Information Technology > Exam > Sophia – Information Technology - Unit 3 Milestone 3,100% CORRECT (All)

Sophia – Information Technology - Unit 3 Milestone 3,100% CORRECT

Document Content and Description Below

The standard interface technology for wireless networks is . The hardware component necessary for computers to connect to these networks is a . • transmission control protocol; IP • ... wireless-internet protocol; TCP • wireless-defined networking; WAP • wireless fidelity; WAP 2 While Kari was searching the Internet, her computer was infected by a virus. What problem can Kari expect as a result? • The code will install software that looks useful but compromises her system's security. • A toolbar will be installed that redirects her Web browser to pirated sites. • Her keystrokes will be recorded and used by hackers to steal her personal and financial information. • Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated? • Principle 8: Self • Principle 7: Colleagues • Principle 3: Product • • Principle 6: Profession 4 Select the true statement about COPPA. • The COPPA regulations state that websites may not collect information from minors under the age of 13. • The COPPA regulations apply to websites that collect information from children. • The COPPA regulations require that parents of children under the age of 13 be given instructions on how to maintain privacy. • The COPPA regulations restrict a child's access to harmful content. - Select the sign of computer addiction that indicates a lack of control. • While driving his car, Mitch rear-ended another car when he was checking his social media account. • After moving to a new town, Sal spends most of his time online to keep his mind off the friends he misses. • Ever since his mother died, Charlie stays up late every night playing an online game. • Even though she knows that she should, Jacqueline cannot stop playing her favorite online game. Kirby visited a sweepstakes website and agreed to download a new program. Later, when he tried to use a word processing program, his document files became corrupted. How can Kirby try to remove the offending program and prevent future attacks? • Kirby should install a biometric reader. • Kirby should use WPA network encryption. • Kirby should change the password on his computer. Select the FALSE statement about the history of the Internet. • The Internet means “an interconnected network of networks.” • ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah. • The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union. • The invention of HTML enabled computers on different networks to communicate with each other. Which of the following can be controlled by copyright? • The team logo for a minor league baseball team • A new type of engine for pickup trucks • The slogan for a business • A writer’s new murder mystery on the New York Times bestsellers list Select the true statement about HTML. In which of the following scenarios can a trademark be applied? • Merle designs a web page for Peter’s business. • Mark writes and records a new song for his rock band. • Peter names his new business “Garden Ornaments.” • Twila paints a picture of Hawaiian scenery. Select the scenario that demonstrates plagiarism. • In a blog post, Katriana paraphrases portions of an interview about her favorite author, and includes a hyperlink to the interview. • In his essay, James rewords a paragraph about an idea that he got from another author, without naming the author. • Savasha uses open source software to develop a new web design manual for her sales company. • Carissa downloads an entire album of music from a file-sharing website. Select the true statement about network protocols. • Communication cannot take place unless the protocol is executed in the same way on all devices. • One function of a protocol is to decompress data when it is delivered to the receiving computer. • Computers that are distributed across a large geographic area need a special protocol to resolve errors. • Using a protocol other than TCP/IP can result in data loss. Amanda and her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family? • PAN • MAN • WAN • LAN Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using? • PAN • LAN • WAN Select the social media site that is an idea-sharing website. • Pinterest • Google+ • QQ • QZone In which of the following scenarios can a trademark be applied? • Mark writes and records a new song for his rock band. • Twila paints a picture of Hawaiian scenery. • Peter names his new business “Garden Ornaments.” • Merle designs a web page for Peter’s business. 2 Select the scenario that demonstrates plagiarism. • Dylan contributes some of his own research to an entry on Wikipedia, and includes a citation for his recent book. • Allison makes a video of herself using sound effects that she clipped from the soundtrack of a popular action movie to market her business. • Summer finds a recent magazine article about an issue that she wants to discuss with her class, so she makes copies of it for the students. • Joseph finds a written passage about a new idea to stop cyberbullying and pastes it into his blog entry without giving credit to its author. T 3 Amanda and her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family? • LAN • PAN • WAN • MAN 4 Select the FALSE statement about the history of the Internet. • The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union. • ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah. • The invention of HTML enabled computers on different networks to communicate with each other. • The Internet means “an interconnected network of networks.” 5 Select the true statement about network protocols. • Protocols determine the best method for resolving errors with data encryption. • Every computer uses the same protocol to communicate, regardless of the network type. • The primary function of a protocol is to compress data to reduce storage requirements. • A protocol is a rule for transmitting data between computing devices. 6 While Kari was searching the Internet, her computer was infected by a virus. What problem can Kari expect as a result? • The code will install software that looks useful but compromises her system's security. • A toolbar will be installed that redirects her Web browser to pirated sites. • The virus will attach itself to the computer's RAM, then attach itself to executable files in RAM. • Her keystrokes will be recorded and used by hackers to steal her personal and financial information. 7 Select the true statement about HTML. • HTML is a language that is used to create Web pages. • HTML tags tell a web browser when to run HTTP sequences. • HTML is used to distribute websites. • HTML supports the delivery of Web pages through HTTP. 8 Select the true statement about COPPA. • The COPPA regulations require that parents of children under the age of 13 be given instructions on how to maintain privacy. • The COPPA regulations state that websites may not collect information from minors under the age of 13. • The COPPA regulations restrict a child's access to harmful content. • The COPPA regulations apply to websites that collect information from children. 9 Which of the following can be controlled by copyright? • The name of a college football team • A song written by the Beatles • The Adidas stripe logo • The advertising slogan for a national car sales chain 10 The standard interface technology for wireless networks is . The hardware component necessary for computers to connect to these networks is a . • wireless fidelity; WAP • wireless-internet protocol; TCP • transmission control protocol; IP • wireless-defined networking; WAP 11 Select the sign of computer addiction that indicates neglect. • Fearing she would lose her place in the standings of an online game, Rachel declined to attend her cousin's wedding. • When confronted by her employer about the amount of time she spent checking her social media account at work, Heidi claimed that she only checks it during her breaks, and at lunch. • When confronted by his parents about the excessive amount of time he spent playing video games, Tom claims that he plays for only an hour every day. • While waiting in the light-rail station, David became so absorbed in an online political post that he missed his train and was late for work. 12 Select the social media site that is an idea-sharing website. • QZone • Google+ • Pinterest • QQ 13 Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using? • LAN • MAN • WAN • PAN 14 Gilbert is an independent consultant who helps organizations select the right accounting software for their needs. After evaluating a local nonprofit organization, Gilbert recommended an accounting software package that he believes meets specifications, secures documents, and satisfies user requirements. Gilbert did not tell his client that he owns a 25% share in the business that developed the software, and that he will benefit if the organization decides to purchase the software he recommends. Which principle of the Software Engineering Code of Ethics has Gilbert violated? • Principle 4: Judgment • Principle 3: Product • Principle 1: Public • Principle 2: Client and Employer 15 Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent. What should Eva do to remove the offending program, and prevent future attacks? • Eva should run an anti-spyware program. • Eva should change her method of user authentication. • Eva should upgrade her system to WPA encryption. • Eva should run an antivirus program. [Show More]

Last updated: 1 year ago

Preview 1 out of 22 pages

Add to cart

Instant download

OR

Reviews( 0 )

Recommended For You

 Information Technology> Exam > Kaperskey Exam. Questions and Answers. (All)

Kaperskey Exam. Questions and Answers.

Question 1 To deploy protection in a network, you need to install Network Agents (1), install Kaspersky Endpoint Security (2), install the Administration Server (3). Select the recommended deployme...

By Kirsch 1 year ago

Exam

$11

0  

 Information Technology> Exam > Sophia University CS-121 / CSCI-E121 sophia milestone 2. (All)

Sophia University CS-121 / CSCI-E121 sophia milestone 2.

Sophia University CS-121 / CSCI-E121 sophia milestone 2. 1 Katelynn and Genevieve want to make flyers to advertise their school's play. They will collaborate on the flyer document online, and remote...

By Expert1 2 years ago

Exam

$9

0  

 Information Technology> Exam > SOPHIA PATHWAY IT Unit 2 Unit 2 - Milestone 2, Complete Answers (Fall 2020) (All)

SOPHIA PATHWAY IT Unit 2 Unit 2 - Milestone 2, Complete Answers (Fall 2020)

SOPHIA PATHWAY IT Unit 2 Unit 2 - Milestone 2, Complete Answers (Fall 2020) Select the data type that can only be classified as a number. • 13:30 • $1,253.12 • 11/10/11 • 83.152 De...

By Expert1 2 years ago

Exam

$15

0  

 Information Technology> Exam > Sophia_Information And Communications Technology|Unit 4 - Milestone 4 (All)

Sophia_Information And Communications Technology|Unit 4 - Milestone 4

Sophia IT Milestone 4 unit 4 Zehra works with a software development team. One of his tasks is to define the overall structure of an application and divide it into components to be developed. What...

By Expert1 2 years ago

Exam

$13

1  

 Information Technology> Exam > Georgia Institute Of Technology - ISYE 6501Midterm Quiz 2 - GT Students and Verified MM Learners _ Midterm Quiz 2 _ ISYE6501x Courseware (All)

Georgia Institute Of Technology - ISYE 6501Midterm Quiz 2 - GT Students and Verified MM Learners _ Midterm Quiz 2 _ ISYE6501x Courseware

Midterm Quiz 2 - GT Students and Veried MM Learners 90 Minute Time Limit Instructions Work alone. Do not collaborate with or copy from anyone else. You may use any of the following resources: One...

By NBS***** 1 year ago

Exam

$6

0  

 Information Technology> Exam > Hinds Community College - IST 1124;IT final milestone_all answers 100% correct. (All)

Hinds Community College - IST 1124;IT final milestone_all answers 100% correct.

IT final milestone. You passed this Milestone 25 questions were answered correctly. 1 Which of the following can be controlled by copyright? • The team logo for a minor league baseball team •...

By Expert1 2 years ago

Exam

$19

0  

 Information Technology> Exam > Sophia University - IT 100 | Sophia Intro to IT Milestone Final. (Summer 2020) Already passed. (All)

Sophia University - IT 100 | Sophia Intro to IT Milestone Final. (Summer 2020) Already passed.

Sophia Intro to IT Milestone Final Score 24/25 1 Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software develop...

By Expert1 2 years ago

Exam

$10

1  

 Information Technology> Exam > SOPHIA PATHWAY Information Technology Unit 3 - Milestone 3. (Already Passed) 100% Correct (Fall 2020) (All)

SOPHIA PATHWAY Information Technology Unit 3 - Milestone 3. (Already Passed) 100% Correct (Fall 2020)

SOPHIA PATHWAY Information Technology Unit 3 - Milestone 3. The standard interface technology for wireless networks is __________. The hardware component necessary for computers to connect to thes...

By Expert1 2 years ago

Exam

$15

0  

 Information Technology> Exam > ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University. (All)

ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University.

ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University./ISM 3541 EXAM 1/KERWIN (LATEST) Download to Score A: Florida State University./ISM 3541 EXAM 1/KERWIN (LATEST) Download t...

By Rixx Dennis 1 year ago

Exam

$4

2  

 Information Technology> Exam > Examen Kaspersky Certified| Latest| Download for Grade A+ (All)

Examen Kaspersky Certified| Latest| Download for Grade A+

Question 1 What happens when the extended KSN mode is enabled? 1. When the extended KSN mode is enabled, Kaspersky Security Center switches to the KSN Proxy mode and starts caching all requests se...

By Quiz Merchant 1 year ago

Exam

$12.5

0  

Exam

$16.00

Add to cart

Instant download

OR

Can't Find what you want?

PLACE CUSTOM WRITING ORDER
193
0

Document information


Connected school, study & course



About the document


Uploaded

1 year ago

Number of pages

22

Written in

All

Type

Exam

Seller


securegrades

Member since 2 years ago

100 Documents Sold


Additional information

This document has been written for:

Course

Information Technology

Paper Category

Exam

Uploaded

1 year ago

Downloads

 0

Views

 193

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·