• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Information Technology Management Essentials - D075 **TESTS**

Latest WGU Jan 13, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Information Technology Management Essentials - D075

**TESTS**

5.0 (3 reviews) Students also studied Terms in this set (70) Western Governors UniversityD 075 Save

WGU D075 OA

54 terms mid619Preview D075 - Study Guide 109 terms TLT73Preview D075 IT Roles (Technical Postions) 15 terms Meme29rPreview

D075 P

46 terms Me Which type of computer runs a network operating system

(NOS)?

A server Which type of software is designed to easily generate Gantt charts?Project management software What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards?Hardware Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts?Database software Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business?End-users What is the main purpose of a firewall?To prevent unauthorized users from accessing the network.A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server?Computer System Administrator

A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using?Local area network (LAN) What term refers to the study, design, development, implementation, support, and management of computer- based information systems?Information Technology An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent?Phishing A data analyst is working with a very large set of data and trying to calculate the amount of data processing that needs to be completed each week.Which attribute of big data is this analyst addressing?Velocity ** relates to how many data are presented that need to be stored or processed over a given time period.Which tool allows large data sets to be stored and processed across multiple servers?Hadoop **an infrastructure for storing and processing large sets of data across multiple servers.Which term is used to refer to the process of combining structured, unstructured, and semistructured data into a data warehouse structure?Data scrubbing **The process of combining structured, unstructured, and semi-structured data into a data warehouse structure is referred to as "scrubbing" data.Which technique is used to ensure data accuracy for a mailing campaign?Segmentation An analyst at a furniture company wants to use the company's relational database to find out which customers have made purchases in the past six months.What is an appropriate tool for the data analyst to use to find this information?

SQL **is used to perform queries within a database.Transaction processing systems (TPSs) are used by grocery stores to gather data on which products are sold and when they are sold, and customer information.If all TPS data are related to a grocery store's finances, inventory, and customers, which type of network configuration would be most appropriate for the implementation of a TPS?Intranet A company has experienced significant growth in just a few months. The company expects to continue this rate of growth in the coming year.Which cloud computing feature would most benefit this business in the short term as it manages its growth?Rapid system scalability

What did the Sarbanes-Oxley Act of 2002 require of IT departments in American companies?Record and preserve accounting records Which aspect of human resource management is the responsibility of an IT department?Administration of information on employees Which technology is a critical component of customer relationship management (CRM) systems?The database A transaction processing system (TPS) enables the entry and recording of sale-related data such as item purchased, price, and date and time of sale.Which kind of decisions does management use these data for?Tactical decisions What is the major issue that hinders the effective use of decision support systems (DSS)?The collection of too much data Which network information is needed to connect an Internet of Things (IoT) device?Wi-Fi connection information Maria designs a website for her small business using a browser-based web development platform. She copies an image file of a large company's logo and places the words "Just Buy It" underneath the logo. She places the logo prominently on her website.Which intellectual property law does Maria's website violate?Trademark Delivery drones do not depend on guidance by a human but on information technology systems to run autonomously.Which key network system would a self-guided drone system rely on?

GPS A farmer has placed IoT rain sensors in all owned fields to provide rain density information by field location.Which transmission methodology should the farmer use to gather this information?Wi-Fi A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties.Which technology is the hospital using for these wristbands?IoT How can the Internet of Things (IoT) be utilized in driverless or self-driving automobiles?IoT can allow vehicles to communicate with each other regarding location and speed. This is known as vehicle-to-vehicle (V2V) communications.How can creators of new applications (apps) protect the computer programs used to run them?Copyright

Oliver wants to share some company files with his colleague Alice, so they connect their computers using a USB cable to securely transfer the files between their computers.Which term is used to describe this methodology of file sharing?Peer-to-peer Which type of software is supply chain management software?Function-specific software Alice has written and published a novel, and she is deciding whether to publish it in the traditional way or publish a digital e-book. However, she is concerned about whether the book will be successful or not.What is the largest financial advantage of publishing the novel as an e-book?E-books require less investment to publish.Cell phones, IoT devices, and GPS have been major technological changes in the IT infrastructure.What is the term used to describe an important change that happens when the usual way of thinking about or doing something is replaced by a completely new and different way?Paradigm shift There are a number of different social media platforms that are categorized into distinct types.Which type of social media platform features short written entries posted for anyone who has subscribed to the account?Microblogging A company creates a new product in response to demand from a small but diverse group of customers with a specific shared interest.What is the most important reason to advertise this product on social media?Targeted advertising Establishing a large network of IoT devices can improve the operation of a manufacturing business by automating many aspects of the manufacturing process.What is the main vulnerability to production due to use of IoT devices?IoT devices require constant Wi-Fi connectivity.A hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner.Which technology did the hospital implement to perform this service?

RFID

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The detailed explanations offered by this document was incredibly useful for my research. A outstanding purchase!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 13, 2026
Description:

Information Technology Management Essentials - D075 **TESTS** 5.0 (3 reviews) Students also studied Terms in this set Western Governors UniversityD 075 Save WGU D075 OA 54 terms mid619 Preview D075...

Unlock Now
$ 11.00