Sophisticated modeling software is helping international researchers A. analyze computer systems to gather potential legal evidence. B. market new types of products to a wider audience. C. create more intricate screenplays and movie scripts. D. increase the pace of research in finding and producing vaccines.
Which item is defined as the crime of breaking into a computer system and making changes to it? (1 point) phishing identity theft digital ethics hacking
Buffer overflow is common in programs when data exceeds the boundary of the buffer. True False
When creating a file for use in a video, it is important to avoid thin lines (less than 2 pixels)because: This can create a flicker If you are using a bright colour, it may bleed These will not be visible onscreen These may cause alignment problems
How do you select multiple cells scattered across a spreadsheet? Enter + Spacebar Shift+Click CTRL+Click Click+Drag
Which method is the most common way used to select the multiple cells? Click and drag method Ctrl key method Shift key method
Spy removal programs are designed to detect and remove various types of privacy threats. True False
If you are testing code and you want the debugger to jump out of the current method or function and go back to the main program, which command should you use? A. Go back B. Step out C. Step over D. Resume
A program crashes after half of it has executed.What kind of error causes this to happen? A. logic error B. syntax error C. runtime error D. deliberate error
Select the correct answer from each drop-down menu. What is the purpose of the domain name? The domain name government website square is an example of a service provider. The domain name .gov.nz is an example of a square net .com gov
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product