100% Solved
How many layer does the TCP/IP model have? Correct answer-4
IPv6 is how many bits long? Correct answer-128
UDP provides sequencing, error control and flow control just like TCP Correct answer-
False
What are examples of standard paired cables? Correct answer-CAT 2, CAT 3, CAT 5
Which technology uses software and hardware to automatically collect and analyze data about
a device's surroundings, to present relevant, actionable information to the end user?
Correct answer-Contextual Computing
What technology serves as a centralized IT ecosystem that automates IT processes and unifies
all of user's existing technologies (including hardware, software, and services) into a one stop
connected platform? Correct answer-Workplace Hub
What are examples of simulation types for implementing of VR technolgoy? Correct
answer-Non-immersive, semi-immersive, and fully immersive
What are examples of Deep Learning Algorithms? Correct answer-CNN, DNN, LSTM
, GMU IT 105 Final Exam; Questions & Answers
100% Solved
What is the process of examining large and varied data sets to uncover hidden patterns,
correlations, and information to help make business decisions? Correct answer-Big Data
Analytics
What is a subnet? Correct answer-
What class is 75.0.0.7? Correct answer-class A
Decryption is the process of converting plain text into ciphertext Correct answer-false
Suppose you are creating a password and the password length is 6 digits. What is the number of
passwords? (P = C^password length) Correct answer-1000000
Serial transmission is described as transmitting a group of bits at a single instant in time
Correct answer-false
Malware refers to any computer program designed to surreptitiously enter a digital device
Correct answer-true
private key functions involve the use of two keys during the process of private-key encrytion
Correct answer-false