WGU C182 Objective Assessment
Study online at https://quizlet.com/_93jl23
1. First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user.: Evolution of Users
2. Sends files over the network at the request of clients. Responds over
LAN, within one location/site. Support both application software and data
files.: FILE SERVER
3. Turns a user-friendly domain name, like Google.com, into an Internet Pro-
tocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each
other on the network.: Domain Name Server (DNS)
4. Uses TWO KEYS a public and private key for performing encryption and
decryption: Public Key Encryption
5. PROVING you are who you say you are which can be done by: what you
know, what you have!: Authentication
6. TIER WHERE THE USER interface for the system is developed; SHIELDS
THE USER from the underlying logic of the systems as well as the underlying
data structures: Presentation Tier
7. SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documenta-
tion 3. End User Training: System Deployment
8. CONNECTS MULTIPLES networks together; can be used to directly connect
computers to a network; will relay messages to computers with APPROPRI-
ATE IP ADDRESS: ROUTER
9. Requires that data is KEPT secure so that they are not accidentally provided
or obtained by unauthorized users: Confidentiality
10. Protecting EVERY LAYER that SURROUNDS ((( DATA ))): Defense in Depth
11. Can take on DIFFERENT FORMS depending on the complexity of the
application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application: THE MODEL
12. Creates a subset of the data by reducing the data from multiple dimensions
to one dimension: Slicing Data
13. The technology used in creating, maintaining, and making information
accessible.: Information Technology
14. In charge of all aspects of the COMPUTER NETWORKS: Network Adminis-
trator
15. Focuses on the design, development, and support of DATABASE MANAGE-
MENT systems (DBMSs).: Database Administrator
16. Installs, configures, maintains, secures, and troubleshoots web severs: -
Web Administrator
17. Processed data.: Information
1/8
, WGU C182 Objective Assessment
Study online at https://quizlet.com/_93jl23
18. INFORMATION THAT HAS BEEN PUT TO USE information placed into a
context. Refined information such that the user of the knowledge is able to call
forth only relevant portions of information when needed.: Knowledge in DIKW
19. Provides a social setting to knowledge; AN UNDERSTANDING OF THE (((
WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE: -
WISDOM
20. The INPUT Processing, OUTPUT, STORAGE Cycle: I.P.O.S.
21. Raw data is organized or structured for usefulness.: PROCESSED DATA
22. Information is output so user can see results.: OUTPUT DATA
23. Processed information is stored for permanent record.: STORAGE
24. A collection of components that work together to meet the needs of the
user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NET-
WORKS AND USERS: COMPUTER SYSTEM
25. Physical components of a computer system which include the system
unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE
COMPUTER: HARDWARE
26. A collection of computers and resources CONNECTED by various media
so that they can COMMUNICATE WITH EACH OTHER.: NETWORK
27. Systems Software and Applications Software: SOFTWARE CATEGORIES
28. RULES provided by WHICH NETWORKS communicate with each other: IP
PROTOCOL
29. STORES the programs BEING EXECUTED and the data they are using.: -
COMPUTER MEMORY
30. Controls THE SPEED at which instructions are processed.: SYSTEM
CLOCK
31. Stands for Random Access Memory. It temporarily stores data before it
is processed and sent to your screen or printer. IT IS VOLATILE (means data
or information stored disappears when the computer is turned off or loses
power).: RAM
32. Transistor components, magnetic core memory, smaller size, easier to
program, disk drives and drums, called mainframe computers: 2nd Generation
of Computers
33. Silicon chips (known as ICs - integrated circuits), reduced cost, called
mini computers, networks introduced via dumb terminals: 3rd Generation of
Computers
34. Written for a specific machine by the engineers who built and ran the com-
puters; no need for OS since only one program could run at a time: Low-level
Language
2/8
Study online at https://quizlet.com/_93jl23
1. First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user.: Evolution of Users
2. Sends files over the network at the request of clients. Responds over
LAN, within one location/site. Support both application software and data
files.: FILE SERVER
3. Turns a user-friendly domain name, like Google.com, into an Internet Pro-
tocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each
other on the network.: Domain Name Server (DNS)
4. Uses TWO KEYS a public and private key for performing encryption and
decryption: Public Key Encryption
5. PROVING you are who you say you are which can be done by: what you
know, what you have!: Authentication
6. TIER WHERE THE USER interface for the system is developed; SHIELDS
THE USER from the underlying logic of the systems as well as the underlying
data structures: Presentation Tier
7. SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documenta-
tion 3. End User Training: System Deployment
8. CONNECTS MULTIPLES networks together; can be used to directly connect
computers to a network; will relay messages to computers with APPROPRI-
ATE IP ADDRESS: ROUTER
9. Requires that data is KEPT secure so that they are not accidentally provided
or obtained by unauthorized users: Confidentiality
10. Protecting EVERY LAYER that SURROUNDS ((( DATA ))): Defense in Depth
11. Can take on DIFFERENT FORMS depending on the complexity of the
application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL
IMPLEMENTATION of the application: THE MODEL
12. Creates a subset of the data by reducing the data from multiple dimensions
to one dimension: Slicing Data
13. The technology used in creating, maintaining, and making information
accessible.: Information Technology
14. In charge of all aspects of the COMPUTER NETWORKS: Network Adminis-
trator
15. Focuses on the design, development, and support of DATABASE MANAGE-
MENT systems (DBMSs).: Database Administrator
16. Installs, configures, maintains, secures, and troubleshoots web severs: -
Web Administrator
17. Processed data.: Information
1/8
, WGU C182 Objective Assessment
Study online at https://quizlet.com/_93jl23
18. INFORMATION THAT HAS BEEN PUT TO USE information placed into a
context. Refined information such that the user of the knowledge is able to call
forth only relevant portions of information when needed.: Knowledge in DIKW
19. Provides a social setting to knowledge; AN UNDERSTANDING OF THE (((
WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE: -
WISDOM
20. The INPUT Processing, OUTPUT, STORAGE Cycle: I.P.O.S.
21. Raw data is organized or structured for usefulness.: PROCESSED DATA
22. Information is output so user can see results.: OUTPUT DATA
23. Processed information is stored for permanent record.: STORAGE
24. A collection of components that work together to meet the needs of the
user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NET-
WORKS AND USERS: COMPUTER SYSTEM
25. Physical components of a computer system which include the system
unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE
COMPUTER: HARDWARE
26. A collection of computers and resources CONNECTED by various media
so that they can COMMUNICATE WITH EACH OTHER.: NETWORK
27. Systems Software and Applications Software: SOFTWARE CATEGORIES
28. RULES provided by WHICH NETWORKS communicate with each other: IP
PROTOCOL
29. STORES the programs BEING EXECUTED and the data they are using.: -
COMPUTER MEMORY
30. Controls THE SPEED at which instructions are processed.: SYSTEM
CLOCK
31. Stands for Random Access Memory. It temporarily stores data before it
is processed and sent to your screen or printer. IT IS VOLATILE (means data
or information stored disappears when the computer is turned off or loses
power).: RAM
32. Transistor components, magnetic core memory, smaller size, easier to
program, disk drives and drums, called mainframe computers: 2nd Generation
of Computers
33. Silicon chips (known as ICs - integrated circuits), reduced cost, called
mini computers, networks introduced via dumb terminals: 3rd Generation of
Computers
34. Written for a specific machine by the engineers who built and ran the com-
puters; no need for OS since only one program could run at a time: Low-level
Language
2/8