WGU C182 Objective Assessment Correct Questions and
Answers 2026
First users were the engineers who built and programmed computers, then employees who had
received specialized training were users, and now today, anyone and everyone can be a user. -
Correct Answer Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within one
location/site. Support both application software and data files. - Correct Answer FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like
((( 70.42.251.42 ))) that computers use to identify each other on the network. - Correct Answer
Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption - Correct
Answer Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what you have! -
Correct Answer Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the
underlying logic of the systems as well as the underlying data structures - Correct Answer
Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training
- Correct Answer System Deployment
, CONNECTS MULTIPLES networks together; can be used to directly connect computers to a
network; will relay messages to computers with APPROPRIATE IP ADDRESS - Correct Answer
ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or obtained by
unauthorized users - Correct Answer Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - Correct Answer Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in certain
instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application -
Correct Answer THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one dimension -
Correct Answer Slicing Data
The technology used in creating, maintaining, and making information accessible. - Correct
Answer Information Technology
In charge of all aspects of the COMPUTER NETWORKS - Correct Answer Network Administrator
Focuses on the design, development, and support of DATABASE MANAGEMENT systems
(DBMSs). - Correct Answer Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs - Correct Answer Web
Administrator
Processed data. - Correct Answer Information
Answers 2026
First users were the engineers who built and programmed computers, then employees who had
received specialized training were users, and now today, anyone and everyone can be a user. -
Correct Answer Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within one
location/site. Support both application software and data files. - Correct Answer FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like
((( 70.42.251.42 ))) that computers use to identify each other on the network. - Correct Answer
Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption - Correct
Answer Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what you have! -
Correct Answer Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the
underlying logic of the systems as well as the underlying data structures - Correct Answer
Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End User Training
- Correct Answer System Deployment
, CONNECTS MULTIPLES networks together; can be used to directly connect computers to a
network; will relay messages to computers with APPROPRIATE IP ADDRESS - Correct Answer
ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or obtained by
unauthorized users - Correct Answer Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - Correct Answer Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in certain
instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application -
Correct Answer THE MODEL
Creates a subset of the data by reducing the data from multiple dimensions to one dimension -
Correct Answer Slicing Data
The technology used in creating, maintaining, and making information accessible. - Correct
Answer Information Technology
In charge of all aspects of the COMPUTER NETWORKS - Correct Answer Network Administrator
Focuses on the design, development, and support of DATABASE MANAGEMENT systems
(DBMSs). - Correct Answer Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs - Correct Answer Web
Administrator
Processed data. - Correct Answer Information