Вы находитесь на странице: 1из 9

WGU C182 Introduction to

IT
FOR MORE OF THIS COURSE AND ANY
OTHER COURSES, TEST BANKS, FINAL
EXAMS, AND SOLUTION MANUALS
CONTACT US
AT WHISPERHILLS@GMAIL.COM
For Order contact us at
WhisperHills@Gmil.om
1. 1st Generation of Computers
2. 2nd Generation of Computers
3. 3rd Generation of Computers
4. 4th Generation of Computers
5. Administrator Ethics
6. Algorithms
7. Alpha Testing
8. Analysis
9. Anti-viral Software
10. Application Software
11. Assembly Language
12. Attributes

13. Authentication
14. Availability
15. Batch Processing
16. Beta Testing
17. Big Data
18. Binary
19. BIOS ROM
20. Boolean/Logical
21. Buffer Overflow
22. Bus
23. Business Continuity
24. Business Intelligence
25. Bus Network
26. Byte
27. Characteristics of Quality Data
Character Representation
28. CIA
29. Circuit Switched Network
30. Client-server Network
31. Cloud Computing
32. Cold Site
33. Common Steps in SDLC
34. Compiled Language
35. Complier
36. Components of a Computer
37. Computer Network Advantages
38. Computer System

39. Confidentiality
40. The Controller
41. Copyrights
42. CPU
43. Database Administrator
44. Database Information Processing (OLAP)
45. Database Interacting Format
46. Database Management System (DBMS)
47. Database Server
48.
Data in DIKW
49. Data Integrity Efforts
50. Data mirroring
51. Data Tier
52. Data Validation
53. Data Warehouse
54. Decimal
55. Defense in Depth
56. Denial of Service (DOS)
57. Device Drivers
58. Dicing
59. DIKW Hierarchy
60. Direct Conversion
61. Domain Name
62. Domain Name Parts
63. Domain Name Server (DNS)
64. Drilling up and down
65. Encryption
66. End User License Agreement (EULA)

67. Ethics
68. Event-driven Processing
69. Evolution of Storage
70. Evolution of Users
71. Field
72. File Server
73. Firewalls
74. Flat File Database
75. Floating-point
76. Freeware
77. FROM
78. FTP Server
79. Full backup
80. Grey Hat Hacker
81. Hacking
82. Hardware
83. Hexadecimal
84. Hierarchical Database
85. Host Name
86. Hot Site
87. Image backups
88. Implementation
89. Incremental backup
90. Information
91. Information in DIKW
92. Information Security Classifications
93. Information Systems

94. Information Technology


95. Input
96. Integrity
97. Internal Components of the System Unit
98. The Internet of Things (IoT)
99. Interpreted Code
100.

Interpreted Language

101.

Intranet

102.

I/O Subsystem

103.

IPOS

104.

IT Professional Roles

105.

Join

106.

Kernel

107.

Knowledge in DIKW

108.

LaaS

109.

Language Translator Programs

110.

Language Translators

111.Local Applications
112.

Local Computer

113.

Logical design

114.

Logic Tier

115.

Machine/Low-level Language

116.

Mail Server

117.

Maintenance

118.

Memory

119.

Mesh Network

120.

The Model

121.

Model-View-Controller (MVC)

122.

Moore's Law

123.

Multi-tier Development

124.

Network

125.

Network Administrator

126.

Network Hub

127.

Network Switch

128.

N-tier Development

129.

Object Oriented Programming

130.

Octal

131.

ODBC (Open Database Connectivity)

132.

Off-Site Storage

133.

Online Data Processing (OLDP)

134.

Open Source

135.

Operating Systems

136.

Output

137.

PaaS

138.

Packet Sniffing

139.

Packet Switched Network

140.

Parallel Conversion

141.

Parts of the CPU

142.

Parts of URL (Uniform Resource Locator)

143.

Patents

144.

Phased Conversion

145.

Phishing

146.

Physical design

147.

Pilot Conversion

148.

Pivot

149.

Point-to-Point Network

150.

Preliminary investigation

151.

Presentation Tier

152.

Primary Key

153.

Print Server

154.

Processing

155.

Project Executing and Controlling Reports

156.

Project Initiation

157.

Projection

158.

Project phases

159.

Project Planning

160.

Proprietary Software

161.

Protocol

162.

Protocol Stack

163.

Proxy Server

164.

Public Domain

165.

Public Key Encryption

166.

Query

167.

RAM

Redundancy
168.

Relation

169.

Relational Database

170.

Remote Computer

171.

Resource/Filename ID

172.

Ring Network

173.

Role-based Access Control

174.

Rolling up

175.

Router

176.

SaaS

177.

Scope Creep

178.

Script

179.

Security Administrator

180.

Security Education

181.

SELECT

182.

Server

183.

Server Software

184.

Services

185.

Shareware

186.

Shell

187.

Shell Scripting

188.

Site Sharing

189.

Slicing

190.

Software

191.

Software Categories

192.

Sort

193.

SQL Injection

194.

Star Network

195.

Storage

196.

Strategic Risk Analysis

197.

String Data

198.

Structured Programming

199.

Structured Query Language (SQL)

200.

Support IT Professionals

201.

Symmetric Key Encryption

202.

System Administrator

203.

System Clock

204.

System Deployment

205.

System Development Life Cycle (SDLC)

206.

System Software

207.

System Unit

208.

TCP/IP

209.

TLD(Top Level Domain) Name

210.

Trojan Horse

211.

Tuples

212.

Types of RAM

213.

Unnecessary Requirements

214.

User

215.

User Acceptance Testing

216.

Utility Programs

217.

The View

218.

Virtual Machine (VM)

219.

Virus

220.

Web Administrator

221.

Web Server

222.

WHERE

223.

White Hat Hacker

224.

Wireless Access Point

225.

Wisdom in DIKW

226.

Workstations

227.

Worms