What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender BitLocker
Smart devices are so called because of their ability to communicate, locate and predict. a. True b. False
What is the maximum resolution that an HDM 2.1 can support? 720P 1080P 4K 8K
Which of the following is true of single mode fiber? It has a larger core. It is an older technology. It is more common and used for running Internet to homes.
7. Explain how encryption works and how asymmetric encryption is used for purchasing items online securely. (5 points)
A virtual image is only found on the internet. True False
Intelligent transportation systems use GPS to __ Select all that apply. A. accept fare payments B. prevent "bunching" C. count passengers D. communicate current position and speed to other vehicles
Suppose one has a pushdown automaton M with two stacks.. Which of the following is true? A two stack machine is much more efficient than a Turing machine Adding a third stack will further increase the power of the machine. Popping the value off of one stack and pushing on the other is the equivalent of a tape move on a Turing machine The second I stack does not add any capability
For HIE and data analytics, __ Structured data has many advantages Unstructured data has many advantages Decreased use of mobile devices has many advantages Decreased use of patient portals has many advantages
For the entity PERSON the attribute SSN is an example of a duplicated values attribute. True False
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product