100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C182 Objective Assessment Questions and Answers with Complete Solutions $8.99   Add to cart

Exam (elaborations)

WGU C182 Objective Assessment Questions and Answers with Complete Solutions

 0 view  0 purchase
  • Course
  • Institution

WGU C182 Objective Assessment Questions and Answers with Complete Solutions

Preview 2 out of 9  pages

  • September 9, 2023
  • 9
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU C182 Objective Assessment
Questions and Answers with Complete
Solutions
First users were the engineers who built and programmed computers, then employees
who had received specialized training were users, and now today, anyone and
everyone can be a user. - Correct Answer- Evolution of Users

Sends files over the network at the request of clients. Responds over LAN, within one
location/site. Support both application software and data files. - Correct Answer- FILE
SERVER

Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network. - Correct Answer- Domain Name Server (DNS)

Uses TWO KEYS a public and private key for performing encryption and decryption -
Correct Answer- Public Key Encryption

PROVING you are who you say you are which can be done by: what you know, what
you have! - Correct Answer- Authentication

TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER
from the underlying logic of the systems as well as the underlying data structures -
Correct Answer- Presentation Tier

SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End
User Training - Correct Answer- System Deployment

CONNECTS MULTIPLES networks together; can be used to directly connect computers
to a network; will relay messages to computers with APPROPRIATE IP ADDRESS -
Correct Answer- ROUTER

Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - Correct Answer- Confidentiality

Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - Correct Answer- Defense
in Depth

Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of
the application - Correct Answer- THE MODEL

, Creates a subset of the data by reducing the data from multiple dimensions to one
dimension - Correct Answer- Slicing Data

The technology used in creating, maintaining, and making information accessible. -
Correct Answer- Information Technology

In charge of all aspects of the COMPUTER NETWORKS - Correct Answer- Network
Administrator

Focuses on the design, development, and support of DATABASE MANAGEMENT
systems (DBMSs). - Correct Answer- Database Administrator

Installs, configures, maintains, secures, and troubleshoots web severs - Correct
Answer- Web Administrator

Processed data. - Correct Answer- Information

INFORMATION THAT HAS BEEN PUT TO USE information placed into a context.
Refined information such that the user of the knowledge is able to call forth only
relevant portions of information when needed. - Correct Answer- Knowledge in DIKW

Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY )))
Can only come by having BOTH KNOWLEDGE and EXPERIENCE - Correct Answer-
WISDOM

The INPUT Processing, OUTPUT, STORAGE Cycle - Correct Answer- I.P.O.S.

Raw data is organized or structured for usefulness. - Correct Answer- PROCESSED
DATA

Information is output so user can see results. - Correct Answer- OUTPUT DATA

Processed information is stored for permanent record. - Correct Answer- STORAGE

A collection of components that work together to meet the needs of the user; typically :
CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS -
Correct Answer- COMPUTER SYSTEM

Physical components of a computer system which include the system unit and its
components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER -
Correct Answer- HARDWARE

A collection of computers and resources CONNECTED by various media so that they
can COMMUNICATE WITH EACH OTHER. - Correct Answer- NETWORK

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Divinehub. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart