BIS 221T Apply: Week 5 Apply Assignment

0 items
BIS 221T Apply: Week 5 Apply Assignment
BIS 221T Apply: Week 5 Apply Assignment
$12.00
  • Description

BIS 221T Apply: Week 5 Apply Assignment

Complete the Week 5 Apply Assignment in Cirrus®. Note: Check in Cirrus to determine how many attempts you have available to complete this assignment.

Task 1 | Mark: 1.00/1.00

Question text

Application software is the software that is used when you do each of the following tasks except

Select one:

  1. send an email.
  2. create art.
  3. start your computer.
  4. surf the web.

 

Task 2 | Mark: 1.00/1.00

Question text

WordStar was an early _____ application for personal computers.

Select one:

  1. desktop publishing
  2. word processor
  3. spreadsheet
  4. graphics editing

 

Task 3 | Mark: 1.00/1.00

Question text

In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of

Select one:

  1. screen size and keyboard functionality.
  2. processing speed and graphics capabilities.
  3. storage capacity and processing speed.
  4. memory and screen size.

 

Task 4 | Mark: 1.00/1.00

Question text

Productivity software suites typically include each of the following except _____ software.

Select one:

  1. presentation
  2. word processor
  3. financial management
  4. spreadsheet

 

Task 5 | Mark: 1.00/1.00

Question text

As discussed in Chapter 5, a key benefit of a software suite is

Select one:

  1. a common interface among programs.
  2. free upgrades to new versions.
  3. access to cloud storage and cloud-based versions of the software.
  4. All of the choices are correct.

 

Task 6 | Mark: 1.00/1.00

Question text

Office 365 is an example of

Select one:

  1. SaaS.
  2. CAD/CAM.
  3. ERP.
  4. SCM.

 

Task 7 | Mark: 1.00/1.00

Question text

If you create a(n) _____ object, when the source is updated, the object is also updated.

Select one:

  1. linked
  2. formatted
  3. connected
  4. embedded

 

Task 8 | Mark: 1.00/1.00

Question text

A computer network consists of two or more computing or other devices connected by a

Select one:

  1. communications medium.
  2. cable.
  3. wire.
  4. wireless signal.

 

Task 9 | Mark: 1.00/1.00

Question text

The internet is a global network of

Select one:

  1. social networks.
  2. intranets.
  3. many networks linked together.
  4. microwave towers.

 

Task 10 | Mark: 1.00/1.00

Question text

An analog signal is formed by _____ that _____.

Select one:

  1. a discrete signal; fluctuates between high and low
  2. continuous sound waves; fluctuate between high and low
  3. continuous sound waves; are either high or low
  4. a discrete signal; is either high or low

 

Task 11 | Mark: 1.00/1.00

Question text

On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium.

Select one:

  1. broadband
  2. latency
  3. bandwidth
  4. frequency

 

Task 12 | Mark: 1.00/1.00

Question text

A microwave is a(n) _____ that is directed from one microwave station tower to another.

Select one:

  1. infrared light signal
  2. low-frequency radio signal
  3. beam of light
  4. high-frequency radio signal

 

Task 13 | Mark: 1.00/1.00

Question text

Bluetooth is a network protocol that offers _____ connectivity via _____.

Select one:

  1. long-range; microwaves
  2. short-range; infrared light signals
  3. long-range; ultraviolet light signals
  4. short-range; radio waves

 

Task 14 | Mark: 1.00/1.00

Question text

This wired networking standard specifies the order in which data is sent through the network.

Select one:

  1. Ethernet
  2. WiMAX
  3. TCP/IP
  4. LTE

 

Task 15 | Mark: 1.00/1.00

Question text

If you connect to a network through your phone or cable company, then you probably connect through a

Select one:

  1. MAN.
  2. LAN.
  3. WAN.
  4. WLAN.

 

Task 16 | Mark: 1.00/1.00

Question text

A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection.

Select one:

  1. switch
  2. modem
  3. hub
  4. router

 

Task 17 | Mark: 1.00/1.00

Question text

Which of the following is not described in Chapter 6 as a strategy to maintain network security?

Select one:

  1. computer-user policies
  2. virtual private network (VPN)
  3. firewall
  4. bring your own device (BYOD) policy

 

Task 18 | Mark: 1.00/1.00

Question text

_____ computing is a solution for networks in which a reduction in time for data to travel across the network for processing is critical, such as in healthcare.

Select one:

  1. Edge
  2. Offline
  3. Cloud
  4. 5G

 

Task 19 | Mark: 0.00/1.00

Question text

One of the benefits expected from 5G networks and devices includes

Select one:

  1. speeds up to 50 times faster than 4G.
  2. edge computing capabilities.
  3. Firewall as a Service.
  4. Software as a Service.

 

Task 20 | Mark: 1.00/1.00

Question text

One predicted trend in social technology is the ability to do this with the profile you create when you join a service.

Select one:

  1. carry it from site to site
  2. alter it
  3. hide it
  4. update it automatically according to your life events

 

Task 21 | Mark: 1.00/1.00

Question text

Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter.

Select one:

  1. exclamation point (!)
  2. pound symbol (#)
  3. dollar sign ($)
  4. at symbol (@)

 

Task 22 | Mark: 1.00/1.00

Question text

One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat.

Select one:

  1. disappearing media
  2. media sharing
  3. social marketing
  4. contact lists

 

Task 23 | Mark: 1.00/1.00

Question text

What would you consider one of the key features of a wiki?

Select one:

  1. the opportunity for social interaction
  2. the ability to collaborate
  3. the accuracy of content
  4. the ability to create a list of friends

 

Task 24 | Mark: 1.00/1.00

Question text

Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts.

Select one:

  1. live media streaming
  2. metadata
  3. disappearing media
  4. video blogging

 

Task 25 | Mark: 1.00/1.00

Question text

An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network.

Select one:

  1. authentication
  2. information security
  3. data loss prevention
  4. social engineering

 

Task 26 | Mark: 0.00/1.00

Question text

A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information.

Select one:

  1. DoS
  2. DLP
  3. APT
  4. WPA

 

Task 27 | Mark: 1.00/1.00

Question text

Spyware is sometimes used by legitimate websites to track your browsing habits in order to

Select one:

  1. better target advertisements to you.
  2. improve customer service.
  3. offer you the best price on the products you’re shopping for.
  4. comply with law enforcement investigations.

 

Task 28 | Mark: 1.00/1.00

Question text

A fingerprint scanner is used as a method of

Select one:

  1. decryption.
  2. GPS tracking.
  3. encryption.
  4. authentication.

 

Task 29 | Mark: 0.00/1.00

Question text

A DoS attack typically causes an internet site to

Select one:

  1. become inefficient or crash.
  2. redirect visitors to another site.
  3. send spam emails.
  4. track the browsing history of visitors.

 

Task 30 | Mark: 1.00/1.00

Question text

A honeypot is used by companies to

Select one:

  1. monitor network traffic.
  2. identify weak spots in their network security.
  3. store valuable data.
  4. generate encryption keys.