WGU INTRO TO I.T. PRACTICE EXAM B
QUESTIONS WITH CORRECT ANSWERS
What does GUI stand for?
Graphic User Interchange
Graphic Utility Interface
Graphical User Interface
Graphical User Interchange - Answer-C. Graphical User Interface
Which of the following types of transmission is paired correctly with the given media?
A. fiber optic cable - light impulses
B. coaxial cable - radio waves
C. coaxial cable - light impulses
D. fiber optic cable - electricity - Answer-A. fiber optic cable- light impulses
A service portfolio is simply a list of the services the IT department offers.
True
False - Answer-A. True
A monitor is a peripheral device for what system?
A. I/O
B. Storage - Answer-A. I/O
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered
off?
True
False - Answer-A. True
Hot storage is a low cost and slow means of storing critical data, while cold storage is
high cost and fast.
True
False - Answer-B. False
________ refers to data sets that are so large and complex that they advanced
database management/processing tools than we currently use?
Algorithms
, Database Management Systems
Big Data
Relational Databases - Answer-C. Big Data
Which of the following database categories is the most similar to spreadsheet or MS
Excel document?
Hierarchical
Isolated
Flat file
Relational - Answer-C. Flat file
What is one probable advantage of outsourcing?
More control can be exercised over IT processing.
Reliance can be placed on the expertise of outsourcing vendors.
Employee satisfaction may increase.
The organization can transfer its accountability in terms of privacy laws. - Answer-B.
Reliance can be placed on the expertise of outsourcing vendors.
SQL (Structured Query Language), a query for databases, was invented by?
Linux
Cisco
HP
IBM - Answer-D. IBM
The business case, feasibility study, and stakeholder input are 3 key elements of which
project phase?
Closing
Initiation
Executing
Planning - Answer-B. Initiation
Which classification for documents is used when the unauthorized disclosure, alteration,
or destruction of data would result in little or no risk?
Public
Private
Top secret
Confidential - Answer-A. Public
QUESTIONS WITH CORRECT ANSWERS
What does GUI stand for?
Graphic User Interchange
Graphic Utility Interface
Graphical User Interface
Graphical User Interchange - Answer-C. Graphical User Interface
Which of the following types of transmission is paired correctly with the given media?
A. fiber optic cable - light impulses
B. coaxial cable - radio waves
C. coaxial cable - light impulses
D. fiber optic cable - electricity - Answer-A. fiber optic cable- light impulses
A service portfolio is simply a list of the services the IT department offers.
True
False - Answer-A. True
A monitor is a peripheral device for what system?
A. I/O
B. Storage - Answer-A. I/O
RAM is ephemeral, meaning data stored in RAM is lost when the computer is powered
off?
True
False - Answer-A. True
Hot storage is a low cost and slow means of storing critical data, while cold storage is
high cost and fast.
True
False - Answer-B. False
________ refers to data sets that are so large and complex that they advanced
database management/processing tools than we currently use?
Algorithms
, Database Management Systems
Big Data
Relational Databases - Answer-C. Big Data
Which of the following database categories is the most similar to spreadsheet or MS
Excel document?
Hierarchical
Isolated
Flat file
Relational - Answer-C. Flat file
What is one probable advantage of outsourcing?
More control can be exercised over IT processing.
Reliance can be placed on the expertise of outsourcing vendors.
Employee satisfaction may increase.
The organization can transfer its accountability in terms of privacy laws. - Answer-B.
Reliance can be placed on the expertise of outsourcing vendors.
SQL (Structured Query Language), a query for databases, was invented by?
Linux
Cisco
HP
IBM - Answer-D. IBM
The business case, feasibility study, and stakeholder input are 3 key elements of which
project phase?
Closing
Initiation
Executing
Planning - Answer-B. Initiation
Which classification for documents is used when the unauthorized disclosure, alteration,
or destruction of data would result in little or no risk?
Public
Private
Top secret
Confidential - Answer-A. Public