SOPHIA PATHWAY IT MILESTONE 3 ( 2021 latest update )
SOPHIA PATHWAY IT MILESTONE 3. is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of . Ethernet; SDN Wired fidelity; WAP LAN; IP Ethernet; TCP RATIONALE Ethernet is the standard interface for wired networks. It is the most widely-installed local area network (LAN) technology. Software-defined networking (SDN) is a concept in computer networking that makes it easier to innovate and adapt a network to meet changing demands quickly. CONCEPT Computer Network Components 2 Select the true statement about HTML. HTML tags tell a web browser when to run HTTP sequences. HTML is used to distribute websites. HTML is a language that is used to create Web pages. HTML supports the delivery of Web pages through HTTP. RATIONALE Hypertext markup language (HTML) is the most basic building block of the Web. It is used to apply structure and format to the content of Web pages. In addition to HTML, other tools are used to add interactivity and other functionality to Web pages. CONCEPT Website Development 3 Select the true statement about network protocols. Computers that are distributed across a large geographic area need a special protocol to resolve errors. One function of a protocol is to decompress data when it is delivered to the receiving computer. Using a protocol other than TCP/IP can result in data loss. Communication cannot take place unless the protocol is executed in the same way on all devices. RATIONALE A protocol is a system of rules that enables two or more entities (computer devices) in a communications system to send and receive information. Communication cannot take place unless the protocol is executed in exactly the same way on all devices. CONCEPT Introduction to Computer Networks 4 David’s computer is infected with spyware. What problem can David expect as a result? His computer will be infected by a virus that could delete his files. Hackers will steal his files through pop-up windows. The malware will install a toolbar that redirects his web browser. Information about his computer usage will be sent to an outside party. RATIONALE Spyware is a security risk because it usually compromises data confidentiality. David should be concerned that information about his computer usage will be sent to an outside party. CONCEPT Network Security 5 Select the FALSE statement about the history of the Internet. The invention of HTML enabled computers on different networks to communicate with each other. ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah. The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union. The Internet means “an interconnected network of networks.” RATIONALE The launch of Sputnik by the Soviet Union motivated the U.S. to develop technology that enabled data transmission between computers. APRANET connected computers at UCLA, Stanford, MIT and the University of Utah in 1969. ARPANET was a predecessor of the Internet — "an interconnected network of networks." The invention of TCP/IP in 1982 provided an intermediary protocol that enabled computers on different networks to communicate with each other. HTML (Hypertext Markup Language) is the language in which most web content is written, and is a fundamental component of the "World Wide Web." CONCEPT The World Wide Web 6 Select the scenario that demonstrates plagiarism. In his essay, James rewords a paragraph about an idea that he got from another author, without naming the author. Savasha uses open source software to develop a new web design manual for her sales company. In a blog post, Katriana paraphrases portions of an interview about her favorite author, and includes a hyperlink to the interview. Carissa downloads an entire album of music from a file-sharing website. RATIONALE In his essay, James reworded a paragraph about an idea he got from an author without naming that author. This is plagiarism, because James took the work or idea of another and presented it as his own. By paraphrasing and including a link to the interview, Katriana did not plagiarize. By downloading an entire album of music from a file-sharing website, Clarissa is using works protected by copyright law without permission. This is a form of copyright infringement, but it is not plagiarism. Open source software can be used and shared freely, so Savasha is not guilty of copyright infringement. CONCEPT Ethical Behavior in the Digital World 7 Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this. Which computer addiction symptom is Chip experiencing? Neglect Downplaying Uncomfortable feelings Lack of control RATIONALE Chip is experiencing the downplaying symptom of computer addiction because he attempts to justify his unreasonable interest in surfing the net. CONCEPT Computer Addiction 8 Select the true statement about CIPA. Public schools and organizations are required to install anti-virus software on all computers accessed by children. Parental consent is required for users under 13 before the site may collect information. Enforcement is handled by the Federal Trade Commission (FTC). Entities are required to have a hearing or forum to notify the public of its Internet safety policy. RATIONALE According to COPPA regulations, enforcement is handled by the Federal Trade Commission (FTC), and parental consent is required for users under 13 before the site can collect information. However, according to CIPA regulations, entities are required to have a hearing or forum to notify the public of its internet safety policy. Neither CIPA nor COPPA requires public schools and organizations to install anti-virus software on all computers accessed by children. CONCEPT Protecting Minors from Online Dangers 9 Which of the following can be controlled by copyright? A lip-sync video of a popular song posted to YouTube A new cancer medication approved by the FDA The name of a publicly-traded company The logo of the Oklahoma City Thunder professional basketball team RATIONALE Copyright is used to protect content, including digital content, and to control who can distribute, share, or reproduce a work. A lip-sync video of a popular song that is posted to YouTube can be controlled by copyright because the copyright holder can limit how the song is shared publicly. The name of a publicly-traded company or the logo of a professional sports team cannot be controlled by copyright. Inventions, including new cancer medications, are subject to patent protections— not copyright protections. CONCEPT Copyright, Trademark and Intellectual Property 10 Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly. Which type of network is best for Shayne? MAN LAN PAN WAN RATIONALE The most appropriate network for Shayne is a personal area network (PAN), because it is used to share data between personal devices that are close to each other (e.g., computers, mobile phones, and tablets). CONCEPT Computer Network Types 11 In which of the following scenarios can a trademark be applied? Peter names his new business “Garden Ornaments.” Merle designs a web page for Peter’s business. Mark writes and records a new song for his rock band. Twila paints a picture of Hawaiian scenery. RATIONALE The main difference between copyright and trademark is that a copyright protects content and a trademark protects a brand. Twila, Merle, and Mark are protected by copyright because they are the creators of particular content. Peter's business brand is protected by trademark. CONCEPT Copyright, Trademark and Intellectual Property 12 Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using? WAN LAN MAN PAN RATIONALE A metropolitan area network (MAN) is a computer network that connects users with computer resources in a geographic area that is larger than the area covered by a local area network (LAN), but smaller than the area covered by a wide area network (WAN). CONCEPT Computer Network Types 13 Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated? Principle 7: Colleagues Principle 8: Self Principle 6: Profession Principle 3: Product RATIONALE Victor violated the "Colleagues" principle of the Software Engineering Code of Ethics. According to the code, software engineers shall be fair to, and supportive of, their colleagues. Additionally, this principle includes an annotation that explicitly addresses Victor's unethical behavior: Software engineers shall fully credit the work of others, and refrain from taking undue credit. CONCEPT Professional Code of Ethics 14 Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent. What should Eva do to remove the offending program, and prevent future attacks? Eva should run an anti-spyware program. Eva should change her method of user authentication. Eva should run an antivirus program. Eva should upgrade her system to WPA encryption. RATIONALE Eva should download and install a spyware removal program. These are often bundled with virus protection software and firewalls, but are also available separately. Eva should also choose her downloads carefully. She must download only from reputable companies that have posted disclosure statements for users to review. CONCEPT Network Security 15 is a mobile application used primarily to share photos and videos with others. LinkedIn QQ Instagram Twitter RATIONALE Instagram is a mobile photo sharing application, which enables users to share photos and videos with "followers."
Escuela, estudio y materia
Información del documento
- Subido en
- 6 de noviembre de 2021
- Número de páginas
- 9
- Escrito en
- 2021/2022
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
sophia pathway it milestone 3 is the standard interface for all wired networks the addition or removal of users from a wired network by an administrator is an example of ethernet sdn wired f