Multiple Choice 2 points Which of the following is a negative consequence associated with malware infections? loss of data identity theft time spent removing the infection all of the above
A group of eight bits is called a __ kilobit byte pixel binary
What is a characteristic of deep learning that traditional machine learning does not have? it uses decision trees for classification It relies specifically on neural networks It only uses small datasets It is exclusively used for image recognition
What is a function of a proxy firewall? uses signatures to detect patterns in network traffic connects to remote servers on behalf of clients filters IP traffic between bridged interfaces drops or forwards traffic based on packet header information
Multiple Choice Question A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a __ LAN MAN PAN CAN
Select the person whose job is performing the role of a software project manager. Valerie maintains documentation related to product testing and software training of personnel. Felipe is responsible for keeping software development projects on time and on budget. Ellen writes computer code using a programming language. Colin develops and evaluates the results of tests for different aspects of the software.
To apply a header in Word, select the __ tab. A Review B Insert C Home
When should a user consider restoring the operating system? A When programs or apps do not start properly B When the monitor does not display anything C When you cannot print documents D When you can't connect to the Internet
What type of hard drive has no moving parts, making it fast and durable? A magnetic hard drive B solid state drive C DVD D tape drive
What is typically configured when you turn on a mobile device for the first time? App store access Email settings Phone number and text messaging Security settings
Question 3 If the $IPV4CIDR$ address is $73.0.5.0/17$ how many bits are reserved for the host address? 17 32 16 15
Task 2 Incident Handling Plan Create an incident handling plan for the selected attack from the top 100 B $\square $ Space used(includes formatting): 0/30000
Matching 2 points Match the definition on the left to the correct term on the right: A(n) __ disappointed is a program that translates programs to a simpler language that the computer can execute. The __ is a program that supervises operation of the entire computer. $\square $ memory operating system processor algorithm The __ is the part of a computer that follows instructions.
Which statements correctly describe the role of big cata in unsupervised, supervisec or reinforcement machine learning? Select all that apply. A. Allows the AI to identify meaningful patterns. B. Increases the Al motlel Accuracy with predictions. Determines the Al's tone and personality. a Improves the AI's decision -making over time. E. Reduces the At's need for complex alzorithms
1 . Identify List five different technologies or types of hardware that are used today in communications.
Which image type is made up of pixels and is best suited for detailed images like photographs? A Bitmap B Vector C Path D Shape
Click to add title How can you add a frame to a picture in Word? A. type "frame" B. Double click the picture, then the "frame"menu appears C. Drag the picture into the frame options window D. none of the above
To convert an image stored by a geometric formula to pixels A Vector B Bitmap C Rasterize D Smart Object
13 of 51 Determining the type and specifics of contamination is performed during the __ phase. after-attack recovery during-attack pre-attack
Which color mode is used primarily for digital displays? A RGB B CMYK C Grayscale D Indexed Color