( 2025/2026) WGU C182 OBJECTIVE ASSESSMENT
EXAM LATEST
- WGU C182 OBJECTIVE ASSESSMENT REAL EXAM
150 QUESTIONS AND ANSWERS PASSED
WITH A+
which form of cloud computing enables teams of developers to quickly and reliably
develop and deliver applications by accessing the same environment in real-time. -
--VERIFIED SOLUTION--Paas or Platform as a Service
Which cloud service provides all the resources (servers, data storage) tha an IT dept
needs ouside of the org making them accessible by anyone, anywhere - --VERIFIED
SOLUTION--IaaS or Infrastructure as a Service
First users were the engineers who built and programmed computers, then employees
who had received specialized training were users, and now today, anyone and
everyone can be a user. - --VERIFIED SOLUTION--Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within one
location/site. Support both application software and data files. - --VERIFIED
SOLUTION--FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network. - --VERIFIED SOLUTION--Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption - --
VERIFIED SOLUTION--Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what
you have! - --VERIFIED SOLUTION--Authentication
,TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER
from the underlying logic of the systems as well as the underlying data structures - --
VERIFIED SOLUTION--Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End
User Training - --VERIFIED SOLUTION--System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect computers
to a network; will relay messages to computers with APPROPRIATE IP ADDRESS - --
VERIFIED SOLUTION--ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - --VERIFIED SOLUTION--Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - --VERIFIED SOLUTION--
Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of
the application - --VERIFIED SOLUTION--THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one
dimension - --VERIFIED SOLUTION--Slicing Data
The technology used in creating, maintaining, and making information accessible. - --
VERIFIED SOLUTION--Information Technology
In charge of all aspects of the COMPUTER NETWORKS - --VERIFIED SOLUTION--
Network Administrator
,Focuses on the design, development, and support of DATABASE MANAGEMENT
systems (DBMSs). - --VERIFIED SOLUTION--Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs - --VERIFIED
SOLUTION--Web Administrator
Processed data. - --VERIFIED SOLUTION--Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a context.
Refined information such that the user of the knowledge is able to call forth only
relevant portions of information when needed. - --VERIFIED SOLUTION--Knowledge
in DIKW
Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY )))
Can only come by having BOTH KNOWLEDGE and EXPERIENCE - --VERIFIED
SOLUTION--WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle - --VERIFIED SOLUTION--I.P.O.S.
Raw data is organized or structured for usefulness. - --VERIFIED SOLUTION--
PROCESSED DATA
Information is output so user can see results. - --VERIFIED SOLUTION--OUTPUT
DATA
Processed information is stored for permanent record. - --VERIFIED SOLUTION--
STORAGE
A collection of components that work together to meet the needs of the user; typically :
CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS -
--VERIFIED SOLUTION--COMPUTER SYSTEM
Physical components of a computer system which include the system unit and its
components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER - --
VERIFIED SOLUTION--HARDWARE
, A collection of computers and resources CONNECTED by various media so that they
can COMMUNICATE WITH EACH OTHER. - --VERIFIED SOLUTION--NETWORK
Systems Software and Applications Software - --VERIFIED SOLUTION--SOFTWARE
CATEGORIES
RULES provided by WHICH NETWORKS communicate with each other - --VERIFIED
SOLUTION--IP PROTOCOL
STORES the programs BEING EXECUTED and the data they are using. - --VERIFIED
SOLUTION--COMPUTER MEMORY
Controls THE SPEED at which instructions are processed. - --VERIFIED SOLUTION--
SYSTEM CLOCK
Stands for Random Access Memory. It temporarily stores data before it is processed
and sent to your screen or printer. IT IS VOLATILE (means data or information stored
disappears when the computer is turned off or loses power). - --VERIFIED
SOLUTION--RAM
Transistor components, magnetic core memory, smaller size, easier to program, disk
drives and drums, called mainframe computers - --VERIFIED SOLUTION--2nd
Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers,
networks introduced via dumb terminals - --VERIFIED SOLUTION--3rd Generation of
Computers
Written for a specific machine by the engineers who built and ran the computers; no
need for OS since only one program could run at a time - --VERIFIED SOLUTION--
Low-level Language
EXAM LATEST
- WGU C182 OBJECTIVE ASSESSMENT REAL EXAM
150 QUESTIONS AND ANSWERS PASSED
WITH A+
which form of cloud computing enables teams of developers to quickly and reliably
develop and deliver applications by accessing the same environment in real-time. -
--VERIFIED SOLUTION--Paas or Platform as a Service
Which cloud service provides all the resources (servers, data storage) tha an IT dept
needs ouside of the org making them accessible by anyone, anywhere - --VERIFIED
SOLUTION--IaaS or Infrastructure as a Service
First users were the engineers who built and programmed computers, then employees
who had received specialized training were users, and now today, anyone and
everyone can be a user. - --VERIFIED SOLUTION--Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within one
location/site. Support both application software and data files. - --VERIFIED
SOLUTION--FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network. - --VERIFIED SOLUTION--Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption - --
VERIFIED SOLUTION--Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what
you have! - --VERIFIED SOLUTION--Authentication
,TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER
from the underlying logic of the systems as well as the underlying data structures - --
VERIFIED SOLUTION--Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End
User Training - --VERIFIED SOLUTION--System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect computers
to a network; will relay messages to computers with APPROPRIATE IP ADDRESS - --
VERIFIED SOLUTION--ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - --VERIFIED SOLUTION--Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - --VERIFIED SOLUTION--
Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of
the application - --VERIFIED SOLUTION--THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one
dimension - --VERIFIED SOLUTION--Slicing Data
The technology used in creating, maintaining, and making information accessible. - --
VERIFIED SOLUTION--Information Technology
In charge of all aspects of the COMPUTER NETWORKS - --VERIFIED SOLUTION--
Network Administrator
,Focuses on the design, development, and support of DATABASE MANAGEMENT
systems (DBMSs). - --VERIFIED SOLUTION--Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs - --VERIFIED
SOLUTION--Web Administrator
Processed data. - --VERIFIED SOLUTION--Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a context.
Refined information such that the user of the knowledge is able to call forth only
relevant portions of information when needed. - --VERIFIED SOLUTION--Knowledge
in DIKW
Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY )))
Can only come by having BOTH KNOWLEDGE and EXPERIENCE - --VERIFIED
SOLUTION--WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle - --VERIFIED SOLUTION--I.P.O.S.
Raw data is organized or structured for usefulness. - --VERIFIED SOLUTION--
PROCESSED DATA
Information is output so user can see results. - --VERIFIED SOLUTION--OUTPUT
DATA
Processed information is stored for permanent record. - --VERIFIED SOLUTION--
STORAGE
A collection of components that work together to meet the needs of the user; typically :
CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS -
--VERIFIED SOLUTION--COMPUTER SYSTEM
Physical components of a computer system which include the system unit and its
components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER - --
VERIFIED SOLUTION--HARDWARE
, A collection of computers and resources CONNECTED by various media so that they
can COMMUNICATE WITH EACH OTHER. - --VERIFIED SOLUTION--NETWORK
Systems Software and Applications Software - --VERIFIED SOLUTION--SOFTWARE
CATEGORIES
RULES provided by WHICH NETWORKS communicate with each other - --VERIFIED
SOLUTION--IP PROTOCOL
STORES the programs BEING EXECUTED and the data they are using. - --VERIFIED
SOLUTION--COMPUTER MEMORY
Controls THE SPEED at which instructions are processed. - --VERIFIED SOLUTION--
SYSTEM CLOCK
Stands for Random Access Memory. It temporarily stores data before it is processed
and sent to your screen or printer. IT IS VOLATILE (means data or information stored
disappears when the computer is turned off or loses power). - --VERIFIED
SOLUTION--RAM
Transistor components, magnetic core memory, smaller size, easier to program, disk
drives and drums, called mainframe computers - --VERIFIED SOLUTION--2nd
Generation of Computers
Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers,
networks introduced via dumb terminals - --VERIFIED SOLUTION--3rd Generation of
Computers
Written for a specific machine by the engineers who built and ran the computers; no
need for OS since only one program could run at a time - --VERIFIED SOLUTION--
Low-level Language