Information Technology > QUESTIONS & ANSWERS > WGU C182 Objective Assessment Questions and answers, 2022. Graded A+ (All)

WGU C182 Objective Assessment Questions and answers, 2022. Graded A+

Document Content and Description Below

WGU C182 Objective Assessment Questions and answers, 2022. Graded A+ First users were the engineers who built and programmed computers, then employees who had received specialized training were u... sers, and now today, anyone and everyone can be a user. - ✔✔Evolution of Users Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files. - ✔✔FILE SERVER Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network. - ✔✔Domain Name Server (DNS) Uses TWO KEYS a public and private key for performing encryption and decryption - ✔✔Public Key Encryption PROVING you are who you say you are which can be done by: what you know, what you have! - ✔✔Authentication TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures - ✔✔Presentation Tier SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training - ✔✔System Deployment CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS - ✔✔ROUTER Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users - ✔✔Confidentiality Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - ✔✔Defense in Depth Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application - ✔✔THE MODEL Creates a subset of the data by reducing the data from multiple dimensions to one dimension - ✔✔Slicing Data The technology used in creating, maintaining, and making information accessible. - ✔✔Information Technology In charge of all aspects of the COMPUTER NETWORKS - ✔✔Network Administrator Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs). - ✔✔Database Administrator Installs, configures, maintains, secures, and troubleshoots web severs - ✔✔Web Administrator Processed data. - ✔✔Information INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed. - ✔✔Knowledge in DIKW Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE - ✔✔WISDOM The INPUT Processing, OUTPUT, STORAGE Cycle - ✔✔I.P.O.S. Raw data is organized or structured for usefulness. - ✔✔PROCESSED DATA Information is output so user can see results. - ✔✔OUTPUT DATA Processed information is stored for permanent record. - ✔✔STORAGE A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS - ✔✔COMPUTER SYSTEM Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER - ✔✔HARDWARE A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER. - ✔✔NETWORK Systems Software and Applications Software - ✔✔SOFTWARE CATEGORIES RULES provided by WHICH NETWORKS communicate with each other - ✔✔IP PROTOCOL STORES the programs BEING EXECUTED and the data they are using. - ✔✔COMPUTER MEMORY Controls THE SPEED at which instructions are processed. - ✔✔SYSTEM CLOCK Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power). - ✔✔RAM Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers - ✔✔2nd Generation of Computers Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals - ✔✔3rd Generation of Computers Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time - ✔✔Low-level Language Easier than machine but still required detailed, precise LOW LEVEL instructions - ✔✔Assembly Language Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer - ✔✔Language Translator Programs Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements - ✔✔Structured Programming A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions. - ✔✔Interpreted Language (Code) Small programs that place Linux commands or DOS batch files into a file - ✔✔Shell Scripting The computer that the user is using; physically present with - ✔✔Local Computer Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers. - ✔✔Network Hub Like a hub, but this will only send data that is INTENDED FOR SPECIFIC COMPUTER - ✔✔Network Switch Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable - ✔✔Wireless Access Point Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers - ✔✔Client-server Network Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet. - ✔✔Web Server Monitors print jobs - ✔✔Print Server Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server. - ✔✔FTP Server Devices connected along a SINGLE CABLE Size of network is restricted - ✔✔Bus Network Each device is connected to a CENTRAL DEVICE such as a hub or switch. - ✔✔Star Network Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached. - ✔✔Ring Network Every device is connected directly to every other device in the network. - ✔✔Mesh Network Identifies the server on which the web page can be found - ✔✔Domain Name Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page - ✔✔TLD (Top Level Domain) Name Exam: www.yourname.com .edu .net . gov .org Indicates the name of the file you are accessing, or the location of the document on the server - ✔✔Resource/ Filename ID Confidentiality, Integrity, Availability - ✔✔CIA 1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked - ✔✔Data Integrity Efforts 1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats - ✔✔Risk Management & Strategic Risk Analysis c First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user. - ✔✔Evolution of Users Sends files over the network at the request of clients. Responds over LAN, within one location/site. Support both application software and data files. - ✔✔FILE SERVER Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network. - ✔✔Domain Name Server (DNS) Uses TWO KEYS a public and private key for performing encryption and decryption - ✔✔Public Key Encryption PROVING you are who you say you are which can be done by: what you know, what you have! - ✔✔Authentication TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures - ✔✔Presentation Tier SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training - ✔✔System Deployment CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS - ✔✔ROUTER Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users - ✔✔Confidentiality Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - ✔✔Defense in Depth Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application - ✔✔THE MODEL Creates a subset of the data by reducing the data from multiple dimensions to one dimension - ✔✔Slicing Data The technology used in creating, maintaining, and making information accessible. - ✔✔Information Technology In charge of all aspects of the COMPUTER NETWORKS - ✔✔Network Administrator Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs). - ✔✔Database Administrator Installs, configures, maintains, secures, and troubleshoots web severs - ✔✔Web Administrator Processed data. - ✔✔Information INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed. - ✔✔Knowledge in DIKW Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE - ✔✔WISDOM The INPUT Processing, OUTPUT, STORAGE Cycle - ✔✔I.P.O.S. Raw data is organized or structured for usefulness. - ✔✔PROCESSED DATA Information is output so user can see results. - ✔✔OUTPUT DATA Processed information is stored for permanent record. - ✔✔STORAGE A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS - ✔✔COMPUTER SYSTEM Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER - ✔✔HARDWARE A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER. - ✔✔NETWORK Systems Software and Applications Software - ✔✔SOFTWARE CATEGORIES RULES provided by WHICH NETWORKS communicate with each other - ✔✔IP PROTOCOL STORES the programs BEING EXECUTED and the data they are using. - ✔✔COMPUTER MEMORY Controls THE SPEED at which instructions are processed. - ✔✔SYSTEM CLOCK Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power). - ✔✔RAM Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers - ✔✔2nd Generation of Computers Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals - ✔✔3rd Generation of Computers Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time - ✔✔Low-level Language Easier than machine but still required detailed, precise LOW LEVEL instructions - ✔✔Assembly Language Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer - ✔✔Language Translator Programs Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements - ✔✔Structured Programming A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions. - ✔✔Interpreted Language (Code) Small programs that place Linux commands or DOS batch files into a file - ✔✔Shell Scripting The computer that the user is using; physically present with - ✔✔Local Computer Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers. - ✔✔Network Hub Like a hub, but this will only send data that is INTENDED FOR SPECIFIC COMPUTER - ✔✔Network Switch Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable - ✔✔Wireless Access Point Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers - ✔✔Client-server Network Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet. - ✔✔Web Server Monitors print jobs - ✔✔Print Server Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server. - ✔✔FTP Server Devices connected along a SINGLE CABLE Size of network is restricted - ✔✔Bus Network Each device is connected to a CENTRAL DEVICE such as a hub or switch. - ✔✔Star Network Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached. - ✔✔Ring Network Every device is connected directly to every other device in the network. - ✔✔Mesh Network Identifies the server on which the web page can be found - ✔✔Domain Name Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page - ✔✔TLD (Top Level Domain) Name Exam: www.yourname.com .edu .net . gov .org Indicates the name of the file you are accessing, or the location of the document on the server - ✔✔Resource/ Filename ID Confidentiality, Integrity, Availability - ✔✔CIA 1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked - ✔✔Data Integrity Efforts 1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats - ✔✔Risk Management & Strategic Risk Analysis [Show More]

Last updated: 1 year ago

Preview 1 out of 12 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
72
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 26, 2022

Number of pages

12

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 2 years

313 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 26, 2022

Downloads

 0

Views

 72

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »

$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·