SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 5 Weeks Ago, 3 Days Ago
Questions Answered: 7559
Tutorials Posted: 7341

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Computer Science Posted 14 Aug 2020 My Price 15.00

IT 1500 Unit 3 Challenges Introduction to Information Technology Sophia Course

IT 1500 Unit 3 Challenges Introduction to Information Technology Sophia Course

Click below links for Answers

Challenge 1

The most common protocol in use is TCP/IP, which is a group of protocols that functions together to permit __________ communication.

·a.)

web-based

·b.)

LAN

·c.)

telephone

·d.)

email

A protocol is a format or rule for transmitting data that determines which of the following?

·a.)

How to compress the data being sent

·b.)

How the sending device notifies the receiving device of incoming data

·c.)

All of the answer choices are correct.

·d.)

How to check for errors in the data being sent

Which of the following is NOT an advantage of a computer network?

·a.)

The invention of email

·b.)

Collaboration between users

·c.)

Decreased need for paper communication

·d.)

Faster processing speeds

__ is a type of network software that allows administrators to define the location of data storage in a network and determine user access to that data.

·a.)

Application software

·b.)

Wired software

·c.)

File management software

·d.)

User management software

__ is used to manage computer networks so that administrators can understand how the network functions and control how networked computers are connected.

·a.)

Network software

·b.)

Network hardware

·c.)

A router

·d.)

A network adapter

Every device on a network must have a __________, either built into the motherboard or attached as a peripheral, that will manage in/outbound network requests and translate instructions from the operating system into information that can be sent over the network.

·a.)

router

·b.)

network adapter

·c.)

switch

·d.)

WAP

If a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, it should use a(n) __________.

·a.)

PAN

·b.)

LAN

·c.)

WAN

·d.)

MAN

 is a type of PAN or LAN that takes an internet signal and converts it to radio waves.

·a.)

Bluetooth

·b.)

Intranet

·c.)

Wi-Fi

·d.)

NFC

Which of the following describes extranet?

·a.)

A device that provides 3G and 4G for mobile networks

·b.)

A LAN that is a combination of public and private where access can be granted to those outside the LAN

·c.)

A private LAN only accessible to those with permissions

·d.)

A global WAN made up of smaller networks that connect devices using TCP/IP

Software that opens files and scans their code to look for certain types of malware is known as __________ software.

·a.)

WEP

·b.)

access control

·c.)

anti-virus

·d.)

worm

A good way to defend against worms is to use __________ software, while a good way to defend against adware is to use __________ software.

·a.)

biometric reader, anti-adware

·b.)

exploit, anti-malware

·c.)

integrity, confidentiality

·d.)

anti-virus, anti-spyware

A(n) __________ is a type of malware that can carry a virus through an email attachment and be either active or passive.

·a.)

spyware program

·b.)

adware program

·c.)

trojan horse

·d.)

worm

Challenge 2

In 1982, the __________ were invented so that all of the emerging networks could communicate with one another.

·a.)

HTML protocols

·b.)

TCP/IP protocols

·c.)

ARPANET protocols

·d.)

HTTP protocols

In order for the US to keep up with the advancements of other countries, __________ was created to lead computing research, which then led to the creation of the first wide area network.

·a.)

TCP/IP

·b.)

HTML

·c.)

ARPA

·d.)

the Internet

A(n) __________ is a numeric representation that provides a unique identification for a computer on a network.

·a.)

HTTP

·b.)

TCP

·c.)

IP address

·d.)

domain name

 are sections of markup code enclosed in angle brackets that define how content is formatted.

·a.)

Webpages

·b.)

HTML tags

·c.)

Resource locators

·d.)

Hyperlinks

The Web is a network of HTML documents supported by the __________ network protocol.

·a.)

IP

·b.)

URL

·c.)

web-transfer

·d.)

HTTP

The HTML tag __________ is used as a container for a block of content, while the HTML tag __________ is used for inserting a hyperlink.

·a.)

<div></div>, <a href = "link"></a>

·b.)

<title></title>, <p></p>

·c.)

<img></img>, <html></html>

·d.)

<em></em>, <ins "link"></ins>

_ is a danger of using the Internet that involves harassment and threats through email, chat rooms, or forums with the goal of obtaining personal information from the victims. 

·a.)

P2P file sharing

·b.)

Phishing

·c.)

Cyberstalking

·d.)

Cyberbullying

_ is a government act that requires organizations using federal-provided Internet to provide a policy detailing how they will protect minors on their network by blocking inappropriate content or websites.

·a.)

ARPA

·b.)

CIPA

·c.)

HTML

·d.)

COPPA

Which of the following is NOT a way to safeguard against the potential dangers of the Internet?

·a.)

Setting rules for and monitoring Internet usage

·b.)

Using anti-malware software

·c.)

Using P2P file sharing

·d.)

Restricting access to inappropriate websites

If a person became angry or anxious when he/she was forced to stop using the computer, this would be a symptom of computer addiction known as __________.

·a.)

uncomfortable feelings

·b.)

downplaying computer use

·c.)

neglect

·d.)

lack of control

Lack of control is a symptom of computer addiction that can be categorized by all of the following, EXCEPT __________.

·a.)

lying about time spent on the computer

·b.)

having a difficult time quitting usage of the computer

·c.)

performing poorly at school or work

·d.)

constantly losing track of time

Which of the following is NOT a sign of computer addiction?

·a.)

