100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

IT 105 Final Exam GMU QUESTIONS AND ANSWERS 100% ACCURATE.

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
29-05-2025
Geschreven in
2024/2025

IT 105 Final Exam GMU QUESTIONS AND ANSWERS 100% ACCURATE.

Instelling
IT
Vak
IT









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
IT
Vak
IT

Documentinformatie

Geüpload op
29 mei 2025
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

IT 105 Final Exam GMU QUESTIONS AND ANSWERS 100% ACCURATE.




True - A computer worm is a standalone malware computer program that replicates itself in
order to spread to other computers

False - Hoax viruses flood a targeted computer with so many requests that it cripples
functionality.

True - The most complex type of firewall is the application proxy firewall

True - A router is a hardware component used to interconnect networks

4 - How many layers are there in the TCP/IP protocol suite?

128 - IPv6 addresses are how many bits long?

False - UDP provides sequencing, error control and flow control just like TCP

CAT 2, CAT 3, and CAT 5 - What are standard twisted pair cables?

Contextual Computing - Which technology uses software and hardware to automatically collect
and analyze data about a device's surroundings, to present relevant, actionable information to the
end user?

Workplace Hub - Which technology serves as a centralized IT ecosystem that automates IT
processes and unifies all of user's existing technologies (including hardware, software, and
services) into a one stop connected platform?

Non-Immersive, Semi-immersive, and Fully-immersive - Simulation types for implementing of
virtual reality technology?

CNN, DNN, and LSTM - Deep Learning Algorithms?

Big Data Analytics - the process of examining large and varied data sets to uncover hidden
patterns, correlations, and information to help make business decisions

172.16.64.0 - subnet

Class A - terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7

False - Decryption is the process of converting plaintext into ciphertext

False - Serial transmission is described as transmitting a group of bits at a single instant in time,
which requires multiple paths

, True - Malware refers to any computer program designed to surreptitiously enter a digital device.

False - Private-key functions involve the use of two keys during the process of Private-key
encryption.

transport - Which OSI layer offers reliable, connection-oriented data communication services?

164.20.31.9 - Which of the following is an IPv4 address?

EULA (End User License Agreement) - Agreement between the user and the software publisher

hot-plugging - When a peripheral device is connected or disconnected while the host device is
operating

IoT smart sensors - work behind the scenes to collect data and use it to improve just about
anything

Anonymizing data - What happens to the data they collect, however, can pose security and
privacy risks

the time it takes for one pixel to change from black to white than back to black. 5 ms or less -
What is the response rate in the context of image quality in display devices?

Offline (CD), Online, .exe (Windows), .dmg and .app (Mac), CNET, Tucows, Developer
Website - Software Distribution

One-time purchase - The software remains the same as when it was purchased

Subscription - consumers pay an annual fee to use software; updates and upgrades are usually
included in the pricing

Trial - consumers use a software product during a free trial period

Freemium - provides free use of a stripped-down or basic version of the product but requires
payment for upgraded features

license agreements - displayed during the installation process; by clicking the I agree button, you
consent to the terms of the license agreement

Open source software - Makes uncompiled program instructions-the source code- available to
programmers who want to modify and improve the software. (Linux, FileZilla) Includes source
code

Telecommunication - is the distance transfer of meaningful information from a source location to
a destination location. Does this through cable (copper or fiber)
$11.49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
GradeVaultAcademy

Maak kennis met de verkoper

Seller avatar
GradeVaultAcademy Havard School
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
6 maanden
Aantal volgers
0
Documenten
841
Laatst verkocht
4 maanden geleden
GradeVault Academy.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen