WGU C182/D322 INTRODUCTION TO IT
OBJECTIVE ASSESSMENT EXAM LATEST WITH
ACTUAL QUESTIONS AND CORRECT VERIFIED
ANSWERS ALREADY GRADED A+ 100%
GUARANTEED PASS!
First users were the engineers who built and
programmed computers, then employees who had
received specialized training were users, and now
today, anyone and everyone can be a user. -
.....ANSWER ...✔✔ Evolution of Users
Sends files over the network at the request of clients.
Responds over LAN, within one location/site. Support
both application software and data files. - .....ANSWER
...✔✔ FILE SERVER
Turns a user-friendly domain name, like Google.com,
into an Internet Protocol (IP) address like (((
70.42.251.42 ))) that computers use to identify each
other on the network. - .....ANSWER ...✔✔ Domain
Name Server (DNS)
,2|Page
Uses TWO KEYS a public and private key for
performing encryption and decryption - .....ANSWER
...✔✔ Public Key Encryption
PROVING you are who you say you are which can be
done by: what you know, what you have! - .....ANSWER
...✔✔ Authentication
TIER WHERE THE USER interface for the system is
developed; SHIELDS THE USER from the underlying logic
of the systems as well as the underlying data structures -
.....ANSWER ...✔✔ Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2.
Final Documentation 3. End User Training - .....ANSWER
...✔✔ System Deployment
CONNECTS MULTIPLES networks together; can be used
to directly connect computers to a network; will relay
messages to computers with APPROPRIATE IP ADDRESS -
.....ANSWER ...✔✔ ROUTER
Requires that data is KEPT secure so that they are not
accidentally provided or obtained by unauthorized
users - .....ANSWER ...✔✔ Confidentiality
,3|Page
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) -
.....ANSWER ...✔✔ Defense in Depth
Can take on DIFFERENT FORMS depending on the
complexity of the application; in certain instances, it is
AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application - .....ANSWER
...✔✔ THE MODEL
Creates a subset of the data by reducing the data from
multiple dimensions to one dimension - .....ANSWER
...✔✔ Slicing Data
The technology used in creating, maintaining, and
making information accessible. - .....ANSWER ...✔✔
Information Technology
In charge of all aspects of the COMPUTER NETWORKS -
.....ANSWER ...✔✔ Network Administrator
Focuses on the design, development, and support of
DATABASE MANAGEMENT systems (DBMSs). -
.....ANSWER ...✔✔ Database Administrator
, 4|Page
Installs, configures, maintains, secures, and troubleshoots
web severs - .....ANSWER ...✔✔ Web Administrator
Processed data. - .....ANSWER ...✔✔ Information
INFORMATION THAT HAS BEEN PUT TO USE
information placed into a context. Refined information
such that the user of the knowledge is able to call forth
only relevant portions of information when needed. -
.....ANSWER ...✔✔ Knowledge in DIKW
Provides a social setting to knowledge; AN
UNDERSTANDING OF THE ((( WHY ))) Can only come
by having BOTH KNOWLEDGE and EXPERIENCE -
.....ANSWER ...✔✔ WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle -
.....ANSWER ...✔✔ I.P.O.S.
Raw data is organized or structured for usefulness. -
.....ANSWER ...✔✔ PROCESSED DATA