D322 (Objective
Assessment) with
100% correct answers
First users were the engineers who built and
programmed computers, then employees who
had received specialized training were users,
and now today, anyone and everyone can be
a user. - answer Evolution of Users
Sends files over the network at the request
of clients. Responds over LAN, within one
location/site. Support both application
software and data files. - answer FILE
SERVER
Turns a user-friendly domain name, like
Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that
computers use to identify each other on the
,network. - answer Domain Name Server
(DNS)
Uses TWO KEYS a public and private key for
performing encryption and decryption -
answer Public Key Encryption
PROVING you are who you say you are which
can be done by: what you know, what you
have! - answer Authentication
TIER WHERE THE USER interface for the
system is developed; SHIELDS THE USER from
the underlying logic of the systems as well as
the underlying data structures - answer
Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System
Conversion 2. Final Documentation 3. End
User Training - answer System Deployment
CONNECTS MULTIPLES networks together;
can be used to directly connect computers to
a network; will relay messages to computers
, with APPROPRIATE IP ADDRESS - answer
ROUTER
Requires that data is KEPT secure so that
they are not accidentally provided or
obtained by unauthorized users - answer
Confidentiality
Protecting EVERY LAYER that SURROUNDS
((( DATA ))) - answer Defense in Depth
Can take on DIFFERENT FORMS depending on
the complexity of the application; in certain
instances, it is AN ACTUAL OBJECT that is an
ACTUAL IMPLEMENTATION of the application -
answer THE MODEL
Creates a subset of the data by reducing the
data from multiple dimensions to one
dimension - answer Slicing Data
The technology used in creating,
maintaining, and making information
accessible. - answer Information Technology