100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C182 Introduction to IT QUESTIONS WITH 100 % CORRECT ANSWERS | VERIFIED $7.99   Add to cart

Exam (elaborations)

WGU C182 Introduction to IT QUESTIONS WITH 100 % CORRECT ANSWERS | VERIFIED

 2 views  0 purchase
  • Course
  • WGU C182 Introduction to IT
  • Institution
  • WGU C182 Introduction To IT

Client-server Network - ️️Contains one or more servers; client is a computer that will request information from another computer; server is a computer that takes requests and responds with the requested information; the software used facilitates communication with remote servers Business Co...

[Show more]

Preview 3 out of 17  pages

  • November 19, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C182 Introduction to IT
  • WGU C182 Introduction to IT
avatar-seller
ACADEMICMATERIALS
WGU C182 Introduction to IT
Client-server Network - ✔️✔️Contains one or more servers; client is a computer that
will request information from another computer; server is a computer that takes requests
and responds with the requested information; the software used facilitates
communication with remote servers

Business Continuity - ✔️✔️The activity performed by an organization to ensure that
critical business functions will be available to customer, suppliers, regulators, and other
entities that must have access to those functions.

Administrator Ethics - ✔️✔️Privacy, Ownership, Control, Accuracy, Security

Algorithms - ✔️✔️A formula or procedure for solving a problem. Can also be described
as a set of steps that are followed in order to complete a process

Alpha Testing - ✔️✔️System developers assist end users as they interact with new
system; simulated data is used

Analysis - ✔️✔️Determines the user requirements for the new system and develops
logical models of the system

Anti-viral Software - ✔️✔️Attempts to identify if a file contains a virus or some form of
malware

Application Software - ✔️✔️Consists of programs that end users run to accomplish
tasks

Assembly Language - ✔️✔️Easier than machine but still required detailed, precise low
level instructions

Attributes - ✔️✔️Columns of the relation

Authentication - ✔️✔️Proving you are who you say you are which can be done by:
what you know, what you have (two factor authentication)

Availability - ✔️✔️Requires that information is available when needed

Batch Processing - ✔️✔️Processing large amounts of data all in one batch when the
computer system is not busy

Beta Testing - ✔️✔️Performed by the end user without any assistance from the system
developers; live data in a real working environment is used.

,Big Data - ✔️✔️Refers to data sets that are so large and complex that they will require
more advanced database management/processing tools.

Binary - ✔️✔️Uses base 2 system (0 and 1)

BIOS ROM - ✔️✔️BIOS stands for Basic Input Output System; ROM stands for Read
Only Memory.

Typically stored in ROM chip on the motherboard.

Is software not hardware, ("basic" operating system that runs when the computer is first
turned on).

Runs tests of memory and the CPU and initializes hardware components so that the
actual Operating System can be loaded from the hard disk.

Can't choose the amount or contents.

1st Generation of Computers - ✔️✔️Vacuum tubes, relay switches, the need to
program in machine language

2nd Generation of Computers - ✔️✔️Transistor components, magnetic core memory,
smaller size, easier to program, disk drives and drums, called mainframe computers

3rd Generation of Computers - ✔️✔️Silicon chips (known as ICs - integrated circuits),
reduced cost, called mini computers, networks introduced via dumb terminals

4th Generation of Computers - ✔️✔️Single chip processor, called microcomputer, first
personal computer, rudimentary computer graphics, home use

Black Hat Hacker - ✔️✔️Individuals with malicious intent who violate security in order
to commit crimes or acts of terrorism

Boolean/Logical - ✔️✔️True/False

Buffer Overflow - ✔️✔️Placing malicious code into the buffer so that it can be executed
once stored in memory; oldest and most well known software exploit; software
engineers can protect against this when writing code

Bus - ✔️✔️Permits information to move between each component; electrical channels
that enable communication among the electronic components

Bus Network - ✔️✔️Devices connected along a single cable.

, Size of network is restricted.


Business Intelligence - ✔️✔️A specific information system to help an organization
reach its strategic goals

Byte - ✔️✔️8 bits; a single character of text in a computer

Character Representation - ✔️✔️ASCII and Unicode

Characteristics of Quality Data - ✔️✔️Relevance - the data being used must apply
directly to the decision being made

Timely - data must be efficient and must be provided in a timely manner

Thorough - the data must be complete

Accurate - data should be captured only once, where possible and should be captured
as close to the point of activity as possible.

Reliable - data should reflect stable and consistent data collection processes across
collections points and over time

CIA - ✔️✔️Confidentiality, Integrity, Availability

Circuit Switched Network - ✔️✔️Requires that a full pathway, or circuit, be est. before
transmission can begin and maintained during the entire transmission

Cloud Computing - ✔️✔️Offers, as a service, the ability to offload computation and
storage from your local computer

Cold Site - ✔️✔️Physical location like a shell that can be used for operations should
the need arise; not equipped with hardware, servers, etc.; cheaper to have

Common Steps in SDLC - ✔️✔️Preliminary investigation, Analysis, Logical design,
Physical design, Implementation, Maintenance

Compiled Language - ✔️✔️Translates the entire program, creating an executable
program which can be run at a later time

Complier - ✔️✔️Improve language translator; requires that the components of the
software all be defined before compilation can begin; code is more effcient

Components of a Computer - ✔️✔️CPU, Memory and Storage, Peripheral Devices

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICMATERIALS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart