Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

WGU C182 Objective Assessment

Puntuación
-
Vendido
-
Páginas
12
Grado
A+
Subido en
29-04-2024
Escrito en
2023/2024

First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user. - correct answer Evolution of Users Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files. - correct answer FILE SERVER Turns a user-friendly domain name, like G, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network. - correct answer Domain Name Server (DNS) Uses TWO KEYS a public and private key for performing encryption and decryption - correct answer Public Key Encryption PROVING you are who you say you are which can be done by: what you know, what you have! - correct answer Authentication TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures - correct answer Presentation Tier SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training - correct answer System Deployment CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS - correct answer ROUTER Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users - correct answer Confidentiality Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - correct answer Defense in Depth Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application - correct answer THE MODEL Creates a subset of the data by reducing the data from multiple dimensions to one dimension - correct answer Slicing Data The technology used in creating, maintaining, and making information accessible. - correct answer Information Technology In charge of all aspects of the COMPUTER NETWORKS - correct answer Network Administrator Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs). - correct answer Database Administrator Installs, configures, maintains, secures, and troubleshoots web severs - correct answer Web Administrator Processed data. - correct answer Information INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed. - correct answer Knowledge in DIKW Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE - correct answer WISDOM The INPUT Processing, OUTPUT, STORAGE Cycle - correct answer I.P.O.S. Raw data is organized or structured for usefulness. - correct answer PROCESSED DATA Information is output so user can see results. - correct answer OUTPUT DATA Processed information is stored for permanent record. - correct answer STORAGE A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS - correct answer COMPUTER SYSTEM Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER - correct answer HARDWARE A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER. - correct answer NETWORK Systems Software and Applications Software - correct answer SOFTWARE CATEGORIES RULES provided by WHICH NETWORKS communicate with each other - correct answer IP PROTOCOL STORES the programs BEING EXECUTED and the data they are using. - correct answer COMPUTER MEMORY Controls THE SPEED at which instructions are processed. - correct answer SYSTEM CLOCK Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power). - correct answer RAM Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers - correct answer 2nd Generation of Computers Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals - correct answer 3rd Generation of Computers Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time - correct answer Low-level Language Easier than machine but still required detailed, precise LOW LEVEL instructions - correct answer Assembly Language Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer - correct answer Language Translator Programs Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements - correct answer Structured Programming A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions. - correct answer Interpreted Language (Code) Small programs that place Linux commands or DOS batch files into a file - correct answer Shell Scripting The computer that the user is using; physically present with - correct answer Local Computer Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers. - correct answer Network Hub Like a hub, but this will only send data that is INTENDED FOR SPECIFIC COMPUTER - correct answer Network Switch Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable - correct answer Wireless Access Point Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers - correct answer Client-server Network Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet. - correct answer Web Server Monitors print jobs - correct answer Print Server Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server. - correct answer FTP Server Devices connected along a SINGLE CABLE Size of network is restricted - correct answer Bus Network Each device is connected to a CENTRAL DEVICE such as a hub or switch. - correct answer Star Network Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached. - correct answer Ring Network Every device is connected directly to every other device in the network. - correct answer Mesh Network Identifies the server on which the web page can be found - correct answer Domain Name Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page - correct answer TLD (Top Level Domain) Name Exam: .edu .net . gov .org Indicates the name of the file you are accessing, or the location of the document on the server - correct answer Resource/ Filename ID Confidentiality, Integrity, Availability - correct answer CIA 1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked - correct answer Data Integrity Efforts 1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats - correct answer Risk Management & Strategic Risk Analysis An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows

Mostrar más Leer menos
Institución
WGU C182
Grado
WGU C182









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C182
Grado
WGU C182

Información del documento

Subido en
29 de abril de 2024
Número de páginas
12
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$12.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
rickysparkyy

Conoce al vendedor

Seller avatar
rickysparkyy Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
2 año
Número de seguidores
0
Documentos
843
Última venta
1 mes hace
Ricky sparky

Ace Your Exams with Our Comprehensive Exam Documents and Answers! Struggling with exam preparation? Look no further! Our expertly crafted exam documents come complete with accurate answers, helping you study efficiently and effectively. Each document is designed to cover key topics, provide clear explanations, and offer insightful answers to typical exam questions. Perfect for students aiming to excel, our materials are regularly updated to align with the latest curriculum standards. **Why Choose Us?** - Accurate and Reliable: Verified answers you can trust. - Comprehensive Coverage: Detailed documents covering all major topics. - Time-Saving: Study smarter, not harder. - User-Friendly Format: Easy to navigate and understand. Achieve academic success with our top-notch study aids. Get started today and ace your exams with confidence! Feel free to modify it to better fit your specific offerings!

Lee mas Leer menos
0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes