Multiple Choice 2 points Which of the following is a negative consequence associated with malware infections? loss of data identity theft time spent removing the infection all of the above
A group of eight bits is called a __ kilobit byte pixel binary
What is a characteristic of deep learning that traditional machine learning does not have? it uses decision trees for classification It relies specifically on neural networks It only uses small datasets It is exclusively used for image recognition
What is a function of a proxy firewall? uses signatures to detect patterns in network traffic connects to remote servers on behalf of clients filters IP traffic between bridged interfaces drops or forwards traffic based on packet header information
Multiple Choice Question A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a __ LAN MAN PAN CAN
Select the person whose job is performing the role of a software project manager. Valerie maintains documentation related to product testing and software training of personnel. Felipe is responsible for keeping software development projects on time and on budget. Ellen writes computer code using a programming language. Colin develops and evaluates the results of tests for different aspects of the software.
To apply a header in Word, select the __ tab. A Review B Insert C Home
When should a user consider restoring the operating system? A When programs or apps do not start properly B When the monitor does not display anything C When you cannot print documents D When you can't connect to the Internet
What type of hard drive has no moving parts, making it fast and durable? A magnetic hard drive B solid state drive C DVD D tape drive
What is typically configured when you turn on a mobile device for the first time? App store access Email settings Phone number and text messaging Security settings
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product