CTS 107 Short Answer Questions

Ace your homework & exams now with Quizwiz!

1. Describe how MAC and IPv4 addresses are assigned to a host on the Internet.

A MAC address is a unique address that is given to the hardware of a device. An IPV4 address is delegated to each device on the network. Your IPV4 address changes depending on what network your on but MAC address of your device is constant no matter what network you're on. A MAC address can be changed but it must be changed manually.

1. Explain the differences between commercial and open source software.

Commercial software is created by companies for profit and sold to you. Open Source Software is available free of charge and with few licensing and copyright restrictions.

1. Define ergonomics and discuss the ideal physical setup for using computing devices.

Ergonomics refers to how you arrange your computer and equipment to minimize your risk of injury or discomfort. The ideal physical setup for using computing devices is 1) Positioning your monitor correctly 2) Having a proper position while typing 3) Buying an adjustable chair 4) Making sure lighting is enough 5) Not looking at the screen for too long 6) Having ergonomics keyboard 7) Taking frequent breaks

1. Describe one of the components of secure programming and why the it is important.

One component of secure programming is programming in a way that is safe, this is important because it would prevent the accidental introduction of security vulnerabilities. Components of secure programming would include checking and updating your program routinely to keep it far from defects, bugs and glitches.

1. Describe one reason for using desktop virtualization on a desktop computer.

One reason for using desktop virtualization on a desktop computer is if you want to test a new program before installing it on all computers in your organization. You could set up a computer just for this purpose but that would be expensive and time consuming. Therefore, through virtualization you could test a new program without having to waste resources.

1. Explain the differences between peer-to-peer networks and client/server networks.

Peer-to-peer is a network where each node can be a client or server. Each node can request for services and can also provide services. The focus of this network is connectivity and each peer have its own data and the server is not bottlenecked. They are less expensive but will have problems if the number of peers increases in the system. In contrast a client/server network is a network where there are specific clients connected to the server. The client will request for service and the server will respond with the service. The focus in this network is sharing information and the data is stored in a centralized server. When many clients request for services continuously the server can get bottlenecked.

1. Describe the purpose of ASCII code.

The ASCII code stands for American Standard Code for Information Interchange. It represents each of 26 uppercase and 26 lowercase letters in the alphabet along with punctuation symbols and special characters in 8-bit or 1 byte binary code. This helps the computer understand as computer can only communicate and understand in binary. This is the standard used in electronic equipment and now they can communicate with each other with the same character code.

1. Describe one of the ethical concerns related to the expanding use of IoT.

The Internet of Things or IoT refers to the establishment of the Internet to every object (electronic devices) to send and or receive data over Internet. This raises ethical concerns one being that privacy. For example, IoT devices like smart speakers like Amazon Alexa or Google Home. These smart devices raise concerns about privacy because they instantly respond to your concerns when you call their name and it seems like they're always listening. Questions like is something listening to us or spying on us are always concerns.

1. Describe the purpose of the registry.

The registry contains all the different configurations (settings) used by the OS and by other applications. It contains customized settings like mouse speed and instructions to which programs should be loaded first.

1. Identify the three basic factors for authentication and give an example of each.

The three basic factors for authentication are: knowledge, possession, and inherence. Knowledge: something the user knows (password or pin) Possession: something the user has (ATM card or mobile phone) Inherence: something only the user is (biometric characteristics like fingerprints or iris pattern)

1. Identify two of the most effective operating system features you can use to protect your computer when connected to a network. Explain why these are important.

Turn on Firewall: A system that is deigned to prevent unauthorized internet users from accessing private networks connected to the Internet. Keep Windows up to Date: using automatic updates to keep your windows always update to date. This is important because hackers always try to find new ways to get through Window's built in security features. If updated automatically the risk of this is low.

1. Describe the types of user interfaces.

User interfaces allow you to interact with your devices. There are three types of user interfaces. Command-driven interface: you enter commands to communicate with your computer system. Menu-driven interface: you choose commands from the menus displayed on the screen. This eliminates having to know every command because now you can select it from the menu. Graphical user interface: GUI's display graphics and use the point-and-click technology of the mouse and cursor, making it more user friendly.


Related study sets

ATI psych treatment setting/communication

View Set

(PrepU) Health Promotion: Nursing Concepts

View Set

Ch 5 Q's, Ch 6 Questions, test #3 - Online practice work, test #3 - Stats & Methods

View Set

CHAPTER 2 Quiz: The Courts and Jurisdiction

View Set

rest of the ap chem ms buck questions

View Set