ASSESSMENT EXAMS WITH
ACTUAL CORRECT QUESTIONS
AND VERIFIED DETAILED
ANSWERS ALREADY GRADED A+
GUARANTEED PASS
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like (((
70.42.251.42 ))) that computers use to identify each other on the network.
Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption
Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what you have!
Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying
logic of the systems as well as the underlying data structures
Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training
System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will
relay messages to computers with APPROPRIATE IP ADDRESS
ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized
users
Confidentiality
,Protecting EVERY LAYER that SURROUNDS ((( DATA )))
Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is
AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application
THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one dimension
Slicing Data
The technology used in creating, maintaining, and making information accessible.
Information Technology
In charge of all aspects of the COMPUTER NETWORKS
Network Administrator
Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs).
Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs
Web Administrator
Processed data.
Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such
that the user of the knowledge is able to call forth only relevant portions of information when needed.
Knowledge in DIKW
Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by
having BOTH KNOWLEDGE and EXPERIENCE
WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle
I.P.O.S.
Raw data is organized or structured for usefulness.
PROCESSED DATA
Information is output so user can see results.
OUTPUT DATA
Processed information is stored for permanent record.
,STORAGE
A collection of components that work together to meet the needs of the user; typically : CATEGORIZED
AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS
COMPUTER SYSTEM
Physical components of a computer system which include the system unit and its components and
peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER
HARDWARE
A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE
WITH EACH OTHER.
NETWORK
Systems Software and Applications Software
SOFTWARE CATEGORIES
RULES provided by WHICH NETWORKS communicate with each other
IP PROTOCOL
STORES the programs BEING EXECUTED and the data they are using.
COMPUTER MEMORY
Controls THE SPEED at which instructions are processed.
SYSTEM CLOCK
Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your
screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is
turned off or loses power).
RAM
Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums,
called mainframe computers
2nd Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks
introduced via dumb terminals
3rd Generation of Computers
Written for a specific machine by the engineers who built and ran the computers; no need for OS since
only one program could run at a time
Low-level Language
Easier than machine but still required detailed, precise LOW LEVEL instructions
, Assembly Language
Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another
form; source code by itself cannot be read by a computer
Language Translator Programs
Programmer is limited to high level control constructs such as while loops, for loops, and if/else
statements and not allowed to use primitive GOTO statements
Structured Programming
A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS
DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions.
Interpreted Language (Code)
Small programs that place Linux commands or DOS batch files into a file
Shell Scripting
The computer that the user is using; physically present with
Local Computer
Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED
Used for private networks with local computers.
Network Hub
Like a hub, but this will only send data that is INTENDED FOR SPECIFIC COMPUTER
Network Switch
Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends
out a wireless signal so computers on the network can connect without a cable
Wireless Access Point
Contains one or more servers; client is a computer that will request information from another
computer; server is a computer that takes requests and responds with the requested information; the
software used facilitates communication with remote servers
Client-server Network
Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.
Web Server
Monitors print jobs
Print Server
Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered
between client and server.