Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SOPHIA PATHWAY IT MILESTONE 3.

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
17-11-2021
Written in
2022/2023

SOPHIA PATHWAY IT MILESTONE 3. is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of . Ethernet; SDN Wired fidelity; WAP LAN; IP Ethernet; TCP RATIONALE Ethernet is the standard interface for wired networks. It is the most widely-installed local area network (LAN) technology. Software-defined networking (SDN) is a concept in computer networking that makes it easier to innovate and adapt a network to meet changing demands quickly. CONCEPT Computer Network Components 2 Select the true statement about HTML. HTML tags tell a web browser when to run HTTP sequences. HTML is used to distribute websites. HTML is a language that is used to create Web pages. HTML supports the delivery of Web pages through HTTP. RATIONALE Hypertext markup language (HTML) is the most basic building block of the Web. It is used to apply structure and format to the content of Web pages. In addition to HTML, other tools are used to add interactivity and other functionality to Web pages. CONCEPT Website Development 3 Select the true statement about network protocols. Computers that are distributed across a large geographic area need a special protocol to resolve errors. One function of a protocol is to decompress data when it is delivered to the receiving computer. Using a protocol other than TCP/IP can result in data loss. Communication cannot take place unless the protocol is executed in the same way on all devices. RATIONALE A protocol is a system of rules that enables two or more entities (computer devices) in a communications system to send and receive information. Communication cannot take place unless the protocol is executed in exactly the same way on all devices. CONCEPT Introduction to Computer Networks 4 David’s computer is infected with spyware. What problem can David expect as a result? His computer will be infected by a virus that could delete his files. Hackers will steal his files through pop-up windows. The malware will install a toolbar that redirects his web browser. Information about his computer usage will be sent to an outside party. RATIONALE Spyware is a security risk because it usually compromises data confidentiality. David should be concerned that information about his computer usage will be sent to an outside party. CONCEPT Network Security 5 Select the FALSE statement about the history of the Internet. The invention of HTML enabled computers on different networks to communicate with each other. ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah. The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union. The Internet means “an interconnected network of networks.” RATIONALE The launch of Sputnik by the Soviet Union motivated the U.S. to develop technology that enabled data transmission between computers. APRANET connected computers at UCLA, Stanford, MIT and the University of Utah in 1969. ARPANET was a predecessor of the Internet — "an interconnected network of networks." The invention of TCP/IP in 1982 provided an intermediary protocol that enabled computers on different networks to communicate with each other. HTML (Hypertext Markup Language) is the language in which most web content is written, and is a fundamental component of the "World Wide Web." CONCEPT The World Wide Web 6 Select the scenario that demonstrates plagiarism. In his essay, James rewords a paragraph about an idea that he got from another author, without naming the author. Savasha uses open source software to develop a new web design manual for her sales company. In a blog post, Katriana paraphrases portions of an interview about her favorite author, and includes a hyperlink to the interview. Carissa downloads an entire album of music from a file-sharing website. RATIONALE In his essay, James reworded a paragraph about an idea he got from an author without naming that author. This is plagiarism, because James took the work or idea of another and presented it as his own. By paraphrasing and including a link to the interview, Katriana did not plagiarize. By downloading an entire album of music from a file-sharing website, Clarissa is using works protected by copyright law without permission. This is a form of copyright infringement, but it is not plagiarism. Open source software can be used and shared freely, so Savasha is not guilty of copyright infringement. CONCEPT Ethical Behavior in the Digital World 7 Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this. Which computer addiction symptom is Chip experiencing? Neglect Downplaying Uncomfortable feelings Lack of control RATIONALE Chip is experiencing the downplaying symptom of computer addiction because he attempts to justify his unreasonable interest in surfing the net. CONCEPT Computer Addiction 8 Select the true statement about CIPA. Public schools and organizations are required to install anti-virus software on all computers accessed by children. Parental consent is required for users under 13 before the site may collect information. Enforcement is handled by the Federal Trade Commission (FTC). Entities are required to have a hearing or forum to notify the public of its Internet safety policy. RATIONALE According to COPPA regulations, enforcement is handled by the Federal Trade Commission (FTC), and parental consent is required for users under 13 before the site can collect information. However, according to CIPA regulations, entities are required to have a hearing or forum to notify the public of its internet safety policy. Neither CIPA nor COPPA requires public schools and organizations to install anti-virus software on all computers accessed by children. CONCEPT Protecting Minors from Online Dangers 9 Which of the following can be controlled by copyright? A lip-sync video of a popular song posted to YouTube A new cancer medication approved by the FDA The name of a publicly-traded company The logo of the Oklahoma City Thunder professional basketball team RATIONALE Copyright is used to protect content, including digital content, and to control who can distribute, share, or reproduce a work. A lip-sync video of a popular song that is posted to YouTube can be controlled by copyright because the copyright holder can limit how the song is shared publicly. The name of a publicly-traded company or the logo of a professional sports team cannot be controlled by copyright. Inventions, including new cancer medications, are subject to patent protections— not copyright protections. CONCEPT Copyright, Trademark and Intellectual Property 10 Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly. Which type of network is best for Shayne? MAN LAN PAN WAN RATIONALE The most appropriate network for Shayne is a personal area network (PAN), because it is used to share data between personal devices that are close to each other (e.g., computers, mobile phones, and tablets). CONCEPT Computer Network Types 11 In which of the following scenarios can a trademark be applied? Peter names his new business “Garden Ornaments.” Merle designs a web page for Peter’s business. Mark writes and records a new song for his rock band. Twila paints a picture of Hawaiian scenery. RATIONALE The main difference between copyright and trademark is that a copyright protects content and a trademark protects a brand. Twila, Merle, and Mark are protected by copyright because they are the creators of particular content. Peter's business brand is protected by trademark. CONCEPT Copyright, Trademark and Intellectual Property 12 Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using? WAN LAN MAN PAN RATIONALE A metropolitan area network (MAN) is a computer network that connects users with computer resources in a geographic area that is larger than the area covered by a local area network (LAN), but smaller than the area covered by a wide area network (WAN). CONCEPT Computer Network Types 13 Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated? Principle 7: Colleagues Principle 8: Self Principle 6: Profession Principle 3: Product RATIONALE Victor violated the "Colleagues" principle of the Software Engineering Code of Ethics. According to the code, software engineers shall be fair to, and supportive of, their colleagues. Additionally, this principle includes an annotation that explicitly addresses Victor's unethical behavior: Software engineers shall fully credit the work of others, and refrain from taking undue credit. CONCEPT Professional Code of Ethics 14 Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent. What should Eva do to remove the offending program, and prevent future attacks? Eva should run an anti-spyware program. Eva should change her method of user authentication. Eva should run an antivirus program. Eva should upgrade her system to WPA encryption. RATIONALE Eva should download and install a spyware removal program. These are often bundled with virus protection software and firewalls, but are also available separately. Eva should also choose her downloads carefully. She must download only from reputable companies that have posted disclosure statements for users to review. CONCEPT Network Security 15 is a mobile application used primarily to share photos and videos with others. LinkedIn QQ Instagram Twitter RATIONALE Instagram is a mobile photo sharing application, which enables users to share photos and videos with "followers."

Show more Read less
Institution
SOPHIA PATHWAY IT MILESTONE 3.
Course
SOPHIA PATHWAY IT MILESTONE 3.









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SOPHIA PATHWAY IT MILESTONE 3.
Course
SOPHIA PATHWAY IT MILESTONE 3.

Document information

Uploaded on
November 17, 2021
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSEREP Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
595
Member since
5 year
Number of followers
424
Documents
2677
Last sold
2 weeks ago
NURSEREP

On this page, you find all documents, package deals, and flashcards offered by seller NURSEREP

4.7

327 reviews

5
285
4
20
3
9
2
4
1
9

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions