WGU C182 OBJECTIVE ASSESSMENT OA LATEST
2023/2024 | Complete 300 Questions with
Answers Graded A+
Practice questions for this set
Learn
Studied 7 terms
Nice work, you're crushing it
Continue studying in Learn
Terms in this set (118)
First users were the Evolution of Users
engineers who built and
programmed computers,
then employees who had
received specialized
training were users, and
now today, anyone and
everyone can be a user.
https://quizlet.com/988080223/wgu-c182-objective-assessment-oa-latest-20232024-complete-300-questions-with-answers-graded-a-flash-cards/?new 1/18
,12/24/24, 1:50 AM WGU C182 OBJECTIVE ASSESSMENT OA LATEST 2023/2024 | Complete 300 Questions with Answers Graded A+ Flashcards | …
Sends files over the FILE SERVER
network at the request of
clients. Responds over
LAN, within one
location/site. Support
both application software
and data files.
Turns a user-friendly Domain Name Server (DNS)
domain name, like
Google.com, into an
Internet Protocol (IP)
address like (((
70.42.251.42 ))) that
computers use to identify
each other on the
network.
Uses TWO KEYS a public Public Key Encryption
and private key for
performing encryption
and decryption
PROVING you are who Authentication
you say you are which can
be done by: what you
know, what you have!
TIER WHERE THE USER Presentation Tier
interface for the system is
developed; SHIELDS THE
USER from the underlying
logic of the systems as
well as the underlying
data structures
https://quizlet.com/988080223/wgu-c182-objective-assessment-oa-latest-20232024-complete-300-questions-with-answers-graded-a-flash-cards/?new 2/18
, 12/24/24, 1:50 AM WGU C182 OBJECTIVE ASSESSMENT OA LATEST 2023/2024 | Complete 300 Questions with Answers Graded A+ Flashcards | …
SYSTEMS DEPLOYMENT System Deployment
Steps 1. System
Conversion 2. Final
Documentation 3. End
User Training
CONNECTS MULTIPLES ROUTER
networks together; can be
used to directly connect
computers to a network;
will relay messages to
computers with
APPROPRIATE IP
ADDRESS
Requires that data is KEPT Confidentiality
secure so that they are not
accidentally provided or
obtained by unauthorized
users
Protecting EVERY LAYER Defense in Depth
that SURROUNDS ((( DATA
)))
Can take on DIFFERENT THE MODEL
FORMS depending on the
complexity of the
application; in certain
instances, it is AN ACTUAL
OBJECT that is an ACTUAL
IMPLEMENTATION of the
application
Creates a subset of the Slicing Data
data by reducing the data
from multiple dimensions
to one dimension
https://quizlet.com/988080223/wgu-c182-objective-assessment-oa-latest-20232024-complete-300-questions-with-answers-graded-a-flash-cards/?new 3/18