100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C182 FINAL EXAM PREP 2025/2026 ACTUAL QUESTIONS WITH VERIFIED ACCURATE ANSWERS || 100% ENDORSED PASS>LATEST VERSION<

Rating
-
Sold
-
Pages
89
Grade
A+
Uploaded on
23-07-2025
Written in
2024/2025

WGU C182 FINAL EXAM PREP 2025/2026 ACTUAL QUESTIONS WITH VERIFIED ACCURATE ANSWERS || 100% ENDORSED PASS&gt;LATEST VERSION&lt; . 1. SELECT database operation - ANSWER The selection operation takes rows from one table and creates a new table. 2. Asterisk (*) database operation - ANSWER The asterisk (*) means everything from that table. 3. UNION database operation - ANSWER The union operation combines distinct fields from multiple tables that have the same set of attributes and data types. 4. JOIN database operation - ANSWER A join operation combines two tables, but records are only appended when a matching criterion is met. 5. Data lake - ANSWER A data lake is a system of data stored in raw format. 6. Application Software - ANSWER Programs end users run to accomplish tasks. 7. Productivity Software - ANSWER Application software used to aid in productivity. I.E. Presentation software, word processor, spreadsheets. 8. Define OLTP - ANSWER Sits on top of a database. Used for OnLine Transaction Processing. 9. Define OLAP - ANSWER Sits on top of a data warehouse. Introduces slicing, dicing, drilling up or down and pivoting. Used for OnLine Analytical Processing. 10. Define Slicing as it relates to OLAP - ANSWER It creates a subset of the data by reducing the data from multiple dimensions to one dimension. 11. Define Dicing as it relates to OLAP - ANSWER It is the same as slicing except that the result can remain in multiple dimensions 12. Define drill down / drill up as it relates to OLAP - ANSWER Drilling down provides more detail and drilling up provides summarized data. 13. Define Pivot as it relates to OLAP - ANSWER It rotates data to view the data from a different perspective 14. What does OLDP do? - ANSWER It deals with data in real time 15. What is Event Driven Processing? - ANSWER It deals with data as it arrives 16. What is Batch Processing? - ANSWER It deals with multiple pieces of data all at once 17. How does ODBC/JDBC work? - ANSWER They work with Database Drivers and sit between the database and the application. 18. What does ODBC/JDBC do? - ANSWER It translates commands from the application into queries for the database 19. What order do Project Phases go in? - ANSWER Initiation, Planning, Executing, Monitoring, Closure 20. What occurs during the Initiation Phase? - ANSWER Problem Definition, Resource Allocation and Risk Assessment. 21. What occurs during the Planning Phase? - ANSWER Define Activities, Organize Activities, Time Estimation, Cost Estimation 22. What occurs during the Execution Phase? - ANSWER Variance Reports, Status Reports, Resource Allocation Reports 23. What occurs during the Closure Phase? - ANSWER A final report is created detailing the outcome of the project 24. What are some risks that can occur during a project? - ANSWER Scope Creep, Unnecessary Requirements, Cutting Corners, Overly Optimistic Time Frame, Improper Skill Sets, User Resistance 25. What is SDLC? - ANSWER A process for planning, creating, testing, and deploying information systems 26. What is the Preliminary Investigation step in SDLC? - ANSWER You assess the feasibility of the proposed project and select a development methodology. Expected costs and benefits of this new system are estimated as well. 27. What is the Analysis step in SDLC? - ANSWER You determine the user requirements for the new system and develop logical models of the system. End users' needs (how data will be captured and entered into the system by the users) are also gathered. Security concerns should be addressed here as well. 28. What is the Logical Design step in SDLC? - ANSWER You revise the logical models to ensure that the new system will meet the user requirements identified 29. What is the Physical Design step in SDLC? - ANSWER Logical models are converted into physical models. They are now more complete and may include network maps and descriptions of servers and other devices 30. System Software - ANSWER Consists of programs that make up the OS and directly support system itself. **Includes services or DAEMONS 31. Server Software - ANSWER Works with hardware to provide network service. 32. Local Application - ANSWER Software stored on an individual computer. 33. Intranet - ANSWER A LAN that uses IP. Used to communicate within organization. 34. Cloud Computing - ANSWER Allows organization to access resources/app anywhere, anytime. Beneficial because an org. may access resources it may not normally have. 35. Operating Systems - ANSWER Allows a user to easily access hardware/software, required to maintain computer environment. 36. Virtual Machine - ANSWER Allows access to multiple machines without having to purchase multiple computers. Also allows user to run software for a computer that normally would not be able to run that software. 37. Network Server - ANSWER Dedicated, high performance computer with large hard disk drives. It may be in a cabinet so multiple servers can be housed. **Stand alone computer, not a desktop. 38. Information Security Assurance Goals - ANSWER "CIA" Confidentiality Integrity Availability 39. IAS Confidentiality - ANSWER Requires data be kept secure so that it does not fall to unauthorized users. It goes beyond security measures and extends to policies. Security measures should extend beyond network. A stolen laptop should not violate confidentiality. 40. IAS Integrity - ANSWER Requires data are correct. Requires 3 different efforts: Data gathering should include an accuracy component. Data must be entered into system accurately. Once data is in dB, changes made will leave a record of when the change was made and by whom. 41. IAS Availability - ANSWER Requires data/information be available when needed. 42. Steps of Strategic Risk Analysis - ANSWER 1.Identify organization information assets. 2. Identify vulnerabilities. 3.Identify threats. 4.Implement policies. 43. What is the database administrator's role in security? a. To eliminate data redundancy when integrating old with new systems b. To institute protocols to protect the databases from external threats c. To set ports on the router to secure the transport of data d. To create a redundant server architecture - ANSWER To institute protocols to protect the databases from external threats 44. What are the three main categories of databases? a. Flat file, relational, hierarchal b. Table query report c. Relation join project d. Spreadsheet simple complex - ANSWER Flat file, relational, hierarchal 45. Which filed must contain a unique value in order for a relational database table to function? a. Name b. Record number c. ID Number d. Primary Key - ANSWER . Primary Key 46. In which category of the DIKW hierarchy would business intelligence be located? a. Information b. Knowledge c. Data d. Wisdom - ANSWER Knowledge 47. Why is it important to ensure that data support business goals? a. To ensure raw data is captured b. To provide opportunities for communication c. To establish needs of users d. To aid in making strategic decisions - ANSWER To aid in making strategic decisions 48. Armando is a freelance graphic designer. He has decided to create a database of the artwork he has done throughout the years. Each of his pieces of art is sorted using an assigned name and number. Which data type will be required in order to create his database? a. Boolean b. Floating Point c. String data d. Numeric Integer - ANSWER String data 49. Which data type is used to represent product order code that comprises alphanumberic characters? a. Fixed-Point b. String c. Boolean d. Floating-point - ANSWER String 50. Which SQL clause is used to inform the database management system (DMBS) which tables should be interrogated by the query? a. FROM b. HERE c. SELECT d. WHERE - ANSWER FROM 51. What is the role of drivers in facilitating communication between applications and databases? a. They allow all the data to be communicated via the network. b. They allow the application to interact with the database c. They allow ODBC to be used for interactions with the database and applications d. They allow SQL to manage communications between applications and databases. - ANSWER They allow ODBC to be used for interactions with the database and applications 52. What is another term for a formula that outlines how to execute a task? a. User-Defined function b. Process c. Pseudocode d. Algorithm - ANSWER d. Algorithm 53. Which is true of databases and the applications that interact with them? a. Applications store data in their own files b. The database determines the application classes c. Applications are interdependent with the database. d. The database can support at most one application. - ANSWER Applications are interdependent with the database. 54. Which two languages have traditionally been used for automation rather than software development? a. TCL b. PYTHON c. C++ d. COBOL - ANSWER TCL PYTHON 55. What statement is true concerning compiled and interpreted computer language? a. Both compiled and interpreted languages are written in binary code. b. A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. c. An interpreted language program runs faster than a compiled language program. d. A compiled language-program is portable and can be run on multiple types of system, whereas an interpreted program runs on a single type of system. - ANSWER A compiler translates an entire program into executable program, which can be run at a later time, while the interpreter does this incrementally. 56. Which component facilitates communication between the other two components in the MVC architecture model? a. View b. Model c. Presentation d. Controller - ANSWER Controller 57. On which tier of an N-Tier architecture model are user interfaces developed? a. Logic b. Application c. Data d. Presentation - ANSWER Presentation 58. How does a compiler work? a. It relies on a session to compete its task. b. It allows a programmer to easily test out changes to code. c. It takes the most recent instructions and translates them into machine code d. It requires the components of the software to be defined from the onset. - ANSWER It requires the components of the software to be defined from the onset. 59. Which is a characteristic of high-level languages? a. They use object oriented programs. b. Code is more difficult to write than low-level language. c. Zeros and ones are used to produce the code. d. Language translator programs are required. - ANSWER Language translator programs are required. 60. Which is a type of two-factor authentication? a. Packet sniffing b. Smart card c. Least privilege d. Access right - ANSWER Smart card 61. Which technique uses all possible combinations of letters and numbers to crack a password? a. Dictionary attack b. Password generator c. Brute force d. Packet sniffing - ANSWER Brute force 62. Which goal of Information Assurance and Security (IAS) requires that information is accessible when needed? a. Stability b. Availability c. Confidentiality d. Integrity - ANSWER Availability 63. Which part of a uniform resource locator (URL) identifies the location of the document on the server? a. Resource Path ID b. Protocol c. Domain Name d. IP Address - ANSWER Resource Path ID 64. What makes data timely? - ANSWER Data must be efficient and must be provided in a timely manner so that companies can utilize it in their business. When there is a delay in data, it may no longer be of use or properly serve its purpose. 65. What makes data thorough? - ANSWER This means that the data must be complete. Data that is not thorough might contain errors or lapses of data. 66. What makes data accurate? - ANSWER This is most likely to be secured if data is captured as close to the point of activity as possible. It should be captured as close to the source as possible. 67. What makes data reliable? - ANSWER It should reflect stable and consistent data collection processes. Data integrity and quality are essential to reliability.. 68. What 4 processes does a computer perform? - ANSWER (I)nput, (P)rocessing, (O)utput, (S)torage - IPOS 69. In the IPOS process, what performs the Input of data (data, numbers, images and sounds)? - ANSWER The user 70. In the IPOS process, what performs the Processing of the data into Information? - ANSWER The computer 71. In the IPOS process, how is the information Output? - ANSWER Depending on what is needed by the user, the computer may output the information for the user by displaying words on the monitor, printing on paper or transmitting audio over speakers 72. What is hardware? - ANSWER The physical components of the computer. This includes all of the internal and external parts of a computer. 73. What is software? - ANSWER The programs and other operating information used by the computer. Software can be shared between computers when part of a network. 74. What is a network? - ANSWER A collection of computers and resources connected by various media so they can communicate with each other 75. What are users? - ANSWER The people who use the computer system 76. What is system software? - ANSWER Includes the operating system and all the utilities that enable the computer to function 77. What is application software? - ANSWER Includes programs that do real work for users (Word, Excel, etc) 78. Who were the earliest computer users? - ANSWER The engineers who built and programmed them 79. What has allowed computers to become easier to use for most users? - ANSWER GUI interfaces 80. What advantages do Networks provide? - ANSWER The ability to share information, share hardware such as a printer, and even share software. Cost savings can also be had due to resource sharing. 81. What is the most commonly used network protocol? - ANSWER TCP/IP, also referred to as a protocol stack 82. What is a network protocol? - ANSWER Provides the rules by which networks communicate with each other 83. What are the 4 major components of a computer? - ANSWER CPU, memory, I/O subsystem and bus 84. What does the CPU do? - ANSWER The device that not only executes your programs' instructions, but also commands the various components in the computer. 85. What does memory do? - ANSWER Stores the program(s) being executed and the data that each program is using 86. What does the I/O subsystem do? - ANSWER Includes all peripheral devices (input, output, storage, network) where storage consists of the long-term storage devices (disk drives, tape) 87. What does the bus do? - ANSWER The device that permits information to move between each component. The bus transfers data between computer components using hardware such as wires, optical fiber, or printed circuit boards with traces that electrically connect various components. The size, or width, of a bus indicates how much data, or bits, can be transmitted at one time. 88. What is a Bit? - ANSWER A single 0 or 1 89. What is a Byte? - ANSWER 8 bits 90. What is a Word? - ANSWER The typical size of a datum (commonly 32 or 64 bits) 91. What are some other Internal Components of a computer? - ANSWER Internal bays and slots that grip the internal components, bays (external openings) and ports that connect peripherals 92. What two components make up a CPU? - ANSWER The control unit (CU) and the arithmetic logic unit (ALU) 93. What does the control unit (CU) do? - ANSWER It retrieves the instructions and the raw data that is input, and coordinates or controls the sending of those instructions and data to the ALU 94. What does the arithmetic logic unit (ALU) do? - ANSWER It does the actual processing of the data, from mathematical calculations and logical operations (comparing values that can be numeric or alphabetical) to conversion of keyboard text entry to output display on your screen 95. What does the system clock do? - ANSWER It controls the speed at which instructions are processed 96. What is RAM? - ANSWER Short-term storage is most commonly random access memory like DRAM and SRAM. RAM is volatile, and can be written to and read from. 97. What is is static RAM (SRAM) - ANSWER It is bigger, faster, more expensive, used for cache memory. 98. What is dynamic RAM (DRAM) - ANSWER It is smaller, slower, less expensive, used for main memory. 99. What does random mean for RAM? - ANSWER Can access any location within the same amount of time. Does not have to be in order. 100. What is ROM? - ANSWER Retains its contents indefinitely and can only be read from. 101. What would 1 GB (~billion bytes) store? - ANSWER Roughly 1 billion bytes. Will store roughly 1 billion characters. Would store at least 1000 books (without pictures) 102. What would 1 KB store? - ANSWER We might store a block of memory in this size 103. What would 1 MB (~million byes) store? - ANSWER A small image or a large text file 104. What would 1 TB (~trillion bytes) store? - ANSWER A library of movies 105. What are peripheral devices? - ANSWER Components that are located outside the system unit, yet are connected physically or wirelessly to it. For input, this could be a keyboard, mouse, scanner, digital/web/video camera, or microphone. For output, this could include the monitor, printer or plotter, and speakers 106. What are Bays for a computer? - ANSWER They house CDs and DVDs. They are typically on the front of the system unit for easy access. 107. What are Slots for a computer? - ANSWER They allow you to insert wireless access cards, and other PC cards (such as camera cards). 108. What are Ports on a computer? - ANSWER They connect additional input, output, storage, and communication devices. 109. What describes a desktop computer? - ANSWER Designed for regular use in one physical location 110. What describes a laptop? - ANSWER Lightweight and portable 111. What describes a handheld computer? - ANSWER Come in a variety of forms, including tablets, smartphones, and MP3 players 112. When did the first generation of computers occur? - ANSWER Occurred between approximately the mid 1940s and the late 1950s 113. When did the second generation of computers occur? - ANSWER Took place from around 1959 until 1965 114. When did the third generation of computers occur? - ANSWER Lasted until the early 1970s 115. When did the fourth generation of computers occur? - ANSWER Approximately 1974, we are still in it.

Show more Read less
Institution
WGU C182
Course
WGU C182











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C182
Course
WGU C182

Document information

Uploaded on
July 23, 2025
Number of pages
89
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C182 FINAL EXAM PREP
2025/2026 ACTUAL QUESTIONS
WITH VERIFIED ACCURATE
ANSWERS || 100% ENDORSED
PASS>LATEST VERSION<




.
1. SELECT database operation - ANSWER✓ The selection operation takes rows from one
table and creates a new table.

2. Asterisk (*) database operation - ANSWER✓ The asterisk (*) means everything from
that table.

3. UNION database operation - ANSWER✓ The union operation combines distinct fields
from multiple tables that have the same set of attributes and data types.

,4. JOIN database operation - ANSWER✓ A join operation combines two tables, but records
are only appended when a matching criterion is met.

5. Data lake - ANSWER✓ A data lake is a system of data stored in raw format.
6. Application Software - ANSWER✓ Programs end users run to accomplish tasks.

7. Productivity Software - ANSWER✓ Application software used to aid in productivity. I.E.
Presentation software, word processor, spreadsheets.
8. Define OLTP - ANSWER✓ Sits on top of a database. Used for OnLine Transaction
Processing.

9. Define OLAP - ANSWER✓ Sits on top of a data warehouse. Introduces slicing, dicing,
drilling up or down and pivoting. Used for OnLine Analytical Processing.

10. Define Slicing as it relates to OLAP - ANSWER✓ It creates a subset of the data by
reducing the data from multiple dimensions to one dimension.

11. Define Dicing as it relates to OLAP - ANSWER✓ It is the same as slicing except that the
result can remain in multiple dimensions

12. Define drill down / drill up as it relates to OLAP - ANSWER✓ Drilling down provides
more detail and drilling up provides summarized data.

