COMPREHENSIVE COURSE EXAM PREPARATION WITH
EXTENSIVE UPDATED CONTENT AND IN-DEPTH CONCEPT
REVIEW SUPPORT || REAL WGU-STYLE QUESTIONS WITH
FULLY VERIFIED, DETAILED, ACCURATE ANSWERS LATEST
EDITION || ELITE A+ PREMIUM QUALITY GUARANTEED
What is the definition of information technology - THE CORRECT
ANSWER –It is the technology used to create, maintain, and make information
accessible.
First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user. - THE CORRECT ANSWER -
Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within
one location/site. Support both application software and data files. - THE
CORRECT ANSWER - FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol
(IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on
the network. - THE CORRECT ANSWER - Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and
decryption - THE CORRECT ANSWER - Public Key Encryption
PROVING you are who you say you are which can be done by: what you know,
what you have! - THE CORRECT ANSWER - Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE
USER from the underlying logic of the systems as well as the underlying data
structures - THE CORRECT ANSWER - Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation
3. End User Training - THE CORRECT ANSWER - System Deployment
,CONNECTS MULTIPLES networks together; can be used to directly connect
computers to a network; will relay messages to computers with APPROPRIATE
IP ADDRESS - THE CORRECT ANSWER - ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - THE CORRECT ANSWER -
Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - THE
CORRECT ANSWER - Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the
application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application - THE CORRECT ANSWER -
THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one
dimension - THE CORRECT ANSWER - Slicing Data
The technology used in creating, maintaining, and making information
accessible. - THE CORRECT ANSWER - Information Technology
In charge of all aspects of the COMPUTER NETWORKS - THE CORRECT
ANSWER - Network Administrator
Focuses on the design, development, and support of DATABASE
MANAGEMENT systems (DBMSs). - THE CORRECT ANSWER -
Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs - THE
CORRECT ANSWER - Web Administrator
Processed data. - THE CORRECT ANSWER - Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a
context. Refined information such that the user of the knowledge is able to call
forth only relevant portions of information when needed. - THE CORRECT
ANSWER - Knowledge in DIKW
,Provides a social setting to knowledge; AN UNDERSTANDING OF THE (((
WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE -
THE CORRECT ANSWER - WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle - THE CORRECT
ANSWER - I.P.O.S.
Raw data is organized or structured for usefulness. - THE CORRECT
ANSWER - PROCESSED DATA
Information is output so user can see results. - THE CORRECT ANSWER
- OUTPUT DATA
Processed information is stored for permanent record. - THE CORRECT
ANSWER - STORAGE
A collection of components that work together to meet the needs of the user;
typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE,
NETWORKS AND USERS - THE CORRECT ANSWER - COMPUTER
SYSTEM
Physical components of a computer system which include the system unit and its
components and peripheral devices; TANGIBLE ASPECTS OF THE
COMPUTER - THE CORRECT ANSWER - HARDWARE
A collection of computers and resources CONNECTED by various media so that
they can COMMUNICATE WITH EACH OTHER. - THE CORRECT
ANSWER - NETWORK
Systems Software and Applications Software - THE CORRECT ANSWER
- SOFTWARE CATEGORIES
RULES provided by WHICH NETWORKS communicate with each other -
THE CORRECT ANSWER - IP PROTOCOL
STORES the programs BEING EXECUTED and the data they are using. - THE
CORRECT ANSWER - COMPUTER MEMORY
, Controls THE SPEED at which instructions are processed. - THE CORRECT
ANSWER - SYSTEM CLOCK
Stands for Random Access Memory. It temporarily stores data before it is
processed and sent to your screen or printer. IT IS VOLATILE (means data or
information stored disappears when the computer is turned off or loses power). -
THE CORRECT ANSWER - RAM
Transistor components, magnetic core memory, smaller size, easier to program,
disk drives and drums, called mainframe computers - THE CORRECT
ANSWER - 2nd Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini
computers, networks introduced via dumb terminals - THE CORRECT
ANSWER - 3rd Generation of Computers
Written for a specific machine by the engineers who built and ran the computers;
no need for OS since only one program could run at a time - THE CORRECT
ANSWER - Low-level Language
Easier than machine but still required detailed, precise LOW LEVEL instructions
- THE CORRECT ANSWER - Assembly Language
Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source
code and convert it to another form; source code by itself cannot be read by a
computer - THE CORRECT ANSWER - Language Translator Programs
Programmer is limited to high level control constructs such as while loops, for
loops, and if/else statements and not allowed to use primitive GOTO statements
- THE CORRECT ANSWER - Structured Programming
A type of programming language for which most of its implementations
EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously
compiling a program into machine-language instructions. - THE CORRECT
ANSWER - Interpreted Language (Code)
Small programs that place Linux commands or DOS batch files into a file - THE
CORRECT ANSWER - Shell Scripting