WGU C182 Objective Assessment Flashcards

1
Q

First users were the engineers who built and programmed computers, then employees who had received specialized training were users, and now today, anyone and everyone can be a user.

A

Evolution of Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of server Sends files over the network at the request of clients.

Responds over LAN, within one location/site.

Support both application software and data files.

A

FILE SERVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP) address like ((( 70.42.251.42 ))) that computers use to identify each other on the network.

A

Domain Name Server (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses TWO KEYS, a public and private key for performing encryption and decryption

A

Public Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it called when you are PROVING you are who you say you are which can be done by: what you know, what you have!

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the TIER WHERE THE USER INTERFACE for the system is developed; SHIELDS THE USER from the underlying logic of the systems as well as the underlying data structures

A

Presentation Tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System Deployment Steps
1. System Conversion
2. Final Documentation
3. End User Training

A

System Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What CONNECTS MULTIPLES networks together; can be used to directly connect computers to a network; will relay messages to computers with APPROPRIATE IP ADDRESS

A

ROUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Requires that data is KEPT secure so that they are not accidentally provided or obtained by unauthorized users

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protecting EVERY LAYER that SURROUNDS ((( DATA )))

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can take on DIFFERENT FORMS depending on the complexity of the application; in certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION of the application

A

THE MODEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Creates a subset of the data by reducing the data from multiple dimensions to one dimension

A

Slicing Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The technology used in creating, maintaining, and making information accessible.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In charge of all aspects of the COMPUTER NETWORKS

A

Network Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Focuses on the design, development, and support of DATABASE MANAGEMENT systems (DBMSs).

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who Installs, configures, maintains, secures, and troubleshoots web severs

A

Web Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Processed data

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

INFORMATION THAT HAS BEEN PUT TO USE information placed into a context. Refined information such that the user of the knowledge is able to call forth only relevant portions of information when needed.
(ILLUMINATI)

A

Knowledge in DIKW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Provides a social setting to knowledge; AN UNDERSTANDING OF THE ((( WHY ))) Can only come by having BOTH KNOWLEDGE and EXPERIENCE

A

WISDOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The INPUT Processing, OUTPUT, STORAGE Cycle

A

I.P.O.S.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Raw data is organized or structured for usefulness.

A

PROCESSED DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information is output so user can see results.

A

OUTPUT DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Processed information is stored for permanent record.

A

STORAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A collection of components that work together to meet the needs of the user; typically : CATEGORIZED AS EITHER HARDWARE, SOFTWARE, NETWORKS AND USERS

A

COMPUTER SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Physical components of a computer system which include the system unit and its components and peripheral devices; TANGIBLE ASPECTS OF THE COMPUTER

A

HARDWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A collection of computers and resources CONNECTED by various media so that they can COMMUNICATE WITH EACH OTHER.

A

NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Systems Software and Applications Software

A

SOFTWARE CATEGORIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

RULES provided by WHICH NETWORKS communicate with each other

A

IP PROTOCOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What portion of the computer STORES the programs BEING EXECUTED and the data they are using.

A

COMPUTER MEMORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Controls THE SPEED at which instructions are processed.

A

SYSTEM CLOCK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Stands for Random Access Memory. It temporarily stores data before it is processed and sent to your screen or printer. IT IS VOLATILE (means data or information stored disappears when the computer is turned off or loses power).

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Transistor components, magnetic core memory, smaller size, easier to program, disk drives and drums, called mainframe computers

A

2nd Generation of Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Silicon chips (known as ICs - integrated circuits), reduced cost, called mini computers, networks introduced via dumb terminals

A

3rd Generation of Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What kind of language is Written for a specific machine by the engineers who built and ran the computers; no need for OS since only one program could run at a time

A

Low-level Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What kind of language is Easier than machine but still required detailed, precise LOW LEVEL instructions

A

Assembly Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Function is to TRANSLATE ONE LANGUAGE TO ANOTHER; take source code and convert it to another form; source code by itself cannot be read by a computer

A

Language Translator Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What type of programming is used when a Programmer is limited to high level control constructs such as; while loops, for loops, and if/else statements and not allowed to use primitive GOTO statements

A

Structured Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is A type of programming language for which most of its implementations EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a program into machine-language instructions.

A

Interpreted Language (Code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Small programs that place Linux commands or DOS batch files into a file

A

Shell Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The computer that the user is using; physically present with

A

Local Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS BEING TRANSFERRED Used for private networks with local computers.

A

Network Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Like a hub, but this will only send data that is INTENDED FOR SPECIFIC COMPUTER

A

Network Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Can be connected to hub, switch, or router; many routers now also act as a wireless access point; sends out a wireless signal so computers on the network can connect without a cable

A

Wireless Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers

A

Client-server Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What type of server Stores data files (web pages) and programs (scripts). Responds from anywhere on the Internet.

A

Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What kind of server Monitors print jobs

A

Print Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Like a web server or file server, in that requests are for files and responses are the files
(File Transfer Protocols)

A

FTP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What kind of network has Devices connected along a SINGLE CABLE. Size of network is restricted

A

Bus Network

49
Q

What type of network has Each device connected to a CENTRAL DEVICE such as a hub or switch.

A

Star Network

50
Q

What type of network has Each device connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached.

A

Ring Network

51
Q

Every device is connected directly to every other device in the network.

A

Mesh Network

52
Q

Identifies the server on which the web page can be found

A

Domain Name

53
Q

Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page

A

TLD (Top Level Domain) Name Exam: www.yourname.com .edu .net . gov .org

54
Q

Indicates the name of the file you are accessing, or the location of the document on the server

A

Resource/ Filename ID

55
Q

Confidentiality, Integrity, Availability

A

CIA

56
Q

1st - Must include a component that ensures the accuracy of the collected data
2nd - Must be entered into the system accurately
3rd - Data modification must be tracked

A

Data Integrity Efforts

57
Q
  1. Identify the organization’s information assets
  2. Identify vulnerabilities of each asset
  3. Determine threats 4. Prioritizing risks
  4. Develop and enact policies that will reduce threats
A

Risk Management & Strategic Risk Analysis

58
Q

An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company’s website; web server might pass the command onto the database which then allows potentially anything to be done to the database

A

SQL Injection

59
Q

Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code

A

Buffer Overflow

60
Q

Informs companies of potential problems with software HACK ATTACKS so companies can fix the problems.

A

White Hat Hacker

61
Q

Individuals with MALICIOUS INTENT WHO VIOLATE SECURITY in order to commit crimes or acts of terrorism

A

Black Hat Hacker

62
Q

Engage in BOTH WHITE and BLACK hat types of hacking activities

A

Grey Hat Hacker

63
Q

Type of virus that completely replaces an existing application and takes the name of the taken over file

A

Trojan Horse

64
Q

Attempts to identify if a file contains a virus or some form of malware

A

Anti-virus Software

65
Q

Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline

A

Data Redundancy

66
Q

Uses the same key for performing the encryption and decryption

A

Symmetric Key Encryption

67
Q

Ensures that the user gains access only to the resources that the user should be able to access (RBAC)

A

Role-based Access Control

68
Q

Advantages in ___________?
1. Cost savings benefits
2. Increased efficiency and productivity
3. Increased facilitation of communication

A

Computer Network Advantages

69
Q

Consists of programs that END USERS RUN to accomplish tasks

A

Application Software

70
Q

What form of software Consists of programs that MAKE UP THE OS
software that directly supports the computer system itself
(System)

A

System Software

71
Q

What form of software Works with hardware to provide a NETWORK SERVICE
(Server)

A

Server Software

72
Q

A LAN that uses the Internet Protocol

A

Intranet

73
Q

Core components of the OS that is loaded when the computer is first booted.

A

Kernel

74
Q

An interface for the user, often personalized for that given user, that provides access to the kernel.

A

Shell

75
Q

Administration and Support

A

IT Professional Roles

76
Q

Maintains all aspects of the system including hardware, software, and programming.

A

System Administrator

77
Q

Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions.

A

Security Administrator

78
Q

Help desk and training.

A

Support IT Professionals

79
Q

Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom)

A

DIKW Hierarchy

80
Q

The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form.

A

Data in DIKW

81
Q

Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form.

A

Information in DIKW

82
Q

A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers.

A

Information Systems

83
Q

RELEVANCE - the data being used must apply directly to the decision being made
TIMELY - data must be efficient and must be provided in a timely manner
THOROUGH - the data must be complete
ACCURATE - data should be captured only once, where possible and should be captured as close to the point of activity as possible.
RELIABLE - data should reflect stable and consistent data collection processes across collections points and over time

A

Characteristics of Quality Data

84
Q

Raw data is entered BY THE USER

A

Input

85
Q

COMPUTER PROGRAMS that tell the computer what to do–how to execute commands and process information

A

Software

86
Q

Transmission Control Protocol/Internet Protocol. Most commonly used protocol; is required of all computers that communicate over the Internet.

A

TCP/IP

87
Q

A collection of protocols. TCP/IP is an example.

A

Protocol Stack

88
Q

CPU, Memory and Storage, Peripheral Devices

A

Components of a Computer

89
Q

Executes programs’ instructions and commands various components in the computer. Referred to as the “chip”.

A

CPU

90
Q

All peripheral devices where long term storage devices are used.

A

i/o Subsystem

91
Q

Permits information to move between each component; electrical channels that enable communication among the electronic components

A

System Bus

92
Q

Critical component of all computer based systems; consists of most of the hardware the computer needs in order to run; comes in a variety of shapes and sizes.

A

System Unit

93
Q

Case, Internal Bays, Buses, Ports, Hard Drive, Motherboard, CPU, CPU Cooler, Memory Module (RAM), Power Supply Unit (PSU), Expansion Slots/Cards

A

Internal Components of the System Unit

94
Q

Control Unit (CU) - retrieves the instructions and the raw data that is input and coordinates or controls the sending of those instructions and data to the ALU Arithmetic Logic Unit (ALU) - does the actual processing of the data; completing mathematical calculations and logical operations to process the data and converting the input of the keyboard text entry to output displayed on the screen

A

Parts of the CPU

95
Q

Dynamic RAM (DRAM) - typically called main memory Static RAM (SRAM) - cache memory and registers

A

Types of RAM

96
Q

BIOS stands for: Basic Input Output System; ROM stands for Read Only Memory. Typically stored in ROM chip on the motherboard. Is software NOT hardware, (“basic” operating system that runs when the computer is first turned on). Runs tests of memory and the CPU and initializes hardware components so that the actual Operating System can be loaded from the hard disk. Can’t choose the amount or contents.

A

BIOS ROM

97
Q

Vacuum tubes, relay switches, the need to program in machine language

A

1st Generation of Computers

98
Q

Single chip processor, called microcomputer, first personal computer, rudimentary computer graphics, home use

A

4th Generation of Computers 1971 - 1980.

99
Q

Doubling of transistor count roughly every 18 - 24 months (exponential increase)

A

Moore’s Law

100
Q

Punch cards, magnetic tape, hard disks, floppy disks, optical discs, flash memory, cloud storage

A

Evolution of Storage

101
Q

Improve language translator; requires that the components of the software all be defined before compilation can begin; code is more efficient

A

Compiler

102
Q

Characterized by the creation of windowed operating systems, easier real-world object modeling in programming code, and the application of inheritance in program code.

A

Object Oriented Programming

103
Q

A computer being accessed over the network

A

Remote Computer

104
Q

Requires that a full pathway, or circuit, be established before transmission can begin and maintained during the entire transmission; like calling someone on the phone

A

Circuit Switched Network

105
Q

A message’s pathway is only established as it is sent; the choice of pathway is based on availability and amount of message traffic

A

Packet Switched Network

106
Q

Creates and maintains client network connections to remote servers

A

Workstations

107
Q

A software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers; allows a user to run software for different OS platform in their computer that would not otherwise be able to run that software; this allows multiple users on a network to access the software to support collaboration.

A

Virtual Machine (VM)

108
Q

Responds to queries by pulling from the database. Typically only to local clients.

A

Database Server

109
Q

Two email servers communicate with each other

A

Mail Server

110
Q

Link between two resources; links two routers without any host or network in between

A

Point-to-Point Network

111
Q

Protocol, Domain name, Resource/Filename

A

Parts of URL (Uniform Resource Locator)

112
Q

Requires that data is correct

A

Integrity

113
Q

Requires that information is available when needed

A

Availability

114
Q

Public - available through public sources; includes names and addresses Sensitive - not considered a threat to a person’s privacy if others learn of it; include email addresses Private - information that could be a threat if disclosed to others; includes social security and credit card numbers Confidential - information that an organization will keep secret; includes patentable information and business plans

A

Information Security Classifications

115
Q

Emails to people to redirect them to a website to perform some operation but the website is a fake and just takes the information

A

Phishing

116
Q

Allows you to obtain anything being sent over a network if the data being transmitted isn’t encrypted

A

Packet Sniffing

117
Q

Self contained programs that do not need other programs to propagate across computers and computer networks

A

Worm

118
Q

Idea of obfuscating the information that resides on a computer or sent over a network so that if it is intercepted the hacker will be unable to use the information

A

Encryption