SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 20 Dec 2017 My Price 10.00

computers in a building would be connected

I really struggleing with My CIS 105 lesson this week. I need some help with my questions so I can compete my study guide.

1  of 40

The computers in a lab on a floor of a building would be connected using a ________.

MAN

PAN

LAN

WAN

Question

2  of 40

A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

armored

transitional

proxy

bastion host

Question

3  of 40

A ________ is a virus triggered on a certain date.

time bomb

logic bomb

worm

macro

Question

4  of 40

DRM-free music can be moved legally from system to system.

True

False

Question

5  of 40

Which of the following is NOT a common network topology?

Cluster

Linear bus

Star

Ring

Question

6  of 40

Every new cell/smartphone has to include a GPS chip.

True

False

Question

7  of 40

Which of the following uses radio waves to transmit data signals over short distances?

Infrared

Bluetooth

Wireless access protocol

VoIP

Question

8  of 40

Which of the following is NOT a virus category?

Macro

Pharming

Worm

Logic bomb

Question

9  of 40

Many mobile devices include a mini- ________ port.

serial

coaxial

USB

parallel

Question

10  of 40

The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.

True

False

Question

11  of 40

With regard to computer protection, quarantining is defined as ________.

deleting an infected file

updating your antivirus software

repairing an infected file

placing a found virus in a secure area on the hard drive

Question

12  of 40

A(n) ________ server tracks who is logging onto the network as well as which services on the network each user has available.

application

authentication

file

dedicated

Question

13  of 40

A power failure interrupts VoIP service.

True

False

Question

14  of 40

Since data transmissions can pass through fiber-optic cable in only one direction, transmission of data in both directions requires at least two fibers.

True

False

Question

15  of 40

A ________ is a virus attached to documents such as Word or Excel files.

Trojan horse

script virus

macro virus

polymorphic virus

Question

16  of 40

________ viruses are often transmitted by a flash drive left in a USB port.

Macro

Boot-sector

Time-bomb

Logic-bomb

Question

17  of 40

A main difference between the tablet and the smartphone is the ________.

touch-screen interface

Internet connectivity

screen size

operating system

Question

18  of 40

Ethical hackers are also known as white-hat hackers.

True

False

Question

19  of 40

CAPTCHA is ________.

a rootkit virus

password method

antivirus software

the wavy hard-to-read letter and number sequence you type to prove you are human to a Web site

Question

20  of 40

Which of the following classifications of viruses can change its own code to avoid detection?

Stealth

Worm

Polymorphic

Multipartite

Question

21  of 40

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

heap

stack

spooler

logger

Question

22  of 40

A tablet uses a full traditional operating system.

True

False

Question

23  of 40

Data flows in both directions in a ring network.

True

False

Question

24  of 40

4G LTE Cellular networks offer faster data-transfer speed than Wi-Fi offers.

True

False

Question

25  of 40

A virus signature is a portion of virus code unique to a particular computer virus.

True

False

Question

26  of 40

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

pretexting

theft

pharming

engineering

Question

27  of 40

All of the following were top cybercrimes reported to the IC3 EXCEPT ________.

identity theft

non-auction scam

theft of services

advance fee fraud

Question

28  of 40

Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

Conversion rate

Converting rate

Simplifying rate

Sampling rate

Question

29  of 40

Ring networks use the ________ method to avoid data collisions.

active-check

passive-check

token

packet screening

Question

30  of 40

The distance between two near field communication (NFC) devices is limited to about ________.

1.5 in

1.5 m

10 m

1.5 ft

Question

31  of 40

Transmission media comprise the physical system data takes to flow between devices on the network.

True

False

Question

32  of 40

Text messaging is also called ________.

short text messaging (STM)

text messaging system (TMS)

sending messages shortly (SMS)

short message service (SMS)

Question

33  of 40

________ allows only limited use of legally purchased media.

Copyright

Copyleft

Synchronizing

Digital rights management

Question

34  of 40

The terms virus and worm actually mean the same thing.

True

False

Question

35  of 40

________ hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities.

White-hat

Black-hat

Gray-hat

Green-hat

Question

36  of 40

Which of the following digital image formats compresses the image file?

MPEG

JPEG

PDF

WAV

Question

37  of 40

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

firewall

fire extinguisher

firehouse

firebreak

Question

38  of 40

The primary input devices for smartphones are ________.

microphone and touch screen

touch screen and digital camera

keyboard and mouse

microphone and mouse

Question

39  of 40

A macro virus is a virus attached to a file such as a Word document or Excel workbook.

True

False

Question

40  of 40

SMS technology sends both text and pictures.

True

False

Save your answers

Save your answers

 

Attachments:

Answers

(5)
Status NEW Posted 20 Dec 2017 12:12 PM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)