5. Place the words onto the correct places to complete the table. Differences & Smart TV & Basic TV Internet Connectivity & & Streaming & & Gaming Capabilities & & I No Built-in Wi-Fi or Ethernet Cable Yes Built-in Streaming Apps Requires External Device to Stream N/A
In what medium do web applications operate? Select one: Cloud Browser Telepresence Internet
Define cloud computing. Select one: The act of sharing audio files via email. The act of sharing your ideas in a document typed on a computer. The delivery of computers The delivery of shared resources through the Internet.
VolP stands for what? Select one: Virtualization Over Insufficient Paper Voice Over Internet Protocol Virtually Only Internet Protocols Voice Over Internet Party
What is the primary role of a DHCPv6 server in an IPv6 network? To locate the default gateway for clients To generate host addresses with suitable network prefixes To provide additional option settings To support broadcast messages for IPv6 clients
Web Testing Application cookies Cookies are small files that are stored in a user's machine that maintain the login session on the website. Test to see if the cookies are encrypted before they are written on the user's machine. To test session cookies that expire after a session ends, check for the login sessions and user stats after the end of a session. Check the effect that cookie deletion has on web testing application security. Validating HTML/CSS HTML/CSS validation is a key part of any search engine optimization process. The main thing is to validate the website for HTML syntax errors and to see if search engine spiders can crawl across the entire website.
What is the first step in the DHCP lease process? DHCPACK DHCPDISCOVER DHCPOFFER DHCPREQUEST
Why must a DHCP server, without the use of relays, be placed in the same subnet as its clients? To reduce network latency To ensure it can assign IP addresses to them To comply with network security policies To increase the server's processing speed
What is the default line spacing setting within a paragraph in Word? A 1 (single) B 2 (double-spaced C 1.5 D 1.15
The Web 2.0 world came about when you could interact with websites without knowing how to create a web page. A True B False
2. You have problem with your c omputer The Aloric za End User Suppo rt person assisting you asks for your password.problem Give it to them but chang e it once your computer is fixed. Refuse and instead ask them to provide your User Security PIN Question it but provide the basswor d tô them anyway. Give it t them they're in IT so they'r authorized.
3. What are the four most common types of cyber attacks launched against K-12 school districts? See pages $3-11$ then identify each one and briefly describe it. __ 1. 2. 3 __ . Go to the incident map located at this website: https://www.h (12six.org/map. Find 3 incidents on the map located near your school or at least in your state and briefly __ ours MART CYBERTHREATS STUDENT WORKBOOK
What is Al bias? When an Al tool makes an incorrect or problematic decision due to flawed training data. When an Al works faster on some computers than on others. When an Alls biased against other Al programs. When an Al has a favorite color.
Adding a field to a blank form places __ control(s) in a stacked layout. two three four only one
Which step in the Cyber Attack Cycle involves delivering the malware to the target? Delivery Reconnaissance Exploitation Malicious Actions
Which of the following is true regarding a heap? Select all that apply It is typically implemented using an array There is a relationship between a node's value and the values of its children There is no relationship between a node's value and the values of its children It is a complete binary tree
Which of the following BEST describes the purpose of Locator Apps and Remote Wipe features on mobile devices? To locate a lost or stolen device and remotely erase sensitive data. To monitor app usage and restrict access to specific applications or mobile devices. To enforce password policies and ensure compliance with organizational security standards. To enhance the speed and performance of mobile devices by clearing unnecessary data.
What creates a trusted infrastructure for issuing and managing digita lidentities? CSR Firewall CA VPN
Which of these is not an advantage of star topology? Easy to add or remove devices Easy to troubleshoot Scalable If central hub fails , the network fails In which topology does a signal travel the entire network even if the recipient is found early? Ring Mesh Bus Star
When troubleshooting an app that frequently crashes on an Android device, you decide to clear the app cache. What is the primary purpose of clearing the app cache in this scenario? To permanently delete the app's data, including user settings and login information. To disable the app temporarily, preventing it from consuming system resources. To uninstall and reinstal the app to ensure compatibility with the operating system. To remove temporary files that may be causing the app to malfunction.