WGU C182 Objective Assessment Exam
Questions And Correct Answers| Get It
Correct !!!
First users were the engineers who built and
programmed computers, then employees who had
received specialized training were users, and now today,
anyone and everyone can be a user. -
Correct Answers-
Evolution of Users
Sends files over the network at the request of clients.
Responds over LAN, within one location/site. Support
both application software and data files. -
Correct Answers-
FILE SERVER
Turns a user-friendly domain name, like Google.com,
into an Internet Protocol (IP) address like
((( 70.42.251.42 ))) that computers use to identify each
other on the network. -
Correct Answers-
Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing
encryption and decryption -
Correct Answers-
Public Key Encryption
PROVING you are who you say you are which can be
done by: what you know, what you have! -
1
,Correct Answers-
Authentication
TIER WHERE THE USER interface for the system is
developed; SHIELDS THE USER from the underlying logic
of the systems as well as the underlying data structures -
Correct Answers-
Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2.
Final Documentation 3. End User Training -
Correct Answers-
System Deployment
CONNECTS MULTIPLES networks together; can be used
to directly connect computers to a network; will relay
messages to computers with APPROPRIATE IP ADDRESS -
Correct Answers-
ROUTER
Requires that data is KEPT secure so that they are not
accidentally provided or obtained by unauthorized users
-
Correct Answers-
Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) -
Correct Answers-
Defense in Depth
2
, Can take on DIFFERENT FORMS depending on the
complexity of the application; in certain instances, it is
AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application -
Correct Answers-
THE MODEL
Creates a subset of the data by reducing the data from
multiple dimensions to one dimension -
Correct Answers-
Slicing Data
The technology used in creating, maintaining, and
making information accessible. -
Correct Answers-
Information Technology
In charge of all aspects of the COMPUTER NETWORKS -
Correct Answers-
Network Administrator
Focuses on the design, development, and support of
DATABASE MANAGEMENT systems (DBMSs). -
Correct Answers-
Database Administrator
Installs, configures, maintains, secures, and
troubleshoots web severs -
Correct Answers-
Web Administrator
3
Questions And Correct Answers| Get It
Correct !!!
First users were the engineers who built and
programmed computers, then employees who had
received specialized training were users, and now today,
anyone and everyone can be a user. -
Correct Answers-
Evolution of Users
Sends files over the network at the request of clients.
Responds over LAN, within one location/site. Support
both application software and data files. -
Correct Answers-
FILE SERVER
Turns a user-friendly domain name, like Google.com,
into an Internet Protocol (IP) address like
((( 70.42.251.42 ))) that computers use to identify each
other on the network. -
Correct Answers-
Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing
encryption and decryption -
Correct Answers-
Public Key Encryption
PROVING you are who you say you are which can be
done by: what you know, what you have! -
1
,Correct Answers-
Authentication
TIER WHERE THE USER interface for the system is
developed; SHIELDS THE USER from the underlying logic
of the systems as well as the underlying data structures -
Correct Answers-
Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2.
Final Documentation 3. End User Training -
Correct Answers-
System Deployment
CONNECTS MULTIPLES networks together; can be used
to directly connect computers to a network; will relay
messages to computers with APPROPRIATE IP ADDRESS -
Correct Answers-
ROUTER
Requires that data is KEPT secure so that they are not
accidentally provided or obtained by unauthorized users
-
Correct Answers-
Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) -
Correct Answers-
Defense in Depth
2
, Can take on DIFFERENT FORMS depending on the
complexity of the application; in certain instances, it is
AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application -
Correct Answers-
THE MODEL
Creates a subset of the data by reducing the data from
multiple dimensions to one dimension -
Correct Answers-
Slicing Data
The technology used in creating, maintaining, and
making information accessible. -
Correct Answers-
Information Technology
In charge of all aspects of the COMPUTER NETWORKS -
Correct Answers-
Network Administrator
Focuses on the design, development, and support of
DATABASE MANAGEMENT systems (DBMSs). -
Correct Answers-
Database Administrator
Installs, configures, maintains, secures, and
troubleshoots web severs -
Correct Answers-
Web Administrator
3