100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D075 EXAM OBJECTIVE ASSESSMEN2 $17.99   Add to cart

Exam (elaborations)

WGU D075 EXAM OBJECTIVE ASSESSMEN2

 1 view  0 purchase
  • Course
  • WGU D075
  • Institution
  • WGU D075

WGU D075 EXAM OBJECTIVE ASSESSMEN2

Preview 3 out of 16  pages

  • September 25, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D075
  • WGU D075
avatar-seller
leonardmuriithi061
WGU D075 EXAM OBJECTIVE ASSESSMENT

Adware - ANSWER Programs that automatically display or download advertising to a
computer.

Application Software - ANSWER Software that is designed for the user to carry out a
specific task.

Best Practice - ANSWER A management process, technique, or method that is most
effective at arriving at a desired outcome or a better outcome than any other
process, technique, or method.

Big Data - ANSWER Data that is collected from all over the internet, including
smartphone metadata, internet usage records, social media activity, computer usage
records, and countless other data sources.

Bus Topology - ANSWER A network topology sometimes called a linear bus, where
each of a network's nodes is connected to a common linear backbone that has two
endpoints.

Business Analytics - ANSWER Attempts to make connections between data so
organizations can try to predict future trends that may give them a competitive
advantage.

Business Intelligence (BI) - ANSWER Strategies and technologies used by
enterprises for the data analysis of business information.

Cache - ANSWER A hardware or software component that stores data so that future
requests for that data can be served faster.

Campus Area Network (CAN) - ANSWER A computer network that connects two or
more LANs that are located on a campus.

Chief Information Officer (CIO) - ANSWER A job title for the board-level head of an
information technology department within a business organization. The CIO's job is
to make sure IT assets are in place to ensure a smooth transition.

Chief Information Security Officer (CISO) - ANSWER The CISO is generally focused
on the security of an organization's data and information, making sure it is backed
up, deciding who gets to see it and who does not, and so on.

Chief Security Officer (CSO) - ANSWER A CSO is in charge of such things as the
physical security and safety of employees, facilities, and corporate assets and may
have a law enforcement background.

Chief Technology Officers (CTO) - ANSWER The CTO runs the organization's IT
engineering group and serves as the company's top technology architect.

,Click Fraud - ANSWER An internet fraud scheme that automatically passes a user to
an advertiser, whether they had any intention of visiting or not, in order to collect a
per-click fee.

Clients - ANSWER An end user's computer in a computer network.

Computer Network - ANSWER Two or more computers connected together to
communicate and share resources.

Cybersecurity - ANSWER The convergence of technologies, sound practice, and
processes designed to protect networks and their devices, programs, and data from
attack or unauthorized access.

Data Analysis - ANSWER The application of statistics and logic techniques to define,
illustrate, and evaluate data.

Data Management (DM) - ANSWER The practices, architectural techniques, and
tools for achieving consistent access to and delivery of data across the spectrum of
data subject areas and data structure types in the enterprise.

Data Management Processes - ANSWER The process of acquiring data, making
sure the data are valid, and then storing and processing the data into usable
information for a business.

Data Mapping - ANSWER Extra notes about the definition of a field, its data, and its
use.

Data Mining - ANSWER The examination of huge sets of data to find patterns and
connections and identify outliers and hidden relationships.

Database Administrators (DBAs) - ANSWER DBAs categorize data requirements
and create the database entities and models that ensure accurate and smooth-
flowing information throughout a business.

Database Management System Software (DBMS) - ANSWER An application
software that is used to create a collection of related files that consist of records of
data separated by fields that can be queried to produce populations of information.

Databases - ANSWER Well-thought-out collections of computer files, the most
important of which are called tables.

Default-allow Firewall Rule - ANSWER A rule that all traffic is allowed unless it has
been specifically blocked.

Default-deny Firewall Rule - ANSWER The only network connections that are
permitted are the ones that have been explicitly allowed.

Denial-of-service - ANSWER An attempt to make a computer or any of its resources
unavailable to its intended users.

, Disk Storage - ANSWER Nonvolatile, secondary storage on a physical device like a
hard drive or optical disk with a read/write apparatus.

Ethernet Card - ANSWER Provides the computer with a unique 48-bit address called
a MAC (media access control) address. No two Ethernet cards have the same
address.

Extract, Transform, and Load - ANSWER Tools that are used to standardize data
across systems and allow the data to be queried.

File Allocation Table (FAT) - ANSWER A table of contents that directs the read/write
arm of the hard drive to the location where data exist and accesses the data upon
the user's request.

Firewall - ANSWER Specialized hardware and software that ensures that only
authorized personnel can access and use an organization's intranet.

Foreign Key - ANSWER A field in a database table that provides a link between two
tables in a relational database.

Gantt Chart - ANSWER A type of bar chart that illustrates a project schedule.

Graphical User Interface (GUI) - ANSWER The visual system of computer screen
designs that allow a user to interact with an electronic device.

Hardware - ANSWER The physical part of the computer.

Hypertext Markup Language (HTML) - ANSWER The major markup language used
to create web pages.

Hypertext Transfer Protocol (HTTP) - ANSWER Protocol used to define how
messages are formatted and transmitted on the internet.

IT Managers - ANSWER IT managers are in charge of software application
development teams that develop, design, program, and test software applications.

Identity Theft - ANSWER A crime concerning the unlawful practice of assuming
another individual's identity.

Information Security Analysts (ISA) - ANSWER ISAs are responsible for protecting
all sensitive information within an organization.

Information Technology - ANSWER The study, design, development,
implementation, support, and management of computer-based information systems,
particularly software and hardware.

Infrastructure - ANSWER The underlying foundation or basic framework for an
organization or project.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller leonardmuriithi061. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart