100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C182 Introduction to IT Exam With Actual Questions & Verified Answers,Plus Rationales/Expert Verified For Guaranteed Pass 2025/2026 /Latest Update/Instant Download Pdf

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
03-09-2025
Written in
2025/2026

WGU C182 Introduction to IT Exam With Actual Questions & Verified Answers,Plus Rationales/Expert Verified For Guaranteed Pass 2025/2026 /Latest Update/Instant Download Pdf











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 3, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C182 Introduction to IT Exam With
Actual Questions & Verified Answers,Plus
Rationales/Expert Verified For
Guaranteed Pass 2025/2026 /Latest
Update/Instant Download Pdf

1. Which of the following is considered hardware in a computer system?
A. Operating system
B. Word processor
C. CPU
D. Web browser
The CPU is a physical component of a computer, making it hardware, while the
other options are software.

2. What does BIOS stand for?
A. Binary Input Output System
B. Basic Internal Operating Software
C. Basic Input Output System
D. Basic Integrated Operating System
BIOS is firmware that initializes hardware during the booting process.

3. Which type of memory is volatile?
A. ROM
B. Flash
C. SSD
D. RAM
RAM loses its contents when power is turned off, making it volatile.

4. Which device is used to convert digital signals to analog for transmission over phone
lines?
A. Router
B. Switch
C. Modem
D. Hub
A modem modulates digital signals into analog signals for communication over
telephone lines.

,5. What does DNS stand for?
A. Digital Network System
B. Domain Name System
C. Distributed Name Server
D. Domain Network Service
DNS translates human-readable domain names into IP addresses.

6. Which layer of the OSI model is responsible for logical addressing?
A. Physical
B. Data Link
C. Transport
D. Network
The Network layer handles logical addressing such as IP addresses.

7. Which of the following is an example of an input device?
A. Monitor
B. Printer
C. Keyboard
D. Speaker
A keyboard is used to input data into a computer system.

8. Which type of software is used for creating spreadsheets?
A. Database software
B. Word processor
C. Presentation software
D. Productivity software
Productivity software includes applications like spreadsheets, word processors, and
presentation tools.

9. What is the primary function of an operating system?
A. Running web applications
B. Managing software development
C. Managing hardware and software resources
D. Running security programs
The OS manages system resources such as memory, processors, and storage for
applications.

10. Which topology connects all devices to a central hub?
A. Ring
B. Bus
C. Star
D. Mesh
In a star topology, all devices connect to a central hub or switch.

, 11. Which of the following is NOT a type of malware?
A. Virus
B. Worm
C. Trojan
D. Firewall
A firewall is a security device/software, not malware.

12. What does HTTP stand for?
A. Hyper Text Transfer Protocol
B. Hypertext Transfer Protocol
C. Hyperlink Transmission Tool Protocol
D. Hyper Transfer Text Protocol
HTTP is the protocol used for transferring web pages over the internet.

13. Which of the following is a function of the CPU?
A. Storing long-term files
B. Processing instructions
C. Displaying graphics
D. Connecting networks
The CPU executes program instructions and performs calculations.

14. Which device directs traffic within a network?
A. Hub
B. Router
C. Switch
D. Repeater
Routers determine the best path for data between networks.

15. Which storage type is the fastest?
A. HDD
B. SSD
C. Optical disk
D. RAM
RAM is much faster than any storage drive, as it is primary memory.

16. What is phishing?
A. Malware installation
B. Fraudulent attempt to obtain sensitive information
C. Network scanning
D. Data encryption
Phishing tricks users into giving personal or financial information.

17. Which of the following is a cloud computing service model?
A. BIOS
$20.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
DrPrep1
5.0
(1)

Get to know the seller

Seller avatar
DrPrep1 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
9
Member since
4 months
Number of followers
2
Documents
1088
Last sold
2 days ago
“Trusted Exam Prep | Instant Download PDFs Verified Questions & AnswersClinical & Nursing Study Guides | Pass With Confidence”

“Trusted Nursing Exam Prep | Instant Download PDFs – Verified Questions & Answers,Clinical & Nursing Study Guides,Expert Pyschology, HR And Math Resoures | Pass With Confidence”

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions