Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 5 Weeks Ago, 3 Days Ago |
Questions Answered: | 7559 |
Tutorials Posted: | 7341 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
IT 1500 Unit 3 Challenges Introduction to Information Technology Sophia Course
Click below links for Answers
Challenge 1
The most common protocol in use is TCP/IP, which is a group of protocols that functions together to permit __________ communication.
·a.)
web-based
·b.)
LAN
·c.)
telephone
·d.)
A protocol is a format or rule for transmitting data that determines which of the following?
·a.)
How to compress the data being sent
·b.)
How the sending device notifies the receiving device of incoming data
·c.)
All of the answer choices are correct.
·d.)
How to check for errors in the data being sent
Which of the following is NOT an advantage of a computer network?
·a.)
The invention of email
·b.)
Collaboration between users
·c.)
Decreased need for paper communication
·d.)
Faster processing speeds
__ is a type of network software that allows administrators to define the location of data storage in a network and determine user access to that data.
·a.)
Application software
·b.)
Wired software
·c.)
File management software
·d.)
User management software
__ is used to manage computer networks so that administrators can understand how the network functions and control how networked computers are connected.
·a.)
Network software
·b.)
Network hardware
·c.)
A router
·d.)
A network adapter
Every device on a network must have a __________, either built into the motherboard or attached as a peripheral, that will manage in/outbound network requests and translate instructions from the operating system into information that can be sent over the network.
·a.)
router
·b.)
network adapter
·c.)
switch
·d.)
WAP
If a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, it should use a(n) __________.
·a.)
PAN
·b.)
LAN
·c.)
WAN
·d.)
MAN
 is a type of PAN or LAN that takes an internet signal and converts it to radio waves.
·a.)
Bluetooth
·b.)
Intranet
·c.)
Wi-Fi
·d.)
NFC
Which of the following describes extranet?
·a.)
A device that provides 3G and 4G for mobile networks
·b.)
A LAN that is a combination of public and private where access can be granted to those outside the LAN
·c.)
A private LAN only accessible to those with permissions
·d.)
A global WAN made up of smaller networks that connect devices using TCP/IP
Software that opens files and scans their code to look for certain types of malware is known as __________ software.
·a.)
WEP
·b.)
access control
·c.)
anti-virus
·d.)
worm
A good way to defend against worms is to use __________ software, while a good way to defend against adware is to use __________ software.
·a.)
biometric reader, anti-adware
·b.)
exploit, anti-malware
·c.)
integrity, confidentiality
·d.)
anti-virus, anti-spyware
A(n) __________ is a type of malware that can carry a virus through an email attachment and be either active or passive.
·a.)
spyware program
·b.)
adware program
·c.)
trojan horse
·d.)
worm
Challenge 2
In 1982, the __________ were invented so that all of the emerging networks could communicate with one another.
·a.)
HTML protocols
·b.)
TCP/IP protocols
·c.)
ARPANET protocols
·d.)
HTTP protocols
In order for the US to keep up with the advancements of other countries, __________ was created to lead computing research, which then led to the creation of the first wide area network.
·a.)
TCP/IP
·b.)
HTML
·c.)
ARPA
·d.)
the Internet
A(n) __________ is a numeric representation that provides a unique identification for a computer on a network.
·a.)
HTTP
·b.)
TCP
·c.)
IP address
·d.)
domain name
 are sections of markup code enclosed in angle brackets that define how content is formatted.
·a.)
Webpages
·b.)
HTML tags
·c.)
Resource locators
·d.)
Hyperlinks
The Web is a network of HTML documents supported by the __________ network protocol.
·a.)
IP
·b.)
URL
·c.)
web-transfer
·d.)
HTTP
The HTML tag __________ is used as a container for a block of content, while the HTML tag __________ is used for inserting a hyperlink.
·a.)
<div></div>, <a href = "link"></a>
·b.)
<title></title>, <p></p>
·c.)
<img></img>, <html></html>
·d.)
<em></em>, <ins "link"></ins>
_ is a danger of using the Internet that involves harassment and threats through email, chat rooms, or forums with the goal of obtaining personal information from the victims.Â
·a.)
P2P file sharing
·b.)
Phishing
·c.)
Cyberstalking
·d.)
Cyberbullying
_ is a government act that requires organizations using federal-provided Internet to provide a policy detailing how they will protect minors on their network by blocking inappropriate content or websites.
·a.)
ARPA
·b.)
CIPA
·c.)
HTML
·d.)
COPPA
Which of the following is NOT a way to safeguard against the potential dangers of the Internet?
·a.)
Setting rules for and monitoring Internet usage
·b.)
Using anti-malware software
·c.)
Using P2P file sharing
·d.)
Restricting access to inappropriate websites
If a person became angry or anxious when he/she was forced to stop using the computer, this would be a symptom of computer addiction known as __________.
·a.)
uncomfortable feelings
·b.)
downplaying computer use
·c.)
neglect
·d.)
lack of control
Lack of control is a symptom of computer addiction that can be categorized by all of the following, EXCEPT __________.
·a.)
lying about time spent on the computer
·b.)
having a difficult time quitting usage of the computer
·c.)
performing poorly at school or work
·d.)
constantly losing track of time
Which of the following is NOT a sign of computer addiction?
·a.)
Neglecting personal responsibilities
·b.)
Exhibiting a lack of control
·c.)
Downplaying computer use
·d.)
Blocking access to inappropriate websites
_ is a social networking platform that only allows users to upload videos, while __________ is a mobile platform for sharing photo or video that allows users to specify who sees their content by selecting "followers."
·a.)
Facebook, Twitter
·b.)
YouTube, Instagram
·c.)
QZone, Google+
·d.)
Pinterest, Tumblr
Which of the following is a benefit of using social networks?
·a.)
Social networking creates a higher potential for cyberbullying.
·b.)
Social networking increases access to information.
·c.)
Social networking has the potential to compromise personal privacy.
·d.)
Social networks can provide false information.
One benefit of social media is that it can provide fast sharing of information.Â
Select the risk associated with this benefit.
·a.)
Social media can waste users' time when they intend to be productive.
·b.)
Social media users can provide misleading or inaccurate reports.
·c.)
Social media can be used to discriminate against others.
·d.)
Social media can cause relationship problems.
Challenge 3
Copyrights are obtained __________.
·a.)
automatically when an original work is created
·b.)
if the work meets certain conditions
·c.)
after a five-year waiting period
·d.)
after being reviewed for fair use
Which of the following do authors NOT control under copyright laws?
·a.)
Who can display or perform their work publicly
·b.)
Who can make copies of their work
·c.)
Who can view or listen to their work
·d.)
Who can distribute their work
 is a protection for words, phrases, or logos to ensure consumers are able to purchase the goods they want without confusion.
·a.)
Copyright
·b.)
Open source
·c.)
Fair use
·d.)
Trademark
The section of an acceptable use policy that details what actions will be taken if the policy is not followed is known as __________.
·a.)
consequences for violation
·b.)
AUP coverage
·c.)
infringement
·d.)
unacceptable uses
_ are documents that outline ways in which a system is allowed to be used, to which a user must agree before accessing a software or service.
·a.)
Information system ethics
·b.)
Professional practices
·c.)
Acceptable use policies
·d.)
Definitions of terms
 means violating the rights of a copyright holder, while __________ means taking another person's work and presenting it as your own.
·a.)
Plagiarism, ethics
·b.)
Infringement, consequences for violation
·c.)
Infringement, plagiarismÂ
·d.)
Unacceptable use, terms of service
The fifth software engineering code of ethics principle, management, deals primarily with __________.
·a.)
acting in the best interests of employers and clients as consistent with public interest
·b.)
leaders subscribing to and promoting ethical approaches to software development
·c.)
promoting ethical approaches to software development as well as engaging in lifelong learning in the profession
·d.)
being fair and supportive towards colleagues
When turning in his portion of code to the team lead, a software engineer is praised for a particular part of the code. He accepts the praise even though he had struggled with that portion and had asked a colleague to write some of the program for him.Â
Â
Which of the following principles is being violated here?
·a.)
Self
·b.)
Public
·c.)
Both self and colleagues
·d.)
Colleagues
Which of the following principles of the software engineering code of ethics deals with maintaining integrity and independence in professional decision-making?
·a.)
Self
·b.)
Judgement
·c.)
Profession
·d.)
Public
Â
IT -----------150-----------0 U-----------nit----------- 3 -----------Cha-----------lle-----------nge-----------s I-----------ntr-----------odu-----------cti-----------on -----------to -----------Inf-----------orm-----------ati-----------on -----------Tec-----------hno-----------log-----------y S-----------oph-----------ia -----------Cou-----------rse-----------