Wgu c182 Objective Assessment and Practice Exam Newest 2025 Test Bank
Wgu c182 Objective Assessment and Practice Exam Newest 2025 Test Bank
(Module: Software Licensing) (correct answers)d. The right to use the software.
b. Computer networks allow individuals to share hardware such as printers, but not software.
c. Computer networks allow individuals to share many types of resources.
d. Computer networks are not useful unless they are connected to the internet.
(Module: Network Hardware) (correct answers)c. Computer networks allow individuals to share many types
of resources.
part of the domain name of a Web page's URL. (correct answers)top-level domain (TLD)
(Module: Network Hardware) (correct answers)a. It is a computer that a person is physically at.
b. Determine threats
c. Identify vulnerabilities
d. Develop and enact policies against threats. (correct answers)b. Determine threats
a. A computer network consists of two or more computers linked together that share devices such as
printers and file servers but they are not able to share software.
b. A computer network is a collection of computers and computer resources (e.g., printers, file servers)
connected in such a way that the computers can communicate with each other and their
resources.
d. A computer network consists of a number of computers connected via a device that allows them to
connect to the Internet.
(Module: Network Hardware) (correct answers)b. A computer network is a collection of computers and
computer resources (e.g., printers, file servers) connected in such a way that the computers can
communicate with each other and their resources.
b. Made freely available as a source code to enhance and distribute the software.
c. Free from purchase but you are bound to some agreements when you install it.
(Module: Software Licensing) (correct answers)a. Purchased from a vendor and gives you the right to use
the software but is not yours to own.
What is the most common type of local, physical network connection in use today?
b. Is a public license.
c. Is free.
Which of the following type of transmission is paired correctly with the given media?
(Module: Network Hardware) (correct answers)b. Fiber optic cable - Light impulses.
Which number system is read and used by humans every day?
a. Octal.
b. Decimal.
c. Hexadecimal.
d. Binary.
a. Because switches only transfer information to specific computers within a network and not all of the
computers, the bandwidth used with a switch is more than that of a hub.
b. Because switches only transfer information to specific computers within a network and not all of the
computers, the bandwidth used with a switch is less than that of a hub.
c. Because a switch is a more powerful device, it can be used over longer distances compared to a
hub.
(Module: Network Hardware) (correct answers)b. Because switches only transfer information to specific
computers within a network and not all of the computers, the bandwidth used with a switch is less than that
of a hub.
a. 13 and 64A
b. 64A and 8G
c. 3KF and 13
Which of the following devices is used to connect one network to another network?
a. Switch.
b. Router.
c. Hub.
(Routers are the main means of connection between one network and another.)
How many bits are in a byte?
a. 5
b. 24
c. 16
d. 8 (correct answers)d. 8
Which of the following communication system hardware devices is commonly used as a wireless access
point?
a. Radio waves.
b. Hub.
c. Router.
d. Switch.
Recall the IPOS (Input-Processing-Output-Storage) cycle. Which two steps of the IPOS cycle deal exclusively
with binary representations of data?
a. The path exists during the entire transmission, allowing communication in either direction to occur
simultaneously.
b. The choice of pathway is based on network availability and amount of message traffic.
d. A and B.
e. B and C.
(Module: Network Hardware) (correct answers)b. The choice of pathway is based on network availability
and amount of message traffic.
What two inventions have allowed programmers to avoid writing programs in machine language?
(Module: Programming and Scripting) (correct answers)c. Language Translators and High Level
Programming Languages
b. The switch will purposefully drop messages if message traffic exceeds its capacity.
c. Both a router and a switch use the message's destination address to select the line to route the
incoming message to.
d. The router will purposefully drop messages if message traffic exceeds its capacity.
(Module: Network Hardware) (correct answers)d. The router will purposefully drop messages if message
traffic exceeds its capcity.
a. C++.
b. Java.
c. Javascript.
d. BASIC.
b. A virtual machine (VM) is made available by software and permits a computer to run multiple OSs.
In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.
c. A virtual machine (VM) is a server that users can log into and use different OSs and applications
associated with the different OSs.
d. A virtual machine (VM) is a whole separate physical computer that provides users access to an OS
different from their primary computer. Being able to have access to a computer with a different OS
facilitates collaboration in the business ecosystem.
(Module: Network Hardware) (correct answers)d. A virtual machine (VM) is made available by software and
permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that
is not restricted by platform software.
a. Translates the entire program, creating an executable program, which can be run at a later time.
b. Takes the most recently entered instruction, translates it into machine language, and executes it.
d. Every instruction is translated first and then executed, and this must be done every time the
program is run.
(Module: Programming and Scripting) (correct answers)a. Translates the entire program, creating an
executable program, which can be run at a later time.
In a client-server network, what is the role of the server?
c. The role of the server is to take requests from the client and send back the requested information.
d. The role of the server is the same as the role of the client because all of the computers on this type
of network are equal.
(Module: Network Hardware) (correct answers)c. The role of the server is to take requests from the client
and send back the requested information.
a. It translates the entire program, creating an executable program, which can be run at a later time.
b. It takes one program, written in a high-level language, as input, and creates a machine language
program as output.
c. It takes the most recently entered instruction, translates it into machine language, and executes it.
a. Print server.
b. Web server.
c. File server.
d. FTP server.
c. Lack of portability.
d. Must convert programming language to machine code.
Which of the following servers monitors requests, but doesn't send files in return?
a. Print server.
b. FTP server.
c. Web server.
d. File server.
a. Scripting language.
b. Interpreted language.
c. Assembly language.
d. Compiled language.
Which of the following servers can generate reports from client queries?
a. File server.
b. Database server.
c. Web server.
d. Mail server.
Which of the following types of networks has each device in the network connected in a single point-to-
point connection with a central HUB?
a. Star network.
b. Bus network.
c. Mesh network.
d. Ring network.
Which two are both types of high-level programming languages but not considered scripting languages?
a. Ada and JavaScript.
Which device permits packet switching so that a message can be routed to the next link in a network?
a. LAN.
b. IP Address.
c. DNS.
d. Router.
(A router is a device that permits packet switching in order to send messages to the next link in the
network.)
a. Compiler.
b. Pascal.
c. Interpreted program.
d. Machine code.
a. URL.
b. Packet switching.
c. Routers.
d. DNS.
a. An elaborate algorithm.
b. A set of processes.
d. A translator.
b. In order to communicate over the Internet, a host does not need to run the IP network protocol.
What is an example of a non-computer scenario that represents an algorithm? Select 3 that apply.
a. Making a sandwich.
b. Building a swing-set.
d. Being asleep.
(Module: Programming and Scripting) (correct answers)a. Making a sandwich
b. Building a swing-set
(Module: World Wide Web) (correct answers)a. Identifies the server on which a web page can be found.
a. Infinite.
b. Complex.
c. Ambiguous.
d. Clear.
b. Protocol.
c. TLD.
d. Host name.
Which describes how data is used in the data tier? Select three that apply.
a. Data is updated.
b. Data is stored.
c. Data is scaled.
d. Data is retrieved.
b. Data is stored.
d. Data is retrieved.
Why is it best to keep the data independent from the application? Select 2 that apply.
a. Removes the need for a user to interact directly with the data
d. It shields users from the complexities of the data (correct answers)a. Removes the need for a user to
interact directly with the data
Which of the following statements is not part of the path a message takes from one computer to another?
c. All messages require a response from the destination machine to the sending device.
d. All packets of the same message are combined together as they arrive.
(Module: World Wide Web) (correct answers)c. All messages require a response from the destination
machine to the sending device.
a. Model-Variable-Controller.
b. Model-View-Component.
c. Model-View-Controller.
d. Model-View-Computer.
is computed from other data contained within an IP packet and stored as part of the IP packet.
b. A gateway.
c. A checksum.
b. Input model.
c. Interface model.
d. Business model.
c. IP packet.
d. Router.
What is one way the n-tier development model differs from the MVC model?
c. The n-tier model has tiers that are each separate applications.
(Module: Programming and Scripting) (correct answers)c. The n-tier model has tiers that are each separate
applications.
Using a unique identifier to allow access to sensitive information is an example of:
a. availability.
b. confidentiality.
c. integrity.
a. The number of fields in the database determines the cost of that database.
b. By knowing the purpose, the developer can determine how many fields are needed in the database.
d. The developer can determine which data types would help fulfill the purpose.
(Module: Data Infrastructure) (correct answers)b. By knowing the purpose, the developer can determine
how many fields are needed in the database.
d. The developer can determine which data types would help fulfill the purpose.
The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an
example of
a. availability.
b. confidentiality.
c. integrity.
(Module: Network Security and Business Implication) (correct answers)b. confidentiality.
Indicate which of the following statements about databases and data types are accurate. Select three that
apply.
a. A customer's first name and last name must be entered as two separate fields.
b. Once the database is designed, the user doesn't need to worry about determining data types.
c. Numbers can be entered as text or as numeric values
(Module: Data Infrastructure) (correct answers)b. Once the database is designed, the user doesn't need to
worry about determining data types.
a. confidentiality.
b. integrity.
c. availability.
Which of the following would be a field in a database? Select two that apply.
a. 63.2%.
b. 19943-5568.
c. Gender.
d. Sales.
b. 19943-5568.
Obtaining data from computers all over the organization is an example of
a. Confidentiality
b. Availability
c. Integrity
Which of the following statements about data organization are correct? Select three that apply.
(Module: Data Infrastructure) (correct answers)a. Not all records need to contain data about every attribute.
Ensuring that data is accessible and information is available when needed is an example of
a. availability.
b. confidentiality.
c. integrity.
(Module: Network Security and Business Implication) (correct answers)a. availability.
Which of the following are forms of queries? Select two that apply.
a. Insert.
b. Projection.
c. Database.
d. Join.
d. Join.
(Module: Network Security and Business Implication) (correct answers)b. Student ID and credit card
numbers
Which of the following are operations used to alter the data within a relation of a database? Select three
that apply.
a. Insert.
b. Join.
c. Update.
d. Delete.
c. Update.
d. Delete.
Which of the following will find vulnerabilities and fix or protect against them?
a. Social engineering.
b. Packet sniffing.
c. White-hat hacking.
d. Phishing.
(Module: Network Security and Business Implication) (correct answers)c. White-hat hacking
In order for a relational database to work, at least one of the fields has to contain unique values. What is the
name of this field?
a. Unique database.
b. Unique identifier.
c. Unique relation.
d. Unique projection.
a. Encryption.
b. Certificates.
c. Anti-viral software.
d. Digital signatures.
b. Certificates.
d. Digital signatures.
Which of the following are the three main categories of databases? Select 3 that apply.
a. Relational.
b. Isolated.
c. Flat File.
d. Hierarchical.
c. Flat File.
d. Hierarchical.
c. Prioritize risks.
d. Determine threats.
(Module: Network Security and Business Implication) (correct answers)a. Identify vulnerabilities
Which of the following database categories is the most similar to a spreadsheet or MS Excel document?
a. Relational.
b. Hierarchical.
c. Isolated.
d. Flat File.
c. Determine threats
(Module: Network Security and Business Implication) (correct answers)a. Develop and enact policies against
threats
Which of the following examples best describes hierarchical databases? Select 2 that apply.
a. Parent-child relationships.
b. A spreadsheet.
c. A tree-like structure.
c. A tree-like structure.
Which of the following skills are needed to assist with application design and development? Select 2 that
apply.
a. Schema development.
b. Data integration.
c. Performance tuning.
d. Maintenance.
(Module: Data Infrastructure) (correct answers)a. Schema development.
c. Performance tuning.
a. Authentication.
b. Access control.
c. Education.
(Module: Network Security and Business Implication) (correct answers)c. Education
Database administrators might be involved with the integration of data from where?
a. phishing.
b. password.
c. key card.
d. fingerprint.
(Module: Data Infrastructure) (correct answers)d. Design development and DBMS support.
Access rights
(Module: Network Security and Business Implication) (correct answers)b. Will include files that the user can
access
(Module: Data Management Tools) (correct answers)a. It is used when making long-term decisions.
b. Decreased efficiency
c. Decreased communication
d. Decreased productivity
(Module: Network Security and Business Implication) (correct answers)a. Cost savings
a. Low-level management.
b. High-level management.
c. Entry-level employees.
d. Customers.
(Module: Network Security and Business Implication) (correct answers)a. allows hardware sharing within
one office
b. Business intelligence refers to a specific software application businesses can use to gather data from
their competitors.
c. Business intelligence is a term used to depict a network structure that allows greater
communication among different parts of an organization.
d. Business intelligence refers to a specific type of server used to gather data that can be analyzed by
an organization.
(Module: Data Management Tools) (correct answers)a. Business intelligence is a term used to reflect the
knowledge a business can create by analyzing data gathered from multiple sources.
How does a network (WAN) enhance the business ecosystem? Select 2 that apply.
.(Module: Network Security and Business Implication) (correct answers)a. Employees in different locations
can share hardware and software.
d. Team members can review files on the shared drive synchronously.
Which OLAP operation involves viewing the data using a different filter first?
a. Drilling up or down.
b. Rolling up.
c. Dicing.
d. Pivoting.
a. Application.
b. Server.
c. System.
d. Microsoft PowerPoint.
c. OLDP deals with data in real time while a data warehouse does not.
d. OLDP collects data from one source while data warehouses collect data from multiple sources.
(Module: Data Management Tools) (correct answers)c. OLDP deals with data in real time while a data
warehouse does not.
Which type of software includes programs such as Microsoft Word and PowerPoint?
a. Server.
b. Daemons.
c. System.
d. Application.
Which of the following are examples of real-time processing? Select two that apply.
c. Processing payroll.
(Module: Data Management Tools) (correct answers)b. Playing an online multiplayer video game.
a. Microsoft Word.
b. System.
c. Server.
d. Application.
a. A BI system.
b. OLDP.
c. A driver.
Which of the following is a program that will allow a computer to easily access the hardware and software
of the computer system?
a. Mobile device.
b. Server.
c. Workstation.
d. Operating system.
(Module: Types of Software) (correct answers)d. Operating system.
a. SQL.
b. DBMS.
c. ODBC application.
d. JDBC.
(Module: Data Management) (correct answers)c. ODBC application.
Today's operating systems . An operating system will issue commands using the command line prompt by
a. typing in commands.
(Module: Data Management) (correct answers)b. Have an application interact with any database when
developing in Java.
a. Chrome.
b. iOS.
c. Windows 10.
d. Android.
a. SELECT.
b. DROP.
c. INSERT.
d. FIX.
b. DROP.
c. INSERT.
Which of the following operating systems is for mobile devices?
a. Android.
b. Windows Server.
c. Linux.
d. Windows 7/8.
a. iOS.
b. Windows Server.
c. Windows 7/8.
d. Android.
a. <>
b. =
c. *
d. LIKE
Which layer of the operating system will handle process management, resource management, and memory
management?
a. Shell.
b. Kernel.
c. Services.
d. Utility programs.
Which department will work with the management department to achieve strategic goals by developing
technology solutions, applications, and databases?
a. Marketing.
b. Finance.
c. HR.
d. IT.
b. Shell.
c. Utility programs.
d. Device drivers.
(Module: The IT Department) (correct answers)a. Make sure the company's website can handle e-
commerce transactions.
Which layer of the operating system run in the background and will handle an event?
a. Utility programs.
b. Services.
c. Kernel.
d. Shell.
(Module: Types of Software) (correct answers)b. Services
b. Ensuring privacy and security of data shared by customers using cloud computing.
c. Breaking organization goals into smaller goals will not relate to IT activities.
d. IT goals include cloud computing, and organization goals include real-time communication to
contain costs while scaling quickly.
(Module: The IT Department) (correct answers)d. IT goals include cloud computing, and organization goals
include real-time communication to contain costs while scaling quickly.
a. Employee.
b. Guest.
c. Administrator.
d. User.
(Module: Types of Software) (correct answers)c. Administrator.
d. Cloud computing.
(Module: The IT Department) (correct answers)c. Specific, measurable outcomes the organization plans to
achieve.
a. Employee.
b. User.
c. Guest.
d. Administrator.
(Module: Types of Software) (correct answers)d. Administrator.
b. Maintaining websites.
a. Server.
b. Mobile device.
c. Workstation.
d. Android.
b. Handling budgets.
c. Establishing deadlines.
a. Server.
b. Mobile device.
c. Workstation.
d. Android.
IT personnel who understand both the technical IT infrastructure and management of the business fill which
role?
a. IT entry-level.
b. Board of Directors.
c. IT specialists.
d. IT management.
b. Mobile device.
c. Workstation.
d. Android.
c. More expensive.
(Module: The IT Department) (correct answers)a. Meeting the company's specific needs.
a. Purchased from a vendor and gives you the right to use the software but is not yours to own.
c. Free from purchase but you are bound to some agreements when you install it.
d. Made freely available as a source code to enhance and distribute the software.
(Module: Software Licensing) (correct answers)d. Made freely available as a source code to enhance and
distribute the software.
What is an advantage of buying a solution from another company?
a. More expensive.
d. Faster
What will protect the original work and the creation of inventive concepts?
a. Fair Use.
b. Patent.
c. Copyright.
An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the
a. organization.
b. manager.
c. phase.
d. project.
(Module: Introduction to Project Management) (correct answers)d. project.
Problem definition, resource allocation, and risk assessment are 3 key elements of which project phase?
a. Closing.
b. Initiation.
c. Planning.
d. Executing.
What will prevent others from making, selling, or using an invention for 20 years?
a. Patent.
b. Fair Use.
c. Copyright.
Which project phase consists of determining the objectives and activities, organizing the activities, and
estimating the time and costs?
a. Planning.
b. Closing.
c. Initiation.
d. Executing.
Project managers use variance reports, status reports, and resource allocation reports in which project
phase?
a. Initiation.
b. Planning.
d. Closing.
(Module: Introduction to Project Management) (correct answers)c. Monitoring & Controlling.
When must a software license agreement be accepted when using proprietary software?
c. After downloading (or obtaining via another medium) but before using the software.
(Module: Software Licensing) (correct answers)c. After downloading (or obtaining via another medium) but
before using the software.
The team will write a final report detailing the processes and outcomes of the project in which project
phase?
a. Initiation.
b. Planning.
The proprietary software license agreement gives the purchaser the right to?
a. Initiation.
b. Planning.
d. Closing.
Which project phase determines what resources are available to meet the project needs?
a. Initiation.
b. Planning.
c. Executing.
d. Closing.
(Module: Introduction to Project Management) (correct answers)a. Initiation.
a. Initiation.
b. Planning.
d. Closing.
The End User License Agreements is a contract between the Licensor and the?
Determining the project scope or the work that needs to be completed is in what project phase?
a. Initiation.
b. Planning.
c. Executing.
d. Closing.
a. Time only.
b. Capital only.
(Module: Introduction to Project Management) (correct answers)c. the work that needs to be done.
What kind of numbering system is binary?
a. Base 2.
b. Base 10.
c. Base 16.
d. Base 8.
(Module: Programming and Scripting) (correct answers)a. Base 2
(Module: Programming and Scripting) (correct answers)c. In order for the computer to understand the code.
a. Base 8.
b. Base 10.
c. Base 16.
d. Base 2.
(Module: Programming and Scripting) (correct answers)c. Base 16.
During analysis, which system requirement includes features that will satisfy end user requirements?
a. Accessibility.
b. Buffer.
c. Security.
d. User requirements.
During analysis, which system requirement prevents unauthorized users from accessing data?
a. Buffer overflow.
b. Security.
c. User needs.
d. Accessibility.
During analysis, which system requirement ensures that the system is accessible to all users?
a. Security.
b. User needs.
c. Accessibility.
d. Preliminary investigation.
(Module: System Development Life Cycle) (correct answers)c. Alpha testing uses simulated data.
During implementation, which testing method is performed by the end user (in a limited fashion) using
actual data in the real working environment?
a. User acceptance.
b. Beta.
c. Modeling.
d. Alpha.
During implementation, which testing assesses whether the system functions and is useful?
a. Deployment.
b. Beta.
c. User acceptance.
d. Alpha.
b. Testing.
c. Preliminary investigation.
d. System deployment.
Which term involves replacing the old system with a new system?
a. Final documentation.
b. End-user training.
c. Modeling.
d. System conversion.
b. Physical models.
c. Logical models.
(Module: System Development Life Cycle) (correct answers)d. Existing systems in the organization.
A company's ability to recover after a disaster is directly related to which of the following?
a. IT department.
b. Marketing strategy.
c. Financial plan.
Which of the following statements accurately describes off-site storage? Select two that apply.
a. An off-site storage location should be far enough away from the main business site so that it is
protected in the case of a disaster.
b. A hot site is a form of off-site storage that does not include hardware and servers.
d. Site sharing is a form of off-site storage that involves having multiple data centers located in
different regions.
(Module: Business Continuity) (correct answers)a. An off-site storage location should be far enough away
from the main business site so that it is protected in the case of a disaster.
d. Site sharing is a form of off-site storage that involves having multiple data centers located in different
regions.
An operating system will write and change data to multiple hard drives at the same time so that if
something happens to one hard drive, another hard drive is available to speed up data recovery. This
statement best describes which of the following?
a. Backup media.
b. Data mirroring.
c. Incremental backups.
d. Image backups.
a. Backup media.
b. Incremental backups.
c. Image backups.
d. Data mirroring.
b. Radio-frequency identification.
a. Healthcare.
b. Consumers.
c. Financial sector.
d. Media/advertising.
(Module: The Future of Computing) (correct answers)a. Healthcare.
c. Financial sector.
d. Media/advertising.
a. A Platform as a Service is the ability to quickly and consistently develop and deliver applications.
b. A Platform as a Service is the ability to store data and aid communication for remote teams.
c. A Platform as a Service makes it possible for businesses to access and use software through the
Internet.
d. A Platform as a Service makes it possible to have all of your businesses IT departments needs sited
outside of the organization and available to anyone, wherever.
(Module: The Future of Computing) (correct answers)a. A Platform as a Service is the ability to quickly and
consistently develop and deliver applications.
The need for professionals and businesses to have a better way to communicate over a distance led to IT
professionals first developing .
b. Information Technology.
c. The Internet.
d. Cloud computing.
b. local reach.
(Module: The Future of Computing) (correct answers)c. more tools for communicating.
Which of the following would be an example of unethical behavior on the part of an IT professional? Select
two that apply.
d. Checking that employees are following organization rules and protocol for Internet usage.
(Module: Ethics) (correct answers)a. Using a work computer to do personal online shopping.
Select all of the following items which can be a threat to personal and organizational privacy. Select three
that apply.
(Module: Ethics) (correct answers)b. Phishing and scams attempting to get private information.
a. Common Knowledge.
b. Sensitive.
c. Private.
d. Confidential.
Which of the following is the best example of the availability component of computer security?
a. Data synchronization.
b. Encryption of passwords.
Which of the following are protected by federal legislation? Select three that apply.
a. Copyrighted music.
d. Student records.
d. Student records.
For the following scenario, which government regulation would be relevant? Andrea is employed by the
Deming Foundation, a non-profit seeking to help increase graduation rates in rural communities. She has
been working hard to identify and recruit donations from wealthy businessmen and companies and is seeing
a great deal of success. While she quickly runs into the grocery store for a few items, someone steals her
laptop from her car, containing all her work files.
b. Making sure the policies are enforced fairly and evenly throughout an organization.
d. Checking employees' personal e-mail accounts on their personal digital devices to ensure they
contain no classified information.
(Module: Ethics) (correct answers)a. Giving feedback to management in the development of IT policy.
b. Making sure the policies are enforced fairly and evenly throughout an organization.
Which of the following are reasons why it is important for an IT professional to be aware of a variety of
Professional Association and Ethics Standards? Select 4 that apply.
a. By reviewing the ethical standards of different associations, the IT Professional can have a
benchmark to measure his or her own behavior and that of the organization.
b. By being aware of the different ethical codes, the IT Professional is more likely to know the
appropriate course of action in different situations.
(Module: Ethics) (correct answers)a. By reviewing the ethical standards of different associations, the IT
Professional can have a benchmark to measure his or her own behavior and that of the organization.
b. By being aware of the different ethical codes, the IT Professional is more likely to know the
appropriate course of action in different situations.
c. Professional Associations provide support and training.
d. Each Professional Association has a different focus so may be relevant to different aspects of an IT
professional's duties.