WGU Information Technology Management QGC1 Questions and Answers
A hospital has implemented several new software systems and has chosen to implement ITIL to maintain and continually improve services. Which need influenced the hospital's decision to implement ITIL?
Which statement describes the planning phase of the systems development life cycle (SDLC)?
Why is employee training important in an ethical IT use policy?
Employees in different business levels need knowledge to effectively drive their work and decision-making.
Which term describes the trait of an IT leader to effectively translate perspectives at both a broad and corporate strategic level?
Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?
What is a common risk associated with outsourcing software development?
A team tests a prototype prior to meeting with a company's client and discovers the "My Account" menu is not working. The team revises the code and presents a functioning prototype to the client.
Which advantage of prototyping does this describe?
A manager asks a team member to identify the top five customers by total dollars spent on the company's services in the past calendar year. Which phase of the customer relationship management (CRM) system does this represent?
What should an IT leader consider when creating a presentation that will be delivered to the board of directors?
What are ecological results of the expanded use of technology? Choose 2 answers.
Which factor in the planning process is considered true, real, or certain without proof or demonstration?
What is a customer relationship management (CRM) system used for?
Which business layer determines which products or services are being sold and to whom?
What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?
How does service-oriented architecture (SOA) help companies become more agile?
Which term is used to describe the business needs, justification, requirements, and boundaries of a project?
Which statement describes the development phase of the systems development life cycle (SDLC)?
An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?
Which dashboard capability helps a business manager break down data into segments to understand it from different perspectives?