Special Summer Sale - Limited Time 70% Discount Offer - Ends in 1d 15h 27m 37s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Information-Technology-Management

Information-Technology-Management WGU Information Technology Management QGC1 Question and Answers

Question # 4

Which software carries out a set of operations on behalf of a user with a degree of independence and employs knowledge of the user's goals?

A.

Information of Everything

B.

Virtual assistant

C.

Autonomous agent

D.

Ambient digital experience

Full Access
Question # 5

Which organizational policy states that an employee should never send unsolicited emails outside the organization?

A.

Information use policy

B.

Employee monitoring policy

C.

Anti-spam policy

D.

Social media policy

Full Access
Question # 6

Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?

A.

Downtime and uptime

B.

Hackers and viruses

C.

Ethics and cost

D.

Adware and spyware

Full Access
Question # 7

An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.

Which phase of CRM does this describe?

A.

Predicting

B.

Defining

C.

Reporting

D.

Analyzing

Full Access
Question # 8

Which system provides a foundation for collaboration between departments, enabling people in different business areas to communicate?

A.

Enterprise resource planning (ERP)

B.

Supply chain management (SCM)

C.

Customer relationship management (CRM)

D.

Electronic data interchange (EDI)

Full Access
Question # 9

What is the purpose of the Internet Use portion of the IT ethics policy?

A.

To improve worker productivity

B.

To specify which email messages may be read by others

C.

To identify company branding for use in communications

D.

To specify what a user can and cannot do with company printers

Full Access
Question # 10

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Full Access
Question # 11

What is the expert system type of artificial intelligence?

A.

A system that imitates the reasoning processes used by skilled humans

B.

A system that attempts to emulate the way a typical human brain works

C.

The longest identified stretch of dependent activities measured from start to finish

D.

Knowledge-based information system that accomplishes specific tasks on behalf of its users

Full Access
Question # 12

How can a unified communications system meet the communication goals of most organizations?

A.

Manages customer expectations

B.

Reduces latency between parties

C.

Generates innovative solutions

D.

Makes employees more comfortable

Full Access
Question # 13

Which epolicy is the starting point and the umbrella for all other policies the organization might establish?

A.

Computer use

B.

Email privacy

C.

Acceptable use

D.

Information privacy

Full Access
Question # 14

A director of software development observes friction between various team members. How should the director alleviate team friction?

A.

Ask each team member to provide weekly feedback via email

B.

Create a culture of showing appreciation

C.

Nurture competition among team members

D.

Provide a public forum for anonymous feedback

Full Access
Question # 15

Which basic business system serves operational level analysts in an organization?

A.

Optimization analysis system (OAS)

B.

Decision support system (DSS)

C.

Transaction processing system (TPS)

D.

Executive information system (EIS)

Full Access
Question # 16

Which prototyping method demonstrates how a solution operates using various data and business rules as inputs?

A.

Storyboards

B.

Static modeling

C.

Simulation

D.

Workflow modeling

Full Access
Question # 17

Which statement describes the development phase of the systems development life cycle (SDLC)?

A.

Physically constructing software and information systems using programming languages

B.

Performing corrections, additions, and upgrades to ensure the system continually meets business goals

C.

Bringing project pieces together, checking interoperability, and verifying functionality

D.

Placing the software or information system into production to allow users to perform business operations

Full Access
Question # 18

What are ecological results of the expanded use of technology? Choose 2 answers.

A.

Lengthened life span of computer equipment

B.

Increased carbon emissions

C.

More people purchasing computer equipment

D.

Decreased electronic waste

E.

Increased energy consumption

Full Access
Question # 19

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

A.

Project requirements

B.

Project theory

C.

Project Assumption

D.

Project objective

Full Access
Question # 20

An organization wants to use an application software that increases the cooperation and joint productivity of small teams of employees.

Which application software will serve this need?

A.

Data management

B.

Program management

C.

Personnel systems

D.

Collaborative systems

Full Access
Question # 21

What is a benefit of in-house development and maintenance of information technology systems?

A.

Increases financial savings because it costs less than outsourcing the work

B.

Utilizes state-of-the-art technological resources without having to acquire and maintain them

C.

Creates a better quality workforce by combining both technical and business skills

D.

Allows for the fastest development time and ability to scale to new demand levels

Full Access
Question # 22

What is an example of a knowledge factor used for authentication?

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Full Access