Network _____ specify how computers access a network, data transmission speeds, and
the types of hardware the network uses, including cable and wireless technology.
Give this one a try later!
Net neutrality supports the concept that the Internet should be neutral and
all traffic should be treated equally.
,Which term refers to the science that specifies the design and arrangement of items
you use so you interact with the items efficiently and safely?
Give this one a try later!
Ergonomics is an applied science that specifies the design and
arrangement of items that you use, such as posture techniques, so that you
and items interact efficiently and safely.
Emma needs to purchase a note-taking app for her iPhone. Which of the following
sources is typically safe for purchasing the app?
Give this one a try later!
Unfamiliar websites, or a link in an email or popup window, may sell
programs and apps that have been modified to contain elements that may
endanger the system or data, or they may be selling the product illegally.
Which of the following forms of identity theft involves posing as a legitimate
researcher to ask for personal information?
Give this one a try later!
pretexting
The set of activities performed to build a program is called the _____.
Give this one a try later!
, Adaptive or agile development methodology is more responsive to rapidly
changing technologies and markets
Siobhan has recently opened a Facebook account and as a new user, is posting
frequently and accepting many friend requests. You see a post about an upcoming
trip and notice that her profile is open to the public. What can you tell Siobhan to
help her use social networking safely?
Give this one a try later!
Several general defenses can be used for any social-networking site. First
and foremost, be cautious about what information you post. Second, be
cautious about who can view your information. Consider carefully who you
accept as friends. Finally, review the site's security settings.
When including an image in HTML code, you would use the <a href> tag.
True or False?
Give this one a try later!
The <img> tag specifies information about an image to display on a website.
Which commonly used programming language is used to manage, access, and search
for database content?
Give this one a try later!
the types of hardware the network uses, including cable and wireless technology.
Give this one a try later!
Net neutrality supports the concept that the Internet should be neutral and
all traffic should be treated equally.
,Which term refers to the science that specifies the design and arrangement of items
you use so you interact with the items efficiently and safely?
Give this one a try later!
Ergonomics is an applied science that specifies the design and
arrangement of items that you use, such as posture techniques, so that you
and items interact efficiently and safely.
Emma needs to purchase a note-taking app for her iPhone. Which of the following
sources is typically safe for purchasing the app?
Give this one a try later!
Unfamiliar websites, or a link in an email or popup window, may sell
programs and apps that have been modified to contain elements that may
endanger the system or data, or they may be selling the product illegally.
Which of the following forms of identity theft involves posing as a legitimate
researcher to ask for personal information?
Give this one a try later!
pretexting
The set of activities performed to build a program is called the _____.
Give this one a try later!
, Adaptive or agile development methodology is more responsive to rapidly
changing technologies and markets
Siobhan has recently opened a Facebook account and as a new user, is posting
frequently and accepting many friend requests. You see a post about an upcoming
trip and notice that her profile is open to the public. What can you tell Siobhan to
help her use social networking safely?
Give this one a try later!
Several general defenses can be used for any social-networking site. First
and foremost, be cautious about what information you post. Second, be
cautious about who can view your information. Consider carefully who you
accept as friends. Finally, review the site's security settings.
When including an image in HTML code, you would use the <a href> tag.
True or False?
Give this one a try later!
The <img> tag specifies information about an image to display on a website.
Which commonly used programming language is used to manage, access, and search
for database content?
Give this one a try later!