Itech final
Select the major US cell phone providers
-Verizon -ATT -T-Mobile -Sprint
Select common Internet transmission media
-coaxial cable -telephone wire -cell phone radio waves
List in order the steps required to install home Wi-Fi network
1 2Plug in the modem's electrical cord and turn the modem on 3 Connect the modem to the router using a highly quality ethernet cable 4 5
Put the steps on the virus infection correct order
1 Virus arrives via email I'll download or buy the city and infected sleep 2An action such as running or opening the file triggers the virus 3The infection spread to other devices wearing at work 4 Play load is activated where it starts destruction
Twitter recommends using no more than—- Hashtags per tweet
2
Personal computer cpu Clock speeds range between
2 to 4 gigahertz
Combining the power of the soft with a neat clean look—-computers are popular with business. Their lack of expandability makes them less popular with serious gamers though
All in one
Select what's true regarding all in one computers
All in one computers house every component except the keyboard and mouse inside the same case as the monitor All in one computers are stationary devices with separate keyboard and mouse
Identify what's true about script kiddies
Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that others have written
Select statements that are true regarding wifi ssid
An ssid is the WiFi name Most routers transmit the ssid every second so roaming devices can find the signal In home networks after all legitimate devices connected to the ssid once transmitting the ssid it's unnecessary
The integration of digital information with the users in real time is called
Augmented reality
Business owners copy write holders and network administrators publish—-So that users understand what is expected and permissible when they use them at work computer equipment and or software
Aup's
Volume of data that can be carried on the Internet transmission media in an amount of time is called
Band with
There are a variety cookie settings that can be adjusted in Google Chrome including
Blocking/allowing cookies by default Deleting cookies Making exceptions for cookies from specific websites or domains
A short range wireless transmission protocol is known as
Bluetooth
Because it's radio waves pass through walls or desktops— Cable devices are becoming very popular
Bluetooth
Select appropriate linked in contacts
Business contacts professional peers
In ascii, 8 bits are combined together to create 1
Byte
Which might be a choice of Internet service in your area
Cable Internet
In addition to round modern processors temporary early keep frequently access data in a
Cache
Select what's true about troubleshooting it work
Check to make sure the cables are not damaged and then all cables are plugged in properly A poor signal can also be an indicator that the hardware may be old or improperly positioned Hey devices that is in position properly can cause weak signals and system issues
Acomputer that request resources such as my page spreadsheet image file or services from other computer on and at work
Client
Clock speed also referred to as—-is the speed at which the processor performs the operations required to run digital device and instructions execute did buy digital device
Clock rate
Sage was developed during the—war
Cold
When Wyatt Kevin Sally and Cassie are all in the same business phone calls it's referred to as
Conference calling
Select the characteristics of a router
Connect networks provide hardware firewall protection usually incorporates a switch
Switch
Connected devices within the network
Router
Connects 2 networks
If you believe you have fallen victim of phishing scam you shouldn't
Contact the institution the message was allegedly sent from contact us-cert
Select the characteristics of traditional hard drive
Contains platters Contains read/write heads Stores data magnetically
Modem
Converts analog signals into digital signals and back
Which of the following statements about Facebook it's true
Cyber stocking an online predators are a real problem on Facebook
The Internet service at times to provide most consistent speed is
DSL
Being able to surf the web watch videos and listen to streaming audio as well as cell service with a—- Lan is extremely popular in the United States
Data
Select what's true about session cookies
Determine the start and end of a session analyze and Measure traffic on the web page Determine the web browser being used
Screen size is measured by the
Diagonal distance between the upper right and the left corners of the screen
Business management software that encompasses nearly all business activities in a corporation is called—-software
ERP
Select the statements that are true regarding fiber optic Internet service
Fast is home network option available not available in all areas fiber optic cable can typically go into the home
A protocol commonly used to transfer large files from one Summer to another on the Internet is the
File transfer protocol
Software that limits the material that the browser purchase or the search engine displays are called
Filters
Select the following statements that are true regarding filters
Filters limit the material browsers fetch Parents often use search engine filters to restrict offensive images from being displayed on computer monitors Filter settings are often accessed through a browser's preferences
Because it's a google product downloading an app from the play store might require a
Google login
the —-Is a computer within your computer that creates images
Gpu
We have the packing or breaking into the computer system for a politically or socially motivated purpose is called
Hacktivism
Which of the following should be considered when choosing an isp
How many users will be logged on my network at the same time? Will user's be streaming data? What ISP choices are available in my area?
Mac address
Identifies a device within a network
Root kits allow a Remote user to do with of the
Install rogue files create back door programs delete files
Which of the following are considered cyber crimes
Internet scams cyber espionage Information theft
While many third-party apps are available through the App Store apps for—-Must first be tested and approved before they're made available for downloading
Iphones
What was the major question that arpanet wanted to solve
Karina work the belt that would continue or work even if multiple parts collapse
Spyware that records all actions typed on a keyboard it's called a—logger
Keystroke
Spyware is software that collects information about your Internet surfing habits and behaviors spyware includes the collection
Keystrokes passwords confidential information
There are many technical challenges associated with implementing an augmented reality system some of which include
Latency registration errors occlusions
Select expenses found on a typical cell phone bill
Line charges data plan charges taxes and surcharges
Select the examples of streaming
Listening to Pandora watching YouTube videos watching a movie on Netflix
Connecting digital musical devices to computers is accomplished by using
MIDI ports
What is the name of the virus written in a macro language and placed within the document or spreadsheet
Macro virus
Select characteristics of fiber optic lines
Made of one or thousands of fibers high speed transmission
When referring to business information technology mis stands for
Management information systems
broadband is measured in
Mbps
Common presentation software programs include which of the following
Microsoft PowerPoint Keynote on Mac google slides
Megahertz is equal to one— cycles (instructions) per second
Million
Sometimes used in smaller business networks employee, —- software is impractical Four large networks because of the number of users and the potential for misuse
Monitoring
A—-It's a group of two or more devices computers connected together to allow for exchange and information and for sharing resources such as winners
Network
Select the reasons to purchase a prepaid phone
No long-term contracts Useful if you just need a phone or calling or texting Useful if you just need a phone for emergencies
Select what's true about the system software
One of the most important types of system software in the operating systems System software refers to the programs that offer the structure and hardware control necessary to run the computer and peripheral devices
Unlike circuit switching data transfer with— doesn't rely on dedicated physical path
Packet switching
Ring the storage capacity is from highest to lowest
Petabyte Terabyte Gigabyte Megabyte Kilobyte
Software that can be added to a browser to increase its functionality are called
Plug-ins
All of the following best practices when using LinkedIn except
Post vacation photos to show your friends where you traveled
A virtual— network vpn Create a secure connection between two computers
Public
Once the virus is identified the antivirus software times from the virus if the software cannot remove the infected while I was on the phone to an isolated area on the hard disk called
Quarantine
The place in a digital device where the data and program the device is currently using are accessible by processor is called being
Ram
Jose is sending a business email to me prospective client select appropriate business email etiquette practices
Remember that potentially negative news is best given face-to-face keep attachments small
Which of the following are Internet service providers
Satellite cable fiber optic
Amateur computer hackers with Little programming experience that illegal gain access to computer systems using programs that others have written or called
Script kiddies
Social networking is based on 6° of
Separation
Well not a required step in sending an email it's still wise to always— any message before clicking sound
Spell check
July following are online nuisances
Spyware spoofing spam
Programs that offer the structure and hardware control necessary to run a computer and it's peripheral devices are called—-software
System
Examples of management information systems mis include
TPS Dds Ess
According to Mozilla one of the most efficient ways to clear cookies in firefox is
The menu button to see history and then clear recent history Once you have cleared recent history you should set the time in the range to clear everything Click the arrow next to details to expand the list of history items Sure all items you want to keep or not selected close clear recent history
When advantage of using web based email such as gmail
Uaers can access it from nearly any internet connected device
URL sounds for—- Resource locator
Uniform
The type of connector is the most common for connecting peripheral (printers storage devices etc) to a computer
Usb
Select the statements that are true regarding dsl Internet service
Uses telephone wires and transmission wires Internet signals tend to be consistent
Went to war more lans have been connected using a public network a —- It's created
Wan
What's true about privacy risk with cookies
Websites using cookies and collect your information and so it's a third-party Websites can check your surfing behavior and create a profile Corporate and government entities can track your word behavior
Www
World Wide Web
Which of the following are true statements regarding linkedin
You can use LinkedIn to apply for jobs includes a résumé tool go to assist in creating professional resume
Select the reasons you might purchase a tablet computer
You need a highly mobile computer that works now for reading e-books or online gaming Do you need a computer with a large amount of storage (hard drive)
Sage was developed by the US Department of
defense
screen size is measured by the __ across the monitor
diagonal
Business management software that encompasses nearly all business activities in a corporation is called—- software
erp
Typical SSD capacities for tablet computers or smartphones are measured in ____ .
gigabytes
When determining how much cell phone data you need it is important to consider
how much data you currently use
A point (a hole or slot) in a computer, designed to accept a specific connector, is called a ___ .
port
Spam messages are sometimes referred to as ___.
ube
Some apps that use surprising amount of data are those that include embedded
video
Select the domain name
www.cnet.com