john
WGU C182 Objective Assessment ( Latest 2023 – 2024 )
All New Qs & As for A++ Exam - Pass Guaranteed!
1. First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today, anyone
and everyone can be a user.
Answer: Evolution of Users
2. Sends files over the network at the request of clients. Responds over LAN,
within one location/site. Support both application software and datafiles.
Answer: FILE SERVER
3. Turns a user-friendly domain name, like Google.com, into an Internet Protocol
(IP) address like ((( 70.42.251.42 ))) that computers use to identifyeach other on
the network.
Answer: Domain Name Server (DNS)
4. Uses TWO KEYS a public and private key for performing encryption and
decryption
Answer: Public Key Encryption
5. PROVING you are who you say you are which can be done by: what youknow,
what you have!
Answer: Authentication
6. TIER WHERE THE USER interface for the system is developed; SHIELDS
THE USER from the underlying logic of the systems as well as the underlyingdata
structures
,john
Answer: Presentation Tier
7. SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documen-
tation 3. End User Training
Answer: System Deployment
8. CONNECTS MULTIPLES networks together; can be used to directly con- nect
computers to a network; will relay messages to computers with APPRO-PRIATE IP
ADDRESS
Answer: ROUTER
9. Requires that data is KEPT secure so that they are not accidentally pro-vided
or obtained by unauthorized users
Answer: Confidentiality
10. Protecting EVERY LAYER that SURROUNDS ((( DATA )))
Answer: Defense in Depth
11. Can take on DIFFERENT FORMS depending on the complexity of the
application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application
Answer: THE MODEL
12. Creates a subset of the data by reducing the data from multiple dimensions to
one dimension
Answer: Slicing Data
, john
13. The technology used in creating, maintaining, and making information
accessible.
Answer: Information Technology
14. In charge of all aspects of the COMPUTER NETWORKS
Answer: Network Administrator
15. Focuses on the design, development, and support of DATABASE MAN-
AGEMENT systems (DBMSs).
Answer: Database Administrator
16. Installs, configures, maintains, secures, and troubleshoots web severs
Answer: - Web Administrator
17. Processed data.
Answer: Information
18. INFORMATION THAT HAS BEEN PUT TO USE information placed into a
context. Refined information such that the user of the knowledge is able tocall forth
only relevant portions of information when needed.
Answer: Knowledge inDIKW
19. Provides a social setting to knowledge; AN UNDERSTANDING OF THE (((
WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE
Answer: -WISDOM
WGU C182 Objective Assessment ( Latest 2023 – 2024 )
All New Qs & As for A++ Exam - Pass Guaranteed!
1. First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today, anyone
and everyone can be a user.
Answer: Evolution of Users
2. Sends files over the network at the request of clients. Responds over LAN,
within one location/site. Support both application software and datafiles.
Answer: FILE SERVER
3. Turns a user-friendly domain name, like Google.com, into an Internet Protocol
(IP) address like ((( 70.42.251.42 ))) that computers use to identifyeach other on
the network.
Answer: Domain Name Server (DNS)
4. Uses TWO KEYS a public and private key for performing encryption and
decryption
Answer: Public Key Encryption
5. PROVING you are who you say you are which can be done by: what youknow,
what you have!
Answer: Authentication
6. TIER WHERE THE USER interface for the system is developed; SHIELDS
THE USER from the underlying logic of the systems as well as the underlyingdata
structures
,john
Answer: Presentation Tier
7. SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documen-
tation 3. End User Training
Answer: System Deployment
8. CONNECTS MULTIPLES networks together; can be used to directly con- nect
computers to a network; will relay messages to computers with APPRO-PRIATE IP
ADDRESS
Answer: ROUTER
9. Requires that data is KEPT secure so that they are not accidentally pro-vided
or obtained by unauthorized users
Answer: Confidentiality
10. Protecting EVERY LAYER that SURROUNDS ((( DATA )))
Answer: Defense in Depth
11. Can take on DIFFERENT FORMS depending on the complexity of the
application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application
Answer: THE MODEL
12. Creates a subset of the data by reducing the data from multiple dimensions to
one dimension
Answer: Slicing Data
, john
13. The technology used in creating, maintaining, and making information
accessible.
Answer: Information Technology
14. In charge of all aspects of the COMPUTER NETWORKS
Answer: Network Administrator
15. Focuses on the design, development, and support of DATABASE MAN-
AGEMENT systems (DBMSs).
Answer: Database Administrator
16. Installs, configures, maintains, secures, and troubleshoots web severs
Answer: - Web Administrator
17. Processed data.
Answer: Information
18. INFORMATION THAT HAS BEEN PUT TO USE information placed into a
context. Refined information such that the user of the knowledge is able tocall forth
only relevant portions of information when needed.
Answer: Knowledge inDIKW
19. Provides a social setting to knowledge; AN UNDERSTANDING OF THE (((
WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE
Answer: -WISDOM