Computer Science > QUESTIONS & ANSWERS > WGU C182 Objective Assessment Questions and Answers Latest Update (All)
WGU C182 Objective Assessment Questions and Answers Latest Update 1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication Correct Answer- Comput ... er Network Advantages 1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats Correct Answer- Risk Management & Strategic Risk Analysis 1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked Correct AnswerData Integrity Efforts A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS Correct AnswerCOMPUTER SYSTEM A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER. Correct Answer- NETWORK A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers. Correct Answer- Information Systems A collection of protocols. TCP/IP is an example. Correct Answer- Protocol Stack A computer being accessed over the network Correct Answer- Remote ComputerA LAN that uses the Internet Protocol Correct Answer- Intranet A message's pathway is only established as it is sent; the choice of pathway is based on availability and amount of message traffic Correct Answer- Packet Switched Network A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration. Correct Answer- Virtual Machine (VM) A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machinelanguage instructions. Correct Answer- Interpreted Language (Code) Administration and Support Correct Answer- IT Professional Roles All peripheral devices where long term storage devices are used. Correct Answer- i/o Subsystem Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted Correct Answer- Packet Sniffing Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page Correct Answer- TLD (Top Level Domain) Name Exam: www.yourname.com .edu .net . gov .org An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database Correct Answer- SQL InjectionAn interface for the user, often personalized for that given user, that provides access to the kernel. Correct Answer- Shell Attempts to identify if a file contains a virus or some form of malware Correct Answer- Antivirus Software BIOS stands for: Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software NOT hardware, ("basic" operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can't choose the amount or contents. Correct Answer- BIOS ROM Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable Correct Answer- Wireless Access Point Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application Correct Answer- THE MODEL Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards Correct Answer- Internal Components of the System Unit Characterized by the creation of windowed operating systems, easier real-world object modeling in programming code, and the application of inheritance in program code. Correct Answer- Object Oriented Programming COMPUTER PROGRAMS that tell the computer what to do--how to execute commands and process information Correct Answer- Software Confidentiality, Integrity, Availability Correct Answer- CIAConnects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers. Correct Answer- Network Hub CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS Correct AnswerROUTER Consists of programs that END USERS RUN to accomplish tasks Correct Answer- Application Software Consists of programs that MAKE UP THE OS software that directly supports the computer system itself Correct Answer- System Software Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers Correct AnswerClient-server Network Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen Correct Answer- Parts of the CPU Controls THE SPEED at which instructions are processed. Correct Answer- SYSTEM CLOCK Core components of the OS that is loaded when the computer is first booted. Correct AnswerKernel CPU, Memory and Storage, Peripheral Devices Correct Answer- Components of a ComputerCreates a subset of the data by reducing the data from multiple dimensions to one dimension Correct Answer- Slicing Data Creates and maintains client network connections to remote servers Correct AnswerWorkstations Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes. Correct Answer- System Unit Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom) Correct Answer- DIKW Hierarchy Devices connected along a SINGLE CABLE Size of network is restricted Correct Answer- Bus Network Doubling of transistor count roughly every 18 - 24 months (exponential increase) Correct Answer- Moore's Law Dynamic RAM (DRAM) - typically called main memory Static RAM (SRAM) - cache memory and registers Correct Answer- Types of RAM Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached. Correct Answer- Ring Network Each device is connected to a CENTRAL DEVICE such as a hub or switch. Correct Answer- Star Network Easier than machine but still required detailed, precise LOW LEVEL instructions Correct AnswerAssembly LanguageEmails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information Correct Answer- Phishing Engage in BOTH WHITE and BLACK hat types of hacking activities Correct Answer- Grey Hat Hacker Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline Correct Answer- Data Redundancy Ensures that the user gains access only to the resources that the user should be able to access Correct Answer- Role-based Access Control Every device is connected directly to every other device in the network. Correct Answer- Mesh Network Executes programs' instructions and commands various components in the computer. Referred to as the "chip". Correct Answer- CPU First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user. Correct Answer- Evolution of Users Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs). Correct Answer- Database Administrator Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a compu [Show More]
Last updated: 3 years ago
Preview 1 out of 13 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 10, 2022
Number of pages
13
Written in
All
This document has been written for:
Uploaded
Sep 10, 2022
Downloads
0
Views
119
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·