SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 5 Weeks Ago, 3 Days Ago
Questions Answered: 7559
Tutorials Posted: 7341

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Computer Science Posted 14 Aug 2020 My Price 30.00

IT 1500 Unit 3 Milestone Introduction to Information Technology Sophia Course

IT 1500 Unit 3 Milestone Introduction to Information Technology Sophia Course

Click below Link for Answers

1

Ben borrowed his friend's flash drive to save some files. Later, when he inserted the flash drive into his computer, everything he typed, and the address of every website he visited, was recorded and sent to a marketing company.

What should Ben do to remove the offending program and prevent future attacks?

·

Ben should install and run an antivirus program and change his network password.

·

Ben should consider a different form of access control after installing and running an anti-spyware program.

·

Ben should install and run an antivirus program, and should upgrade his system to WPA security.

·

Ben should install and run antivirus and anti-spyware programs.

2

__________ is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of __________.

·

Ethernet; TCP

·

LAN; IP

·

Wired fidelity; WAP

·

Ethernet; SDN

 

3

Morris is a software engineer for a manufacturer. He wrote a program for the accounting department. During the testing phase, he noticed that the software would occasionally return an erroneous result, but he decided not to make modifications to the program because there were concerns about the project going over budget. He decided that it was better for him to be seen as someone who could stay within budget, and rationalized that the error was minor, and would not affect financial performance.

Which principle of the Software Engineering Code of Ethics has Morris violated?

·

Principle 6: Profession

·

Principle 3: Product

·

Principle 7: Colleagues

·

Principle 8: Self

4

Which of the following can be controlled by copyright?

·

The Adidas stripe logo

·

The advertising slogan for a national car sales chain

·

A song written by the Beatles

·

The name of a college football team

5

David’s computer is infected with spyware. 

What problem can David expect as a result?

·

Hackers will steal his files through pop-up windows.

·

Information about his computer usage will be sent to an outside party.

·

His computer will be infected by a virus that could delete his files.

·

The malware will install a toolbar that redirects his web browser.

6

Select the true statement about the history of the Internet.

·

It took more than a decade for a private company — Bolt, Beranek, and Newman — to develop ARPANET.

·

During the first year of its operation, ARPANET enabled computer networks to communicate through the invention of the TCP/IP protocol.

·

The U.S. government created the Advanced Research Projects Agency (ARPA) in response to the Soviet launch of Sputnik.

·

As a way to spy on the Soviet Union, ARPA was preceded by the creation of the DARPA agency in the late 1950s.

7

Select the true statement about network protocols.

·

Communication cannot take place unless the protocol is executed in the same way on all devices.

·

One function of a protocol is to decompress data when it is delivered to the receiving computer.

·

Using a protocol other than TCP/IP can result in data loss.

·

Computers that are distributed across a large geographic area need a special protocol to resolve errors.

8

Select the sign of computer addiction that indicates a lack of control.

·

Ever since his mother died, Charlie stays up late every night playing an online game.

·

Even though she knows that she should, Jacqueline cannot stop playing her favorite online game.

·

After moving to a new town, Sal spends most of his time online to keep his mind off the friends he misses.

·

While driving his car, Mitch rear-ended another car when he was checking his social media account.

9

Select the social media site that is an idea-sharing website.

·

QQ

·

Google+

·

Pinterest

·

QZone

10

Clay works for a company that has offices in major cities across the United States. His department regularly holds videoconferences with teams in the other branches.

Which type of network does Clay's business most likely use for videoconferencing?

·

PAN

·

LAN

·

WAN

·

MAN

11

In which of the following scenarios can a trademark be applied?

·

Peter names his new business “Garden Ornaments.”

·

Twila paints a picture of Hawaiian scenery.

·

Mark writes and records a new song for his rock band. 

·

Merle designs a web page for Peter’s business.

12

Internet Big Box is a global retailer that has networked devices in many small networks in North America, Europe, and Asia. Maria, an executive who works in the United States, communicates regularly with Chen, an executive in China.

Which network type do the executives at Internet Big Box use to communicate with each other?

·

PAN

·

MAN

·

WAN

·

LAN

13

Select the true statement about CIPA.

·

Parental consent is required if a child wants to use a site.

·

It can restrict a minor's access to harmful content.

·

It is enforced by the federal E-rate program.

·

All schools are required to adopt it.

14

Select the true statement about HTML.

·

The web consists of documents written in HTTP and transmitted by HTML.

·

The final product transmitted to a browser is in HTML.

·

An HTML tag initiates a protocol known as HTTP.

·

HTML stands for hidden transfer markup language.

15

Select the scenario that demonstrates plagiarism.

·

Savasha uses open source software to develop a new web design manual for her sales company.

·

In a blog post, Katriana paraphrases portions of an interview about her favorite author, and includes a hyperlink to the interview.

·

Carissa downloads an entire album of music from a file-sharing website.

·

In his essay, James rewords a paragraph about an idea that he got from another author, without naming the author.

1

In which of the following scenarios can a trademark be applied?

·

Paige creates a gluten-free dessert recipe and posts it on her blog.

·

Erik uploads a new reaction video to his YouTube channel.

·

Randy designs a bracelet for his jewelry line.

·

Tiffany records a sequence of three musical notes that appear in every ad for a company.

2

Select the social media site that is an idea-sharing website.

·

Pinterest

·

Google+

·

QQ

·

QZone

3

Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network.

Which network type is Genevieve using?

·

LAN

·

PAN

·

MAN

·

WAN

4

Select the true statement about network protocols.

·

Computers that are distributed across a large geographic area need a special protocol to resolve errors.

·

Using a protocol other than TCP/IP can result in data loss.

·

Communication cannot take place unless the protocol is executed in the same way on all devices.

·

One function of a protocol is to decompress data when it is delivered to the receiving computer.

 

5

Select the true statement about HTML.

·

The final product transmitted to a browser is in HTML.

·

The web consists of documents written in HTTP and transmitted by HTML.

·

An HTML tag initiates a protocol known as HTTP.

·

HTML stands for hidden transfer markup language.

6

Select the scenario that demonstrates plagiarism.

·

Dylan contributes some of his own research to an entry on Wikipedia, and includes a citation for his recent book.

·

Summer finds a recent magazine article about an issue that she wants to discuss with her class, so she makes copies of it for the students.

·

Allison makes a video of herself using sound effects that she clipped from the soundtrack of a popular action movie to market her business.

·

Joseph finds a written passage about a new idea to stop cyberbullying and pastes it into his blog entry without giving credit to its author.

7

Select the true statement about the history of the Internet.

·

During the first year of its operation, ARPANET enabled computer networks to communicate through the invention of the TCP/IP protocol.

·

It took more than a decade for a private company — Bolt, Beranek, and Newman — to develop ARPANET.

·

The U.S. government created the Advanced Research Projects Agency (ARPA) in response to the Soviet launch of Sputnik.

·

As a way to spy on the Soviet Union, ARPA was preceded by the creation of the DARPA agency in the late 1950s.

8

Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.

Which computer addiction symptom is Chip experiencing?

·

Uncomfortable feelings

·

Neglect

·

Lack of control

·

Downplaying

 

9

Alexis received an email message from an unknown sender that included an attachment. 

If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?

·

Opening the attachment would release a passive worm, which would infect her system with adware.

·

Opening the attachment would release a worm, which would infect her system with spyware.

·

Opening the attachment would release an active worm, which would infect her system with adware.

·

Opening the attachment would release a worm, which would infect her system with a virus.

10

__________ is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of __________.

·

LAN; IP

·

Wired fidelity; WAP

·

Ethernet; TCP

·

Ethernet; SDN

11

Morris is a software engineer for a manufacturer. He wrote a program for the accounting department. During the testing phase, he noticed that the software would occasionally return an erroneous result, but he decided not to make modifications to the program because there were concerns about the project going over budget. He decided that it was better for him to be seen as someone who could stay within budget, and rationalized that the error was minor, and would not affect financial performance.

Which principle of the Software Engineering Code of Ethics has Morris violated?

·

Principle 6: Profession

·

Principle 7: Colleagues

·

Principle 8: Self

·

Principle 3: Product

12

Select the true statement about COPPA.

·

The COPPA regulations apply to websites that collect information from children.

·

The COPPA regulations state that websites may not collect information from minors under the age of 13.

·

The COPPA regulations require that parents of children under the age of 13 be given instructions on how to maintain privacy.

·

The COPPA regulations restrict a child's access to harmful content.

13

Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent.

What should Eva do to remove the offending program, and prevent future attacks?

·

Eva should upgrade her system to WPA encryption.

·

Eva should run an antivirus program.

·

Eva should change her method of user authentication.

·

Eva should run an anti-spyware program.

14

Which of the following can be controlled by copyright?

·

A lip-sync video of a popular song posted to YouTube

·

The name of a publicly-traded company

·

The logo of the Oklahoma City Thunder professional basketball team

·

A new cancer medication approved by the FDA

15

Clay works for a company that has offices in major cities across the United States. His department regularly holds videoconferences with teams in the other branches.

Which type of network does Clay's business most likely use for videoconferencing?

·

LAN

·

WAN

·

MAN

·

PAN

RATIONALE

1

Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.

Which computer addiction symptom is Chip experiencing?

·

Uncomfortable feelings

·

Downplaying

·

Neglect

·

Lack of control

2

Gilbert is an independent consultant who helps organizations select the right accounting software for their needs. After evaluating a local nonprofit organization, Gilbert recommended an accounting software package that he believes meets specifications, secures documents, and satisfies user requirements.

Gilbert did not tell his client that he owns a 25% share in the business that developed the software, and that he will benefit if the organization decides to purchase the software he recommends.

Which principle of the Software Engineering Code of Ethics has Gilbert violated?

·

Principle 1: Public

·

Principle 2: Client and Employer

·

Principle 3: Product

·

Principle 4: Judgment 

3

Select the true statement about network protocols.

·

A protocol is a rule for transmitting data between computing devices.

·

Protocols determine the best method for resolving errors with data encryption.

·

The primary function of a protocol is to compress data to reduce storage requirements.

·

Every computer uses the same protocol to communicate, regardless of the network type.

4

Select the FALSE statement about the history of the Internet.

·

The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union. 

·

The Internet means “an interconnected network of networks.”

·

ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah.

·

The invention of HTML enabled computers on different networks to communicate with each other.

5

__________ is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of __________.

·

Ethernet; TCP

·

Ethernet; SDN

·

LAN; IP

·

Wired fidelity; WAP

6

Amanda and her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house.

Which type of network is best for Amanda and her family?

·

PAN

·

MAN

·

LAN

·

WAN

7

__________ is a social media and microblogging site that enables users to post multimedia content to a short-form blog.

·

WhatsApp

·

QQ

·

Instagram

·

Tumblr

8

In which of the following scenarios can a trademark be applied?

·

Mark writes and records a new song for his rock band. 

·

Peter names his new business “Garden Ornaments.”

·

Twila paints a picture of Hawaiian scenery.

·

Merle designs a web page for Peter’s business.

 

9

Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent.

What should Eva do to remove the offending program, and prevent future attacks?

·

Eva should run an antivirus program.

·

Eva should change her method of user authentication.

·

Eva should upgrade her system to WPA encryption.

·

Eva should run an anti-spyware program.

10

Which of the following can be controlled by copyright?

·

The team logo for a minor league baseball team

·

A writer’s new murder mystery on the New York Times bestsellers list

·

A new type of engine for pickup trucks

·

The slogan for a business

11

Select the true statement about CIPA.

·

Enforcement is handled by the Federal Trade Commission (FTC).

·

Public schools and organizations are required to install anti-virus software on all computers accessed by children.

·

Parental consent is required for users under 13 before the site may collect information.

·

Entities are required to have a hearing or forum to notify the public of its Internet safety policy.

 

12

Select the scenario that demonstrates plagiarism.

·

Allison makes a video of herself using sound effects that she clipped from the soundtrack of a popular action movie to market her business.

·

Summer finds a recent magazine article about an issue that she wants to discuss with her class, so she makes copies of it for the students.

·

Joseph finds a written passage about a new idea to stop cyberbullying and pastes it into his blog entry without giving credit to its author.

·

Dylan contributes some of his own research to an entry on Wikipedia, and includes a citation for his recent book.

13

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?

·

PAN

·

LAN

·

MAN

·

WAN

14

Select the true statement about HTML.

·

HTML supports the delivery of Web pages through HTTP.

·

HTML is used to distribute websites.

·

HTML tags tell a web browser when to run HTTP sequences.

·

HTML is a language that is used to create Web pages.

15

While Kari was searching the Internet, her computer was infected by a virus. 

What problem can Kari expect as a result?

·

The virus will attach itself to the computer's RAM, then attach itself to executable files in RAM.

·

The code will install software that looks useful but compromises her system's security.

·

Her keystrokes will be recorded and used by hackers to steal her personal and financial information.

·

A toolbar will be installed that redirects her Web browser to pirated sites.

 

Select the true statement about CIPA.

·

It can restrict a minor's access to harmful content.

·

All schools are required to adopt it.

·

Parental consent is required if a child wants to use a site.

·

It is enforced by the federal E-rate program.

 

Which of the following is the basic functionality of network software?

·

Internet speed

·

Ethernet development

·

Automation management

·

User management

 

In which of the following scenarios can a trademark be applied?

·

Scott designs a new open-source application that can be used by any web designer.

·

Alanna draws a shape to use as a background image on a company's website.

·

Finn describes the results of his research in a journal article.

·

Glenda writes a computer program for a business.

 

is a mobile application used primarily to share photos and videos with others.

·

Instagram

·

·

QQ

·

·

LinkedIn

·

·

Twitter

·

 

 

Answers

(118)
Status NEW Posted 14 Aug 2020 09:08 AM My Price 30.00

IT -----------150-----------0 U-----------nit----------- 3 -----------Mil-----------est-----------one----------- In-----------tro-----------duc-----------tio-----------n t-----------o I-----------nfo-----------rma-----------tio-----------n T-----------ech-----------nol-----------ogy----------- So-----------phi-----------a C-----------our-----------se-----------

Attachments

file 1597399272-Milestone 3.docx preview (4826 words )
1----------- B-----------en -----------bor-----------row-----------ed -----------his----------- fr-----------ien-----------d's----------- fl-----------ash----------- dr-----------ive----------- to----------- sa-----------ve -----------som-----------e f-----------ile-----------s. -----------Lat-----------er,----------- wh-----------en -----------he -----------ins-----------ert-----------ed -----------the----------- fl-----------ash----------- dr-----------ive----------- in-----------to -----------his----------- co-----------mpu-----------ter-----------, e-----------ver-----------yth-----------ing----------- he----------- ty-----------ped-----------, a-----------nd -----------the----------- ad-----------dre-----------ss -----------of -----------eve-----------ry -----------web-----------sit-----------e h-----------e v-----------isi-----------ted-----------, w-----------as -----------rec-----------ord-----------ed -----------and----------- se-----------nt -----------to -----------a m-----------ark-----------eti-----------ng -----------com-----------pan-----------y. ----------- Wh-----------at -----------sho-----------uld----------- Be-----------n d-----------o t-----------o r-----------emo-----------ve -----------the----------- of-----------fen-----------din-----------g p-----------rog-----------ram----------- an-----------d p-----------rev-----------ent----------- fu-----------tur-----------e a-----------tta-----------cks-----------? ----------- B-----------en -----------sho-----------uld----------- in-----------sta-----------ll -----------and----------- ru-----------n a-----------n a-----------nti-----------vir-----------us -----------pro-----------gra-----------m a-----------nd -----------cha-----------nge----------- hi-----------s n-----------etw-----------ork----------- pa-----------ssw-----------ord-----------. ----------- B-----------en -----------sho-----------uld----------- co-----------nsi-----------der----------- a -----------dif-----------fer-----------ent-----------
Not Rated(0)