13. Define Pivot as it relates to OLAP - ANSWER✓ It rotates data to view the data from a
different perspective

14. What does OLDP do? - ANSWER✓ It deals with data in real time

15. What is Event Driven Processing? - ANSWER✓ It deals with data as it arrives

16. What is Batch Processing? - ANSWER✓ It deals with multiple pieces of data all at once

17. How does ODBC/JDBC work? - ANSWER✓ They work with Database Drivers and sit
between the database and the application.

18. What does ODBC/JDBC do? - ANSWER✓ It translates commands from the application
into queries for the database

19. What order do Project Phases go in? - ANSWER✓ Initiation, Planning, Executing,
Monitoring, Closure

20. What occurs during the Initiation Phase? - ANSWER✓ Problem Definition, Resource
Allocation and Risk Assessment.

,21. What occurs during the Planning Phase? - ANSWER✓ Define Activities, Organize
Activities, Time Estimation, Cost Estimation

22. What occurs during the Execution Phase? - ANSWER✓ Variance Reports, Status
Reports, Resource Allocation Reports

23. What occurs during the Closure Phase? - ANSWER✓ A final report is created detailing
the outcome of the project

24. What are some risks that can occur during a project? - ANSWER✓ Scope Creep,
Unnecessary Requirements, Cutting Corners, Overly Optimistic Time Frame, Improper
Skill Sets, User Resistance

25. What is SDLC? - ANSWER✓ A process for planning, creating, testing, and deploying
information systems

26. What is the Preliminary Investigation step in SDLC? - ANSWER✓ You assess the
feasibility of the proposed project and select a development methodology. Expected costs
and benefits of this new system are estimated as well.

27. What is the Analysis step in SDLC? - ANSWER✓ You determine the user requirements
for the new system and develop logical models of the system. End users' needs (how data
will be captured and entered into the system by the users) are also gathered. Security
concerns should be addressed here as well.

28. What is the Logical Design step in SDLC? - ANSWER✓ You revise the logical models
to ensure that the new system will meet the user requirements identified

29. What is the Physical Design step in SDLC? - ANSWER✓ Logical models are converted
into physical models. They are now more complete and may include network maps and
descriptions of servers and other devices



30. System Software - ANSWER✓ Consists of programs that make up the OS and directly
support system itself.
**Includes services or DAEMONS

31. Server Software - ANSWER✓ Works with hardware to provide network service.

32. Local Application - ANSWER✓ Software stored on an individual computer.

33. Intranet - ANSWER✓ A LAN that uses IP. Used to communicate within organization.

, 34. Cloud Computing - ANSWER✓ Allows organization to access resources/app anywhere,
anytime. Beneficial because an org. may access resources it may not normally have.

35. Operating Systems - ANSWER✓ Allows a user to easily access hardware/software,
required to maintain computer environment.

36. Virtual Machine - ANSWER✓ Allows access to multiple machines without having to
purchase multiple computers.
Also allows user to run software for a computer that normally would not be able to run
that software.

37. Network Server - ANSWER✓ Dedicated, high performance computer with large hard
disk drives. It may be in a cabinet so multiple servers can be housed.
**Stand alone computer, not a desktop.

38. Information Security Assurance Goals - ANSWER✓ "CIA"
Confidentiality
Integrity
Availability

39. IAS Confidentiality - ANSWER✓ Requires data be kept secure so that it does not fall to
unauthorized users.
It goes beyond security measures and extends to policies.
Security measures should extend beyond network. A stolen laptop should not violate
confidentiality.

40. IAS Integrity - ANSWER✓ Requires data are correct.
Requires 3 different efforts:
Data gathering should include an accuracy component.
Data must be entered into system accurately.
Once data is in dB, changes made will leave a record of when the change was made and
by whom.

41. IAS Availability - ANSWER✓ Requires data/information be available when needed.

42. Steps of Strategic Risk Analysis - ANSWER✓ 1.Identify organization information assets.
2. Identify vulnerabilities.
3.Identify threats.
4.Implement policies.

43. What is the database administrator's role in security?
a. To eliminate data redundancy when integrating old with new systems
b. To institute protocols to protect the databases from external threats
c. To set ports on the router to secure the transport of data

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DocBritiney Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
9 months
Number of followers
1
Documents
46
Last sold
1 week ago
DOCBRITINEY

Get comprehensive solutions for all subjects, covering both assignments and major exams. Reach out if you need any help. Best of luck! I provide clear, well-researched educational materials with expertise in Nursing, Mathematics, Psychology, Biology, and more. My resources include up-to-date exam solutions, verified study guides, and notes—100% guaranteed.

4,0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions