Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D075 Unit & Module & Lesson (All Questions and Answers)

Beoordeling
-
Verkocht
-
Pagina's
15
Cijfer
A
Geüpload op
07-05-2023
Geschreven in
2022/2023

WGU D075 Unit & Module & Lesson (All Questions and Answers) Which type of computer runs a network operating system (NOS)? a server Which type of software is designed to easily generate Gantt charts? Project management software What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards? hardware Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts? Database software Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business? End User What is the main purpose of a firewall? To prevent unauthorized users from accessing the network. A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server? Computer System Administrator A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using? Local area network (LAN) What term refers to the study, design, development, implementation, support, and management of computer-based information systems? Information Technology An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent? Phishing Which type of data are referred to as "decayed"? Data that have become outdated An analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using? Business intelligence software A database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database. What is this field called? Foreign Key

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU D075 Unit & Module & Lesson (All Questions and
Answers)
Which type of computer runs a network operating system (NOS)?
a server
Which type of software is designed to easily generate Gantt charts?
Project management software
What term refers specifically to the physical aspects of a computer such as
circuit boards, processor chips, memory, and keyboards?
hardware
Which application software features tables, records, and fields that can be
queried, updated, and managed by users, programmers, and business analysts?
Database software
Which term refers to any person in a business who uses a computer to complete
their day to day tasks of the business?
End User
What is the main purpose of a firewall?
To prevent unauthorized users from accessing the network.
A large company has decided to invest in new IT systems, including a new server.
Which IT professional should be tasked with setting up and maintaining the
server?
Computer System Administrator
A small business has a single network that allows every employee to connect
through a central server when they are in the company's main office. What type of
network is the business using?
Local area network (LAN)
What term refers to the study, design, development, implementation, support, and
management of computer-based information systems?
Information Technology
An employee receives an email that appears to be from the IT department. The
email asks the recipient to click a link to verify their username and password.
Upon closer inspection, the employee realizes that the email is a fraudulent
attempt to obtain their password. What type of fraud does this email represent?
Phishing
Which type of data are referred to as "decayed"?
Data that have become outdated
An analyst uses software to analyze data in the company's data warehouse and
produce information to guide the organization. The information is presented in
clearly understandable charts and graphs on a dashboard and is used to inform
decisions in the organization. Which type of software is this analyst using?
Business intelligence software
A database manager is setting up a relational database. The manager creates a
field in a table that links to the primary key in a different table in the database.
What is this field called?
Foreign Key

, Which level of security is required to protect the hardware and communications
equipment that support a database?
System-level security
A data analyst is using the ETL process to enter data into the company's
relational database. The data contain many redundancies. Which process will the
data analyst need to use before loading the extracted data into the database?
Normalization
A large company uses a system that provides information to its suppliers to
maintain the supply chain process.
Which type of system is this company using?
Extranet
A company's IT department is currently a subunit of the accounting department,
reporting to the accounting manager. The reason for this is that accounting is the
single largest consumer of the company's IT services. The company's president
decides that due to widespread disorganization and poor communication, she
wants to reorganize all business units.
What is the best recommendation for placement of IT within the company?
Make the IT department independent
Which function of a customer relationship management system helps a company
identify opportunities to increase its business?
Strategy
A company makes personal computers and sells them directly to the public. At
present, all business processes are completed manually by employees,
lengthening the time from customer order to shipment.
Which business process would deliver the most immediate customer satisfaction
and reduced costs if automated?
Transaction processing
Which function or feature has allowed mobile phones to replace PCs for many
small-business functions?
Mobile Apps
Jack meets with the university dean to discuss his 18-year-old son's progress.
Jack's son is a freshman at the university. Jack wants to know if his son is
performing well in his classes. The dean has access to the computer systems
containing the academic records for Jack's son but is also aware of constraints
set by the Family Educational Rights and Privacy Act (FERPA).
What should the dean do?
Share the records only after receiving authorization from Jack's son.
Which advantage does a business gain by using cloud web hosting (CWH) rather
than local hosting?
Cost Savings
Businesses are expected to comply with ethical business practices in every
department.
What is an example of an information technology (IT) business practice that
promotes ethical behavior?
Auditing to remove unlicensed software

Geschreven voor

Vak

Documentinformatie

Geüpload op
7 mei 2023
Aantal pagina's
15
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
magdamwikash23 Western Governers University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
114
Lid sinds
3 jaar
Aantal volgers
94
Documenten
5328
Laatst verkocht
1 week geleden
Magda

NURSING STUDY GUIDES/EXAMS AND NOTES ALL VERIFIED BY EXPERTS All my uploaded documents, exams and essays are verified by relevant experts.I can assure an A or at least 90% if you use any of my documents.

3.9

14 beoordelingen

5
7
4
2
3
2
2
2
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen