100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SOPHIA PATHWAY IT MILESTONE 3 ( 2021 latest update )

Puntuación
-
Vendido
-
Páginas
9
Grado
A+
Subido en
06-11-2021
Escrito en
2021/2022

SOPHIA PATHWAY IT MILESTONE 3. is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of . Ethernet; SDN Wired fidelity; WAP LAN; IP Ethernet; TCP RATIONALE Ethernet is the standard interface for wired networks. It is the most widely-installed local area network (LAN) technology. Software-defined networking (SDN) is a concept in computer networking that makes it easier to innovate and adapt a network to meet changing demands quickly. CONCEPT Computer Network Components 2 Select the true statement about HTML. HTML tags tell a web browser when to run HTTP sequences. HTML is used to distribute websites. HTML is a language that is used to create Web pages. HTML supports the delivery of Web pages through HTTP. RATIONALE Hypertext markup language (HTML) is the most basic building block of the Web. It is used to apply structure and format to the content of Web pages. In addition to HTML, other tools are used to add interactivity and other functionality to Web pages. CONCEPT Website Development 3 Select the true statement about network protocols. Computers that are distributed across a large geographic area need a special protocol to resolve errors. One function of a protocol is to decompress data when it is delivered to the receiving computer. Using a protocol other than TCP/IP can result in data loss. Communication cannot take place unless the protocol is executed in the same way on all devices. RATIONALE A protocol is a system of rules that enables two or more entities (computer devices) in a communications system to send and receive information. Communication cannot take place unless the protocol is executed in exactly the same way on all devices. CONCEPT Introduction to Computer Networks 4 David’s computer is infected with spyware. What problem can David expect as a result? His computer will be infected by a virus that could delete his files. Hackers will steal his files through pop-up windows. The malware will install a toolbar that redirects his web browser. Information about his computer usage will be sent to an outside party. RATIONALE Spyware is a security risk because it usually compromises data confidentiality. David should be concerned that information about his computer usage will be sent to an outside party. CONCEPT Network Security 5 Select the FALSE statement about the history of the Internet. The invention of HTML enabled computers on different networks to communicate with each other. ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah. The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union. The Internet means “an interconnected network of networks.” RATIONALE The launch of Sputnik by the Soviet Union motivated the U.S. to develop technology that enabled data transmission between computers. APRANET connected computers at UCLA, Stanford, MIT and the University of Utah in 1969. ARPANET was a predecessor of the Internet — "an interconnected network of networks." The invention of TCP/IP in 1982 provided an intermediary protocol that enabled computers on different networks to communicate with each other. HTML (Hypertext Markup Language) is the language in which most web content is written, and is a fundamental component of the "World Wide Web." CONCEPT The World Wide Web 6 Select the scenario that demonstrates plagiarism. In his essay, James rewords a paragraph about an idea that he got from another author, without naming the author. Savasha uses open source software to develop a new web design manual for her sales company. In a blog post, Katriana paraphrases portions of an interview about her favorite author, and includes a hyperlink to the interview. Carissa downloads an entire album of music from a file-sharing website. RATIONALE In his essay, James reworded a paragraph about an idea he got from an author without naming that author. This is plagiarism, because James took the work or idea of another and presented it as his own. By paraphrasing and including a link to the interview, Katriana did not plagiarize. By downloading an entire album of music from a file-sharing website, Clarissa is using works protected by copyright law without permission. This is a form of copyright infringement, but it is not plagiarism. Open source software can be used and shared freely, so Savasha is not guilty of copyright infringement. CONCEPT Ethical Behavior in the Digital World 7 Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this. Which computer addiction symptom is Chip experiencing? Neglect Downplaying Uncomfortable feelings Lack of control RATIONALE Chip is experiencing the downplaying symptom of computer addiction because he attempts to justify his unreasonable interest in surfing the net. CONCEPT Computer Addiction 8 Select the true statement about CIPA. Public schools and organizations are required to install anti-virus software on all computers accessed by children. Parental consent is required for users under 13 before the site may collect information. Enforcement is handled by the Federal Trade Commission (FTC). Entities are required to have a hearing or forum to notify the public of its Internet safety policy. RATIONALE According to COPPA regulations, enforcement is handled by the Federal Trade Commission (FTC), and parental consent is required for users under 13 before the site can collect information. However, according to CIPA regulations, entities are required to have a hearing or forum to notify the public of its internet safety policy. Neither CIPA nor COPPA requires public schools and organizations to install anti-virus software on all computers accessed by children. CONCEPT Protecting Minors from Online Dangers 9 Which of the following can be controlled by copyright? A lip-sync video of a popular song posted to YouTube A new cancer medication approved by the FDA The name of a publicly-traded company The logo of the Oklahoma City Thunder professional basketball team RATIONALE Copyright is used to protect content, including digital content, and to control who can distribute, share, or reproduce a work. A lip-sync video of a popular song that is posted to YouTube can be controlled by copyright because the copyright holder can limit how the song is shared publicly. The name of a publicly-traded company or the logo of a professional sports team cannot be controlled by copyright. Inventions, including new cancer medications, are subject to patent protections— not copyright protections. CONCEPT Copyright, Trademark and Intellectual Property 10 Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly. Which type of network is best for Shayne? MAN LAN PAN WAN RATIONALE The most appropriate network for Shayne is a personal area network (PAN), because it is used to share data between personal devices that are close to each other (e.g., computers, mobile phones, and tablets). CONCEPT Computer Network Types 11 In which of the following scenarios can a trademark be applied? Peter names his new business “Garden Ornaments.” Merle designs a web page for Peter’s business. Mark writes and records a new song for his rock band. Twila paints a picture of Hawaiian scenery. RATIONALE The main difference between copyright and trademark is that a copyright protects content and a trademark protects a brand. Twila, Merle, and Mark are protected by copyright because they are the creators of particular content. Peter's business brand is protected by trademark. CONCEPT Copyright, Trademark and Intellectual Property 12 Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using? WAN LAN MAN PAN RATIONALE A metropolitan area network (MAN) is a computer network that connects users with computer resources in a geographic area that is larger than the area covered by a local area network (LAN), but smaller than the area covered by a wide area network (WAN). CONCEPT Computer Network Types 13 Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated? Principle 7: Colleagues Principle 8: Self Principle 6: Profession Principle 3: Product RATIONALE Victor violated the "Colleagues" principle of the Software Engineering Code of Ethics. According to the code, software engineers shall be fair to, and supportive of, their colleagues. Additionally, this principle includes an annotation that explicitly addresses Victor's unethical behavior: Software engineers shall fully credit the work of others, and refrain from taking undue credit. CONCEPT Professional Code of Ethics 14 Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent. What should Eva do to remove the offending program, and prevent future attacks? Eva should run an anti-spyware program. Eva should change her method of user authentication. Eva should run an antivirus program. Eva should upgrade her system to WPA encryption. RATIONALE Eva should download and install a spyware removal program. These are often bundled with virus protection software and firewalls, but are also available separately. Eva should also choose her downloads carefully. She must download only from reputable companies that have posted disclosure statements for users to review. CONCEPT Network Security 15 is a mobile application used primarily to share photos and videos with others. LinkedIn QQ Instagram Twitter RATIONALE Instagram is a mobile photo sharing application, which enables users to share photos and videos with "followers."

Mostrar más Leer menos









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Información del documento

Subido en
6 de noviembre de 2021
Número de páginas
9
Escrito en
2021/2022
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
abram23 Adams State College
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
672
Miembro desde
5 año
Número de seguidores
545
Documentos
3368
Última venta
3 meses hace
QUALITY WORK OF ALL KIND OF QUIZ or EXAM WITH GUARANTEE OF AN A

Im an expert on major courses especially; psychology,Nursing, Human resource Management & Project writting.Assisting students with quality work is my first priority. I ensure scholarly standards in my documents . I assure a GOOD GRADE if you will use my work.

4.0

141 reseñas

5
78
4
25
3
16
2
3
1
19

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes