The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 56 Weeks Ago, 4 Days Ago |
| Questions Answered: | 7570 |
| Tutorials Posted: | 7352 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
BIS 221 Week 5 Apply Assignment
Â
Question text
Application software is the software that is used when you do each of the following tasks except
Select one:
 a. start your computer.
 b. create art.
 c. send an email.
 d. surf the web.
Question text
WordStar was an early _____ application for personal computers.
Select one:
 a. graphics editing
 b. desktop publishing
 c. spreadsheet
 d. word processor
Question text
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of
Select one:
 a. processing speed and graphics capabilities.
 b. screen size and keyboard functionality.
 c. storage capacity and processing speed.
 d. memory and screen size.
Question text
Productivity software suites typically include each of the following except _____ software.
Select one:
 a. spreadsheet
 b. presentation
 c. word processor
 d. financial management
Question text
As discussed in Chapter 5, a key benefit of a software suite is
Select one:
 a. All of the choices are correct.
 b. a common interface among programs.
 c. free upgrades to new versions.
 d. access to cloud storage and cloud-based versions of the software.
Question text
Office 365 is an example of
Select one:
 a. CAD/CAM.
 b. SaaS.
 c. SCM.
 d. ERP.
Question text
If you create a(n) _____ object, when the source is updated, the object is also updated.
Select one:
 a. embedded
 b. connected
 c. formatted
 d. linked
Question text
A computer network consists of two or more computing or other devices connected by a
Select one:
 a. wireless signal.
 b. wire.
 c. cable.
 d. communications medium.
Question text
The internet is a global network of
Select one:
 a. microwave towers.
 b. many networks linked together.
 c. intranets.
 d. social networks.
Question text
An analog signal is formed by _____ that _____.
Select one:
 a. a discrete signal; is either high or low
 b. a discrete signal; fluctuates between high and low
 c. continuous sound waves; fluctuate between high and low
 d. continuous sound waves; are either high or low
Question text
On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium.
Select one:
 a. frequency
 b. latency
 c. broadband
 d. bandwidth
Question text
A microwave is a(n) _____ that is directed from one microwave station tower to another.
Select one:
 a. beam of light
 b. infrared light signal
 c. low-frequency radio signal
 d. high-frequency radio signal
Question text
Bluetooth is a network protocol that offers _____ connectivity via _____.
Select one:
 a. short-range; infrared light signals
 b. long-range; microwaves
 c. short-range; radio waves
 d. long-range; ultraviolet light signals
Question text
This wired networking standard specifies the order in which data is sent through the network.
Select one:
 a. LTE
 b. TCP/IP
 c. WiMAX
 d. Ethernet
Question text
If you connect to a network through your phone or cable company, then you probably connect through a
Select one:
 a. MAN.
 b. WAN.
 c. WLAN.
 d. LAN.
Question text
A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection.
Select one:
 a. router
 b. hub
 c. modem
 d. switch
Question text
Which of the following is not described in Chapter 6 as a strategy to maintain network security?
Select one:
 a. firewall
 b. virtual private network (VPN)
 c. bring your own device (BYOD) policy
 d. computer-user policies
Question text
_____ computing is a solution for networks in which a reduction in time for data to travel across the network for processing is critical, such as in healthcare.
Select one:
 a. 5G
 b. Cloud
 c. Offline
 d. Edge
Question text
One of the benefits expected from 5G networks and devices includes
Select one:
 a. Software as a Service.
 b. edge computing capabilities.
 c. Firewall as a Service.
 d. speeds up to 50 times faster than 4G.
Question text
One predicted trend in social technology is the ability to do this with the profile you create when you join a service.
Select one:
 a. alter it
 b. update it automatically according to your life events
 c. carry it from site to site
 d. hide it
Question text
Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter.
Select one:
 a. pound symbol (#)
 b. exclamation point (!)
 c. dollar sign ($)
 d. at symbol (@)
Question text
One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat.
Select one:
 a. media sharing
 b. disappearing media
 c. contact lists
 d. social marketing
Question text
What would you consider one of the key features of a wiki?
Select one:
 a. the ability to collaborate
 b. the ability to create a list of friends
 c. the accuracy of content
 d. the opportunity for social interaction
Question text
Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts.
Select one:
 a. live media streaming
 b. video blogging
 c. metadata
 d. disappearing media
Question text
An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network.
Select one:
 a. data loss prevention
 b. information security
 c. social engineering
 d. authentication
Question text
A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information.
Select one:
 a. DoS
 b. DLP
 c. APT
 d. WPA
Question text
Spyware is sometimes used by legitimate websites to track your browsing habits in order to
Select one:
 a. improve customer service.
 b. offer you the best price on the products you’re shopping for.
 c. comply with law enforcement investigations.
 d. better target advertisements to you.
Question text
A fingerprint scanner is used as a method of
Select one:
 a. authentication.
 b. decryption.
 c. GPS tracking.
 d. encryption.
Question text
A DoS attack typically causes an internet site to
Select one:
 a. redirect visitors to another site.
 b. track the browsing history of visitors.
 c. send spam emails.
 d. become inefficient or crash.
Question text
A honeypot is used by companies to
Select one:
 a. store valuable data.
 b. identify weak spots in their network security.
 c. monitor network traffic.
 d. generate encryption keys.
Â
BIS----------- 22-----------1 W-----------eek----------- 5 -----------App-----------ly -----------Ass-----------ign-----------men-----------t-----------