WGU C182 OBJECTIVE ASSESSMENT EXAM L
r r r r r
ATEST / WGU C182 OA EXAM REAL EXAM 200
r r r r r r r r
QUESTIONS AND ANSWERS|A+ GRADE ASSURED r r r r
In which type of network topology is each networ
r r r r r r r r
ked device directly connectd to every other netw
r r r r r r r
orked device? - ...ANSWER...Mesh
r r r
Which communication medium is typically used wh
r r r r r r
en sending data transmissions over very long dista
r r r r r r r
nces? - r
...ANSWER...Radio signals r
What indicates a specific internet location? -
r r r r r r
...ANSWER...The ip address r r
Translates human readable aliases into IP addresses
r r r r r r r
-
...ANSWER...domain name system (DNS) r r r
Which part of a Uniform Resource Locator identifies
r r r r r r r r
the location of the document on the server? -
r r r r r r r r
...ANSWER...Resource path id r r
Which goal of information Assurance (IA) requires t
r r r r r r r
hat information is accessible when needed? -
r r r r r r
...ANSWER...Availability
,Which technique uses all possible combinatio
r r r r r
n of letters and numbers to crack a password?
r r r r r r r r
-
r
...ANSWER...brute force r
which is a characterisc of high level languages? -
r r r r r r r r
...ANSWER...language translator programs are requi r r r r
red.
how does a compiler work? -
r r r r r
...ANSWER...It requires the components of the softw
r r r r r r r
are to be defined from the onset.
r r r r r r
On which tier of the n tier architecture model are user
r r r r r r r r r r r
interfaces developed? - ...ANSWER...presentation r r r
Which component facilitates communication bet
r r r r
ween the other two components in the MVC archit
r r r r r r r r
ecture model? - ...ANSWER...controller r r r
What is the difference between a compiled and inter
r r r r r r r r
preted computer language? - r r r
...ANSWER...compiler translates an entire program
r r r r r
into executable progam which can be run at a later t
r r r r r r r r r r r
ime, while the interpreter does this incrementally.
r r r r r r
Which two languages have traditionally been use
r r r r r r
d for automation rather than software developme
r r r r r r
nt? - r
...ANSWER...TCL and Python because they are scri r r r r r r
pting languages r
Which is true of databases and the application t
r r r r r r r r
hat interact with them? -
r r r r
...ANSWER...Applications are interdependent
r r r r
with the database. r r
,What is another term for a formula that outlines how
r r r r r r r r r r
to execute a task? - ...ANSWER...Algorithm
r r r r r
What is the role of drivers in facilitating communicat
r r r r r r r r
ion between application and databases? -
r r r r r
...ANSWER...They allow the ODBC to be used for int
r r r r r r r r r
eractions with the database and applications. r r r r r
Which sql clause is used to inform the databa
r r r r r r r r
se management system which table should
r r r r r r
be interrograted by the query? -
r r r r r
...ANSWER...FROM
r
Which data type is used to represent product or
r r r r r r r r
der code that comprises alphanumeric charact
r r r r r
ers? - r
...ANSWER...String data r
Why is it important to ensure that data support busi
r r r r r r r r r
ness goals? - r r
...ANSWER...To aid in making strategic decisions.
r r r r r r
In which category of the DIKW hierarchy wo
r r r r r r r
uld business intelligence be located? -
r r r r r
...ANSWER...Knowledge
Which field must contain a unique value in order fo
r r r r r r r r r
r a relational database table to function? -
r r r r r r r
...ANSWER...primary key r
What are the three main categories of databases? -
r r r r r r r r
...ANSWER...Flat file, relational, and hierarchal r r r r
, What is the database administrators role in security?
r r r r r r r
-
r
...ANSWER...To institute protocols to protec r r r r
t the databases from external threats.
r r r r r
A single chip process developed in 1974 by IBM -
r r r r r r r r r
...ANSWER...microprocessor
Over the years, the number of transisters that can
r r r r r r r r r
be placed on a chip has increased by how much? -
r r r r r r r r r r
...ANSWER...By orders of maginitude rather t r r r r r
han linearly r
What is the phenomenon observed that the numb
r r r r r r r
er of transistors on a chip doubles every year and w
r r r r r r r r r r
ill continue for at least the next ten years? -
r r r r r r r r r
...ANSWER...Moore's law r
How long has Moore's law continued to be a trend? -
r r r r r r r r r r
...ANSWER...from 1965 to the present r r r r
Is moore's law an observation or a physical law? -
r r r r r r r r r
...ANSWER...observation
The fetch- r
execute cycle is performed in an overlapped fashio r r r r r r r
n on several instructions. -
r r r r
...ANSWER...pipelines cpu
r r
a programming language that is a lengthy list of 1s
r r r r r r r r r r
and 0s. - ...ANSWER...machine language
r r r r
r r r r r
ATEST / WGU C182 OA EXAM REAL EXAM 200
r r r r r r r r
QUESTIONS AND ANSWERS|A+ GRADE ASSURED r r r r
In which type of network topology is each networ
r r r r r r r r
ked device directly connectd to every other netw
r r r r r r r
orked device? - ...ANSWER...Mesh
r r r
Which communication medium is typically used wh
r r r r r r
en sending data transmissions over very long dista
r r r r r r r
nces? - r
...ANSWER...Radio signals r
What indicates a specific internet location? -
r r r r r r
...ANSWER...The ip address r r
Translates human readable aliases into IP addresses
r r r r r r r
-
...ANSWER...domain name system (DNS) r r r
Which part of a Uniform Resource Locator identifies
r r r r r r r r
the location of the document on the server? -
r r r r r r r r
...ANSWER...Resource path id r r
Which goal of information Assurance (IA) requires t
r r r r r r r
hat information is accessible when needed? -
r r r r r r
...ANSWER...Availability
,Which technique uses all possible combinatio
r r r r r
n of letters and numbers to crack a password?
r r r r r r r r
-
r
...ANSWER...brute force r
which is a characterisc of high level languages? -
r r r r r r r r
...ANSWER...language translator programs are requi r r r r
red.
how does a compiler work? -
r r r r r
...ANSWER...It requires the components of the softw
r r r r r r r
are to be defined from the onset.
r r r r r r
On which tier of the n tier architecture model are user
r r r r r r r r r r r
interfaces developed? - ...ANSWER...presentation r r r
Which component facilitates communication bet
r r r r
ween the other two components in the MVC archit
r r r r r r r r
ecture model? - ...ANSWER...controller r r r
What is the difference between a compiled and inter
r r r r r r r r
preted computer language? - r r r
...ANSWER...compiler translates an entire program
r r r r r
into executable progam which can be run at a later t
r r r r r r r r r r r
ime, while the interpreter does this incrementally.
r r r r r r
Which two languages have traditionally been use
r r r r r r
d for automation rather than software developme
r r r r r r
nt? - r
...ANSWER...TCL and Python because they are scri r r r r r r
pting languages r
Which is true of databases and the application t
r r r r r r r r
hat interact with them? -
r r r r
...ANSWER...Applications are interdependent
r r r r
with the database. r r
,What is another term for a formula that outlines how
r r r r r r r r r r
to execute a task? - ...ANSWER...Algorithm
r r r r r
What is the role of drivers in facilitating communicat
r r r r r r r r
ion between application and databases? -
r r r r r
...ANSWER...They allow the ODBC to be used for int
r r r r r r r r r
eractions with the database and applications. r r r r r
Which sql clause is used to inform the databa
r r r r r r r r
se management system which table should
r r r r r r
be interrograted by the query? -
r r r r r
...ANSWER...FROM
r
Which data type is used to represent product or
r r r r r r r r
der code that comprises alphanumeric charact
r r r r r
ers? - r
...ANSWER...String data r
Why is it important to ensure that data support busi
r r r r r r r r r
ness goals? - r r
...ANSWER...To aid in making strategic decisions.
r r r r r r
In which category of the DIKW hierarchy wo
r r r r r r r
uld business intelligence be located? -
r r r r r
...ANSWER...Knowledge
Which field must contain a unique value in order fo
r r r r r r r r r
r a relational database table to function? -
r r r r r r r
...ANSWER...primary key r
What are the three main categories of databases? -
r r r r r r r r
...ANSWER...Flat file, relational, and hierarchal r r r r
, What is the database administrators role in security?
r r r r r r r
-
r
...ANSWER...To institute protocols to protec r r r r
t the databases from external threats.
r r r r r
A single chip process developed in 1974 by IBM -
r r r r r r r r r
...ANSWER...microprocessor
Over the years, the number of transisters that can
r r r r r r r r r
be placed on a chip has increased by how much? -
r r r r r r r r r r
...ANSWER...By orders of maginitude rather t r r r r r
han linearly r
What is the phenomenon observed that the numb
r r r r r r r
er of transistors on a chip doubles every year and w
r r r r r r r r r r
ill continue for at least the next ten years? -
r r r r r r r r r
...ANSWER...Moore's law r
How long has Moore's law continued to be a trend? -
r r r r r r r r r r
...ANSWER...from 1965 to the present r r r r
Is moore's law an observation or a physical law? -
r r r r r r r r r
...ANSWER...observation
The fetch- r
execute cycle is performed in an overlapped fashio r r r r r r r
n on several instructions. -
r r r r
...ANSWER...pipelines cpu
r r
a programming language that is a lengthy list of 1s
r r r r r r r r r r
and 0s. - ...ANSWER...machine language
r r r r