EUC1501 ASSIGNMENT 2
FOR 1ST SEMESTER 2025
FEND TUTORIALS
, Started on Tuesday, 4 February 2025, 6:58 PM
State Finished
Completed on Tuesday, 4 February 2025, 7:21 PM
Time taken 23 mins 45 secs
Grade 90.00 out of 100.00
Question 1
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
How can you check data on devices connected through an IoT network?
Select one:
A.
Use a desktop
B.
Use a server
C.
Use a tablet
D.
Use a network tracker
Feedback
The correct answer is: Use a tablet
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why is the modified data on a file useful?
Select one:
A.
It identifies the most recent version.
B.
It identifies the day it was created.
C.
,It identifies the location of the file.
D.
It identifies the last time the file was opened.
Feedback
The correct answer is: It identifies the most recent version.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
How is a worm different from a Trojan?
Select one:
a.
A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the
network.
b.
A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads
through a network.
c.
A worm spreads through a network, whereas a Trojan hides inside another program.
d.
A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers
information and transmits it to another device.
Feedback
The correct answer is: A worm spreads through a network, whereas a Trojan hides inside another
program.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which is a first step to deter thieves from accessing your financial information?
Select one:
a.
Do not provide personal information over the phone or through email.
, b.
Review financial and billing statements each month carefully.
c.
Follow up on calls regarding purchases that were not made.
d.
Be alert to signs that may indicate unusual activity in an account.
Feedback
The correct answer is: Do not provide personal information over the phone or through email.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Local applications can be accessed only on the computers on which they are installed.
True
False
Feedback
The correct answer is 'True'.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Maggie is using a search engine to find photos for a school project. What search engine tool should
she use to find photos she can legally copy and share?
A.
video search
B.
FOR 1ST SEMESTER 2025
FEND TUTORIALS
, Started on Tuesday, 4 February 2025, 6:58 PM
State Finished
Completed on Tuesday, 4 February 2025, 7:21 PM
Time taken 23 mins 45 secs
Grade 90.00 out of 100.00
Question 1
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
How can you check data on devices connected through an IoT network?
Select one:
A.
Use a desktop
B.
Use a server
C.
Use a tablet
D.
Use a network tracker
Feedback
The correct answer is: Use a tablet
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why is the modified data on a file useful?
Select one:
A.
It identifies the most recent version.
B.
It identifies the day it was created.
C.
,It identifies the location of the file.
D.
It identifies the last time the file was opened.
Feedback
The correct answer is: It identifies the most recent version.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
How is a worm different from a Trojan?
Select one:
a.
A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the
network.
b.
A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads
through a network.
c.
A worm spreads through a network, whereas a Trojan hides inside another program.
d.
A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers
information and transmits it to another device.
Feedback
The correct answer is: A worm spreads through a network, whereas a Trojan hides inside another
program.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which is a first step to deter thieves from accessing your financial information?
Select one:
a.
Do not provide personal information over the phone or through email.
, b.
Review financial and billing statements each month carefully.
c.
Follow up on calls regarding purchases that were not made.
d.
Be alert to signs that may indicate unusual activity in an account.
Feedback
The correct answer is: Do not provide personal information over the phone or through email.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Local applications can be accessed only on the computers on which they are installed.
True
False
Feedback
The correct answer is 'True'.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Maggie is using a search engine to find photos for a school project. What search engine tool should
she use to find photos she can legally copy and share?
A.
video search
B.