WGU C182 OBJECTIVE ASSESSMENT EXAM L
r r r r r
ATEST / WGU C182 OA EXAM REAL EXAM 200
r r r r r r r r
QUESTIONS AND ANSWERS|A+ GRADE ASSURED r r r r
In which type of network topology is each networkedde
r r r r r r r r r
vice directly connectd to every other networked device
r r r r r r r
? - ...ANSWER...Mesh
r r
Which communication medium is typically used when sen
r r r r r r r
ding data transmissions over very long distances? -
r r r r r r r
...ANSWER...Radio signals r
What indicates a specific internet location? -
r r r r r r
...ANSWER...The ip address r r
Translates human readable aliases into IP addresses -
r r r r r r r
...ANSWER...domain name system (DNS) r r r
Which part of a Uniform Resource Locator identifies thelo
r r r r r r r r r
cation of the document on the server? -
r r r r r r r
...ANSWER...Resource path id r r
Which goal of information Assurance (IA) requires thatin
r r r r r r r r
formation is accessible when needed? -
r r r r r
...ANSWER...Availability
,Which technique uses all possible combination ofle
r r r r r r r
tters and numbers to crack a password? -
r r r r r r r
...ANSWER...brute force r
which is a characterisc of high level languages? -
r r r r r r r r
...ANSWER...language translator programs are required. r r r r
how does a compiler work? -
r r r r r
...ANSWER...It requires thecomponents of the software to
r r r r r r r r r
be defined from the onset.
r r r r
On which tier of the n tier architecture model are userinterf
r r r r r r r r r r r
aces developed? - ...ANSWER...presentation
r r r
Which component facilitates communication betweenth
r r r r r
e other two components in the MVC architecture model?
r r r r r r r r r
- ...ANSWER...controller
r
What is the difference between a compiled and interprete
r r r r r r r r
d computer language? -
r r r
...ANSWER...compilertranslates an entire program into e
r r r r r r r
xecutable progam which can be run at a later time, while t
r r r r r r r r r r r
he interpreter does this incrementally.
r r r r
Which two languages have traditionally been used forau
r r r r r r r r
tomation rather than software development? -
r r r r r
...ANSWER...TCL and Python because they are scriptingla r r r r r r r
nguages
Which is true of databases and the application thatint
r r r r r r r r r
eract with them? - r r r
...ANSWER...Applications are interdependent with th
r r r r r
e database.
r
,What is another term for a formula that outlines how toex
r r r r r r r r r r r
ecute a task? - ...ANSWER...Algorithm
r r r r
What is the role of drivers in facilitating communicationbe
r r r r r r r r r
tween application and databases? -
r r r r
...ANSWER...Theyallow the ODBC to be used for interactio
r r r r r r r r r
ns with the database and applications.
r r r r r
Which sql clause is used to inform the databasem
r r r r r r r r r
anagement system which table should be interro r r r r r r
grated by the query? - ...ANSWER...FROM
r r r r r
Which data type is used to represent product orderco
r r r r r r r r r
de that comprises alphanumeric characters? -
r r r r r
...ANSWER...String data r
Why is it important to ensure that data support business g
r r r r r r r r r r
oals? - ...ANSWER...To aid in making strategicdecisions.
r r r r r r r
In which category of the DIKW hierarchy wouldbu
r r r r r r r r
siness intelligence be located? -
r r r r
...ANSWER...Knowledge
Which field must contain a unique value in order for arel
r r r r r r r r r r r
ational database table to function? -
r r r r r
...ANSWER...primary key r
What are the three main categories of databases? -
r r r r r r r r
...ANSWER...Flat file, relational, and hierarchal r r r r
, What is the database administrators role in security? -
r r r r r r r r
...ANSWER...To institute protocols to protect thed r r r r r r
atabases from external threats. r r r
A single chip process developed in 1974 by IBM -
r r r r r r r r r
...ANSWER...microprocessor
Over the years, the number of transisters that can bepla
r r r r r r r r r r
ced on a chip has increased by how much? -
r r r r r r r r r
...ANSWER...By orders of maginitude rather thanli r r r r r r
nearly
What is the phenomenon observed that the number oftr
r r r r r r r r r
ansistors on a chip doubles every year and will continue
r r r r r r r r r r
for at least the next ten years? -
r r r r r r r
...ANSWER...Moore's law r
How long has Moore's law continued to be a trend? -
r r r r r r r r r r
...ANSWER...from 1965 to the present r r r r
Is moore's law an observation or a physical law? -
r r r r r r r r r
...ANSWER...observation
The fetch- r
execute cycle is performed in an overlappedfashion on s
r r r r r r r r r
everal instructions. - ...ANSWER...pipelinescpu
r r r r
a programming language that is a lengthy list of 1s and0s.
r r r r r r r r r r r r
- ...ANSWER...machine language
r r
r r r r r
ATEST / WGU C182 OA EXAM REAL EXAM 200
r r r r r r r r
QUESTIONS AND ANSWERS|A+ GRADE ASSURED r r r r
In which type of network topology is each networkedde
r r r r r r r r r
vice directly connectd to every other networked device
r r r r r r r
? - ...ANSWER...Mesh
r r
Which communication medium is typically used when sen
r r r r r r r
ding data transmissions over very long distances? -
r r r r r r r
...ANSWER...Radio signals r
What indicates a specific internet location? -
r r r r r r
...ANSWER...The ip address r r
Translates human readable aliases into IP addresses -
r r r r r r r
...ANSWER...domain name system (DNS) r r r
Which part of a Uniform Resource Locator identifies thelo
r r r r r r r r r
cation of the document on the server? -
r r r r r r r
...ANSWER...Resource path id r r
Which goal of information Assurance (IA) requires thatin
r r r r r r r r
formation is accessible when needed? -
r r r r r
...ANSWER...Availability
,Which technique uses all possible combination ofle
r r r r r r r
tters and numbers to crack a password? -
r r r r r r r
...ANSWER...brute force r
which is a characterisc of high level languages? -
r r r r r r r r
...ANSWER...language translator programs are required. r r r r
how does a compiler work? -
r r r r r
...ANSWER...It requires thecomponents of the software to
r r r r r r r r r
be defined from the onset.
r r r r
On which tier of the n tier architecture model are userinterf
r r r r r r r r r r r
aces developed? - ...ANSWER...presentation
r r r
Which component facilitates communication betweenth
r r r r r
e other two components in the MVC architecture model?
r r r r r r r r r
- ...ANSWER...controller
r
What is the difference between a compiled and interprete
r r r r r r r r
d computer language? -
r r r
...ANSWER...compilertranslates an entire program into e
r r r r r r r
xecutable progam which can be run at a later time, while t
r r r r r r r r r r r
he interpreter does this incrementally.
r r r r
Which two languages have traditionally been used forau
r r r r r r r r
tomation rather than software development? -
r r r r r
...ANSWER...TCL and Python because they are scriptingla r r r r r r r
nguages
Which is true of databases and the application thatint
r r r r r r r r r
eract with them? - r r r
...ANSWER...Applications are interdependent with th
r r r r r
e database.
r
,What is another term for a formula that outlines how toex
r r r r r r r r r r r
ecute a task? - ...ANSWER...Algorithm
r r r r
What is the role of drivers in facilitating communicationbe
r r r r r r r r r
tween application and databases? -
r r r r
...ANSWER...Theyallow the ODBC to be used for interactio
r r r r r r r r r
ns with the database and applications.
r r r r r
Which sql clause is used to inform the databasem
r r r r r r r r r
anagement system which table should be interro r r r r r r
grated by the query? - ...ANSWER...FROM
r r r r r
Which data type is used to represent product orderco
r r r r r r r r r
de that comprises alphanumeric characters? -
r r r r r
...ANSWER...String data r
Why is it important to ensure that data support business g
r r r r r r r r r r
oals? - ...ANSWER...To aid in making strategicdecisions.
r r r r r r r
In which category of the DIKW hierarchy wouldbu
r r r r r r r r
siness intelligence be located? -
r r r r
...ANSWER...Knowledge
Which field must contain a unique value in order for arel
r r r r r r r r r r r
ational database table to function? -
r r r r r
...ANSWER...primary key r
What are the three main categories of databases? -
r r r r r r r r
...ANSWER...Flat file, relational, and hierarchal r r r r
, What is the database administrators role in security? -
r r r r r r r r
...ANSWER...To institute protocols to protect thed r r r r r r
atabases from external threats. r r r
A single chip process developed in 1974 by IBM -
r r r r r r r r r
...ANSWER...microprocessor
Over the years, the number of transisters that can bepla
r r r r r r r r r r
ced on a chip has increased by how much? -
r r r r r r r r r
...ANSWER...By orders of maginitude rather thanli r r r r r r
nearly
What is the phenomenon observed that the number oftr
r r r r r r r r r
ansistors on a chip doubles every year and will continue
r r r r r r r r r r
for at least the next ten years? -
r r r r r r r
...ANSWER...Moore's law r
How long has Moore's law continued to be a trend? -
r r r r r r r r r r
...ANSWER...from 1965 to the present r r r r
Is moore's law an observation or a physical law? -
r r r r r r r r r
...ANSWER...observation
The fetch- r
execute cycle is performed in an overlappedfashion on s
r r r r r r r r r
everal instructions. - ...ANSWER...pipelinescpu
r r r r
a programming language that is a lengthy list of 1s and0s.
r r r r r r r r r r r r
- ...ANSWER...machine language
r r