• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU C182 Objective Assessment

Latest WGU Jan 12, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU C182 Objective Assessment

  • studiers in 3 days 4.7 (98 reviews)
  • Students also studied Terms in this set (118) Western Governors UniversityD 322 Save WGU C182 Introduction to IT 230 terms kbsing76Preview Introduction to IT - D322/ Pre-asses...70 terms quique218Preview

WGU C182

57 terms ChristiAnnaBanana Preview Intro to 55 terms ann Practice questions for this set Learn1 / 7Study using Learn Confidentiality, Integrity, Availability First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.Evolution of Users Sends files over the network at the request of clients.Responds over LAN, within one location/site. Support both application software and data files.

FILE SERVER

Choose an answer

1FBI2NSA

3CIA4DHS

Don't know?

Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network.Domain Name Server (DNS) Uses TWO KEYS a public and private key for performing encryption and decryption Public Key Encryption PROVING you are who you say you are which can be

done by: what you know, what you have!

Authentication TIER WHERE THE USER interface for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures Presentation Tier SYSTEMS DEPLOYMENT Steps 1. System Conversion 2.Final Documentation 3. End User Training System Deployment CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS

ROUTER

Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users Confidentiality Protecting EVERY LAYER that SURROUNDS ((( DATA ))) Defense in Depth Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application

THE MODEL

Creates a subset of the data by reducing the data from multiple dimensions to one dimension Slicing Data The technology used in creating, maintaining, and making information accessible.Information Technology In charge of all aspects of the COMPUTER NETWORKS Network Administrator Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs).Database Administrator Installs, configures, maintains, secures, and troubleshoots web severs Web Administrator Processed data.Information

INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.Knowledge in DIKW Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE

WISDOM

The INPUT Processing, OUTPUT, STORAGE Cycle I.P.O.S.Raw data is organized or structured for usefulness. PROCESSED DATA Information is output so user can see results.OUTPUT DATA Processed information is stored for permanent record. STORAGE A collection of components that work together to meet

the needs of the user; typically : CATEGORIZED AS

EITHER HARDWARE, SOFTWARE, NETWORKS AND

USERS

COMPUTER SYSTEM

Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE

COMPUTER

HARDWARE

A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH

EACH OTHER.

NETWORK

Systems Software and Applications SoftwareSOFTWARE CATEGORIES RULES provided by WHICH NETWORKS communicate with each other

IP PROTOCOL

STORES the programs BEING EXECUTED and the data they are using.

COMPUTER MEMORY

Controls THE SPEED at which instructions are processed. SYSTEM CLOCK Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power).

RAM Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers 2nd Generation of Computers

Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals 3rd Generation of Computers Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time Low-level Language Easier than machine but still required detailed, precise LOW LEVEL instructions Assembly Language Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer Language Translator Programs Programmer is limited to high level control constructs such as while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements Structured Programming A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions.Interpreted Language (Code) Small programs that place Linux commands or DOS batch files into a file Shell Scripting The computer that the user is using; physically present with Local Computer Connects computers to each other with NO REAL

UNDERSTANDING OF WHAT IS BEING TRANSFERRED

Used for private networks with local computers.Network Hub Like a hub, but this will only send data that is INTENDED

FOR SPECIFIC COMPUTER

Network Switch Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable Wireless Access Point Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers Client-server Network Stores data files (web pages) and programs (scripts).Responds from anywhere on the Internet.Web Server

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured detailed explanations that was a perfect resource for my project. Such an remarkable resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 12, 2026
Description:

WGU C182 Objective Assessment 8 studiers in 3 days 4.7 (98 reviews) Students also studied Terms in this set Western Governors UniversityD 322 Save WGU C182 Introduction to IT 230 terms kbsing76 Pre...

Unlock Now
$ 11.00