ITE 115 Module 4-6 study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a MAC address?

A unique hardware address for your device

Which of the following describes a domain registrar?

A website where you can go to purchase a name for your website.

Which of the following network standards applies to cellular networks?

LTE

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

A modem can also function as what other piece of hardware?

A router

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware.

JavaScript likely controls which of the following elements on a webpage

A slide show

What is an ISP?

A telecommunications company that sells Internet access.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

ensures that the person requesting access to a computer is not an imposter.

Authentication

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? RFID

Bluetooth

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

What would a password manager allow you to do?

Create and store multiple strong passwords.

What does XML use to describe data?

Customized tags

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

HTML has remained the same ever since it was developed, which is why there is only one version.

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site. True

False

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

Which of the following statements is NOT true about a local firewall?

It is often built into a company's operating system.

Why would you include a banner on your website?

It makes the website more easily identifiable to visitors.

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

What is a popular language for writing scripts that run in your browser to control a webpage's behavior?

JavaScript

When describing a client/server network, which of the following would be considered a client?

Laptop

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

Which of the following best defines responsive design?

Pages automatically adjust the size of their content relative to the size of the screen.

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Storing financial information in an unsent email message.

What is a digital certificate?

Technology used to verify a user's identity

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

To give you finer control over the content

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

Which of the following websites most likely uses XML-formatted data?

an ecommerce site that lets you compare products from different vendors

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

banner

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of _______

cyberbullying

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

If a website is designed with responsive design concepts, then _____.

it appears correctly on any device regardless of screen size

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

To access the Internet, a router must be connected to a _____.

modem

Devices on a _____ area network are connected via Bluetooth.

personal

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

Which of the following types of websites typically provides the least security?

social media sites

Why would you want to connect your computer to a network?

to access shared resources

A business would use a website analytics tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com


Ensembles d'études connexes

Client Investment Recommendations & Strategies

View Set

EAQ Nursing Process - Implementation

View Set

Ch 42: Nursing Care of a Family when a Child has an Immune Disorder

View Set

chapter 24 end of chapter questions and the point questions

View Set

4510: Concept Synthesis, Exam 1 - Oxygenation, Perfusion, Elimination, Fluid and Electrolyte, Infection

View Set