100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D075 EXAM OBJECTIVE ASSESSMEN2 $17.99   Add to cart

Exam (elaborations)

WGU D075 EXAM OBJECTIVE ASSESSMEN2

 1 view  0 purchase
  • Course
  • WGU D075
  • Institution
  • WGU D075

WGU D075 EXAM OBJECTIVE ASSESSMEN2

Preview 3 out of 20  pages

  • September 25, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D075
  • WGU D075
avatar-seller
leonardmuriithi061
WGU D075 EXAM OBJECTIVE ASSESSMENT

Technology - ANSWER Puts in structure reports, analyses, and info gleaned to
support business

Information Technology - ANSWER Backbone of business.

Central Processing Unit (CPU) - ANSWER Brain of the computer that performs
instructions defined by software

Random Access Memory (RAM) - ANSWER Short term working memory supports
the CPU aka primary storage

Motherboard - ANSWER A circuit board that contains all of the computer system's
main components.

Network Interface Card (NIC) - ANSWER A card that enables one computer to send
and receive data to and from another computer.

USB - ANSWER A type of connection used to attach devices such as flash drives,
scanners, cameras, and printers to a computer. Attaches peripheral devices to a
CPU

disk drive - ANSWER A device that reads data from and writes data onto a disk. The
disk can be a hard disk - removable or fixed; a floppy disk. It is an example of an
input and output device.

peripheral device - ANSWER A device that is attached to the computer and aids in
input and/or output.

Midrange Computers - ANSWER Sometimes called minicomputers, midrange
computers are less powerful and smaller in physical size than mainframe computers,
but do many of the same things, simply on a smaller scale.

Microcomputer - ANSWER Smaller mainframe. Most used in business. A single-user
computer that comes in many forms, such as a desktop model, a portable
laptop/notebook, or a handheld computer; also called a personal computer.

computer software - ANSWER list of instructions for computer to follow that is stored
in the computer's memory. It tells the computer how to work and perform computer
tasks

Application Software - ANSWER computer software created to allow the user to
perform a specific job or task

system software - ANSWER Consists of the programs that control or maintain the
operations of the computer and its devices.

,Utility Software - ANSWER Performs a particular function in the background, such as
virus protection & printer drivers

Software - ANSWER Program that enables the computer to work

Operating system - ANSWER enables and becomes the platform for the app to work

object linking and embedding (OLE) - ANSWER Method of sharing and saving data.
Software developed by MS that allows embedding and linking to documents.

Network - ANSWER Backbone of It infrastructure, two or more devices that connect

How does a network connect? - ANSWER Client laptop/server (Central CPU).

Device connected to a network - ANSWER Node

Nodes - ANSWER Communicate through wires (Ethernet, cable, fiber optics)

Examples of radio waves - ANSWER Wifi, celltower

Examples of GPS & satellite radio - ANSWER Satellite

Topology - ANSWER The mapping of a physical network and logical
interconnections between nodes(computers).

Nodes - ANSWER Devices connected as part of a computer network (cpu, printer,
router)

Bus topology - ANSWER node is connected to a common liner backbone that had
two end points

Star topology - ANSWER Radiate around a central node, most common. If central
fails then all will fail

Ring Topology - ANSWER Connected to another node with first and last computer,
data is transmitted in a circular manner

Virus - ANSWER spread themselves attaching to files and infection webistes, and
emails,, disable systems

malware - ANSWER used for financial gain, plant spyware that can monitor cpu
actions

Dumpster diving - ANSWER searching the trash for important information that can
help gain access to a company's or individual's important information

Phishing - ANSWER the fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal personal information,
such as passwords and credit card numbers.

, Pharming - ANSWER Reroutes requests for legitimate websites to false websites

Denial of service - ANSWER cyber attack to make machine or network disrupt
service

tailgaiting "piggy backing" - ANSWER attacker seeing entry to a restricted area that
lacks proper authentiiaction

Cpu worm - ANSWER virus that is self replicating but doesn't attach itself to an
existing program to spread

Trojan horse - ANSWER seems harmless, when executed may release a virus or
worm

Spywear - ANSWER installed covertly on a computer or take control of system
without user knowledge

Adwear - ANSWER adertising typically irritating but not malicious, ads automatically
display on a computer

internet fraud - ANSWER used for fraudent activity in an online setting such as an
email, media board, chat room

cookies - ANSWER TXT files stays on a computer so next time the client visits the
website it fills in the info such as a user id and password, can be tracked and
compromised for your privacy

Business intelligence BI - ANSWER data are more valuable then ever because they
provide historical, current, and predictive analyses for organizations

Structured data (normalized data) - ANSWER well labeled and often with traditional
fields and records common to data tables

Unstructed data - ANSWER Most common - disorganized cannot be easily read or
processed by a cpu because it isn't store in rows or columns

Semi structured data - ANSWER mix of structured and unstructured data

Data center - ANSWER large centralized locations where many cpu are housed for
managing data gathered by organization. Location to house processing of data but
store farm of storage devices to hold data collected and a network mgt center to
allow from remote sites

Security - ANSWER paramount, in back up systems and security is made to protect
these valuable assets.

Local Area Network (LAN) - ANSWER a computer network that covers a small area

Campus Area Network (CAN) - ANSWER type of network spanning multiple
buildings, such as a university or business campus

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller leonardmuriithi061. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart