Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C724 Possible Questions and Answers(already graded)

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
30-03-2022
Geschreven in
2021/2022

Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6) Correct answer- Prob ID, Data Collection, Solution Generation, Solutions Test, Solution Selection, Solution Implementation Hard Data Network System Security Ecommerce (IS elements) Correct answer- Hardware and Software, Data Resource Mgmt, Network, Systems and Decisions, Security and Ethics, Ecommerce and Social Meida System that accepts input data and processes it into information as output Correct answer- Information System Information that have been organized to provide value to an organization Correct answer- Data Information systems accept _____ as input and process it into ______ as output. Correct answer- data,information The primary component categories that make up a Computer-based Information System (CBIS) Correct answer- (PPHSND) people, processes, hardware, software, networks, and data Utility Software Correct answer- Programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring Information systems specialists Correct answer- People who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel Transaction processing systems (TPS) Correct answer- This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing Management information systems (MIS) Correct answer- This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly Decision-support systems (DSS) Correct answer- This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends Executive information systems (EIS) Correct answer- This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends IS 4 pyramid Correct answer- TPS, MIS, DSS, EIS The IS function is _____ in structure and its success depends on its cooperation and relationship with the other functions in an organization Correct answer- Horizontal About one third of the IS management agenda is expected to change every _____ ______ , confirming the highly dynamic nature of the IS management function. Correct answer- Three years Example of IS helping HR Correct answer- Monthly payroll Playboys Produced Hotdogs Since Nutritionists Died (IS) Correct answer- People, processes, hardware, software, networks, and data Hotdogs Since Nutritionists Died (IT = Sub of IS) Correct answer- Hardware, software, networks and data Information Technology is a subset of ______ Correct answer- Information Systems HTTP Correct answer- Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the World Wide Web HTTPS Correct answer- Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and Web server FTP Correct answer- File Transfer Protocol = An unsecure method used to transfer files from one computer to another. SFTP Correct answer- Secure File Transfer Protocol = Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer DHCP Correct answer- Dynamic Host Configuration Protocol = A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network SMTP Correct answer- Simple Mail Transfer Protocol = One of several popular email protocols in use today (others include IMAP and POP3) SNMP Correct answer- Simple Network Management Protocol = Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status TELNET Correct answer- An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP) DNS Correct answer- Domain Name Service = Server-based service that translates human language Web address or URL into an IP address, which is used. LDAP Correct answer- Lightweight Directory Access Protocol = Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlookâs global address list and Microsoft Active Directory URL Correct answer- Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS Synchronous Correct answer- Communication occurs in real time, with their client using online chat or instant messaging Asynchronous Correct answer- Communication occurs at different times via bulletin boards, blogs, and streaming videos Major business functions by IS Correct answer- Accounting and Finance, HR, Prod and Ops, Sales and Marketing Accounting and Finance Correct answer- Accounts payable, receivable, budgeting, general ledgers, payroll, cash flow, financial transactions HR Correct answer- Recruiting and training, employee benefits and regulations management, employee records Prod and Ops Correct answer- Product life cycle, manufacturing, inventory management, quality control, research and development Sales and Marketing Correct answer- Sales analysis, set pricing, marketing mix, and product promotions, customer profiling Which business function is responsible for Quality Control? Correct answer- Prod and Ops IT Mgmt Challenges Correct answer- Political and Legal Pressures, Cultural Pressures, Technological Pressures, Economic Pressures Types of computers Correct answer- PC, Workstation (more than 1 person), Server (printers, fax), Mainframe (high performance to process large data), Supercomputer (simulating weather patters, decoding genome structures), Grid computing (supercomputer for many smaller systems connected), Virtual Document camera Correct answer- Real-time image capture for displaying an object to a large audience SDLC (Software Development Life Cycle) Correct answer- Traditional method to develop software JAD (Joint application design) Correct answer- Methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops _____ sessions RAD (Rapid application development) Correct answer- Iterative alternative to the conventional waterfall model of software development CASE (computer-aided software engineering) Correct answer- Allows designers, code writers, testers, planners, and managers to share a common view of where a project stands at each stage of development. Helps ensure a disciplined, check-pointed process. EUD (End-user development) / EUP (End-user programs) Correct answer- Refers to activities and tools that allow end-users - people who are not professional software developers - to program computers Object-oriented systems development Correct answer- Uses the object as the unit of design, and is based on the concepts of class and inheritance. For example, numerous automobiles belong to the class of automobiles, and numerous trucks belong to the class of trucks, but both inherit the property of vehicle from the vehicle class Structured systems models Correct answer- Methodical and process-oriented, moving from the general level to the specific level through a series of processes Data Mart Correct answer- Subset of the data warehouse that is usually oriented to a specific business line or team Data Warehouse Correct answer- Central libraries of data that are combined from one or more sources and organized by subject to support organizational managers ODS (Operational data store) Correct answer- Database designed to integrate data from multiple sources for additional operations on the data. Unlike a master data store the data is not passed back to operational systems. It may be passed for further operations and to the data warehouse for reporting Secondary data Correct answer- Type of quantitative data that has already been collected by someone else for a different purpose to yours. For example, this could mean using: data collected by a hotel on its customers through its guest history system Data tuple (THU_PL) Correct answer- In the Relational Model, is a set of named and typed values. The nearest equivalent in SQL is a "row". MDX (Multidimensional Expressions) Correct answer- Language provides a specialized syntax for querying and manipulating the multidimensional data stored in OLAP cubes OLAP (online analytical processing) Correct answer- Databases containing data that are used for making decisions OLTP (online transaction processing) Correct answer- Database design used for browsing and manipulating business transaction activity Flat file database Correct answer- Model that resembles file cabinet functionality Relational database Correct answer- Connects tables of records together with complex relationships. Hierarchical database Correct answer- Connects tables in a master/slave1, leader/follower, or primary/replica format. Object-oriented database Correct answer- Database that subscribes to a model with information represented by objects Analytical database Correct answer- Read-only system that stores historical data on business metrics such as sales performance and inventory levels Primary Data Correct answer- Data observed or collected directly from first-hand experience Primary key Correct answer- In a relational database that is unique for each record Foreign key Correct answer- Column or set of columns in one table whose values must have matching values in the primary key of another (or the same) table Clickstream analysis Correct answer- Collecting, analyzing, and reporting aggregate data about which pages visitors visit in what order - which are the result of the succession of mouse clicks each visitor makes Primary reason to convert to IPv6? Correct answer- Increase number of IP addresses Wardriving Correct answer- Act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA) Defeat wardriving Correct answer- Hide SSID Information asymmetry Correct answer- Study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions, which can sometimes cause the transactions to go awry, a kind of market failure in the worst case Digital Market Correct answer- Allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change Token Ring Correct answer- Network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time Bus topology Correct answer- Each node is connected to a single cable, by the help of interface connectors Star topology Correct answer- Each network host is connected to a central hub with a point-to-point connection Ring topology Correct answer- Connected in a circular fashion and data travels in one direction Mesh topology Correct answer- In the full topology, each workstation is connected directly to each of the others. In the partial topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data Point to Point topology Correct answer- Direct link between two computers Tree Topology Correct answer- Two or more star networks connected together. The central computers of the star networks are connected to a main bus (network of star networks) Wireless repeater Correct answer- Wireless internet extension Wireless access point Correct answer- Wired internet extention Wireless bridge Correct answer- Connects two wired networks together over Wi-Fi Access point client Correct answer- Machine wired to access point Bluetooth Correct answer- Wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[4]) TCP/IP (Transmission Control Protocol/Internet Protocol) Correct answer- Basic communication language or protocol of the Internet IEEE 802.11 Correct answer- Specifies an over-the-air interface between a wireless client and a base station or between two wireless clients VoIP Correct answer- Methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet Wired Equivalent Privacy (WEP) Correct answer- Wi-Fi security algorithm (64bit) - Retired 2002 Wi-Fi Protected Access (WPA) Correct answer- Wi-Fi security algorithm (256bit) - 2003 - 2006 Wi-Fi Protected Access II (WPA2) Correct answer- Latest algorithm - Mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) - 2006 SDLC Phases Correct answer- Analysis, Design, Implementation SDLC Analysis Phase Correct answer- Identify problems, determine requirements, analyze system needs SDLC Design Phase Correct answer- Designing the recommended system, Developing and documenting software SDLC Implementation Phase Correct answer- Testing and maintaining, Implementing and evaluating Elegant Terrific Outlaws Seized Lethal Penguins (SDLC - Feasibility study) Correct answer- Economic, Technical, Operational, Schedule, Legal, Political TCO (Economic Feasibility) Correct answer- Total Cost of Ownership Pseudocode Correct answer- Informal high-level description of the operating principle of a computer program or other algorithm Work Breakdown Structure (WBS) Correct answer- Broken down list of all deliverables showing what the customer will get at the end of a project. Unified Modeling Language (UML) Correct answer- Not a programming language. This is a graphical notation specifically for drawing diagrams of an object-oriented system Critical Path Method (CPM) Correct answer- Step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems On premises (private cloud) Correct answer- Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization Software as a service (SAAS) Correct answer- Software licensed and hosted on centralized or distributed servers that belong to a service provider Platform as a service (PAAS) Correct answer- A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services Infrastructure as a service (IAAS) Correct answer- A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications RAID (redundant array of independent disks; originally redundant array of inexpensive disks) Correct answer- Provides a way of storing the same data in different places (thus, redundantly) on multiple hard disks Service-oriented architecture (SOA) Correct answer- Architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network Rolling code (hopping code) Correct answer- Used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typical in garage door openers and keyless car entry systems Anti-Malware Correct answer- Detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU C724 Possible Questions and
Answers


Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6) Correct
answer- Prob ID, Data Collection, Solution Generation, Solutions Test, Solution
Selection, Solution Implementation

Hard Data Network System Security Ecommerce (IS elements) Correct answer-
Hardware and Software, Data Resource Mgmt, Network, Systems and Decisions,
Security and Ethics, Ecommerce and Social Meida

System that accepts input data and processes it into information as output Correct
answer- Information System

Information that have been organized to provide value to an organization Correct
answer- Data

Information systems accept _____ as input and process it into ______ as output.
Correct answer- data,information

The primary component categories that make up a Computer-based Information System
(CBIS) Correct answer- (PPHSND) people, processes, hardware, software, networks,
and data

Utility Software Correct answer- Programs perform periodic system maintenance
activities, such as virus detection, storage space consolidation, backup and recovery,
intrusion detection, and access authentication monitoring

Information systems specialists Correct answer- People who develop, operate, and
maintain the systems. Specialists include programmers, systems analysts, testers,
computer operators, and other managerial IS personnel

Transaction processing systems (TPS) Correct answer- This system tracks the flow of
daily routine transactions that are necessary to conduct business, such as payroll or
order processing

Management information systems (MIS) Correct answer- This system provides first
level managers with reports on current performance and historical records to help keep
an organization running smoothly

, Decision-support systems (DSS) Correct answer- This system provides modeling and
analytical tools that support middle to senior managers in all aspects of the decision
making process, when problems are unique, unstructured, and not easily specified in
advance, to project potential future trends

Executive information systems (EIS) Correct answer- This system supports senior
executives by providing important data in the form of graphs and charts to analyze and
identify long-term trends

IS 4 pyramid Correct answer- TPS, MIS, DSS, EIS

The IS function is _____ in structure and its success depends on its cooperation and
relationship with the other functions in an organization Correct answer- Horizontal

About one third of the IS management agenda is expected to change every _____
______ , confirming the highly dynamic nature of the IS management function. Correct
answer- Three years

Example of IS helping HR Correct answer- Monthly payroll

Playboys Produced Hotdogs Since Nutritionists Died (IS) Correct answer- People,
processes, hardware, software, networks, and data

Hotdogs Since Nutritionists Died (IT = Sub of IS) Correct answer- Hardware, software,
networks and data

Information Technology is a subset of ______ Correct answer- Information Systems

HTTP Correct answer- Hypertext Transfer Protocol is the communications protocol at
the foundation of all communication of the World Wide Web

HTTPS Correct answer- Hypertext Transfer Protocol Secure, which uses HTTP as well
as technologies such as Secure Socket Layer (SSL) and Transport Layer Security
(TLS) to encrypt and decrypt data between the user and Web server

FTP Correct answer- File Transfer Protocol = An unsecure method used to transfer files
from one computer to another.

SFTP Correct answer- Secure File Transfer Protocol = Much like HTTPS, SFTP uses
secure technologies, this time Secure Shell (SSH), to secure the connection for
transferring files from computer to computer

DHCP Correct answer- Dynamic Host Configuration Protocol = A DHCP server or
appropriately configured router automatically and temporarily assigns IP addresses to
DHCP-enabled systems on the network

Geschreven voor

Vak

Documentinformatie

Geüpload op
30 maart 2022
Aantal pagina's
10
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5226
Lid sinds
4 jaar
Aantal volgers
3570
Documenten
56078
Laatst verkocht
2 dagen geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

952 beoordelingen

5
453
4
167
3
174
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen