Which of the following is NOT a means by which a person requesting a digital certificate can be authenticated? a. birth certificate b. employee badge c. email d. telephone number
__ is an unsecured communication over the Internet. HTTPS HTTP Software piracy Data security
Which term describes the meaning of an attribute value? Type Entity QualifierType Qualifier
How can you add an image to a document? Insert>Pictures Add>Image the Add Picture to Document button
How do delivery companies track packages? A. They use a learning management system B. They use code scanning technology C. They use GPS D They use robotic arms to load packages
Computer can execute the code in __ None of these high-level language assembly language machine language
What makes spear phishing different from other email phishing schemes? Select all that apply,and then select Submit. There is extra effort to trick the recipient into believing the email is from a credible source. It targets a specific person or organization. It has no effect on the institution that the scammer is impersonating. The emails may contain personal information about the recipient that were collected from other sources.
When a TCP session begins, what is the name of the first segment that is transferred? a. ACK b. SYN c. RST d. FIN
¿Cuál de las siguientes pestañas le permite insertar imágenes en una diapositiva? A Home Tab B Insert Tab C Design Tab D View Tab
En PowerPoint, ¿cuál de las siguientes opciones proporciona coherencia en el diseño mediante gráficos de fondo, colores y configuraciones de fuente? A Temas (Themes) B Variantes (Variants) C ) Miniaturas (Thumbnails) D vistas (Views)
What cannot be done with most video editing software? Burn to a DVD Upload to the web Edit pictures created in the software Add captions
Which of the following types of digital evidence can be pulled from both a computer and a portable device? Images Text history GPS coordinates Phone call data
Which three of the following are characteristics of a router? Connects networks Provides hardware firewall protection Usually incorporates switches Designed to convert analog signals into digital signals
19 Frequently accessed information is held in __ the hard drive cache memory flash memory read only memory
What distinguishes a collision domain from a broadcast domain? Collision domains are established by routers, while broadcast domains are established by switches. Collision domains are about physically shared media, and their borders are established by bridges and switches. Collision domains can span multiple routers, while broadcast domains are limited to a single switch. Broadcast domains require a layer 2 broadcast address to be established.
Most web browsers use a(n) __ to expedite and streamline b rowsing a. Area network b. Cable modem c. Domain d. Caching system
What should be done to secure SNMP traffic? Configure SNMPv3 or use IPSec for encryption. Disable SNMP entirely. Use the original versions of SNMP. Limit SNMP traffic to internal networks.
The role of the programmer is to install computer work stations to enhance children's learning. True False Submit
Select the correct answer. Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio? A. WMV B. MP3 C. JPEG D. MP4
When users store data on remote servers and access and share data through the internet, which storage method are they most likely using? A. Flash storage B. Networking storage C. DRAM storage D. Cloud storage