BIS 221T Apply Week 5 Apply Assignment

Page 1

BIS/221T Introduction to Computer Applications and Systems The Latest Version A+ Study Guide **********************************************

BIS 221T Entire Course Link https://www.onlinehelp123.com/bis-221 ********************************************** BIS 221T Apply: Week 5 Apply Assignment Complete the Week 5 Apply Assignment in Cirrus®. Note: Check in Cirrus to determine how many attempts you have available to complete this assignment. Task 1 | Mark: 1.00/1.00 Question text Application software is the software that is used when you do each of the following tasks except Select one: a. send an email. b. create art. c. start your computer. d. surf the web. Task 2 | Mark: 1.00/1.00 Question text WordStar was an early _____ application for personal computers. Select one: a. desktop publishing b. word processor c. spreadsheet d. graphics editing Task 3 | Mark: 1.00/1.00 Question text In the past, mobile applications were typically not as full-featured as their non-mobile counterparts


because of the limitations of Select one: a. screen size and keyboard functionality. b. processing speed and graphics capabilities. c. storage capacity and processing speed. d. memory and screen size. Task 4 | Mark: 1.00/1.00 Question text Productivity software suites typically include each of the following except _____ software. Select one: a. presentation b. word processor c. financial management d. spreadsheet Task 5 | Mark: 1.00/1.00 Question text As discussed in Chapter 5, a key benefit of a software suite is Select one: a. a common interface among programs. b. free upgrades to new versions. c. access to cloud storage and cloud-based versions of the software. d. All of the choices are correct. Task 6 | Mark: 1.00/1.00 Question text Office 365 is an example of Select one: a. SaaS. b. CAD/CAM. c. ERP. d. SCM. Task 7 | Mark: 1.00/1.00 Question text If you create a(n) _____ object, when the source is updated, the object is also updated. Select one: a. linked b. formatted c. connected d. embedded Task 8 | Mark: 1.00/1.00


Question text A computer network consists of two or more computing or other devices connected by a Select one: a. communications medium. b. cable. c. wire. d. wireless signal. Task 9 | Mark: 1.00/1.00 Question text The internet is a global network of Select one: a. social networks. b. intranets. c. many networks linked together. d. microwave towers. Task 10 | Mark: 1.00/1.00 Question text An analog signal is formed by _____ that _____. Select one: a. a discrete signal; fluctuates between high and low b. continuous sound waves; fluctuate between high and low c. continuous sound waves; are either high or low d. a discrete signal; is either high or low Task 11 | Mark: 1.00/1.00 Question text On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium. Select one: a. broadband b. latency c. bandwidth d. frequency Task 12 | Mark: 1.00/1.00 Question text A microwave is a(n) _____ that is directed from one microwave station tower to another. Select one: a. infrared light signal b. low-frequency radio signal c. beam of light d. high-frequency radio signal


Task 13 | Mark: 1.00/1.00 Question text Bluetooth is a network protocol that offers _____ connectivity via _____. Select one: a. long-range; microwaves b. short-range; infrared light signals c. long-range; ultraviolet light signals d. short-range; radio waves Task 14 | Mark: 1.00/1.00 Question text This wired networking standard specifies the order in which data is sent through the network. Select one: a. Ethernet b. WiMAX c. TCP/IP d. LTE Task 15 | Mark: 1.00/1.00 Question text If you connect to a network through your phone or cable company, then you probably connect through a Select one: a. MAN. b. LAN. c. WAN. d. WLAN. Task 16 | Mark: 1.00/1.00 Question text A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection. Select one: a. switch b. modem c. hub d. router Task 17 | Mark: 1.00/1.00 Question text Which of the following is not described in Chapter 6 as a strategy to maintain network security? Select one: a. computer-user policies


b. virtual private network (VPN) c. firewall d. bring your own device (BYOD) policy Task 18 | Mark: 1.00/1.00 Question text _____ computing is a solution for networks in which a reduction in time for data to travel across the network for processing is critical, such as in healthcare. Select one: a. Edge b. Offline c. Cloud d. 5G Task 19 | Mark: 0.00/1.00 Question text One of the benefits expected from 5G networks and devices includes Select one: a. speeds up to 50 times faster than 4G. b. edge computing capabilities. c. Firewall as a Service. d. Software as a Service. Task 20 | Mark: 1.00/1.00 Question text One predicted trend in social technology is the ability to do this with the profile you create when you join a service. Select one: a. carry it from site to site b. alter it c. hide it d. update it automatically according to your life events Task 21 | Mark: 1.00/1.00 Question text Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter. Select one: a. exclamation point (!) b. pound symbol (#) c. dollar sign ($) d. at symbol (@) Task 22 | Mark: 1.00/1.00


Question text One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat. Select one: a. disappearing media b. media sharing c. social marketing d. contact lists Task 23 | Mark: 1.00/1.00 Question text What would you consider one of the key features of a wiki? Select one: a. the opportunity for social interaction b. the ability to collaborate c. the accuracy of content d. the ability to create a list of friends Task 24 | Mark: 1.00/1.00 Question text Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts. Select one: a. live media streaming b. metadata c. disappearing media d. video blogging Task 25 | Mark: 1.00/1.00 Question text An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network. Select one: a. authentication b. information security c. data loss prevention d. social engineering Task 26 | Mark: 0.00/1.00 Question text A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information. Select one: a. DoS


b. DLP c. APT d. WPA Task 27 | Mark: 1.00/1.00 Question text Spyware is sometimes used by legitimate websites to track your browsing habits in order to Select one: a. better target advertisements to you. b. improve customer service. c. offer you the best price on the products you’re shopping for. d. comply with law enforcement investigations. Task 28 | Mark: 1.00/1.00 Question text A fingerprint scanner is used as a method of Select one: a. decryption. b. GPS tracking. c. encryption. d. authentication. Task 29 | Mark: 0.00/1.00 Question text A DoS attack typically causes an internet site to Select one: a. become inefficient or crash. b. redirect visitors to another site. c. send spam emails. d. track the browsing history of visitors. Task 30 | Mark: 1.00/1.00 Question text A honeypot is used by companies to Select one: a. monitor network traffic. b. identify weak spots in their network security. c. store valuable data. d. generate encryption keys.



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.