Study online at https://quizlet.com/_h7k0ld
First users were the engineers who built
and programmed computers, then em-
ployees who had received specialized Evolution of Users
training were users, and now today, any-
one and everyone can be a user.
Sends files over the network at the re-
quest of clients. Responds over LAN,
FILE SERVER
within one location/site. Support both ap-
plication software and data files.
Turns a user-friendly domain name, like
Google.com, into an Internet Protocol
(IP) address like ((( 70.42.251.42 ))) that Domain Name Server (DNS)
computers use to identify each other on
the network.
Uses TWO KEYS a public and private
key for performing encryption and de- Public Key Encryption
cryption
PROVING you are who you say you are
which can be done by: what you know, Authentication
what you have!
TIER WHERE THE USER interface for
the system is developed; SHIELDS THE
USER from the underlying logic of the Presentation Tier
systems as well as the underlying data
structures
SYSTEMS DEPLOYMENT Steps 1. Sys-
tem Conversion 2. Final Documentation System Deployment
3. End User Training
CONNECTS MULTIPLES networks to-
gether; can be used to directly connect
computers to a network; will relay mes- ROUTER
sages to computers with APPROPRIATE
IP ADDRESS
Requires that data is KEPT secure so
that they are not accidentally provided or Confidentiality
obtained by unauthorized users
, WGU C182 Objective Assessment GRADED A+ 2025
Study online at https://quizlet.com/_h7k0ld
Protecting EVERY LAYER that SUR-
Defense in Depth
ROUNDS ((( DATA )))
Can take on DIFFERENT FORMS de-
pending on the complexity of the applica-
tion; in certain instances, it is AN ACTU- THE MODEL
AL OBJECT that is an ACTUAL IMPLE-
MENTATION of the application
Creates a subset of the data by reducing
the data from multiple dimensions to one Slicing Data
dimension
The technology used in creating, main-
taining, and making information accessi- Information Technology
ble.
In charge of all aspects of the COMPUT-
Network Administrator
ER NETWORKS
Focuses on the design, development,
and support of DATABASE MANAGE- Database Administrator
MENT systems (DBMSs).
Installs, configures, maintains, secures,
Web Administrator
and troubleshoots web severs
Processed data. Information
INFORMATION THAT HAS BEEN PUT
TO USE information placed into a con-
text. Refined information such that the
Knowledge in DIKW
user of the knowledge is able to call
forth only relevant portions of information
when needed.
Provides a social setting to knowledge;
AN UNDERSTANDING OF THE ((( WHY
WISDOM
))) Can only come by having BOTH
KNOWLEDGE and EXPERIENCE
The INPUT Processing, OUTPUT,
I.P.O.S.
STORAGE Cycle
Raw data is organized or structured for
PROCESSED DATA
usefulness.