• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D075 OA

Latest WGU Jan 13, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU D075 OA

11 studiers recently 4.8 (18 reviews) Students also studied Terms in this set (54) Western Governors UniversityD 075 Save D075 - Study Guide 109 terms TLT73Preview D075 Pre-Assessment 54 terms Adan_MPreview D075 Teacher 192 terms drcmillsPreview

D075 P

46 terms Me A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments.Which term refers specifically to this type of device?*Peripheral computer *Microcomputer *Minicomputer *Handheld computer Handheld computer What is the major function of a computer operating system?*Data management *Application program management *Network management *Computer resource management Computer resource management Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory?*File transfer *Object embedding *Object linking *Copy and paste Copy and paste

What are the basic components, in addition to computers, that are required for a local network to function?*Ethernet cards, a common protocol, ethernet cables, and a hub *Ethernet cards, a modem, a router, and a network database *Internet connection, a network interface controller, and a cabling system *Internet connection, a network operating system, and a network administrator Ethernet cards, a common protocol, ethernet cables, and a hub Which type of device is an ethernet card?*Network interface controller (NIC) *Network firewall hardware *Network operating system (NOS) *Network server hardware Network interface controller (NIC) What is the purpose of a MAC address?*To uniquely identify an internet URL *To uniquely identify a computer motherboard *To uniquely identify an email client *To uniquely identify a computer on a network To uniquely identify a computer on a network Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail?*A mesh topology *A linear bus topology *A star topology *A ring topology A star topology A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers.After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?*An encryption key *A MAC address *A digital signature *A password A password Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive.What are these very small files called?*Tracking URLs *Tracking data *Tracking cookies *Tracking packages Tracking cookies

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer?*It allows for universal data transmission to various types of wireless networks.*It provides a wired ethernet connection to the network.*It serves as an internal transmission bus between components within the computer.*It allows the computer to connect peripheral devices.It allows the computer to connect peripheral devices.Which category of software includes programs such as word processors and PDF document readers?*Application software *Project software *System software *Utility software Application software What is the defining characteristic of a part of a system that is considered a point of failure?*It is a part of the system that has failed.*It causes everything to stop if it fails.*It causes a security risk if it fails.*It is prone to frequent failure.It causes everything to stop if it fails.Computer system administrators protect the organization when they require strong passwords to connect to the server, enact policies for safe internet browsing, and install malware-protection software to keep unwanted users and viruses out.Which term is used to describe this set of practices?*Software protection *End-user security *Network security *Malware protection Network security How does a Gantt chart facilitate project management?*It maps the flow of communication and decisions for a project *It identifies and sequences the tasks of a project.*It helps calculate the projected and actual costs of a project.*It graphically shows the organization of a project team.It identifies and sequences the tasks of a project.What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software?*Network development *Network architect *Network administrator *Network engineer Network administrator

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer?*Ensuring that the IT infrastructure is up to date *Interfacing with the IT users and setting end-user policies *Managing the IT group and designing the IT architecture *Keeping the IT development projects on schedule Managing the IT group and designing the IT architecture What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information?*Chief operating officer *Chief cybersecurity officer *Chief information security officer *Chief technology officer Chief information security officer When using extract, transform, and load (ETL), what is done during the "transform" step?*The data are normalized and structured.*The data are given context and relevance.*The database is queried for relevant data.*The database schema is designed and created.The data are normalized and structured.What is the key characteristic that differentiates a datamart from a data warehouse?*A datamart uses centralized data storage while a data warehouse is decentralized.*A datamart is a cloud-based service while a data warehouse requires a dedicated server.*A datamart is smaller and more specialized in its focus than a data warehouse.*A datamart allows a broader set of data structures than a data warehouse.A datamart is smaller and more specialized in its focus than a data warehouse.A marketing employee is tasked with mailing discount coupons to the company's top 100 customers by sales volume. The marketing employee only has lists of customers' names, customers' addresses, and the sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers?*Data structuring *Data warehousing *Data mining *Data intelligence Data mining What is the velocity of big data?*The processing speed of the database servers *The rate at which the data in a data set become decayed *The speed of data produced in a given time *The frequency with which the data set must be updated The speed of data produced in a given time

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured in-depth analysis that was incredibly useful for my research. Such an outstanding resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 13, 2026
Description:

WGU D075 OA 11 studiers recently 4.8 (18 reviews) Students also studied Terms in this set Western Governors UniversityD 075 Save D075 - Study Guide 109 terms TLT73 Preview D075 Pre-Assessment 54 te...

Unlock Now
$ 11.00