Neglecting personal responsibilities

·b.)

Exhibiting a lack of control

·c.)

Downplaying computer use

·d.)

Blocking access to inappropriate websites

_ is a social networking platform that only allows users to upload videos, while __________ is a mobile platform for sharing photo or video that allows users to specify who sees their content by selecting "followers."

·a.)

Facebook, Twitter

·b.)

YouTube, Instagram

·c.)

QZone, Google+

·d.)

Pinterest, Tumblr

Which of the following is a benefit of using social networks?

·a.)

Social networking creates a higher potential for cyberbullying.

·b.)

Social networking increases access to information.

·c.)

Social networking has the potential to compromise personal privacy.

·d.)

Social networks can provide false information.

One benefit of social media is that it can provide fast sharing of information. 

Select the risk associated with this benefit.

·a.)

Social media can waste users' time when they intend to be productive.

·b.)

Social media users can provide misleading or inaccurate reports.

·c.)

Social media can be used to discriminate against others.

·d.)

Social media can cause relationship problems.

Challenge 3

Copyrights are obtained __________.

·a.)

automatically when an original work is created

·b.)

if the work meets certain conditions

·c.)

after a five-year waiting period

·d.)

after being reviewed for fair use

Which of the following do authors NOT control under copyright laws?

·a.)

Who can display or perform their work publicly

·b.)

Who can make copies of their work

·c.)

Who can view or listen to their work

·d.)

Who can distribute their work

 is a protection for words, phrases, or logos to ensure consumers are able to purchase the goods they want without confusion.

·a.)

Copyright

·b.)

Open source

·c.)

Fair use

·d.)

Trademark

The section of an acceptable use policy that details what actions will be taken if the policy is not followed is known as __________.

·a.)

consequences for violation

·b.)

AUP coverage

·c.)

infringement

·d.)

unacceptable uses

_ are documents that outline ways in which a system is allowed to be used, to which a user must agree before accessing a software or service.

·a.)

Information system ethics

·b.)

Professional practices

·c.)

Acceptable use policies

·d.)

Definitions of terms

 means violating the rights of a copyright holder, while __________ means taking another person's work and presenting it as your own.

·a.)

Plagiarism, ethics

·b.)

Infringement, consequences for violation

·c.)

Infringement, plagiarism 

·d.)

Unacceptable use, terms of service

The fifth software engineering code of ethics principle, management, deals primarily with __________.

·a.)

acting in the best interests of employers and clients as consistent with public interest

·b.)

leaders subscribing to and promoting ethical approaches to software development

·c.)

promoting ethical approaches to software development as well as engaging in lifelong learning in the profession

·d.)

being fair and supportive towards colleagues

When turning in his portion of code to the team lead, a software engineer is praised for a particular part of the code. He accepts the praise even though he had struggled with that portion and had asked a colleague to write some of the program for him. 

 

Which of the following principles is being violated here?

·a.)

Self

·b.)

Public

·c.)

Both self and colleagues

·d.)

Colleagues

Which of the following principles of the software engineering code of ethics deals with maintaining integrity and independence in professional decision-making?

·a.)

Self

·b.)

Judgement

·c.)

Profession

·d.)

Public

 

Answers

(118)
Status NEW Posted 14 Aug 2020 09:08 AM My Price 15.00

IT -----------150-----------0 U-----------nit----------- 3 -----------Cha-----------lle-----------nge-----------s I-----------ntr-----------odu-----------cti-----------on -----------to -----------Inf-----------orm-----------ati-----------on -----------Tec-----------hno-----------log-----------y S-----------oph-----------ia -----------Cou-----------rse-----------

Attachments

file 1597398319-Unit 3 Challenges.docx preview (1080 words )
C-----------hal-----------len-----------ge -----------1 -----------The----------- mo-----------st -----------com-----------mon----------- pr-----------oto-----------col----------- in----------- us-----------e i-----------s T-----------CP/-----------IP,----------- wh-----------ich----------- is----------- a -----------gro-----------up -----------of -----------pro-----------toc-----------ols----------- th-----------at -----------fun-----------cti-----------ons----------- to-----------get-----------her----------- to----------- pe-----------rmi-----------t _-----------___-----------___-----------___----------- co-----------mmu-----------nic-----------ati-----------on.----------- a-----------.) ----------- we-----------b-b-----------ase-----------d -----------b.)----------- L-----------AN ----------- c.-----------) -----------tel-----------eph-----------one----------- d-----------.) ----------- em-----------ail----------- A----------- pr-----------oto-----------col----------- is----------- a -----------for-----------mat----------- or----------- ru-----------le -----------for----------- tr-----------ans-----------mit-----------tin-----------g d-----------ata----------- th-----------at -----------det-----------erm-----------ine-----------s w-----------hic-----------h o-----------f t-----------he -----------fol-----------low-----------ing-----------? -----------a.)----------- H-----------ow -----------to -----------com-----------pre-----------ss -----------the----------- da-----------ta -----------bei-----------ng -----------sen-----------t -----------b.)----------- H-----------ow -----------the----------- se-----------ndi-----------ng -----------dev-----------ice----------- no-----------tif-----------ies----------- th-----------e r-----------ece-----------ivi-----------ng -----------dev-----------ice----------- of----------- in-----------com-----------ing----------- da-----------ta ----------- c.-----------) -----------All----------- of----------- th-----------e a-----------nsw-----------er
Not Rated(0)