Navigation » List of Schools, Subjects, and Courses » INT 1010 – Introduction to Information Technology » Exams » Libretext Exam 2
No Answers We dont have answer to this question yet. If you need help with your homework send us an email or chat with our tutors
Libretext Exam 2
Libretext Exam 2
• Question 1
6 out of 6 points
Each byte in main memory is specified by an integer __________________
• Question 2
6 out of 6 points
You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario?
• Question 3
5 out of 5 points
Solid state drives (SSD) are fast, but they are more expensive than hard drives (HDD).
• Question 4
5 out of 5 points
Copper wires has information is encoded utilizing frequencies from the electromagnetic range.
• Question 5
6 out of 6 points
______________ has information encoded as beats of light.
• Question 6
5 out of 5 points
What might a member of a professional organization be doing when they refer to the organization’s code of ethics?
• Question 7
5 out of 5 points
What does the acronym DNS stand for?
• Question 8
5 out of 5 points
What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?
• Question 9
5 out of 5 points
Local variables on the stack are sometimes called automatic, because they are allocated automatically when a function is called, and not freed automatically when the function returns.
• Question 10
0 out of 5 points
Present-day organizations basically utilize three sorts of media to interconnect devices and give the pathway over which information can be transmitted.
These media are:
• Question 11
5 out of 5 points
Worldwide internet users expect expect their connected devices to always stay:
• Question 12
5 out of 5 points
Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?
• Question 13
6 out of 6 points
_________ is information is encoded utilizing frequencies from the electromagnetic range.
• Question 14
5 out of 5 points
Would the following incident be an example of social engineering/phishing? You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver’s license number and telephone number.
• Question 15
6 out of 6 points
__________ displays ads on computer’s desktop or inside individual programs.
• Question 16
5 out of 5 points
Which of the following is good practice to ensure that you do not get malware on your computer from an online source?
• Question 17
5 out of 5 points
A byte is 8 bits.
• Question 18
5 out of 5 points
The tools that cyber criminals often use, including computer viruses, worms, and spyware, are called __________.
• Question 19
0 out of 5 points
A bit is is not a binary digit.