V3 | Explore New 177 Actual Questions and
Answers | Fall 2025/2026 Update | 100% Correct.
Save
Terms in this set (370)
First users were the Evolution of Users
engineers who built and
programmed computers,
then employees who had
received specialized
training were users, and
now today, anyone and
everyone can be a user.
Sends files over the FILE SERVER
network at the request of
clients. Responds over
LAN, within one
location/site. Support
both application software
and data files.
,Turns a user-friendly Domain Name Server (DNS)
domain name, like
Google.com, into an
Internet Protocol (IP)
address like (((
70.42.251.42 ))) that
computers use to identify
each other on the
network.
Uses TWO KEYS a public Public Key Encryption
and private key for
performing encryption
and decryption
PROVING you are who Authentication
you say you are which can
be done by: what you
know, what you have!
TIER WHERE THE USER Presentation Tier
interface for the system is
developed; SHIELDS THE
USER from the underlying
logic of the systems as
well as the underlying
data structures
SYSTEMS DEPLOYMENT System Deployment
Steps 1. System
Conversion 2. Final
Documentation 3. End
User Training
, CONNECTS MULTIPLES ROUTER
networks together; can be
used to directly connect
computers to a network;
will relay messages to
computers with
APPROPRIATE IP
ADDRESS
Requires that data is KEPT Confidentiality
secure so that they are not
accidentally provided or
obtained by unauthorized
users
Protecting EVERY LAYER Defense in Depth
that SURROUNDS ((( DATA
)))
Can take on DIFFERENT THE MODEL
FORMS depending on the
complexity of the
application; in certain
instances, it is AN ACTUAL
OBJECT that is an ACTUAL
IMPLEMENTATION of the
application
Creates a subset of the Slicing Data
data by reducing the data
from multiple dimensions
to one dimension
The technology used in Information Technology
creating, maintaining, and
making information
accessible.