100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C182 OBJECTIVE ASSESSMENT EXAM / WGU C182 OBJECTIVE ASSESSMENT PREPARATION/WGU C182 OA PRACTICE REAL EXAM 170 QUESTIONS AND ANSWERS|PASSED WITH A+

Rating
4.5
(2)
Sold
-
Pages
37
Grade
A+
Uploaded on
24-09-2025
Written in
2025/2026

WGU C182 OBJECTIVE ASSESSMENT EXAM / WGU C182 OBJECTIVE ASSESSMENT PREPARATION/WGU C182 OA PRACTICE REAL EXAM 170 QUESTIONS AND ANSWERS|PASSED WITH A+

Institution
WGU C182 OBJECTIVE
Course
WGU C182 OBJECTIVE











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C182 OBJECTIVE
Course
WGU C182 OBJECTIVE

Document information

Uploaded on
September 24, 2025
Number of pages
37
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C182 OBJECTIVE ASSESSMENT EXAM / WGU C182
OBJECTIVE ASSESSMENT PREPARATION/WGU C182 OA
PRACTICE REAL EXAM 170 QUESTIONS AND ANSWERS|
PASSED WITH A+

Question 1
Which component of a computer is often referred to as the "brain" and is
responsible for executing instructions and performing calculations?
A) RAM
B) Hard Drive
C) CPU
D) Motherboard
E) GPU
Correct Answer: C) CPU
Rationale: The Central Processing Unit (CPU) is the core component
that interprets and executes most commands from other computer
hardware and software.

Question 2
What type of memory is volatile and loses its contents when the computer is
turned off?
A) ROM
B) SSD
C) RAM
D) Flash memory
E) Hard Disk Drive (HDD)
Correct Answer: C) RAM
Rationale: Random Access Memory (RAM) is volatile, meaning it
requires power to maintain the stored information. It is used for
short-term data storage while the computer is active.

Question 3
Which operating system is open-source and widely used on servers, mobile
devices (Android), and embedded systems?
A) Windows
B) macOS
C) iOS
D) Linux
E) Chrome OS
Correct Answer: D) Linux
Rationale: Linux is a well-known open-source operating system that
powers a vast array of devices, from servers and supercomputers to
Android mobile phones and various embedded systems.

,Question 4
What is the primary function of a network router?
A) To connect devices within a single local area network (LAN).
B) To filter unwanted network traffic based on security rules.
C) To forward data packets between different computer networks.
D) To convert analog signals to digital signals.
E) To store website data for faster access.
Correct Answer: C) To forward data packets between different
computer networks.
Rationale: A router's main job is to connect two or more different
networks (e.g., your home network to the Internet) and intelligently
direct data packets to their correct destination across those
networks.

Question 5
Which of the following is an example of application software?
A) Windows 10
B) macOS Sonoma
C) Microsoft Word
D) Linux Ubuntu
E) Android OS
Correct Answer: C) Microsoft Word
Rationale: Application software is designed to perform specific tasks
for the user, such as word processing, spreadsheets, or web
browsing. Operating systems like Windows, macOS, Linux, and
Android are system software.

Question 6
What does "IP address" stand for?
A) Internet Privacy address
B) Internal Protocol address
C) Internet Protocol address
D) Integrated Packet address
E) International Port address
Correct Answer: C) Internet Protocol address
Rationale: An IP address is a numerical label assigned to each
device connected to a computer network that uses the Internet
Protocol for communication, serving as a unique identifier.

Question 7
Which storage device uses non-volatile flash memory to store data and has

,no moving parts?
A) Hard Disk Drive (HDD)
B) Solid State Drive (SSD)
C) Floppy Disk
D) Magnetic Tape
E) Optical Disc (CD/DVD)
Correct Answer: B) Solid State Drive (SSD)
Rationale: Solid State Drives (SSDs) store data using flash memory,
offering faster performance, lower power consumption, and greater
durability compared to traditional HDDs because they lack
mechanical moving parts.

Question 8
What is the purpose of a firewall in network security?
A) To physically separate network segments.
B) To encrypt all outgoing network traffic.
C) To monitor and control incoming and outgoing network traffic based on
predefined security rules.
D) To detect and remove malware from a network.
E) To store backups of network data.
Correct Answer: C) To monitor and control incoming and outgoing
network traffic based on predefined security rules.
Rationale: A firewall acts as a barrier between a trusted internal
network and untrusted external networks (like the Internet),
filtering traffic to prevent unauthorized access or malicious activity.

Question 9
Which of the following is a common input device for a computer?
A) Monitor
B) Printer
C) Keyboard
D) Projector
E) Speakers
Correct Answer: C) Keyboard
Rationale: An input device allows users to send data, commands, or
information to a computer. A keyboard is a primary example of an
input device.

Question 10
What programming language is primarily used for creating structured query
language (SQL) databases?

, A) Python
B) Java
C) C++
D) SQL
E) JavaScript
Correct Answer: D) SQL
Rationale: SQL (Structured Query Language) is a special-purpose
programming language designed for managing data held in a
relational database management system (RDBMS) or for stream
processing in a relational data stream management system
(RDSMS).

Question 11
What does the acronym "HTTP" stand for?
A) HyperText Transfer Protocol
B) High-Tech Transfer Program
C) Hyperlink Texting Protocol
D) Homeostatic Transfer Procedure
E) Host Terminal Transfer Protocol
Correct Answer: A) HyperText Transfer Protocol
Rationale: HTTP is the foundation of data communication for the
World Wide Web, defining how messages are formatted and
transmitted, and what actions Web servers and browsers should
take in response to various commands.

Question 12
Which type of malware disguises itself as legitimate software to trick users
into installing it?
A) Virus
B) Worm
C) Trojan horse
D) Spyware
E) Ransomware
Correct Answer: C) Trojan horse
Rationale: A Trojan horse (or Trojan) is a type of malicious code or
software that looks legitimate but can take control of your
computer. It gets its name from the ancient Greek story of the
Trojan Horse because it hides inside useful-looking programs.

Question 13
What is the process of translating human-readable source code into

Reviews from verified buyers

Showing all 2 reviews
2 months ago

2 months ago

4.5

2 reviews

5
1
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
POLYCARP West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
814
Member since
9 months
Number of followers
11
Documents
823
Last sold
1 week ago
The scholars desk

Struggling to find high-quality study materials? Look no further! I offer well-structured notes, summaries, essays, and research papers across various subjects, designed to help you understand concepts faster, improve your grades, and save study time What You’ll Find Here: ✔ Clear, concise, and exam-focused study materials ✔ Well-organized content for easy understanding ✔ Reliable resources to support your assignments and research ✔ Time-saving summaries to help you study efficiently Whether you\'re preparing for an exam, working on an assignment, or just need a quick reference, my materials are crafted to provide accurate, well-researched, and easy-to-grasp information Browse through my collection and take your studies to the next level!

Read more Read less
4.9

443 reviews

5
394
4
41
3
4
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions