0% found this document useful (0 votes)
607 views121 pages

Wgu c182 Objective Assessment and Practice Exam Newest 2025 Test Bank

The document contains a test bank for WGU C182, featuring 350 actual exam questions and their correct answers across various topics such as software licensing, network hardware, and programming. Key concepts include rights under End User License Agreements, characteristics of computer networks, and definitions of programming languages and algorithms. The content is structured in a question-and-answer format, providing detailed insights into computer science principles.

Uploaded by

karurijames1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
607 views121 pages

Wgu c182 Objective Assessment and Practice Exam Newest 2025 Test Bank

The document contains a test bank for WGU C182, featuring 350 actual exam questions and their correct answers across various topics such as software licensing, network hardware, and programming. Key concepts include rights under End User License Agreements, characteristics of computer networks, and definitions of programming languages and algorithms. The content is structured in a question-and-answer format, providing detailed insights into computer science principles.

Uploaded by

karurijames1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 121

WGU C182 OBJECTIVE ASSESSMENT AND

PRACTICE EXAM NEWEST 2025 TEST BANK|


COMPLETE 350 ACTUAL EXAM QUESTIONS
AND CORRECT DETAILED ANSWERS
(VERIFIED ANSWERS) ALREADY GRADED
A+|| BRAND NEW!!
What rights does the End User License Agreement for proprietary software typically give to purchasers?

a. The freedom to share the software with others.

b. The right to modify the software.

c. Ownership rights to the software.

d. The right to use the software.

(Module: Software Licensing) (correct answers)d. The right to use the software.

Which of the following statements is true of computer networks?

a. Computer Networks are inherently secure.

b. Computer networks allow individuals to share hardware such as printers, but not software.
c. Computer networks allow individuals to share many types of resources.

d. Computer networks are not useful unless they are connected to the internet.

(Module: Network Hardware) (correct answers)c. Computer networks allow individuals to share many types
of resources.

part of the domain name of a Web page's URL. (correct answers)top-level domain (TLD)

Which of the following describes local computers only?

a. It is a computer that a person is physically at.

b. Servers are often this type of computer.

c. It is a computer that is accessed over the network.

d. It is often part of a computer network.

(Module: Network Hardware) (correct answers)a. It is a computer that a person is physically at.

In the strategic risk analysis, prioritizing risks is before which step?


a. Identify information assets

b. Determine threats

c. Identify vulnerabilities

d. Develop and enact policies against threats. (correct answers)b. Determine threats

Which of the following is the best definition of a computer network?

a. A computer network consists of two or more computers linked together that share devices such as
printers and file servers but they are not able to share software.

b. A computer network is a collection of computers and computer resources (e.g., printers, file servers)
connected in such a way that the computers can communicate with each other and their

resources.

c. A computer network consists of one computer connected wirelessly to a printer.

d. A computer network consists of a number of computers connected via a device that allows them to
connect to the Internet.

(Module: Network Hardware) (correct answers)b. A computer network is a collection of computers and
computer resources (e.g., printers, file servers) connected in such a way that the computers can
communicate with each other and their resources.

Which of the following statements applies to a proprietary software license?


a. Purchased from a vendor and gives you the right to use the software but is not yours to own.

b. Made freely available as a source code to enhance and distribute the software.

c. Free from purchase but you are bound to some agreements when you install it.

d. Free to use for a limited amount of time or with a restriction on features.

(Module: Software Licensing) (correct answers)a. Purchased from a vendor and gives you the right to use
the software but is not yours to own.

What is the most common type of local, physical network connection in use today?

a. Coaxial and radio towers.

b. Fiber optic cable and radio towers.

c. Fiber optic and UTP.

d. Radio towers and satellite.

(Module: Network Hardware) (correct answers)c. Fiber optic and UTP.

The End User License Agreement for proprietary software


a. Limits modifying the software.

b. Is a public license.

c. Is free.

d. Leaves room for negotiation.

(Module: Software Licensing) (correct answers)a. Limits modifying the software.

Which of the following type of transmission is paired correctly with the given media?

a. Fiber optic cable - Electricity.

b. Fiber optic cable - Light impulses.

c. Coaxial cable - Radio waves.

d. Coaxial cable - Light impulses.

(Module: Network Hardware) (correct answers)b. Fiber optic cable - Light impulses.
Which number system is read and used by humans every day?

a. Octal.

b. Decimal.

c. Hexadecimal.

d. Binary.

(Module: Programming and Scripting) (correct answers)b. Decimal

Why would it be desirable to use a switch as opposed to a hub in a network?

a. Because switches only transfer information to specific computers within a network and not all of the
computers, the bandwidth used with a switch is more than that of a hub.

b. Because switches only transfer information to specific computers within a network and not all of the
computers, the bandwidth used with a switch is less than that of a hub.

c. Because a switch is a more powerful device, it can be used over longer distances compared to a

hub.
(Module: Network Hardware) (correct answers)b. Because switches only transfer information to specific
computers within a network and not all of the computers, the bandwidth used with a switch is less than that
of a hub.

Which two of these non-decimal numbers are examples of hexadecimal numbers?

a. 13 and 64A

b. 64A and 8G

c. 3KF and 13

d. 8G and 3KF (correct answers)a. 13 and 64A

Which of the following devices is used to connect one network to another network?

a. Switch.

b. Router.

c. Hub.

(Module: Network Hardware) (correct answers)b. Router.

(Routers are the main means of connection between one network and another.)
How many bits are in a byte?

a. 5

b. 24

c. 16

d. 8 (correct answers)d. 8

Which of the following communication system hardware devices is commonly used as a wireless access
point?

a. Radio waves.

b. Hub.

c. Router.

d. Switch.

(Module: Network Hardware) (correct answers)c. Router.


(Routers can be used as a wireless access point.)

Recall the IPOS (Input-Processing-Output-Storage) cycle. Which two steps of the IPOS cycle deal exclusively
with binary representations of data?

a. Output and Storage

b. Processing and Input

c. Storage and Processing

d. Input and Output (correct answers)c. Storage and Processing

Which of the following are characteristics of a packet-switched network? Select two:

a. The path exists during the entire transmission, allowing communication in either direction to occur
simultaneously.

b. The choice of pathway is based on network availability and amount of message traffic.

c. The route is established one branch at a time.

d. A and B.

e. B and C.
(Module: Network Hardware) (correct answers)b. The choice of pathway is based on network availability
and amount of message traffic.

c. The route is established one branch at a time.

What two inventions have allowed programmers to avoid writing programs in machine language?

a. Computers and language translators.

b. High-level programming languages and binary numbers.

c. Language Translators and high-level programming languages.

d. Binary numbers and computers.

(Module: Programming and Scripting) (correct answers)c. Language Translators and High Level

Programming Languages

How do a router and switch differ when handling a message?

a. There is no difference in how a router and a switch handle messages.

b. The switch will purposefully drop messages if message traffic exceeds its capacity.
c. Both a router and a switch use the message's destination address to select the line to route the
incoming message to.

d. The router will purposefully drop messages if message traffic exceeds its capacity.

(Module: Network Hardware) (correct answers)d. The router will purposefully drop messages if message
traffic exceeds its capcity.

Which of the following is a scripting language?

a. C++.

b. Java.

c. Javascript.

d. BASIC.

(Module: Programming and Scripting) (correct answers)c. Javascript.

How do virtual machines support a business computing ecosystem?


a. A virtual machine (VM) is a broadcasting device that facilitates communication across a network,
thus supporting a business computing ecosystem.

b. A virtual machine (VM) is made available by software and permits a computer to run multiple OSs.
In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.

c. A virtual machine (VM) is a server that users can log into and use different OSs and applications
associated with the different OSs.

d. A virtual machine (VM) is a whole separate physical computer that provides users access to an OS
different from their primary computer. Being able to have access to a computer with a different OS
facilitates collaboration in the business ecosystem.

(Module: Network Hardware) (correct answers)d. A virtual machine (VM) is made available by software and
permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that
is not restricted by platform software.

Which of the following is the correct function of the compiler?

a. Translates the entire program, creating an executable program, which can be run at a later time.

b. Takes the most recently entered instruction, translates it into machine language, and executes it.

c. Allows programmers to more easily write programs.

d. Every instruction is translated first and then executed, and this must be done every time the
program is run.

(Module: Programming and Scripting) (correct answers)a. Translates the entire program, creating an
executable program, which can be run at a later time.
In a client-server network, what is the role of the server?

a. The role of the server is to send out requests for information.

b. The role of the server is to maintain connections to remote servers.

c. The role of the server is to take requests from the client and send back the requested information.

d. The role of the server is the same as the role of the client because all of the computers on this type
of network are equal.

(Module: Network Hardware) (correct answers)c. The role of the server is to take requests from the client
and send back the requested information.

Which of the following is the correct function of the interpreter?

a. It translates the entire program, creating an executable program, which can be run at a later time.

b. It takes one program, written in a high-level language, as input, and creates a machine language
program as output.

c. It takes the most recently entered instruction, translates it into machine language, and executes it.

d. It allows programmers to more easily write programs.


(Module: Programming and Scripting) (correct answers)c. It takes the most recently entered instruction,
translates it into machine language, and executes it.

Which of the following servers responds to HTTP requests on the Internet?

a. Print server.

b. Web server.

c. File server.

d. FTP server.

(Module: Network Hardware) (correct answers)b. Web server

What is a disadvantage of a compiled program compared to an interpreted language?

a. Extra translation time.

b. Requires additional translation time.

c. Lack of portability.
d. Must convert programming language to machine code.

(Module: Programming and Scripting) (correct answers)c. Lack of portability.

Which of the following servers monitors requests, but doesn't send files in return?

a. Print server.

b. FTP server.

c. Web server.

d. File server.

(Module: Network Hardware) (correct answers)a. Print server

Which of the following languages can create an executable program?

a. Scripting language.

b. Interpreted language.

c. Assembly language.
d. Compiled language.

(Module: Programming and Scripting) (correct answers)d. Compiled language.

Which of the following servers can generate reports from client queries?

a. File server.

b. Database server.

c. Web server.

d. Mail server.

(Module: Network Hardware) (correct answers)b. Database server

Which of the following are types of language translators?

a. Binary numbers and digital circuits.

b. Compiler and binary numbers.


c. Compiler and interpreter.

d. Interpreter and digital circuits.

(Module: Programming and Scripting) (correct answers)c. Compiler and interpreter.

Which of the following is NOT a characteristic of a bus network topology?

a. All messages travel along a single cable.

b. Is a very reliable form of network.

c. Expensive compared to other topologies.

d. Is one of the more simple types of network topographies.

(Module: Network Hardware) (correct answers)c. Expensive compared to other topologies.

Which two are both types of scripting languages?

a. Python and C++.


b. Pascal and ASP.

c. C++ and Pascal.

d. ASP and Python.

(Module: Programming and Scripting) (correct answers)d. ASP and Python.

Which of the following types of networks has each device in the network connected in a single point-to-
point connection with a central HUB?

a. Star network.

b. Bus network.

c. Mesh network.

d. Ring network.

(Module: Network Hardware) (correct answers)a. Star network

Which two are both types of high-level programming languages but not considered scripting languages?
a. Ada and JavaScript.

b. BASIC and Ada.

c. JavaScript and Tcl.

d. Tcl and BASIC.

(Module: Programming and Scripting) (correct answers)b. BASIC and Ada

Which device permits packet switching so that a message can be routed to the next link in a network?

a. LAN.
b. IP Address.

c. DNS.

d. Router.

(Module: World Wide Web) (correct answers)d. Router

(A router is a device that permits packet switching in order to send messages to the next link in the
network.)

What is another term that defines a script?

a. Compiler.

b. Pascal.

c. Interpreted program.

d. Machine code.

(Module: Programming and Scripting) (correct answers)c. Interpreted program


In order to translate from an IP alias to an IP address, which of the following is used?

a. URL.

b. Packet switching.

c. Routers.

d. DNS.

(Module: World Wide Web) (correct answers)d. DNS.


Which of the following describes a computer program?

a. An elaborate algorithm.

b. A set of processes.

c. A set of JavaScript code.

d. A translator.

(Module: Programming and Scripting) (correct answers)a. An elaborate algorithm.

Which of the following best describes the Internet?

a. The Internet uses circuit switching.

b. In order to communicate over the Internet, a host does not need to run the IP network protocol.

c. The Internet is a global network of networks.

d. The Internet is an isolated computer network.


(Module: World Wide Web) (correct answers)c. The Internet is a global network of networks.

What is an example of a non-computer scenario that represents an algorithm? Select 3 that apply.

a. Making a sandwich.

b. Building a swing-set.

c. Solving a math problem.

d. Being asleep.
(Module: Programming and Scripting) (correct answers)a. Making a sandwich

b. Building a swing-set

c. Solving a math problem

Which is part of the definition of Domain Name?

a. Identifies the server on which a web page can be found.

b. Indicates the location of a document on the server.

c. Indicates the name of the file or document being accessed.

d. Reflects the set of rules by which a resource is transmitted.

(Module: World Wide Web) (correct answers)a. Identifies the server on which a web page can be found.

Which describes an ideal algorithm?

a. Infinite.
b. Complex.

c. Ambiguous.

d. Clear.

(Module: Programming and Scripting) (correct answers)d. Clear

All of the following are parts of a URL except for:


a. LAN.

b. Protocol.

c. TLD.

d. Host name.

(Module: World Wide Web) (correct answers)a. LAN

Which describes how data is used in the data tier? Select three that apply.

a. Data is updated.

b. Data is stored.

c. Data is scaled.

d. Data is retrieved.

(Module: Programming and Scripting) (correct answers)a. Data is updated.

b. Data is stored.

d. Data is retrieved.
Why is it best to keep the data independent from the application? Select 2 that apply.

a. Removes the need for a user to interact directly with the data

b. The data is not independent from the application

c. So the data can not be seen or changed

d. It shields users from the complexities of the data (correct answers)a. Removes the need for a user to
interact directly with the data

d. It shields users from the complexities of the data


The abbreviation "URL" indicates:

a. Uniform Resource Locator.

b. United Rendering Lists.

c. Unified Reader Link.

d. Undetermined Resource Location.

(Module: World Wide Web) (correct answers)a. Uniform Resource Locator

The presentation tier is where the? (correct answers)user interface

Which of the following statements is not part of the path a message takes from one computer to another?

a. A message is divided into one or more packets.

b. The packet(s) are given the final destination address.

c. All messages require a response from the destination machine to the sending device.
d. All packets of the same message are combined together as they arrive.

(Module: World Wide Web) (correct answers)c. All messages require a response from the destination
machine to the sending device.

What does MVC stand for?

a. Model-Variable-Controller.
b. Model-View-Component.

c. Model-View-Controller.

d. Model-View-Computer.

(Module: Programming and Scripting) (correct answers)c. Model-View-Controller

is computed from other data contained within an IP packet and stored as part of the IP packet.

a. A Network Address Translation.

b. A gateway.

c. A checksum.

d. A DNS server table.

(Module: World Wide Web) (correct answers)c. A checksum.

Which other model is the M-V-C model similar to?


a. n-tier development model.

b. Input model.

c. Interface model.

d. Business model.

(Module: Programming and Scripting) (correct answers)a. n-tier development model.

Your site's Internet point of presence is called a:


a. Gateway.

b. DNS server table.

c. IP packet.

d. Router.

(Module: World Wide Web) (correct answers)a. Gateway.

What is one way the n-tier development model differs from the MVC model?

a. The n-tier model controls all edits to data.

b. The n-tier model scans new data for errors.

c. The n-tier model has tiers that are each separate applications.

d. The n-tier model sends data to the controller

(Module: Programming and Scripting) (correct answers)c. The n-tier model has tiers that are each separate
applications.
Using a unique identifier to allow access to sensitive information is an example of:

a. availability.

b. confidentiality.

c. integrity.

(Module: Network Security and Business Implication) (correct answers)b. Confidentiality


Why is it essential to know what information will be needed from the database from the outset of
development? Select three that apply.

a. The number of fields in the database determines the cost of that database.

b. By knowing the purpose, the developer can determine how many fields are needed in the database.

c. The purpose determines the structure of the database.

d. The developer can determine which data types would help fulfill the purpose.

(Module: Data Infrastructure) (correct answers)b. By knowing the purpose, the developer can determine
how many fields are needed in the database.

c. The purpose determines the structure of the database.

d. The developer can determine which data types would help fulfill the purpose.

The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an
example of

a. availability.

b. confidentiality.

c. integrity.
(Module: Network Security and Business Implication) (correct answers)b. confidentiality.

Indicate which of the following statements about databases and data types are accurate. Select three that
apply.

a. A customer's first name and last name must be entered as two separate fields.

b. Once the database is designed, the user doesn't need to worry about determining data types.
c. Numbers can be entered as text or as numeric values

d. Uniform data types can be searched and sorted.

(Module: Data Infrastructure) (correct answers)b. Once the database is designed, the user doesn't need to
worry about determining data types.

c. Numbers can be entered as text or as numeric values

d. Uniform data types can be searched and sorted.

Entering data into the system accurately is an example of

a. confidentiality.

b. integrity.

c. availability.

(Module: Network Security and Business Implication) (correct answers)b. Integrity

Which of the following would be a field in a database? Select two that apply.
a. 63.2%.

b. 19943-5568.

c. Gender.

d. Sales.

(Module: Data Infrastructure) (correct answers)a. 63.2%.

b. 19943-5568.
Obtaining data from computers all over the organization is an example of

a. Confidentiality

b. Availability

c. Integrity

(Module: Network Security and Business Implication) (correct answers)b. Availability

Which of the following statements about data organization are correct? Select three that apply.

a. Not all records need to contain data about every attribute.

b. You cannot perform mathematical functions on string data.

c. A relationship may exist between each individual record.

d. The information in each record must refer to a person.

(Module: Data Infrastructure) (correct answers)a. Not all records need to contain data about every attribute.

b. You cannot perform mathematical functions on string data.


c. A relationship may exist between each individual record.

Ensuring that data is accessible and information is available when needed is an example of

a. availability.

b. confidentiality.

c. integrity.
(Module: Network Security and Business Implication) (correct answers)a. availability.

Which of the following are forms of queries? Select two that apply.

a. Insert.

b. Projection.

c. Database.

d. Join.

(Module: Data Infrastructure) (correct answers)b. Projection.

d. Join.

Which of the following types of information presents a threat to someone's privacy?

a. Phone numbers and e-mail addresses.

b. Student ID and credit card numbers.

c. Secret business plans.


d. Names and addresses in the phone book.

(Module: Network Security and Business Implication) (correct answers)b. Student ID and credit card
numbers

Which of the following are operations used to alter the data within a relation of a database? Select three
that apply.

a. Insert.
b. Join.

c. Update.

d. Delete.

(Module: Data Infrastructure) (correct answers)a. Insert

c. Update.

d. Delete.

Which of the following will find vulnerabilities and fix or protect against them?

a. Social engineering.

b. Packet sniffing.

c. White-hat hacking.

d. Phishing.

(Module: Network Security and Business Implication) (correct answers)c. White-hat hacking
In order for a relational database to work, at least one of the fields has to contain unique values. What is the
name of this field?

a. Unique database.

b. Unique identifier.

c. Unique relation.

d. Unique projection.

(Module: Data Infrastructure) (correct answers)b. Unique identifier.


What is required to verify authenticity of the recipient? Select three that apply.

a. Encryption.

b. Certificates.

c. Anti-viral software.

d. Digital signatures.

(Module: Network Security and Business Implication) (correct answers)a. Encryption

b. Certificates.

d. Digital signatures.

Which of the following are the three main categories of databases? Select 3 that apply.

a. Relational.

b. Isolated.

c. Flat File.
d. Hierarchical.

(Module: Data Infrastructure) (correct answers)a. Relational.

c. Flat File.

d. Hierarchical.

In strategic risk analysis, what is the first step?


a. Identify vulnerabilities.

b. Identify information assets.

c. Prioritize risks.

d. Determine threats.

(Module: Network Security and Business Implication) (correct answers)a. Identify vulnerabilities

Which of the following database categories is the most similar to a spreadsheet or MS Excel document?

a. Relational.

b. Hierarchical.

c. Isolated.

d. Flat File.

(Module: Data Infrastructure) (correct answers)d. Flat File.

In strategic risk analysis, what is the final step?


a. Develop and enact policies against threats

b. Identify vulnerabilities Prioritize risks

c. Determine threats

(Module: Network Security and Business Implication) (correct answers)a. Develop and enact policies against
threats
Which of the following examples best describes hierarchical databases? Select 2 that apply.

a. Parent-child relationships.

b. A spreadsheet.

c. A tree-like structure.

d. Amazon's customer database.

(Module: Data Infrastructure) (correct answers)a. Parent-child relationships.

c. A tree-like structure.

Which of the following skills are needed to assist with application design and development? Select 2 that
apply.

a. Schema development.

b. Data integration.

c. Performance tuning.

d. Maintenance.
(Module: Data Infrastructure) (correct answers)a. Schema development.

c. Performance tuning.

Learning about social engineering and how to protect passwords is an example of .

a. Authentication.

b. Access control.

c. Education.
(Module: Network Security and Business Implication) (correct answers)c. Education

Database administrators might be involved with the integration of data from where?

a. Local area networks to other networks.

b. Newer to older systems.

c. Older systems to new.

d. DBMS to new systems.

(Module: Data Infrastructure) (correct answers)c. Older systems to new.

All of the following are authentication except

a. phishing.

b. password.

c. key card.
d. fingerprint.

(Module: Network Security and Business Implication) (correct answers)a. Phishing

What is the focus of the list of responsibilities for database administrators?

a. DBMS support and proper security measures.

b. Performance tuning and design development.


c. Proper security measures and design development.

d. Design development and DBMS support.

(Module: Data Infrastructure) (correct answers)d. Design development and DBMS support.

Access rights

a. are a password to log in.

b. will include files that the user can access.

c. will prove who you are.

d. may be provided by biometrics.

(Module: Network Security and Business Implication) (correct answers)b. Will include files that the user can
access

Which of the following statements applies to a business intelligence system?

a. It is used when making long-term decisions.


b. Simply collects information from various sources.

c. It only uses information not found within the company databases.

d. It aids in making everyday organizational decisions.

(Module: Data Management Tools) (correct answers)a. It is used when making long-term decisions.

What are advantages of a network?


a. Cost savings

b. Decreased efficiency

c. Decreased communication

d. Decreased productivity

(Module: Network Security and Business Implication) (correct answers)a. Cost savings

A business intelligence system is used by which of the following groups of people?

a. Low-level management.

b. High-level management.

c. Entry-level employees.

d. Customers.

(Module: Data Management Tools) (correct answers)b. High-level management.

A local area network (LAN)


a. allows hardware sharing within one office.

b. allows software sharing between two offices.

c. allows hardware sharing between two offices.

(Module: Network Security and Business Implication) (correct answers)a. allows hardware sharing within
one office

What is the definition of business intelligence?


a. Business intelligence is a term used to reflect the knowledge a business can create by analyzing data
gathered from multiple sources.

b. Business intelligence refers to a specific software application businesses can use to gather data from
their competitors.

c. Business intelligence is a term used to depict a network structure that allows greater
communication among different parts of an organization.

d. Business intelligence refers to a specific type of server used to gather data that can be analyzed by
an organization.

(Module: Data Management Tools) (correct answers)a. Business intelligence is a term used to reflect the
knowledge a business can create by analyzing data gathered from multiple sources.

How does a network (WAN) enhance the business ecosystem? Select 2 that apply.

a. Employees in different locations can share software.

b. The network ensures privacy of customer information.

c. The network provides greater security.

d. Team members can review files on the shared drive synchronously

.(Module: Network Security and Business Implication) (correct answers)a. Employees in different locations
can share hardware and software.
d. Team members can review files on the shared drive synchronously.

Which OLAP operation involves viewing the data using a different filter first?

a. Drilling up or down.

b. Rolling up.
c. Dicing.

d. Pivoting.

(Module: Data Management Tools) (correct answers)d. Pivoting.

Which software is run automatically rather than by the end user?

a. Application.

b. Server.

c. System.

d. Microsoft PowerPoint.

(Module: Types of Software) (correct answers)c. System.

What is the main difference between a data warehouse and OLDP?

a. OLDP isn't used by any businesses while data warehouses are.


b. OLDP stores large amounts of information while a data warehouse does not.

c. OLDP deals with data in real time while a data warehouse does not.

d. OLDP collects data from one source while data warehouses collect data from multiple sources.

(Module: Data Management Tools) (correct answers)c. OLDP deals with data in real time while a data
warehouse does not.

Which type of software includes programs such as Microsoft Word and PowerPoint?
a. Server.

b. Daemons.

c. System.

d. Application.

(Module: Types of Software) (correct answers)d. Application.

Which of the following are examples of real-time processing? Select two that apply.

a. Generating monthly bank statements.

b. Playing an online multiplayer video game.

c. Processing payroll.

d. Paying your bills online.

(Module: Data Management Tools) (correct answers)b. Playing an online multiplayer video game.

d. Paying your bills online.


Which software consists of programs such as daemons and a scheduler?

a. Microsoft Word.

b. System.

c. Server.

d. Application.

(Module: Types of Software) (correct answers)b. System.


Which of the following interacts between a database and an application?

a. A BI system.

b. OLDP.

c. A driver.

d. A database query language.

(Module: Data Management) (correct answers)c. A driver.

Which of the following is a program that will allow a computer to easily access the hardware and software
of the computer system?

a. Mobile device.

b. Server.

c. Workstation.

d. Operating system.
(Module: Types of Software) (correct answers)d. Operating system.

Which of the following is an interface between a database and the application?

a. SQL.

b. DBMS.

c. ODBC application.

d. JDBC.
(Module: Data Management) (correct answers)c. ODBC application.

Today's operating systems . An operating system will issue commands using the command line prompt by

a. typing in commands.

b. clicking the mouse.

c. dragging the mouse.

d. pointing the mouse.

(Module: Types of Software) (correct answers)a. typing in commands.

What does a JDBC driver allow a user to do?

a. The user no longer needs to perform Java updates.

b. Have an application interact with any database when developing in Java.

c. Interact directly with the database when developing in Java.


d. Interact with a database via SQL.

(Module: Data Management) (correct answers)b. Have an application interact with any database when
developing in Java.

Which of the following operating systems is for workstations?

a. Chrome.
b. iOS.

c. Windows 10.

d. Android.

(Module: Types of Software) (correct answers)c. Windows 10.

Which of the following is a SQL command? Select three that apply.

a. SELECT.

b. DROP.

c. INSERT.

d. FIX.

(Module: Data Management) (correct answers)a. SELECT.

b. DROP.

c. INSERT.
Which of the following operating systems is for mobile devices?

a. Android.

b. Windows Server.

c. Linux.

d. Windows 7/8.

(Module: Types of Software) (correct answers)a. Android.


SQL stands for?

(Module: Data Management) (correct answers)Structured Query Language

Which of the following operating systems is for servers?

a. iOS.

b. Windows Server.

c. Windows 7/8.

d. Android.

(Module: Types of Software) (correct answers)b. Windows Server.

Which of the following operators is used to select all of a certain data?

a. <>
b. =

c. *

d. LIKE

(Module: Data Management) (correct answers)c. *

Which layer of the operating system will handle process management, resource management, and memory
management?
a. Shell.

b. Kernel.

c. Services.

d. Utility programs.

(Module: Types of Software) (correct answers)b. Kernel.

Which department will work with the management department to achieve strategic goals by developing
technology solutions, applications, and databases?

a. Marketing.

b. Finance.

c. HR.

d. IT.

(Module: The IT Department) (correct answers)d. IT.

Which layer of the operating system provides access to the kernel?


a. Services.

b. Shell.

c. Utility programs.

d. Device drivers.

(Module: Types of Software) (correct answers)b. Shell.


Which are the main functions of the IT department? Select two that apply.

a. Make sure the company's website can handle e-commerce transactions.

b. Ensuring employee records are up-to-date in the database.

c. Hiring, training, and orienting employees.

d. Supports day-to-day technology needs of an organization.

(Module: The IT Department) (correct answers)a. Make sure the company's website can handle e-
commerce transactions.

d. Supports day-to-day technology needs of an organization.

Which layer of the operating system run in the background and will handle an event?

a. Utility programs.

b. Services.

c. Kernel.

d. Shell.
(Module: Types of Software) (correct answers)b. Services

Which of the following aligns IT goals and organization goals?

a. Improving IT infrastructure to support rapid expansion to capture less market share.

b. Ensuring privacy and security of data shared by customers using cloud computing.

c. Breaking organization goals into smaller goals will not relate to IT activities.
d. IT goals include cloud computing, and organization goals include real-time communication to
contain costs while scaling quickly.

(Module: The IT Department) (correct answers)d. IT goals include cloud computing, and organization goals
include real-time communication to contain costs while scaling quickly.

Which of the following is a role of an administrator account?

a. It can view programs but not write to or execute them.

b. Manipulate system files.

c. Allow the casual user to log in as the administrator.

d. It can add but not delete user accounts.

(Module: Types of Software) (correct answers)b. Manipulate system files.

Individuals in every department are expected to fulfill the organization's ?

(Module: The IT Department) (correct answers)Mission, Vision, and goals


Which account is also referred to as root or super user?

a. Employee.

b. Guest.

c. Administrator.

d. User.
(Module: Types of Software) (correct answers)c. Administrator.

Which of the following defines the organization's goals?

a. The reason the organization exists.

b. Describes future aspirations of the organization.

c. Specific, measurable outcomes the organization plans to achieve.

d. Cloud computing.

(Module: The IT Department) (correct answers)c. Specific, measurable outcomes the organization plans to
achieve.

Adding/deleting user accounts is the role of which account?

a. Employee.

b. User.

c. Guest.

d. Administrator.
(Module: Types of Software) (correct answers)d. Administrator.

What is IT management responsible for?

a. Being the project manager.

b. Maintaining websites.

c. Installation and maintenance.


d. Developing databases.

(Module: The IT Department) (correct answers)a. Being the project manager.

Windows 7/8, Linux, and Mac OS X are operating systems for?

a. Server.

b. Mobile device.

c. Workstation.

d. Android.

(Module: Types of Software) (correct answers)c. Workstation.

What is an IT specialist responsible for?

a. Hiring and firing.

b. Handling budgets.
c. Establishing deadlines.

d. Installation and maintenance.

(Module: The IT Department) (correct answers)d. Installation and maintenance.

Android, Chrome, and iOS are operating systems for?

a. Server.
b. Mobile device.

c. Workstation.

d. Android.

(Module: Types of Software) (correct answers)b. Mobile device.

IT personnel who understand both the technical IT infrastructure and management of the business fill which
role?

a. IT entry-level.

b. Board of Directors.

c. IT specialists.

d. IT management.

(Module: The IT Department) (correct answers)d. IT management.

Windows Server 2008/2012 is an operating system for which type of device?


a. Server.

b. Mobile device.

c. Workstation.

d. Android.

(Module: Types of Software) (correct answers)a. Server.

What is an advantage of building a solution in-house?


a. Meeting the company's specific needs.

b. Less time training employees how to use it.

c. More expensive.

d. Faster than buying.

(Module: The IT Department) (correct answers)a. Meeting the company's specific needs.

What is an advantage of outsourcing?

a. Less control over the subject.

b. Cost-effective if time is constrained.

c. Hiring more employees.

d. Losing the opportunity for internal growth.

(Module: The IT Department) (correct answers)b. Cost-effective if time is constrained.


Which of the following statements applies to an open source software license?

a. Purchased from a vendor and gives you the right to use the software but is not yours to own.

b. Must be purchased after the trial version.

c. Free from purchase but you are bound to some agreements when you install it.

d. Made freely available as a source code to enhance and distribute the software.

(Module: Software Licensing) (correct answers)d. Made freely available as a source code to enhance and
distribute the software.
What is an advantage of buying a solution from another company?

a. More expensive.

b. More time training employees how to use it.

c. Meeting the company's specific needs.

d. Faster

(Module: The IT Department) (correct answers)d. Faster

What will protect the original work and the creation of inventive concepts?

a. Fair Use.

b. Patent.

c. Copyright.

d. GNUs Public License.


(Module: Software Licensing) (correct answers)b. Patent.

An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the

a. organization.

b. manager.

c. phase.

d. project.
(Module: Introduction to Project Management) (correct answers)d. project.

Which two types of software licenses are free?

a. Proprietary and Shareware

b. Open source and Proprietary

c. Freeware and Open source

d. Shareware and Freeware

(Module: Software Licensing) (correct answers)c. Freeware and Open source

Problem definition, resource allocation, and risk assessment are 3 key elements of which project phase?

a. Closing.

b. Initiation.

c. Planning.
d. Executing.

(Module: Introduction to Project Management) (correct answers)b. Initiation.

What will prevent others from making, selling, or using an invention for 20 years?

a. Patent.

b. Fair Use.
c. Copyright.

d. GNUs Public License.

(Module: Software Licensing) (correct answers)a. Patent.

Which project phase consists of determining the objectives and activities, organizing the activities, and
estimating the time and costs?

a. Planning.

b. Closing.

c. Initiation.

d. Executing.

(Module: Introduction to Project Management) (correct answers)a. Planning.

Copyrights will protect?


(Module: Software Licensing) (correct answers)The original work for the duration of the author's life plus 70
years

Project managers use variance reports, status reports, and resource allocation reports in which project
phase?

a. Initiation.

b. Planning.

c. Monitoring & Controlling.

d. Closing.
(Module: Introduction to Project Management) (correct answers)c. Monitoring & Controlling.

When must a software license agreement be accepted when using proprietary software?

a. A software license agreement is not necessary.

b. Before purchasing the software.

c. After downloading (or obtaining via another medium) but before using the software.

d. After using the software.

(Module: Software Licensing) (correct answers)c. After downloading (or obtaining via another medium) but
before using the software.

The team will write a final report detailing the processes and outcomes of the project in which project
phase?

a. Initiation.

b. Planning.

c. Managing & Controlling.


d. Closing.

(Module: Introduction to Project Management) (correct answers)d. Closing.

The proprietary software license agreement gives the purchaser the right to?

(Module: Software Licensing) (correct answers)Use the software


Which project phase defines the problem or opportunity that the project is expected to address?

a. Initiation.

b. Planning.

c. Monitoring & Controlling.

d. Closing.

(Module: Introduction to Project Management) (correct answers)a. Initiation.

What will violate a proprietary software agreement?

a. Using the software after purchasing the software.

b. Purchasing the software.

c. Using the software after accepting the agreement.

d. Using the software after rejecting the agreement.


(Module: Software Licensing) (correct answers)d. Using the software after rejecting the agreement.

Which project phase determines what resources are available to meet the project needs?

a. Initiation.

b. Planning.

c. Executing.

d. Closing.
(Module: Introduction to Project Management) (correct answers)a. Initiation.

Which project phase assesses the risks and benefits of a project?

a. Initiation.

b. Planning.

c. Monitoring & Controlling.

d. Closing.

(Module: Introduction to Project Management) (correct answers)a. Initiation.

The End User License Agreements is a contract between the Licensor and the?

(Module: Software Licensing) (correct answers)Purchaser

Determining the project scope or the work that needs to be completed is in what project phase?
a. Initiation.

b. Planning.

c. Executing.

d. Closing.

(Module: Introduction to Project Management) (correct answers)a. Initiation.


Scope creep can impact the allocation of which of the following resources?

a. Time only.

b. Capital only.

c. Time and capital.

d. The number of staff only.

(Module: Introduction to Project Management) (correct answers)c. Time and capital.

The scope of the project is

a. determined in the closing phase.

b. always accurately identified in the initiation phase.

c. the work that needs to be done.

d. not at any risk.

(Module: Introduction to Project Management) (correct answers)c. the work that needs to be done.
What kind of numbering system is binary?

a. Base 2.

b. Base 10.

c. Base 16.

d. Base 8.
(Module: Programming and Scripting) (correct answers)a. Base 2

Why do high-level programming languages need to be translated?

a. In order for the programmer to understand the code.

b. In order for the load times to be reduced for a user.

c. In order for the computer to understand the code.

d. In order for the program to take up less space.

(Module: Programming and Scripting) (correct answers)c. In order for the computer to understand the code.

Hexadecimal numbers are on which base system?

a. Base 8.

b. Base 10.

c. Base 16.

d. Base 2.
(Module: Programming and Scripting) (correct answers)c. Base 16.

During analysis, which system requirement includes features that will satisfy end user requirements?

a. Accessibility.

b. Buffer.

c. Security.
d. User requirements.

(Module: System Development Life Cycle) (correct answers)d. User requirements.

During analysis, which system requirement prevents unauthorized users from accessing data?

a. Buffer overflow.

b. Security.

c. User needs.

d. Accessibility.

(Module: System Development Life Cycle) (correct answers)b. Security.

During analysis, which system requirement ensures that the system is accessible to all users?

a. Security.

b. User needs.
c. Accessibility.

d. Preliminary investigation.

(Module: System Development Life Cycle) (correct answers)c. Accessibility.

During implementation, how is alpha testing different from beta testing?

a. Beta testing is assisted by system developers.


b. Beta testing uses simulated data.

c. Alpha testing uses simulated data.

d. Alpha testing uses actual data.

(Module: System Development Life Cycle) (correct answers)c. Alpha testing uses simulated data.

During implementation, which testing method is performed by the end user (in a limited fashion) using
actual data in the real working environment?

a. User acceptance.

b. Beta.

c. Modeling.

d. Alpha.

(Module: System Development Life Cycle) (correct answers)b. Beta.

During implementation, which testing assesses whether the system functions and is useful?
a. Deployment.

b. Beta.

c. User acceptance.

d. Alpha.

(Module: System Development Life Cycle) (correct answers)c. User acceptance.

When does system conversion (direct, parallel, pilot, or phased) occur?


a. Modeling.

b. Testing.

c. Preliminary investigation.

d. System deployment.

(Module: System Development Life Cycle) (correct answers)d. System deployment.

Which term involves replacing the old system with a new system?

a. Final documentation.

b. End-user training.

c. Modeling.

d. System conversion.

(Module: System Development Life Cycle) (correct answers)d. System conversion.


When integrating a new system within an organization, what will it interact with?

a. No other systems in the organization.

b. Physical models.

c. Logical models.

d. Existing systems in the organization.

(Module: System Development Life Cycle) (correct answers)d. Existing systems in the organization.
A company's ability to recover after a disaster is directly related to which of the following?

a. IT department.

b. Marketing strategy.

c. Financial plan.

d. Business continuity plan.

(Module: Business Continuity) (correct answers)d. Business continuity plan.

Which of the following is the first step in creating a BCP plan?

a. Testing the plan.

b. Assessing critical operational activities.

c. Determining how quickly activities can resume.

d. Developing threat and risk assessments.


(Module: Business Continuity) (correct answers)b. Assessing critical operational activities.

Which of the following is the final step in creating a BCP plan?

a. Developing threat and risk assessments.

b. Testing the plan.

c. Assessing critical operational activities.

d. Determining how quickly activities can resume.


(Module: Business Continuity) (correct answers)b. Testing the plan.

Which of the following statements accurately describes off-site storage? Select two that apply.

a. An off-site storage location should be far enough away from the main business site so that it is
protected in the case of a disaster.

b. A hot site is a form of off-site storage that does not include hardware and servers.

c. A cold site is a costly form of off-site storage.

d. Site sharing is a form of off-site storage that involves having multiple data centers located in
different regions.

(Module: Business Continuity) (correct answers)a. An off-site storage location should be far enough away
from the main business site so that it is protected in the case of a disaster.

d. Site sharing is a form of off-site storage that involves having multiple data centers located in different
regions.

An operating system will write and change data to multiple hard drives at the same time so that if
something happens to one hard drive, another hard drive is available to speed up data recovery. This
statement best describes which of the following?

a. Backup media.

b. Data mirroring.
c. Incremental backups.

d. Image backups.

(Module: Business Continuity) (correct answers)b. Data mirroring.


A form of backup that creates a copy of everything that is on a hard drive including the operating system,
programs, and configuration files. This statement best describes which of the following?

a. Backup media.

b. Incremental backups.

c. Image backups.

d. Data mirroring.

(Module: Business Continuity) (correct answers)c. Image backups.

What does RFID stand for?

a. Radio-frequency Internet device.

b. Radio-frequency identification.

c. Radio-frequency inventory device.

d. Radio-frequency internal drive.

(Module: The Future of Computing) (correct answers)b. Radio-frequency identification.


Who are some of the professional individuals mentioned that would be involved in finding ways to
administer and collect useful information from large amounts of data? Select three that apply.

a. Healthcare.

b. Consumers.

c. Financial sector.

d. Media/advertising.
(Module: The Future of Computing) (correct answers)a. Healthcare.

c. Financial sector.

d. Media/advertising.

What is the definition of a Platform as a Service (PaaS)?

a. A Platform as a Service is the ability to quickly and consistently develop and deliver applications.

b. A Platform as a Service is the ability to store data and aid communication for remote teams.

c. A Platform as a Service makes it possible for businesses to access and use software through the
Internet.

d. A Platform as a Service makes it possible to have all of your businesses IT departments needs sited
outside of the organization and available to anyone, wherever.

(Module: The Future of Computing) (correct answers)a. A Platform as a Service is the ability to quickly and
consistently develop and deliver applications.

The need for professionals and businesses to have a better way to communicate over a distance led to IT
professionals first developing .

(Module: The Future of Computing) (correct answers)The Internet


Which of the following technologies was developed to provide more efficient and accessible ways to work
virtually?

a. The Internet of Things.

b. Information Technology.
c. The Internet.

d. Cloud computing.

(Module: The Future of Computing) (correct answers)d. Cloud computing.

The use of IT has allowed businesses to have .

a. small customer bases.

b. local reach.

c. more tools for communicating.

d. fewer privacy and security concerns.

(Module: The Future of Computing) (correct answers)c. more tools for communicating.

Which of the following would be an example of unethical behavior on the part of an IT professional? Select
two that apply.

a. Using a work computer to do personal online shopping.


b. Asking permission to use a colleague's PowerPoint presentation.

c. Copying a software program to numerous computers without a site license.

d. Checking that employees are following organization rules and protocol for Internet usage.

(Module: Ethics) (correct answers)a. Using a work computer to do personal online shopping.

c. Copying a software program to numerous computers without a site license.

Select all of the following items which can be a threat to personal and organizational privacy. Select three
that apply.

a. Computer security software.

b. Phishing and scams attempting to get private information.

c. Confidential information stored with inadequate security on a company website.

d. Providing personal information on a social media website.

(Module: Ethics) (correct answers)b. Phishing and scams attempting to get private information.

c. Confidential information stored with inadequate security on a company website.

d. Providing personal information on a social media website.


Which of the following is NOT a common security classification?

a. Common Knowledge.

b. Sensitive.

c. Private.

d. Confidential.

(Module: Ethics) (correct answers)a. Common Knowledge.

Which of the following is the best example of the availability component of computer security?

a. Data synchronization.

b. Encryption of passwords.

c. Access from multiple locations.


d. Frequent, timely backups of data files.

(Module: Ethics) (correct answers)c. Access from multiple locations.

Which of the following are protected by federal legislation? Select three that apply.

a. Copyrighted music.

b. Personal information on Facebook.

c. Electronic health care records.

d. Student records.

(Module: Ethics) (correct answers)a. Copyrighted music.

c. Electronic health care records.

d. Student records.

For the following scenario, which government regulation would be relevant? Andrea is employed by the
Deming Foundation, a non-profit seeking to help increase graduation rates in rural communities. She has
been working hard to identify and recruit donations from wealthy businessmen and companies and is seeing
a great deal of success. While she quickly runs into the grocery store for a few items, someone steals her
laptop from her car, containing all her work files.

a. Computer Matching and Privacy Protection Act of 1988.

b. The Family Educational Rights and Privacy Act of 1974.

c. Security Breach Notification Laws.

d. Electronic Communication Privacy Act of 1986.

(Module: Ethics) (correct answers)c. Security Breach Notification Laws


Which of the following is a role of IT personnel in regards to IT policies on computer and Internet use? Select
three that apply.

a. Giving feedback to management in the development of IT policy.

b. Making sure the policies are enforced fairly and evenly throughout an organization.

c. Making sure others are aware of and understand policies.

d. Checking employees' personal e-mail accounts on their personal digital devices to ensure they
contain no classified information.

(Module: Ethics) (correct answers)a. Giving feedback to management in the development of IT policy.

b. Making sure the policies are enforced fairly and evenly throughout an organization.

c. Making sure others are aware of and understand policies.

Which of the following are reasons why it is important for an IT professional to be aware of a variety of
Professional Association and Ethics Standards? Select 4 that apply.

a. By reviewing the ethical standards of different associations, the IT Professional can have a
benchmark to measure his or her own behavior and that of the organization.

b. By being aware of the different ethical codes, the IT Professional is more likely to know the
appropriate course of action in different situations.

c. Professional Associations provide support and training.


d. Each Professional Association has a different focus so may be relevant to different aspects of an IT
professional's duties.

(Module: Ethics) (correct answers)a. By reviewing the ethical standards of different associations, the IT
Professional can have a benchmark to measure his or her own behavior and that of the organization.

b. By being aware of the different ethical codes, the IT Professional is more likely to know the
appropriate course of action in different situations.
c. Professional Associations provide support and training.

d. Each Professional Association has a different focus so may be relevant to different aspects of an IT
professional's duties.

You might also like