design 16 terms Keyerra_Buckley Preview WGU D075 Inf...

Unlock Now
$ 11.00