WGU C182 OBJECTIVE ASSESSMENT QUESTIONS AND
r r r r r
ANSWERS 2023-2024 NEW UPDATE r r r
WGU C182 OBJECTIVE ASSESSMENT QU
r r r r
ESTIONS AND ANSWERS 2023- r r r
2024NEW UPDATE r r
1. First users were the engineers who built and pro-
r r r r r r r r
grammed computers, then employees who had re-
r r r r r r r
Evolution of Users
r r
ceived specialized training were users, and now to-
r r r r r r r r
day, anyone and everyone can be a user.
r r r r r r r r
2. Sends files over the network at the request of clients. FILE SERVER
r r r r r r r r r r r
Responds over LAN, within one location/site. Sup- r r r r r r
port both application software and data files.
r r r r r r r
3. Turns a user-friendly domain name, like Google.com, Domain Name
r r r r r r r r
into an Internet Protocol (IP) address like ((( 70.42.25
r r accidentally r r r r r r r
1.42 ))) that computers use to identify eachother on th
r r provided or o r r r r r r r r r r
e network.
r btained by un r r
authorizedus r
4. Uses TWO KEYS a public and private key for perform-
r ers r r r r r r r r
ing encryption and decryption
r r r r
5. PROVING you are who you say you are which can bedo r r r r r r r r r r r
ne by: what you know, what you have!
r r r r r r r
6. TIER WHERE THE USER interface for the system is de
r r r r r r r r r
veloped; SHIELDS THE USER from the underlyinglogi r r r r r r r
c of the systems as well as the underlying data structu
r r r r r r r r r r
res
7. SYSTEMS DEPLOYMENT Steps 1. System Conver- r r r r r
sion 2. Final Documentation 3. End User Training
r r r r r r r r
8. CONNECTS MULTIPLES networks together; can be us r r r r r r
ed to directly connect computers to a network; willrelay
r r r r r r r r r
messages to computers with APPROPRIATE IPADDR
r r r r r r r
ESS
9. Requires that data is KEPT secure so that they are not r r r r r r r r r r
1r/r16
,WGU C182 OBJECTIVE ASSESSMENT QUESTIONS AND
r r r r r
ANSWERS 2023-2024 NEW UPDATE r r r
Server (DNS) r
Public Key En- r r Confidentiality
r cryption Authentication Presentat
r r
ion Tier
r
System Deploy- r
mentROUTER
r r
10. Protecting EVERY LAYER that SURROUNDS ((( DATA Defense in Depth
r r r r r r r r r
)))
2r/r16
,WGU C182 OBJECTIVE ASSESSMENT QUESTIONS AND
r r r r r
ANSWERS 2023-2024 NEW UPDATE r r r
11. Can take on DIFFERENT FORMS depending on the co
r r r r r r r r THE MODEL
r
mplexity of the application; in certain instances, itis A r r r r r r r r r
N ACTUAL OBJECT that is an ACTUAL IMPLE-
r r r r r r r
MENTATION of the application
r r r r
12. Creates a subset of the data by reducing the data from Slicing Data
r r r r r r r r r r r r
multiple dimensions to one dimension r r r r
13. The technology used in creating, maintaining, andm
r r r r r r r Information Tech- r
aking information accessible. r r nology
r
14. In charge of all aspects of the COMPUTER NET-
r r r r r r r r Network Adminis-
r
WORKS r trator
r
15. Focuses on the design, development, and support ofD Database Admin-
r r r r r r r r r
ATABASE MANAGEMENT systems (DBMSs). istrator r r r r
16. Installs, configures, maintains, secures, and trou-
r r r r r Web Administrator
r
bleshoots web severs
r r r
17. Processed data. r Information
18. INFORMATION THAT HAS BEEN PUT TO USE infor- r r r r r r r Knowledge in r r
mation placed into a context. Refined information su
r r r r r r r r DIKW
ch that the user of the knowledge is able to call forth o
r r r r r r r r r r r r
nly relevant portions of information when needed.
r r r r r r
19. Provides a social setting to knowledge; AN UNDER- r r r r r r r
STANDING OF THE ((( WHY ))) Can only come by havi
r r r r r r r r r r r WISDOM
ng BOTH KNOWLEDGE and EXPERIENCE
r r r r
20. The INPUT Processing, OUTPUT, STORAGE Cycle
r r r r r I.P.O.S.
21. Raw data is organized or structured for usefulness.
r r r r r r r PROCESSED
DATA
22. Information is output so user can see results. r r r r r r r OUTPUT DATA r
23. STORAGE
3r/r16
r r r r r
ANSWERS 2023-2024 NEW UPDATE r r r
WGU C182 OBJECTIVE ASSESSMENT QU
r r r r
ESTIONS AND ANSWERS 2023- r r r
2024NEW UPDATE r r
1. First users were the engineers who built and pro-
r r r r r r r r
grammed computers, then employees who had re-
r r r r r r r
Evolution of Users
r r
ceived specialized training were users, and now to-
r r r r r r r r
day, anyone and everyone can be a user.
r r r r r r r r
2. Sends files over the network at the request of clients. FILE SERVER
r r r r r r r r r r r
Responds over LAN, within one location/site. Sup- r r r r r r
port both application software and data files.
r r r r r r r
3. Turns a user-friendly domain name, like Google.com, Domain Name
r r r r r r r r
into an Internet Protocol (IP) address like ((( 70.42.25
r r accidentally r r r r r r r
1.42 ))) that computers use to identify eachother on th
r r provided or o r r r r r r r r r r
e network.
r btained by un r r
authorizedus r
4. Uses TWO KEYS a public and private key for perform-
r ers r r r r r r r r
ing encryption and decryption
r r r r
5. PROVING you are who you say you are which can bedo r r r r r r r r r r r
ne by: what you know, what you have!
r r r r r r r
6. TIER WHERE THE USER interface for the system is de
r r r r r r r r r
veloped; SHIELDS THE USER from the underlyinglogi r r r r r r r
c of the systems as well as the underlying data structu
r r r r r r r r r r
res
7. SYSTEMS DEPLOYMENT Steps 1. System Conver- r r r r r
sion 2. Final Documentation 3. End User Training
r r r r r r r r
8. CONNECTS MULTIPLES networks together; can be us r r r r r r
ed to directly connect computers to a network; willrelay
r r r r r r r r r
messages to computers with APPROPRIATE IPADDR
r r r r r r r
ESS
9. Requires that data is KEPT secure so that they are not r r r r r r r r r r
1r/r16
,WGU C182 OBJECTIVE ASSESSMENT QUESTIONS AND
r r r r r
ANSWERS 2023-2024 NEW UPDATE r r r
Server (DNS) r
Public Key En- r r Confidentiality
r cryption Authentication Presentat
r r
ion Tier
r
System Deploy- r
mentROUTER
r r
10. Protecting EVERY LAYER that SURROUNDS ((( DATA Defense in Depth
r r r r r r r r r
)))
2r/r16
,WGU C182 OBJECTIVE ASSESSMENT QUESTIONS AND
r r r r r
ANSWERS 2023-2024 NEW UPDATE r r r
11. Can take on DIFFERENT FORMS depending on the co
r r r r r r r r THE MODEL
r
mplexity of the application; in certain instances, itis A r r r r r r r r r
N ACTUAL OBJECT that is an ACTUAL IMPLE-
r r r r r r r
MENTATION of the application
r r r r
12. Creates a subset of the data by reducing the data from Slicing Data
r r r r r r r r r r r r
multiple dimensions to one dimension r r r r
13. The technology used in creating, maintaining, andm
r r r r r r r Information Tech- r
aking information accessible. r r nology
r
14. In charge of all aspects of the COMPUTER NET-
r r r r r r r r Network Adminis-
r
WORKS r trator
r
15. Focuses on the design, development, and support ofD Database Admin-
r r r r r r r r r
ATABASE MANAGEMENT systems (DBMSs). istrator r r r r
16. Installs, configures, maintains, secures, and trou-
r r r r r Web Administrator
r
bleshoots web severs
r r r
17. Processed data. r Information
18. INFORMATION THAT HAS BEEN PUT TO USE infor- r r r r r r r Knowledge in r r
mation placed into a context. Refined information su
r r r r r r r r DIKW
ch that the user of the knowledge is able to call forth o
r r r r r r r r r r r r
nly relevant portions of information when needed.
r r r r r r
19. Provides a social setting to knowledge; AN UNDER- r r r r r r r
STANDING OF THE ((( WHY ))) Can only come by havi
r r r r r r r r r r r WISDOM
ng BOTH KNOWLEDGE and EXPERIENCE
r r r r
20. The INPUT Processing, OUTPUT, STORAGE Cycle
r r r r r I.P.O.S.
21. Raw data is organized or structured for usefulness.
r r r r r r r PROCESSED
DATA
22. Information is output so user can see results. r r r r r r r OUTPUT DATA r
23. STORAGE
3r/r16