Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. The computers in a lab on a floor of a building would be connected using a ________.

  • MAN
  • PAN
  • LAN
  • WAN

2. A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

  • armored
  • transitional
  • proxy
  • bastion host

3. A _______ is a virus triggered on a certain date.

  • time bomb
  • logic bomb
  • worm
  • macro

4. DRM-free music can be moved legally from system to system.

True
False

5. Which of the following is NOT a common network topology?

  • Cluster
  • Linear bus
  • Star
  • Ring

6. Every new cell/smartphone has to include a GPS chip.

True
False

7. Which of the following uses radio waves to transmit data signals over short distances?

  • Infrared
  • Bluetooth
  • Wireless access protocol
  • VoIP

8. Which of the following is NOT a virus category?

  • Macro
  • Pharming
  • Worm
  • Logic bomb

9. Many mobile devices include a mini- ________ port.

  • serial
  • coaxial
  • USB
  • parallel

10. The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.

True
False

11. With regard to computer protection, quarantining is defined as ________.

  • deleting an infected file
  • updating your antivirus software
  • repairing an infected file
  • placing a found virus in a secure area on the hard drive

12. A(n) ________ server tracks who is logging onto the network as well as which services on the network each user has available.

  • application
  • authentication
  • file
  • dedicated

13. A power failure interrupts VoIP service.

True
False

14. Since data transmissions can pass through fiber-optic cable in only one direction, transmission of data in both directions requires at least two fibers.

True
False

15. A ________ is a virus attached to documents such as Word or Excel files.

  • Trojan horse
  • script virus
  • macro virus
  • polymorphic virus

16. ________ viruses are often transmitted by a flash drive left in a USB port.

  • Macro
  • Boot-sector
  • Time-bomb
  • Logic-bomb

17. A main difference between the tablet and the smartphone is the ________.

  • touch-screen interface
  • Internet connectivity
  • screen size
  • operating system

18. Ethical hackers are also known as white-hat hackers.

True
False

19. CAPTCHA is ________.

  • a rootkit virus
  • password method
  • antivirus software
  • the wavy hard-to-read letter and number sequence you type to prove you are human to a Web site

19. Which of the following classifications of viruses can change its own code to avoid detection?

  • Stealth
  • Worm
  • Polymorphic
  • Multipartite

20. A print server uses a print ________ as a software holding area for jobs waiting to be printed.

  • heap
  • stack
  • spooler
  • logger

21 A tablet uses a full traditional operating system.

True
False

22. Data flows in both directions in a ring network.

True
False

23. 4G LTE Cellular networks offer faster data-transfer speed than Wi-Fi offers.

True
False

24. A virus signature is a portion of virus code unique to a particular computer virus.

True
False

25. Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

  • pretexting
  • theft
  • pharming
  • engineering

26. All of the following were top cybercrimes reported to the IC3 EXCEPT ________.

  • identity theft
  • non-auction scam
  • theft of services
  • advance fee fraud

27. Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

  • Conversion rate
  • Converting rate
  • Simplifying rate
  • Sampling rate

28. Ring networks use the ________ method to avoid data collisions.

  • active-check
  • passive-check
  • token
  • packet screening

29. The distance between two near field communication (NFC) devices is limited to about ________.

  • 1.5 in
  • 1.5 m
  • 10 m
  • 1.5 ft

30. Transmission media comprise the physical system data takes to flow between devices on the network.

True
False

31. Text messaging is also called ________.

  • short text messaging (STM)
  • text messaging system (TMS)
  • sending messages shortly (SMS)
  • short message service (SMS)

32. ________ allows only limited use of legally purchased media.

  • Copyright
  • Copyleft
  • Synchronizing
  • Digital rights management

33. The terms virus and worm actually mean the same thing.

  • True
  • False

34. ________ hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities.

  • White-hat
  • Black-hat
  • Gray-hat
  • Green-hat

35. Which of the following digital image formats compresses the image file?

  • MPEG
  • JPEG
  • PDF
  • WAV

36. A ________ is named after a housing construction feature that slows the spread of fires from house to house.

  • firewall
  • fire extinguisher
  • firehouse
  • firebreak

37. The primary input devices for smartphones are ________.

  • microphone and touch screen
  • touch screen and digital camera
  • keyboard and mouse
  • microphone and mouse

38. A macro virus is a virus attached to a file such as a Word document or Excel workbook.

True
False

39. SMS technology sends both text and pictures.

  • True
  • False

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92278954
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Given two eventsnbspgnbspandnbsph the probabilities of

Given two events  G  and  H , the probabilities of each occurring are as follows: P( G ) = 0.22; P( H ) = 0.34; P( H  AND  G ) = 0.09. Using this information: Find the complement of P ( H  AND  G ). Round to 2 places.

Question a topic related to database securityyou must pick

Question: A topic related to Database Security. You must pick one topic after reading at least 5 articles. You must provide a list of those articles you read and you must annotate each one. That is, you must write at lea ...

Assignment from chapter 10 page 302 web-based case read and

Assignment: From Chapter 10, page 302, Web-Based Case. Read and answer the questions. KNOWLEDGE MANAGEMENT SYSTEMS AND CRM In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the comp ...

You are requested to design an information technology

You are requested to design an Information Technology Infrastructure for an international nonprofit organization. The organization has six offices, one each in Ohio, Kentucky, Toronto, Michigan, Chicago, and Indiana. Col ...

As the school year begins what trends are taking place with

As the school year begins, what trends are taking place with Educational Technology in schools?

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

1 investment risk and default risk are interchangeable

1. Investment risk and default risk are interchangeable terms and essentially mean the same thing.   2. Disadvantages of the Capital Asset Pricing Model include that you are using the past to predict the future and that ...

Describe a study you might conduct in which it would be

Describe a study you might conduct in which it would be appropriate to compute a Pearson r(i.e., a study with one group of participants with two scores per participant). Predict if you perceive that the r-value would be ...

Question summarize the process of how cameras and scanners

Question : Summarize the process of how cameras and scanners produce digital images. Compare differences between the production of images on film and digital images.

Nfs allows the file system on one linux computer to be

NFS allows the file system on one Linux computer to be accessed over a network connection by another Linux system. Discuss the security vulnerabilities of NFS in networked Linux systems, and possible mitigation solutions ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As