Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Introduction-to-IT

Introduction-to-IT WGU Introduction to ITKS02 Question and Answers

Question # 4

What is the role of professional associations regarding ethics standards in the IT profession?

A.

To provide valuable ethical guidelines to IT professionals as they perform their work

B.

To address ethical expectations for all IT professionals as the industry-wide Association of IT Professionals (AITP)

C.

To engage in the development, adoption, and use of globally-accepted, industry-leading practices for all IT professionals

D.

To provide licensing and accreditation of IT professionals

Full Access
Question # 5

Which part of the data-information-knowledge-wisdom DIKW hierarchy involves recognizing the right thing to do?

A.

Wisdom

B.

Information

C.

Data

D.

Knowledge

Full Access
Question # 6

What is the name for computer code that humans can understand?

A.

Compiled language

B.

High-level programming language

C.

Machine language

D.

Interpreted language

Full Access
Question # 7

Which component of the data-information-knowledge-wisdom DIKW pyramid includes raw facts?

A.

Data

B.

Wisdom

C.

Knowledge

D.

Information

Full Access
Question # 8

What is the generation of computing known for natural language processing and machine learning capabilities?

A.

Second

B.

Third

C.

Fourth

D.

Fifth

Full Access
Question # 9

How does application software differ from operating systems?

Choose 2 answers

A.

Application software includes word processors and spreadsheet software that are useful to end users.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes system utilities that run on demand of the user.

D.

Application software supports the computer hardware system directly.

Full Access
Question # 10

Which of the following is required for communication over the Internet?

A.

An IP Alias

B.

A packet switched network

C.

A LAN

D.

A circuit switched network

E.

An analog signal

Full Access
Question # 11

Which technology is characteristic of second-generation computing?

A.

Microprocessors

B.

Nanotechnology

C.

Artificial intelligence

D.

Transistors

Full Access
Question # 12

What does a router do?

A.

Provides services, such as website hosting and routing, for various devices

B.

Manages traffic by maintaining a table of known devices on the network

C.

Extends the cable range and allows connections to be made by increasing the signal strength

D.

Converts incoming analog data into digital and outgoing digital data into analog

Full Access
Question # 13

What is a component of disaster recovery strategies?

A.

Service variety

B.

User authentication

C.

Parallel processing

D.

Off-site storage

Full Access
Question # 14

Which statement describes machine language?

A.

Code that can be run one line at a time

B.

Code commands that directly access registers

C.

Code expressed in the binary system

D.

Computer code that humans can understand

Full Access
Question # 15

A factory machine is turned on at 8:00 a.m. and is turned off at 5:00 p.m. The average output of the machine is 1,200 units per hour. Which term describes the statement, "It is 4:30 p.m., so the machine is still running," based on the data-information-knowledge-wisdom DIKW hierarchy?

A.

Wisdom

B.

Information

C.

Knowledge

D.

Data

Full Access
Question # 16

A local nonprofit organization that promotes healthy living in low income communities is planning an outreach program for members of the community that have type 2 diabetes. The organization plans to partner with local hospitals and

health centers in order to reach patients.

Which government regulation do the healthcare providers need to consider to ensure that they do not illegally provide patient information?

A.

Computer Matching and Privacy Protection Act of 1988

B.

Health Insurance Portability and Accountability Act of 1996

C.

Privacy Act of 1974

D.

Digital Signature and Electronic Authentication law of 1998

Full Access
Question # 17

Which method is frequently used to protect software?

A.

Copyrights

B.

GNU General Public License

C.

Fair use

D.

Trademarks

Full Access
Question # 18

There are 30 questions on a final exam. The exam will be given in room 126 at 2:00 p.m., and students have one hour to complete it. What is the data-information-knowledge-wisdom DIKW pyramid component exemplified by the statement, "I have completed 25 questions, so I am almost done"?

A.

Wisdom

B.

Information

C.

Data

D.

Knowledge

Full Access
Question # 19

Based on an analysis of a company's needs, a database should be installed so that data resides on different machines, often in entirely different locations. What is the name of the database that satisfies this need?

A.

NoSQL

B.

Relational

C.

Cloud

D.

Distributed

Full Access
Question # 20

Which type of conversion involves turning off the old system and turning on the new system at a particular date and time?

A.

Pilot

B.

Direct

C.

Phased

D.

Parallel

Full Access
Question # 21

What is a characteristic of hot storage?

A.

It offers relatively infrequent access.

B.

It typically uses innovative equipment.

C.

It allows for a slow restoration of operations.

D.

It uses lower-performance equipment.

Full Access
Question # 22

What translates and executes source code into machine language one line at a time?

A.

Interpreter

B.

Operating system

C.

Compiler

D.

Assembler

Full Access
Question # 23

What type of a system requirement involves preventing unauthorized access to data?

A.

Design

B.

Accessibility

C.

Security

D.

User needs

Full Access
Question # 24

Which motherboard component is used for short-term storage of data?

A.

Hard Drive

B.

RAM

C.

Read Only Memory

D.

BIOS

Full Access
Question # 25

What is a step for considering risk during the planning phase of project management?

A.

Prioritizing by severity and likelihood

B.

Comparing project progress to milestones

C.

Listing each possible cause of failure

D.

Establishing clear and attainable goals

Full Access
Question # 26

A person is updating procedures for handling integer data within a database. Which value is an example of this data type?

A.

An approximation of pi as 3.14159

B.

A single keystroke from a standard keyboard

C.

The number of baseball games in a season

D.

Whether a bank account does or does not have money in it

Full Access
Question # 27

Which component is part of the system unit?

A.

Keyboard

B.

Motherboard

C.

Monitor

D.

Printer

Full Access
Question # 28

Which two languages are scripted?

Choose 2 answers

A.

C

B.

PHP

C.

Ada

D.

Python

Full Access
Question # 29

What do IT professional organizations publish to offer morals by which individuals and companies abide?

A.

Regulations

B.

Policies

C.

Ethics

D.

Bylaws

Full Access
Question # 30

Which statement best describes the purpose of a business intelligence (BI) system?

A.

A BI system integrates all departments in an organization.

B.

A BI system helps the strategic decision-making process.

C.

A BI system allows access to raw data.

D.

A BI system uses only proprietary data to maximize quality.

Full Access
Question # 31

When would a business intelligence (BI) system be useful in making a decision?

A.

When deciding whether to promote an employee by looking at their annual sales performance

B.

When figuring out when to reorder store inventory for a particular stock keeping unit (SKU)

C.

When deciding if a restaurant should use more organic food in its menu, based on customer reviews and an analysis of current costs

D.

When determining the average salary of the company's executives

Full Access
Question # 32

Which data type should be used to calculate 90% of the retail price of an item?

A.

Boolean

B.

Floating-point

C.

Auto-number

D.

String

Full Access
Question # 33

What is one example of a professional organization in the IT industry?

A.

National Security Agency NSA

B.

Institute for Telecommunication Sciences ITS

C.

Federal Communications Commission FCC

D.

Computer Professionals for Social Responsibility CPSR

Full Access
Question # 34

Which hardware component provides electric pulses that electronic components need in order to operate?

A.

System clock

B.

Motherboard

C.

Expansion bus

D.

Hard drive

Full Access
Question # 35

What is a function of a proxy server?

A.

It responds to HTTP requests and can execute scripts to generate dynamic pages.

B.

It responds to user queries to create, manipulate, and retrieve records from a database.

C.

It acts as a giant cache of web pages that anyone in the organization has recently retrieved.

D.

It stores files that any user of the network may wish to access.

Full Access
Question # 36

Which type of high-level language translates the entire program at once?

A.

Scripting languages

B.

Compiled languages

C.

Assembly languages

D.

Interpreted languages

Full Access
Question # 37

What is a component of IT infrastructure?

A.

Networks

B.

Printer

C.

People

D.

Data

Full Access
Question # 38

What can applications use to interact with a database?

A.

Java Database Connectivity

B.

Operating System

C.

IIAS

D.

SQL

Full Access
Question # 39

What is the arrangement of network devices in a mesh topology?

A.

All devices are connected to a single central device.

B.

Devices are connected to a common communication line.

C.

Every device is connected to every other device.

D.

Every device is connected to exactly two other devices.

Full Access
Question # 40

Which statement represents a difference between wisdom and knowledge, based on the data pyramid?

A.

Wisdom involves understanding principles, but knowledge does not.

B.

Wisdom includes interpreting data, but knowledge does not.

C.

Wisdom involves understanding patterns, but knowledge does not.

D.

Wisdom gives meaning to data, but knowledge does not.

Full Access
Question # 41

A company uses the most up-to-date operating system developed by Microsoft for a desktop computer on its internal network. Which system software does this company's computer use?

A.

Linux

B.

Android

C.

Windows

D.

iOS

Full Access