Libretext Exam 2

Navigation   » List of Schools, Subjects, and Courses  »  INT 1010 – Introduction to Information Technology  »  Exams  »  Libretext Exam 2

No Answers We dont have answer to this question yet.  If you need help with your homework send us an email or chat with our tutors

Libretext Exam 2

Question

Libretext Exam 2

 

•    Question 1
6 out of 6 points
    
    Each byte in main memory is specified by an integer __________________            
    
            
•    Question 2
6 out of 6 points
    
    You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario?            
    
            
•    Question 3
5 out of 5 points
    
    Solid state drives (SSD) are fast, but they are more expensive than hard drives (HDD).            
    
            
•    Question 4
5 out of 5 points
    
    Copper wires has information is encoded utilizing frequencies from the electromagnetic range.            
    
            
•    Question 5
6 out of 6 points
    
    ______________  has information encoded as beats of light.            
    
            
•    Question 6
5 out of 5 points
    
    What might a member of a professional organization be doing when they refer to the organization’s code of ethics?            
    
            
•    Question 7
5 out of 5 points
    
    What does the acronym DNS stand for?            
    
            
•    Question 8
5 out of 5 points
    
    What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?            
    
            
•    Question 9
5 out of 5 points
    
    Local variables on the stack are sometimes called automatic, because they are allocated automatically when a function is called, and not freed automatically when the function returns.            
    
            
•    Question 10
0 out of 5 points
    
    Present-day organizations basically utilize three sorts of media to interconnect devices and give the pathway over which information can be transmitted.
These media are:            
    
            
•    Question 11
5 out of 5 points
    
    Worldwide internet users expect expect their connected devices to always stay:            
    
            
•    Question 12
5 out of 5 points
    
    Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?            
    
            
•    Question 13
6 out of 6 points
    
    _________ is information is encoded utilizing frequencies from the electromagnetic range.            
    
            
•    Question 14
5 out of 5 points
    
    Would the following incident be an example of social engineering/phishing? You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver’s license number and telephone number.            
    
            
•    Question 15
6 out of 6 points
    
      __________ displays ads on computer’s desktop or inside individual programs.             
    
            
•    Question 16
5 out of 5 points
    
    Which of the following is good practice to ensure that you do not get malware on your computer from an online source?            
    
            
•    Question 17
5 out of 5 points
    
    A byte is 8 bits.            
    
            
•    Question 18
5 out of 5 points
    
    The tools that cyber criminals often use, including computer viruses, worms, and spyware, are called __________.            
    
            
•    Question 19
0 out of 5 points
    
    A bit is is not a binary digit.            
                    

We don’t have answer to this question yet.If you need help with your homework send us an email at or chat with our tutors
This question is taken from INT 1010 – Introduction to Information Technology » Fall 2021 » Exams