100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D322 Introduction to Information Technology Exam (Intro to IT) Best Studying Material with Questions and Answers $27.99   Add to cart

Exam (elaborations)

WGU D322 Introduction to Information Technology Exam (Intro to IT) Best Studying Material with Questions and Answers

 4 views  0 purchase
  • Course
  • WGU D322 Introduction to Information Technology
  • Institution
  • WGU D322 Introduction To Information Technology

WGU D322 Introduction to Information Technology Exam (Intro to IT) Best Studying Material with Questions and Answers

Preview 4 out of 41  pages

  • October 9, 2024
  • 41
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D322 Introduction to Information Technology
  • WGU D322 Introduction to Information Technology
avatar-seller
qualityexamshut
WGU D322 Introduction to Information Technology
Exam (Intro to IT) Best Studying Material with
Questions and Answers
Which regulation governs the actions of a company in the case of data records being
compromised, lost, or stolen?

1) Computer Matching & Primary Protection Act of 1988

2) Security Breach Notification Laws

3) The Electronic Communication Privacy Act of 1986

4) Digital Signature & Electronic Authorization laws ----------- Correct Answer ------------ 2)
Security Breach Notification Laws

Which type of systems testing includes having the customer test the system in an operational
setting to see if it is useful?

1) Beta
2) Alpha
3) User Acceptance
4) Analysis ----------- Correct Answer ------------ 3) User Acceptance

Which description explains the role of a domain name system (DNS)? ---------- Correct Answer -
----------- Translates human-readable aliases into IP addresses

Which part of a Uniform Resource Locator (URL) identifies the location of the document on the
server? ---------- Correct Answer ------------ Resource path ID

Which goal of Information Assurance (IA) requires that information is accessible when needed?
---------- Correct Answer ------------ Availability

Which technique uses all possible combinations of letters and numbers to crack a password? -----
----- Correct Answer ------------ Brute force

Which is a type of two-factor authentication? ---------- Correct Answer ------------ Smart card

Which of the following is not true of Windows and Linux?

1) Linux is not case-sensitive
2) Linux places the home directory within the /home/.
3) Windows uses the forward slash (/) to express directory paths.
4) Windows' root directory is referred to by a letter. ----------- Correct Answer ------------ 3

,Windows uses the backslash while Linux uses the forward slash to express directory paths

Which statement is not true of compilers?

1) All errors must be debugged before a compiler can compile the source code
2) Compilers do not translate source code into machine code
3) Interpreters translate and execute one line of source code at a time
4) Perl and Python are examples of programming languages that use an interpreter -----------
Correct Answer ------------ 2) Compilers do not translate source code into machine code.

Which system requirement is an example of considering user needs in the design of an
information system?

1) Including an eye-tracking device for an input device

2) Allowing secure access to customer account information

3) Ensuring that insertions into the buffer are limited in size

4) Incorporating a program that can translate text into spoken words ----------- Correct Answer ---
--------- 2) Allowing secure access to customer account information

What is the role of drivers in facilitating communication between applications and databases?

1) They allow the application to interact with the database

2) They allow the dta to be communicated via the network

3) THey allow ODBC to be used for interactions with the database and applications

4) They allow SQL to manage communications between applications and databases -----------
Correct Answer ------------ 2) They allow the application to interact with the database

Which SQL clause is used to inform the database management system (DBMS) which tables
should be interrogated by the query?

1) WHERE
2) FROM
3) HERE
4) SELECT ----------- Correct Answer ------------ 2) FROM

Which statement correctly describes the operating system?

1) Consists of programs that end users run to accomplish some tasks and is sometimes referred to
as horizontal software

,2) Works with hardware to provide a network service that can be distributed across several
machines on the network

3) Requires the user to have specialized training concerning specific commands that must be
entered with proper syntax

4) Allows the user to control the actions of the software, and through the software, to access
hardware ----------- Correct Answer ------------ 4) Allows the user to control the actions of the
software, and through the software, to access hardware

Which action by application programs requires support from a networked operating system?

1) A word processor program edits texts within a file

2) An internet browser displays a web page

3) A photo editing software enhances a picture

4) A payroll program computes federal tax of an employee ----------- Correct Answer ------------
1) An internet browser displays a web page

Which characteristic identifies application software that is cloud-based?

1) Hosted on an individual computer
2) Hosted in the internal business network
3) Provided by servers in the internal business network
4) Provided by third-party providers ----------- Correct Answer ------------ 4) Provided by third-
party providers

Which two components are part of a CPU?
Choose 2 answers

1) Control unit (CU)
2) Read only memory (ROM)
3) Arithmetic logic unit (ALU)
4) Random access memory (RAM) ----------- Correct Answer ------------ 1) CU
2) ALU

Which technique uses all possible combinations of letters and numbers to crack a password?

1) Dictionary attack
2) Packet sniffing
3) Brute force
4) Password generator ----------- Correct Answer ------------ 3) Brute force

Which is a type of two-factor authentication?

, 1) Least privilege
2) Smart card
3) Packet sniffing
4) Access right ----------- Correct Answer ------------ 2) Smart card

Which language is often used for rapid prototyping and the creation of GUIs?

1) TCL
2) C++
3) COBOL
4) Python ----------- Correct Answer ------------ 1) TCL

Which is true of databases and the applications that interact with them?

1) The database can support at most one application

2) The database determines the application classes

3) Applications store data in their own files

4) Applications are interdependent of the database ----------- Correct Answer ------------ 4)
Applications are interdependent of the database

What is another term for a formula that outlines how to execute a task?

1) Process
2) User-defined function
3) Algorithm
4) Pseudocode ----------- Correct Answer ------------ 3) Algorithm

Which software is run automatically rather than by the end user?

1) PRoductivity software
2) Microsoft office software
3) System software ----------- Correct Answer ------------

All of the following are compiled languages except for:

1) Javascript
2) BASIC
3) Java
4) C++ ----------- Correct Answer ------------ Javascript

Which of the following are operations used to alter the data within a relation of a database?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller qualityexamshut. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $27.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$27.99
  • (0)
  Add to cart