- Description
BIS 221T Apply: Week 5 Apply Assignment
Complete the Week 5 Apply Assignment in Cirrus®. Note: Check in Cirrus to determine how many attempts you have available to complete this assignment.
Task 1 | Mark: 1.00/1.00
Question text
Application software is the software that is used when you do each of the following tasks except
Select one:
- send an email.
- create art.
- start your computer.
- surf the web.
Task 2 | Mark: 1.00/1.00
Question text
WordStar was an early _____ application for personal computers.
Select one:
- desktop publishing
- word processor
- spreadsheet
- graphics editing
Task 3 | Mark: 1.00/1.00
Question text
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of
Select one:
- screen size and keyboard functionality.
- processing speed and graphics capabilities.
- storage capacity and processing speed.
- memory and screen size.
Task 4 | Mark: 1.00/1.00
Question text
Productivity software suites typically include each of the following except _____ software.
Select one:
- presentation
- word processor
- financial management
- spreadsheet
Task 5 | Mark: 1.00/1.00
Question text
As discussed in Chapter 5, a key benefit of a software suite is
Select one:
- a common interface among programs.
- free upgrades to new versions.
- access to cloud storage and cloud-based versions of the software.
- All of the choices are correct.
Task 6 | Mark: 1.00/1.00
Question text
Office 365 is an example of
Select one:
- SaaS.
- CAD/CAM.
- ERP.
- SCM.
Task 7 | Mark: 1.00/1.00
Question text
If you create a(n) _____ object, when the source is updated, the object is also updated.
Select one:
- linked
- formatted
- connected
- embedded
Task 8 | Mark: 1.00/1.00
Question text
A computer network consists of two or more computing or other devices connected by a
Select one:
- communications medium.
- cable.
- wire.
- wireless signal.
Task 9 | Mark: 1.00/1.00
Question text
The internet is a global network of
Select one:
- social networks.
- intranets.
- many networks linked together.
- microwave towers.
Task 10 | Mark: 1.00/1.00
Question text
An analog signal is formed by _____ that _____.
Select one:
- a discrete signal; fluctuates between high and low
- continuous sound waves; fluctuate between high and low
- continuous sound waves; are either high or low
- a discrete signal; is either high or low
Task 11 | Mark: 1.00/1.00
Question text
On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium.
Select one:
- broadband
- latency
- bandwidth
- frequency
Task 12 | Mark: 1.00/1.00
Question text
A microwave is a(n) _____ that is directed from one microwave station tower to another.
Select one:
- infrared light signal
- low-frequency radio signal
- beam of light
- high-frequency radio signal
Task 13 | Mark: 1.00/1.00
Question text
Bluetooth is a network protocol that offers _____ connectivity via _____.
Select one:
- long-range; microwaves
- short-range; infrared light signals
- long-range; ultraviolet light signals
- short-range; radio waves
Task 14 | Mark: 1.00/1.00
Question text
This wired networking standard specifies the order in which data is sent through the network.
Select one:
- Ethernet
- WiMAX
- TCP/IP
- LTE
Task 15 | Mark: 1.00/1.00
Question text
If you connect to a network through your phone or cable company, then you probably connect through a
Select one:
- MAN.
- LAN.
- WAN.
- WLAN.
Task 16 | Mark: 1.00/1.00
Question text
A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection.
Select one:
- switch
- modem
- hub
- router
Task 17 | Mark: 1.00/1.00
Question text
Which of the following is not described in Chapter 6 as a strategy to maintain network security?
Select one:
- computer-user policies
- virtual private network (VPN)
- firewall
- bring your own device (BYOD) policy
Task 18 | Mark: 1.00/1.00
Question text
_____ computing is a solution for networks in which a reduction in time for data to travel across the network for processing is critical, such as in healthcare.
Select one:
- Edge
- Offline
- Cloud
- 5G
Task 19 | Mark: 0.00/1.00
Question text
One of the benefits expected from 5G networks and devices includes
Select one:
- speeds up to 50 times faster than 4G.
- edge computing capabilities.
- Firewall as a Service.
- Software as a Service.
Task 20 | Mark: 1.00/1.00
Question text
One predicted trend in social technology is the ability to do this with the profile you create when you join a service.
Select one:
- carry it from site to site
- alter it
- hide it
- update it automatically according to your life events
Task 21 | Mark: 1.00/1.00
Question text
Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter.
Select one:
- exclamation point (!)
- pound symbol (#)
- dollar sign ($)
- at symbol (@)
Task 22 | Mark: 1.00/1.00
Question text
One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat.
Select one:
- disappearing media
- media sharing
- social marketing
- contact lists
Task 23 | Mark: 1.00/1.00
Question text
What would you consider one of the key features of a wiki?
Select one:
- the opportunity for social interaction
- the ability to collaborate
- the accuracy of content
- the ability to create a list of friends
Task 24 | Mark: 1.00/1.00
Question text
Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts.
Select one:
- live media streaming
- metadata
- disappearing media
- video blogging
Task 25 | Mark: 1.00/1.00
Question text
An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network.
Select one:
- authentication
- information security
- data loss prevention
- social engineering
Task 26 | Mark: 0.00/1.00
Question text
A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information.
Select one:
- DoS
- DLP
- APT
- WPA
Task 27 | Mark: 1.00/1.00
Question text
Spyware is sometimes used by legitimate websites to track your browsing habits in order to
Select one:
- better target advertisements to you.
- improve customer service.
- offer you the best price on the products you’re shopping for.
- comply with law enforcement investigations.
Task 28 | Mark: 1.00/1.00
Question text
A fingerprint scanner is used as a method of
Select one:
- decryption.
- GPS tracking.
- encryption.
- authentication.
Task 29 | Mark: 0.00/1.00
Question text
A DoS attack typically causes an internet site to
Select one:
- become inefficient or crash.
- redirect visitors to another site.
- send spam emails.
- track the browsing history of visitors.
Task 30 | Mark: 1.00/1.00
Question text
A honeypot is used by companies to
Select one:
- monitor network traffic.
- identify weak spots in their network security.
- store valuable data.
- generate encryption keys.