Questions and Answers with Complete
Solutions
First users were the engineers who built and programmed computers, then employees
who had received specialized training were users, and now today, anyone and
everyone can be a user. - Correct Answer- Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within one
location/site. Support both application software and data files. - Correct Answer- FILE
SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network. - Correct Answer- Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption -
Correct Answer- Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what
you have! - Correct Answer- Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER
from the underlying logic of the systems as well as the underlying data structures -
Correct Answer- Presentation Tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3. End
User Training - Correct Answer- System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect computers
to a network; will relay messages to computers with APPROPRIATE IP ADDRESS -
Correct Answer- ROUTER
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users - Correct Answer- Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA ))) - Correct Answer- Defense
in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of
the application - Correct Answer- THE MODEL
, Creates a subset of the data by reducing the data from multiple dimensions to one
dimension - Correct Answer- Slicing Data
The technology used in creating, maintaining, and making information accessible. -
Correct Answer- Information Technology
In charge of all aspects of the COMPUTER NETWORKS - Correct Answer- Network
Administrator
Focuses on the design, development, and support of DATABASE MANAGEMENT
systems (DBMSs). - Correct Answer- Database Administrator
Installs, configures, maintains, secures, and troubleshoots web severs - Correct
Answer- Web Administrator
Processed data. - Correct Answer- Information
INFORMATION THAT HAS BEEN PUT TO USE information placed into a context.
Refined information such that the user of the knowledge is able to call forth only
relevant portions of information when needed. - Correct Answer- Knowledge in DIKW
Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY )))
Can only come by having BOTH KNOWLEDGE and EXPERIENCE - Correct Answer-
WISDOM
The INPUT Processing, OUTPUT, STORAGE Cycle - Correct Answer- I.P.O.S.
Raw data is organized or structured for usefulness. - Correct Answer- PROCESSED
DATA
Information is output so user can see results. - Correct Answer- OUTPUT DATA
Processed information is stored for permanent record. - Correct Answer- STORAGE
A collection of components that work together to meet the needs of the user; typically :
CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS -
Correct Answer- COMPUTER SYSTEM
Physical components of a computer system which include the system unit and its
components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER -
Correct Answer- HARDWARE
A collection of computers and resources CONNECTED by various media so that they
can COMMUNICATE WITH EACH OTHER. - Correct Answer- NETWORK