WGU D075|PA| PRE-ASSESSMENT| TEST QUESTIONS AND
ANSWERS
Correct 46
Incorrect 00
Term
Hardware, software, network
, Network, operating system, Hardware, cloud storage, email
communication tools system
Don't know?
2 of 46
Term
Which kind of fraudulent activity can involve emails where someone
tries to obtain personal information such as social security numbers,
bank account numbers, or credit card details from the recipient?
Give this one a try later!
Hacking Phishing
Skimming Sniffing
Don't know?
3 of 46
Term
What is installed short-term working memory in a computer usually
called?
Give this one a try later!
, Rom (read Only Memory) Flash memory
RAM (Random Access
Cpu (central Processing Unit)
Memory)
Don't know?
4 of 46
Term
An employee has been tasked with sharing sales data from
spreadsheet reports at a meeting and needs to summarize the data
into easy-to-view charts.
Which additional software category will this employee need access
to display the charts in the meeting?
Give this one a try later!
Supply chain management (scm) Data Management (dm)
Integrated marketing
Business Intelligence (BI)
communications (imc)
Don't know?
5 of 46
Term
, What should be the primary consideration for IT managers when
making software and hardware purchases to support IT
infrastructure?
Give this one a try later!
Risk Compatibility
Knowledge Coordination
Don't know?
6 of 46
Term
What is a database management system (DBMS)?
Give this one a try later!
A program for data encryption and An application for data backup and
security recovery
A program controlling the
structure of a database &
A tool for visualizing database
access to the data creates,
relationships
processes, and administers
database.
Don't know?
ANSWERS
Correct 46
Incorrect 00
Term
Hardware, software, network
, Network, operating system, Hardware, cloud storage, email
communication tools system
Don't know?
2 of 46
Term
Which kind of fraudulent activity can involve emails where someone
tries to obtain personal information such as social security numbers,
bank account numbers, or credit card details from the recipient?
Give this one a try later!
Hacking Phishing
Skimming Sniffing
Don't know?
3 of 46
Term
What is installed short-term working memory in a computer usually
called?
Give this one a try later!
, Rom (read Only Memory) Flash memory
RAM (Random Access
Cpu (central Processing Unit)
Memory)
Don't know?
4 of 46
Term
An employee has been tasked with sharing sales data from
spreadsheet reports at a meeting and needs to summarize the data
into easy-to-view charts.
Which additional software category will this employee need access
to display the charts in the meeting?
Give this one a try later!
Supply chain management (scm) Data Management (dm)
Integrated marketing
Business Intelligence (BI)
communications (imc)
Don't know?
5 of 46
Term
, What should be the primary consideration for IT managers when
making software and hardware purchases to support IT
infrastructure?
Give this one a try later!
Risk Compatibility
Knowledge Coordination
Don't know?
6 of 46
Term
What is a database management system (DBMS)?
Give this one a try later!
A program for data encryption and An application for data backup and
security recovery
A program controlling the
structure of a database &
A tool for visualizing database
access to the data creates,
relationships
processes, and administers
database.
Don't know?