WGU D075 Information Technology Management Essentials Exam Graded A+
Adware - ANSWER Programs that automatically display or download advertising to a computer. Application Software - ANSWER Software that is designed for the user to carry out a specific task. Best Practice - ANSWER A management process, technique, or method that is most effective at arriving at a desired outcome or a better outcome than any other process, technique, or method. Big Data - ANSWER Data that is collected from all over the internet, including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources. Bus Topology - ANSWER A network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints. Business Analytics - ANSWER Attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage. Business Intelligence (BI) - ANSWER Strategies and technologies used by enterprises for the data analysis of business information. Cache - ANSWER A hardware or software component that stores data so that future requests for that data can be served faster. Campus Area Network (CAN) - ANSWER A computer network that connects two or more LANs that are located on a campus. Chief Information Officer (CIO) - ANSWER A job title for the board-level head of an information technology department within a business organization. Their job is to make sure IT assets are in place to ensure a smooth transition. Chief Information Security Officer (CISO) - ANSWER Generally focused on the security of an organization's data and information, making sure it is backed up, deciding who gets to see it and who does not, and so on. Chief Security Officer (CSO) - ANSWER Is in charge of such things as the physical security and safety of employees, facilities, and corporate assets and may have a law enforcement background. Chief Technology Officers (CTO) - ANSWER Runs the organization's IT engineering group and serves as the company's top technology architect. Click Fraud - ANSWER An internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee. Clients - ANSWER An end user's computer in a computer network. Computer Network - ANSWER Two or more computers connected together to communicate and share resources. Cybersecurity - ANSWER The convergence of technologies, sound practice, and processes designed to protect networks and their devices, programs, and data from attack or unauthorized access. Data Analysis - ANSWER The application of statistics and logic techniques to define, illustrate, and evaluate data. Data Management (DM) - ANSWER The practices, architectural techniques, and tools for achieving consistent access to and delivery of data across the spectrum of data subject areas and data structure types in the enterprise. Data Management Processes - ANSWER The process of acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business. Data Mapping - ANSWER Extra notes about the definition of a field, its data, and its use. Data Mining - ANSWER The examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships. Database Administrators (DBAs) - ANSWER Categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business. Database Management System Software (DBMS) - ANSWER An application software that is used to create a collection of related files that consist of records of data separated by fields that can be queried to produce populations of information. Databases - ANSWER Well-thought-out collections of computer files, the most important of which are called tables. Default-allow Firewall Rule - ANSWER A rule that all traffic is allowed unless it has been specifically blocked. Default-deny Firewall Rule - ANSWER The only network connections that are permitted are the ones that have been explicitly allowed. Denial-of-service - ANSWER a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Disk Storage - ANSWER Nonvolatile, secondary storage on a physical device like a hard drive or optical disk with a read/write apparatus. Ethernet Card - ANSWER Provides the computer with a unique 48-bit address called a MAC (media access control) address. No two Ethernet cards have the same address. Extract, Transform, and Load - ANSWER Tools that are used to standardize data across systems and allow the data to be queried. File Allocation Table (FAT) - ANSWER A table of contents that directs the read/write arm of the hard drive to the location where data exist and accesses the data upon the user's request. Firewall - ANSWER Specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet. Foreign Key - ANSWER A field in a database table that provides a link between two tables in a relational database. Gantt Chart - ANSWER A type of bar chart that illustrates a project schedule. Graphical User Interface (GUI) - ANSWER The visual system of computer screen designs that allow a user to interact with an electronic device. Hardware - ANSWER The physical part of the computer. Hypertext Markup Language (HTML) - ANSWER The major markup language used to create web pages. Hypertext Transfer Protocol (HTTP) - ANSWER Protocol used to define how messages are formatted and transmitted on the internet. IT Managers - ANSWER In charge of software application development teams that develop, design, program, and test software applications. Identity Theft - ANSWER A crime concerning the unlawful practice of assuming another individual's identity. Information Security Analysts (ISA) - ANSWER Are responsible for protecting all sensitive information within an organization. Information Technology - ANSWER The study, design, development, implementation, support, and management of computer-based information systems, particularly software and hardware. Infrastructure - ANSWER The underlying foundation or basic framework for an organization or project. Internet Fraud - ANSWER Refers to any fraudulent activity in an online setting. Internet fraud can occur through email systems, message boards, chat rooms, or websites. Intranet - ANSWER A private network that works the same way as the internet but is confined within an organization. Keylogging - ANSWER When a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard. Knowledge Management Systems (KMS) - ANSWER Collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer. Local Area Network (LAN) - ANSWER A computer network that is relatively small, typically in a single building, but sometimes as small as a single room. MAC (Media Access Control) - ANSWER Responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel. Mainframe Computers - ANSWER Massive, room-sized computers that process and store enormous amounts of bulk data and information. Malware - ANSWER All malicious software specifically intended to penetrate or damage a computer system without the end user's knowledge. Metropolitan Area Network (MAN) - ANSWER A computer network that connects two or more LANs or CANs together within the boundaries of a town or city. Microcomputers - ANSWER The least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld. Midrange Computers - ANSWER Less powerful and smaller in physical size than mainframe computers, they do many of the same things but on a smaller scale. Network Administrator - ANSWER The person(s) responsible for smooth network operations, network performance, and implementation of new nodes or even new networks. Network Hub - ANSWER A central location of the computer network that serves as a traffic cop for network connection and communication. Network Interface Controller - ANSWER A card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers. Network Operating System (NOS) - ANSWER Software that controls an entire network. Network Operating Systems (NOS) - ANSWER A computer operating system that connects computers together within a local area network. Network Protocol - ANSWER A set of rules a network must follow. Node - ANSWER Any device that is connected as part of a computer network, including computers, hubs, printers, and switches. Object Linking and Embedding - ANSWER A Microsoft technology that allows a user to share information and data from an entire area in one application in part of another application. Operating System - ANSWER A collection of computer programs that work together to manage hardware and software to ensure that they are working properly. Optical Disk - ANSWER A computer disk that uses optical storage techniques and technology to read and write data. Peer-to-peer Networks (P2P) - ANSWER Computer networks that connect computers directly to one another without the use of a server. Phishing - ANSWER The fraudulent practice of sending emails to be from supposedly reputable companies in to induce individuals to reveal personal information, such as passwords, and credit card numbers. Point of Failure - ANSWER A part of a system that, if it fails, will stop the entire system from working. Presentation Software - ANSWER An application software used to present information in a slideshow format. Primary Key - ANSWER A field in a database table that uniquely identifies a record in the table. Process - ANSWER Any task a computer performs. Protocol - ANSWER A standard language that devices connected to a network use to communicate and transfer data. Random Access Memory - ANSWER A type of memory that allows data to be accessed in any order without physical movement of the silicone media. Registers - ANSWER A location in a store of data used for a specific purpose and with quick access time. Ring Topology - ANSWER Created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other. Schema - ANSWER The organization or layout of a database that defines the tables, fields, keys, and integrity of the database. It is the reference or blueprint of the database. Semi-structured Data - ANSWER Data that can be converted into structured data with a lot of work.
Written for
- Institution
- WGU D075
- Course
- WGU D075
Document information
- Uploaded on
- October 28, 2022
- Number of pages
- 19
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- wgu d075
-
wgu d075 information technology management essentials
-
wgu d075 information technology management essentials exam graded a
-
adware programs that automatically display or download advertising t