Wk 5 Apply Assignment

¡Supera tus tareas y exámenes ahora con Quizwiz!

As discussed in Chapter 5, a key benefit of a software suite is Select one: a. a common interface among programs. b. All of the choices are correct. c. free upgrades to new versions. d. access to cloud storage and cloud-based versions of the software. REF: Page 134 OBJ: 5.3 TOP: software suite

a common interface among programs.

A DoS attack typically causes an internet site to Select one: a. become inefficient or crash. b. redirect visitors to another site. c. track the browsing history of visitors. d. send spam emails. REF: Page 229 OBJ: 8.4 TOP: denial-of-service (DoS) attack

become inefficient or crash.

Spyware is sometimes used by legitimate websites to track your browsing habits in order to Select one: a. improve customer service. b. better target advertisements to you. c. offer you the best price on the products you're shopping for. d. comply with law enforcement investigations. REF: Page 216 OBJ: 8.2 TOP: spyware, malware

better target advertisements to you.

A computer network consists of two or more computing or other devices connected by a Select one: a. wireless signal. b. wire. c. communications medium. d. cable. REF: Page 148 OBJ: 6.1 TOP: computer network

communications medium.

One of the benefits expected from 5G networks and devices includes Select one: a. Firewall as a Service. b. Software as a Service. c. edge computing capabilities. d. speeds up to 50 times faster than 4G. REF: page 170 OBJ: 6.8 TOP: 5G

speeds up to 50 times faster than 4G.

A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information. Select one: a. WPA b. DLP c. APT d. DoS REF: Page 210 OBJ: 8.1 TOP: advanced persistent threat (APT)

APT

_____ computing is a solution for networks in which a reduction in time for data to travel across the network for processing is critical, such as in healthcare. Select one: a. 5G b. Offline c. Edge d. Cloud REF: page 170 OBJ: 6.8 TOP: edge computing

Edge

If you connect to a network through your phone or cable company, then you probably connect through a Select one: a. MAN. b. WLAN. c. WAN. d. LAN. REF: Page 160 OBJ: 6.5 TOP: metropolitan area network (MAN), local area network (LAN), wide area network (WAN), wireless LAN (WLAN)

MAN.

The internet is a global network of Select one: a. social networks. b. microwave towers. c. many networks linked together. d. intranets.

REF: Page 148OBJ: 6.1TOP: networks, internet many networks linked together.

An analog signal is formed by _____ that _____. Select one: a. a discrete signal; fluctuates between high and low b. a discrete signal; is either high or low c. continuous sound waves; are either high or low d. continuous sound waves; fluctuate between high and low

REF: Page 149 OBJ: 6.2 TOP: analog signal, digital signal continuous sound waves; fluctuate between high and low

On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium. Select one: a. frequency b. latency c. bandwidth d. broadband

REF: Page 150 OBJ: 6.2 TOP: bandwidth, frequency, broadband bandwidth

A microwave is a(n) _____ that is directed from one microwave station tower to another. Select one: a. low-frequency radio signal b. high-frequency radio signal c. infrared light signal d. beam of light

REF: Page 153 OBJ: 6.3 TOP: microwave high-frequency radio signal

This wired networking standard specifies the order in which data is sent through the network. Select one: a. Ethernet b. TCP/IP c. WiMAX d. LTE

REF: Page 156 OBJ: 6.4TOP: Ethernet, TC/IP TCP/IP

Bluetooth is a network protocol that offers _____ connectivity via _____. Select one: a. short-range; infrared light signals b. long-range; ultraviolet light signals c. short-range; radio waves d. long-range; microwaves

REF: Page 158OBJ: 6.4TOP: Bluetooth short-range; radio waves

Office 365 is an example of Select one: a. SaaS. b. CAD/CAM. c. SCM. d. ERP. REF: Page 134 OBJ: 5.3 TOP: software as a service (SaaS)

SaaS.

A fingerprint scanner is used as a method of Select one: a. decryption. b. GPS tracking. c. authentication. d. encryption. REF: Page 221 OBJ: 8.3 TOP: mobile security

authentication.

Which of the following is not described in Chapter 6 as a strategy to maintain network security? Select one: a. computer-user policies b. firewall c. virtual private network (VPN) d. bring your own device (BYOD) policy REF: page 167 OBJ: 6.7 TOP: network security

bring your own device (BYOD) policy

One predicted trend in social technology is the ability to do this with the profile you create when you join a service. Select one: a. hide it b. carry it from site to site c. alter it d. update it automatically according to your life events REF: Page 186 OBJ: 7.2 TOP: identity

carry it from site to site

An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network. Select one: a. information security b. authentication c. social engineering d. data loss prevention REF: Page 209 OBJ: 8.1 TOP: data loss prevention (DLP), computer security

data loss prevention

One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat. Select one: a. media sharing b. disappearing media c. social marketing d. contact lists REF: Page 192 OBJ: 7.4 TOP: disappearing media

disappearing media

Productivity software suites typically include each of the following except _____ software. Select one: a. presentation b. financial management c. word processor d. spreadsheet REF: Page 119 OBJ: 5.2 TOP: productivity software

financial management

A honeypot is used by companies to Select one: a. monitor network traffic. b. generate encryption keys. c. identify weak spots in their network security. d. store valuable data. REF: Page 228 OBJ: 8.4 TOP: honeypot

identify weak spots in their network security.

If you create a(n) _____ object, when the source is updated, the object is also updated. Select one: a. linked b. connected c. formatted d. embedded REF: Page 137 OBJ: 5.4 TOP: linked object

linked

Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts. Select one: a. disappearing media b. video blogging c. live media streaming d. metadata REF: Page 198 OBJ: 7.7 TOP: media sharing, live media streaming

live media streaming

In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of Select one: a. memory and screen size. b. screen size and keyboard functionality. c. processing speed and graphics capabilities. d. storage capacity and processing speed. REF: Page 131 OBJ: 5.2 TOP: mobile applications

memory and screen size

Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter. Select one: a. exclamation point (!) b. at symbol (@) c. dollar sign ($) d. pound symbol (#) REF: Page 189 OBJ: 7.3 TOP: microblogging, hashtag

pound symbol (#)

A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection. Select one: a. hub b. modem c. switch d. router REF: Page 165 OBJ: 6.6 TOP: router, hub, switch

router

Application software is the software that is used when you do each of the following tasks except Select one: a. start your computer. b. surf the web. c. create art. d. send an email. REF: Page 118 OBJ: 5.1 TOP: application software

start your computer.

What would you consider one of the key features of a wiki? Select one: a. the ability to collaborate b. the ability to create a list of friends c. the accuracy of content d. the opportunity for social interaction REF: Page 196 OBJ: 7.6 TOP: wiki

the ability to collaborate

WordStar was an early _____ application for personal computers. Select one: a. spreadsheet b. word processor c. graphics editing d. desktop publishing REF: Page 118 OBJ: 5.1 TOP: application software

word processor


Conjuntos de estudio relacionados

Leccion 4 - Repaso - Prueba de practica

View Set

MS2- Module 2- Cardiovascular EAQ Quiz

View Set

Unit 2: Life/Health Insurance Underwriting

View Set

Chapter 13: Neurocognitive Disorders

View Set

Chapter 22: The Respiratory System

View Set