1|Page
WGU C182 OBJECTIVE ASSESSMENT OA LATEST
2024/2025 | Complete Questions with Answers
Graded A+
First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user. - (answers)Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within
one location/site. Support both application software and data files. -
(answers)FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network. - (answers)Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and
decryption - (answers)Public Key Encryption
PROVING you are who you say you are which can be done by: what you know,
what you have! - (answers)Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER
from the underlying logic of the systems as well as the underlying data structures
- (answers)Presentation Tier
,2|Page
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End
User Training - (answers)System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect
computers to a network; will relay messages to computers with APPROPRIATE IP
ADDRESS - (answers)ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - (answers)Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - (answers)Defense in
Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of
the application - (answers)THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to
one dimension - (answers)Slicing Data
The technology used in creating, maintaining, and making information accessible.
- (answers)Information Technology
In charge of all aspects of the COMPUTER NETWORKS - (answers)Network
Administrator
, 3|Page
Focuses on the design, development, and support of DATABASE MANAGEMENT
systems (DBMSs). - (answers)Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs -
(answers)Web Administrator
Processed data. - (answers)Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a context.
Refined information such that the user of the knowledge is able to call forth only
relevant portions of information when needed. - (answers)Knowledge in DIKW
Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY )))
Can only come by having BOTH KNOWLEDGE and EXPERIENCE -
(answers)WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle - (answers)I.P.O.S.
Raw data is organized or structured for usefulness. - (answers)PROCESSED DATA
Information is output so user can see results. - (answers)OUTPUT DATA
Processed information is stored for permanent record. - (answers)STORAGE
WGU C182 OBJECTIVE ASSESSMENT OA LATEST
2024/2025 | Complete Questions with Answers
Graded A+
First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user. - (answers)Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within
one location/site. Support both application software and data files. -
(answers)FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network. - (answers)Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and
decryption - (answers)Public Key Encryption
PROVING you are who you say you are which can be done by: what you know,
what you have! - (answers)Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER
from the underlying logic of the systems as well as the underlying data structures
- (answers)Presentation Tier
,2|Page
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End
User Training - (answers)System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect
computers to a network; will relay messages to computers with APPROPRIATE IP
ADDRESS - (answers)ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - (answers)Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - (answers)Defense in
Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of
the application - (answers)THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to
one dimension - (answers)Slicing Data
The technology used in creating, maintaining, and making information accessible.
- (answers)Information Technology
In charge of all aspects of the COMPUTER NETWORKS - (answers)Network
Administrator
, 3|Page
Focuses on the design, development, and support of DATABASE MANAGEMENT
systems (DBMSs). - (answers)Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs -
(answers)Web Administrator
Processed data. - (answers)Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a context.
Refined information such that the user of the knowledge is able to call forth only
relevant portions of information when needed. - (answers)Knowledge in DIKW
Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY )))
Can only come by having BOTH KNOWLEDGE and EXPERIENCE -
(answers)WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle - (answers)I.P.O.S.
Raw data is organized or structured for usefulness. - (answers)PROCESSED DATA
Information is output so user can see results. - (answers)OUTPUT DATA
Processed information is stored for permanent record. - (answers)STORAGE