What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender BitLocker
Smart devices are so called because of their ability to communicate, locate and predict. a. True b. False
What is the maximum resolution that an HDM 2.1 can support? 720P 1080P 4K 8K
Which of the following is true of single mode fiber? It has a larger core. It is an older technology. It is more common and used for running Internet to homes.
7. Explain how encryption works and how asymmetric encryption is used for purchasing items online securely. (5 points)
A virtual image is only found on the internet. True False
Intelligent transportation systems use GPS to __ Select all that apply. A. accept fare payments B. prevent "bunching" C. count passengers D. communicate current position and speed to other vehicles
Suppose one has a pushdown automaton M with two stacks.. Which of the following is true? A two stack machine is much more efficient than a Turing machine Adding a third stack will further increase the power of the machine. Popping the value off of one stack and pushing on the other is the equivalent of a tape move on a Turing machine The second I stack does not add any capability
For HIE and data analytics, __ Structured data has many advantages Unstructured data has many advantages Decreased use of mobile devices has many advantages Decreased use of patient portals has many advantages
For the entity PERSON the attribute SSN is an example of a duplicated values attribute. True False
Question 3 If the $IPV4CIDR$ address is $73.0.5.0/17$ how many bits are reserved for the host address? 17 32 16 15
Task 2 Incident Handling Plan Create an incident handling plan for the selected attack from the top 100 B $\square $ Space used(includes formatting): 0/30000
Matching 2 points Match the definition on the left to the correct term on the right: A(n) __ disappointed is a program that translates programs to a simpler language that the computer can execute. The __ is a program that supervises operation of the entire computer. $\square $ memory operating system processor algorithm The __ is the part of a computer that follows instructions.
Which statements correctly describe the role of big cata in unsupervised, supervisec or reinforcement machine learning? Select all that apply. A. Allows the AI to identify meaningful patterns. B. Increases the Al motlel Accuracy with predictions. Determines the Al's tone and personality. a Improves the AI's decision -making over time. E. Reduces the At's need for complex alzorithms
1 . Identify List five different technologies or types of hardware that are used today in communications.
Which image type is made up of pixels and is best suited for detailed images like photographs? A Bitmap B Vector C Path D Shape
Click to add title How can you add a frame to a picture in Word? A. type "frame" B. Double click the picture, then the "frame"menu appears C. Drag the picture into the frame options window D. none of the above
To convert an image stored by a geometric formula to pixels A Vector B Bitmap C Rasterize D Smart Object
13 of 51 Determining the type and specifics of contamination is performed during the __ phase. after-attack recovery during-attack pre-attack
Which color mode is used primarily for digital displays? A RGB B CMYK C Grayscale D Indexed Color