Itech final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Select the major US cell phone providers

-Verizon -ATT -T-Mobile -Sprint

Select common Internet transmission media

-coaxial cable -telephone wire -cell phone radio waves

List in order the steps required to install home Wi-Fi network

1 2Plug in the modem's electrical cord and turn the modem on 3 Connect the modem to the router using a highly quality ethernet cable 4 5

Put the steps on the virus infection correct order

1 Virus arrives via email I'll download or buy the city and infected sleep 2An action such as running or opening the file triggers the virus 3The infection spread to other devices wearing at work 4 Play load is activated where it starts destruction

Twitter recommends using no more than—- Hashtags per tweet

2

Personal computer cpu Clock speeds range between

2 to 4 gigahertz

Combining the power of the soft with a neat clean look—-computers are popular with business. Their lack of expandability makes them less popular with serious gamers though

All in one

Select what's true regarding all in one computers

All in one computers house every component except the keyboard and mouse inside the same case as the monitor All in one computers are stationary devices with separate keyboard and mouse

Identify what's true about script kiddies

Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that others have written

Select statements that are true regarding wifi ssid

An ssid is the WiFi name Most routers transmit the ssid every second so roaming devices can find the signal In home networks after all legitimate devices connected to the ssid once transmitting the ssid it's unnecessary

The integration of digital information with the users in real time is called

Augmented reality

Business owners copy write holders and network administrators publish—-So that users understand what is expected and permissible when they use them at work computer equipment and or software

Aup's

Volume of data that can be carried on the Internet transmission media in an amount of time is called

Band with

There are a variety cookie settings that can be adjusted in Google Chrome including

Blocking/allowing cookies by default Deleting cookies Making exceptions for cookies from specific websites or domains

A short range wireless transmission protocol is known as

Bluetooth

Because it's radio waves pass through walls or desktops— Cable devices are becoming very popular

Bluetooth

Select appropriate linked in contacts

Business contacts professional peers

In ascii, 8 bits are combined together to create 1

Byte

Which might be a choice of Internet service in your area

Cable Internet

In addition to round modern processors temporary early keep frequently access data in a

Cache

Select what's true about troubleshooting it work

Check to make sure the cables are not damaged and then all cables are plugged in properly A poor signal can also be an indicator that the hardware may be old or improperly positioned Hey devices that is in position properly can cause weak signals and system issues

Acomputer that request resources such as my page spreadsheet image file or services from other computer on and at work

Client

Clock speed also referred to as—-is the speed at which the processor performs the operations required to run digital device and instructions execute did buy digital device

Clock rate

Sage was developed during the—war

Cold

When Wyatt Kevin Sally and Cassie are all in the same business phone calls it's referred to as

Conference calling

Select the characteristics of a router

Connect networks provide hardware firewall protection usually incorporates a switch

Switch

Connected devices within the network

Router

Connects 2 networks

If you believe you have fallen victim of phishing scam you shouldn't

Contact the institution the message was allegedly sent from contact us-cert

Select the characteristics of traditional hard drive

Contains platters Contains read/write heads Stores data magnetically

Modem

Converts analog signals into digital signals and back

Which of the following statements about Facebook it's true

Cyber stocking an online predators are a real problem on Facebook

The Internet service at times to provide most consistent speed is

DSL

Being able to surf the web watch videos and listen to streaming audio as well as cell service with a—- Lan is extremely popular in the United States

Data

Select what's true about session cookies

Determine the start and end of a session analyze and Measure traffic on the web page Determine the web browser being used

Screen size is measured by the

Diagonal distance between the upper right and the left corners of the screen

Business management software that encompasses nearly all business activities in a corporation is called—-software

ERP

Select the statements that are true regarding fiber optic Internet service

Fast is home network option available not available in all areas fiber optic cable can typically go into the home

A protocol commonly used to transfer large files from one Summer to another on the Internet is the

File transfer protocol

Software that limits the material that the browser purchase or the search engine displays are called

Filters

Select the following statements that are true regarding filters

Filters limit the material browsers fetch Parents often use search engine filters to restrict offensive images from being displayed on computer monitors Filter settings are often accessed through a browser's preferences

Because it's a google product downloading an app from the play store might require a

Google login

the —-Is a computer within your computer that creates images

Gpu

We have the packing or breaking into the computer system for a politically or socially motivated purpose is called

Hacktivism

Which of the following should be considered when choosing an isp

How many users will be logged on my network at the same time? Will user's be streaming data? What ISP choices are available in my area?

Mac address

Identifies a device within a network

Root kits allow a Remote user to do with of the

Install rogue files create back door programs delete files

Which of the following are considered cyber crimes

Internet scams cyber espionage Information theft

While many third-party apps are available through the App Store apps for—-Must first be tested and approved before they're made available for downloading

Iphones

What was the major question that arpanet wanted to solve

Karina work the belt that would continue or work even if multiple parts collapse

Spyware that records all actions typed on a keyboard it's called a—logger

Keystroke

Spyware is software that collects information about your Internet surfing habits and behaviors spyware includes the collection

Keystrokes passwords confidential information

There are many technical challenges associated with implementing an augmented reality system some of which include

Latency registration errors occlusions

Select expenses found on a typical cell phone bill

Line charges data plan charges taxes and surcharges

Select the examples of streaming

Listening to Pandora watching YouTube videos watching a movie on Netflix

Connecting digital musical devices to computers is accomplished by using

MIDI ports

What is the name of the virus written in a macro language and placed within the document or spreadsheet

Macro virus

Select characteristics of fiber optic lines

Made of one or thousands of fibers high speed transmission

When referring to business information technology mis stands for

Management information systems

broadband is measured in

Mbps

Common presentation software programs include which of the following

Microsoft PowerPoint Keynote on Mac google slides

Megahertz is equal to one— cycles (instructions) per second

Million

Sometimes used in smaller business networks employee, —- software is impractical Four large networks because of the number of users and the potential for misuse

Monitoring

A—-It's a group of two or more devices computers connected together to allow for exchange and information and for sharing resources such as winners

Network

Select the reasons to purchase a prepaid phone

No long-term contracts Useful if you just need a phone or calling or texting Useful if you just need a phone for emergencies

Select what's true about the system software

One of the most important types of system software in the operating systems System software refers to the programs that offer the structure and hardware control necessary to run the computer and peripheral devices

Unlike circuit switching data transfer with— doesn't rely on dedicated physical path

Packet switching

Ring the storage capacity is from highest to lowest

Petabyte Terabyte Gigabyte Megabyte Kilobyte

Software that can be added to a browser to increase its functionality are called

Plug-ins

All of the following best practices when using LinkedIn except

Post vacation photos to show your friends where you traveled

A virtual— network vpn Create a secure connection between two computers

Public

Once the virus is identified the antivirus software times from the virus if the software cannot remove the infected while I was on the phone to an isolated area on the hard disk called

Quarantine

The place in a digital device where the data and program the device is currently using are accessible by processor is called being

Ram

Jose is sending a business email to me prospective client select appropriate business email etiquette practices

Remember that potentially negative news is best given face-to-face keep attachments small

Which of the following are Internet service providers

Satellite cable fiber optic

Amateur computer hackers with Little programming experience that illegal gain access to computer systems using programs that others have written or called

Script kiddies

Social networking is based on 6° of

Separation

Well not a required step in sending an email it's still wise to always— any message before clicking sound

Spell check

July following are online nuisances

Spyware spoofing spam

Programs that offer the structure and hardware control necessary to run a computer and it's peripheral devices are called—-software

System

Examples of management information systems mis include

TPS Dds Ess

According to Mozilla one of the most efficient ways to clear cookies in firefox is

The menu button to see history and then clear recent history Once you have cleared recent history you should set the time in the range to clear everything Click the arrow next to details to expand the list of history items Sure all items you want to keep or not selected close clear recent history

When advantage of using web based email such as gmail

Uaers can access it from nearly any internet connected device

URL sounds for—- Resource locator

Uniform

The type of connector is the most common for connecting peripheral (printers storage devices etc) to a computer

Usb

Select the statements that are true regarding dsl Internet service

Uses telephone wires and transmission wires Internet signals tend to be consistent

Went to war more lans have been connected using a public network a —- It's created

Wan

What's true about privacy risk with cookies

Websites using cookies and collect your information and so it's a third-party Websites can check your surfing behavior and create a profile Corporate and government entities can track your word behavior

Www

World Wide Web

Which of the following are true statements regarding linkedin

You can use LinkedIn to apply for jobs includes a résumé tool go to assist in creating professional resume

Select the reasons you might purchase a tablet computer

You need a highly mobile computer that works now for reading e-books or online gaming Do you need a computer with a large amount of storage (hard drive)

Sage was developed by the US Department of

defense

screen size is measured by the __ across the monitor

diagonal

Business management software that encompasses nearly all business activities in a corporation is called—- software

erp

Typical SSD capacities for tablet computers or smartphones are measured in ____ .

gigabytes

When determining how much cell phone data you need it is important to consider

how much data you currently use

A point (a hole or slot) in a computer, designed to accept a specific connector, is called a ___ .

port

Spam messages are sometimes referred to as ___.

ube

Some apps that use surprising amount of data are those that include embedded

video

Select the domain name

www.cnet.com


संबंधित स्टडी सेट्स

L'Oreal Superday - Technical Questions

View Set

FCE Use of English Part 4 (TESTS 4-6) Paraphrasing

View Set

Chapter 28: Obstructive Pulmonary Diseases (Lewis)

View Set

Texas Life and Health - Chapter 3 Life Policy Riders, Provisions, Options and Exclusions

View Set

Business Analytics - Chapter 7: Midterm Review

View Set