Technology Complete Exam Prep & OA Final Review | IT
Fundamentals Practice Questions with Verified Answers and
Detailed Rationales | Computer Hardware & Software, Networking
Basics, Databases, Cybersecurity, Cloud Computing, IT Ethics,
Business and Healthcare Applications – Fully Updated for the 2026
WGU Objective Assessment
Question 1:
Which of the following is a primary function of an operating system?
• A) Managing hardware resources
• B) Designing software applications
• C) Writing code in programming languages
• D) Conducting network analysis
Correct Option: A) Managing hardware resources
Rationale: The primary function of an operating system (OS) is to manage computer
hardware resources and provide a stable environment for software applications to run.
This includes managing memory, processes, and input/output devices.
Question 2:
What does the acronym 'URL' stand for?
• A) Uniform Resource Locator
• B) Universal Resource Link
• C) Unified Resource Locator
• D) Unique Resource Locator
Correct Option: A) Uniform Resource Locator
Rationale: 'URL' stands for Uniform Resource Locator, which is the address used to
access resources on the internet. It specifies the location of a resource on the web and
the protocol for retrieving it.
Question 3:
Which of the following best describes cloud computing?
• A) A service that allows online data storage and sharing
• B) A physical server installed in-house
, • C) A type of hardware used for networking
• D) None of the above
Correct Option: A) A service that allows online data storage and sharing
Rationale: Cloud computing refers to delivering various services over the internet,
including data storage, networking, and processing power, which allows for remote
access to resources and flexibility in managing IT infrastructure.
Question 4:
In the context of cybersecurity, what is a firewall?
• A) A physical barrier
• B) A software or hardware solution that blocks unauthorized access
• C) A tool for creating applications
• D) A type of malware
Correct Option: B) A software or hardware solution that blocks unauthorized
access
Rationale: A firewall is a security device that can be either software or hardware,
designed to monitor and control incoming and outgoing network traffic based on
predetermined security rules, thereby blocking unauthorized access.
Question 5:
What is the purpose of a database management system (DBMS)?
• A) To process and manage data in a structured format
• B) To develop software applications
• C) To analyze network performance
• D) To manage hardware connections
Correct Option: A) To process and manage data in a structured format
Rationale: A Database Management System (DBMS) provides services for creating,
managing, and manipulating data in databases, facilitating data retrieval and ensuring
data integrity.
Question 6:
What is the function of the CPU in a computer?
• A) To store data permanently
• B) To process instructions and manage tasks
, • C) To connect to the internet
• D) To display graphics
Correct Option: B) To process instructions and manage tasks
Rationale: The CPU (Central Processing Unit) is the brain of the computer that
processes instructions, manages tasks, and performs calculations essential for running
programs and applications.
Question 7:
Which of the following represents a binary number?
• A) 101
• B) 12
• C) A3
• D) 45F
Correct Option: A) 101
Rationale: Binary numbers consist only of two digits: 0 and 1. The number 101 is a
binary representation, while the others include decimal and hexadecimal
representations.
Question 8:
What does HTTP stand for?
• A) Hypertext Transfer Protocol
• B) High Transfer Text Protocol
• C) Hyperlink Transfer Protocol
• D) Hypertext Transfer Process
Correct Option: A) Hypertext Transfer Protocol
Rationale: HTTP stands for Hypertext Transfer Protocol, which is the foundational
protocol used for transferring web pages on the internet.
Question 9:
Which of the following security measures is used to protect against unauthorized
access to data?
• A) Encryption
, • B) Compression
• C) Backup
• D) Replication
Correct Option: A) Encryption
Rationale: Encryption converts data into a coded format that can only be read by
authorized individuals who have the proper decryption key, thus protecting information
from unauthorized access.
Question 10:
What is the primary purpose of a spreadsheet program?
• A) To manage databases
• B) To manipulate and analyze numerical data
• C) To edit graphic images
• D) To create web pages
Correct Option: B) To manipulate and analyze numerical data
Rationale: Spreadsheet programs, like Microsoft Excel, are primarily designed for
organizing, calculating, and analyzing data using formulas and functions.
Question 11:
What kind of network topology has a central hub?
• A) Mesh
• B) Ring
• C) Star
• D) Bus
Correct Option: C) Star
Rationale: In a star topology, all network devices connect to a central hub or switch,
which acts as a repeater for data flow, making it easy to manage and isolate network
issues.
Question 12:
Which type of software is specifically designed to detect and eliminate malware?
• A) Firewall