Question

Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....

Question 21

  1. ​By default, most wireless networks are ____.

    a.

    ​secured by WEP

    b.

    ​password-locked

    c.

    ​secured by WPA or WPA2

    d.

    ​left unsecured

1 points

Question 22

  1. ​Choosing Image Editing and Illustration Programs

    a.

    ​non-lossy

    b.

    ​linear

    c.

    ​bitmap

    d.

    ​vector

1 points

Question 23

  1. ​Computer-generated graphics come in two varieties: ____ and vector.

    a.

    ​linear

    b.

    ​raster

    c.

    ​angular

    d.

    ​digital

1 points

Question 24

  1. ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by cellular phone carriers.

    a.

    ​1G, 2G, and 3G

    b.

    ​3G only

    c.

    ​3G and 4G

    d.

    ​none of the above; WWAN doesn’t work with cellular technology

1 points

Question 25

  1. ​Disabling the SSID broadcast of a network makes that network ____ to roaming devices.

    a.

    ​invisible

    b.

    ​not able to connect

    c.

    ​WPA-enabled

    d.

    ​attractive

1 points

Question 26

  1. ​Each manufacturer of network interface cards adds a(n) ____ to identify the device.

    a.

    ​Ethernet port

    b.

    ​Media Access Control address

    c.

    ​WiMAX account

    d.

    ​wireless mesh

1 points

Question 27

  1. ​Encryption keys are generally ____ or ____ bits long.

    a.

    ​16, 64

    b.

    ​64, 256

    c.

    ​128, 256

    d.

    ​64, 128

1 points

Question 28

  1. ​HTML quickly evolved through specifications that are the result of the collective work of the organization known as the ____.

    a.

    ​T3C

    b.

    ​W3C

    c.

    ​Net Referral Union

    d.

    ​web Roots

1 points

Question 29

  1. ​HTML specifications that are not included when newer specifications are released or are not included in the XHTML specification are referred to as ____.

    a.

    ​obsolete

    b.

    ​web-safe

    c.

    ​deprecated

    d.

    ​variant

1 points

Question 30

  1. ​If you are using Notepad as your text editor and the text does not wrap to the next line in the program window, click ____ on the menu bar, and then click Word Wrap to place a check mark next to it.

    a.

    ​View

    b.

    ​Options

    c.

    ​File

    d.

    ​Format

1 points

Question 31

  1. ​If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word “____” as an SSID.

    a.

    ​home

    b.

    ​secured

    c.

    ​default

    d.

    ​unsecured

1 points

Question 32

  1. ​If you have both WPA and WEP available to you, your system will be most secure if you use ____.

    a.

    ​both a and b

    b.

    ​WPA only

    c.

    ​WEP only

    d.

    ​neither a nor b

1 points

Question 33

  1. ​If you need to add more items to a bulleted list, you add them using the ____ tag(s).

    a.

    ​<bull> and </bull>

    b.

    ​<l> and </l>

    c.

    ​<li> and </li>

    d.

    ​<ul> and </ul>

1 points

Question 34

  1. ​In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.

    a.

    ​evil twin

    b.

    ​over-the-shoulder

    c.

    ​Bluebugging

    d.

    ​denial-of-service

1 points

Question 35

  1. ​JavaScript is a(n)____ language that is executed by a web browser.

    a.

    ​add-on

    b.

    ​HTML

    c.

    ​self-contained

    d.

    ​scripting

1 points

Question 36

  1. ​Most browsers underline hyperlinks and display them in a(n) ____ font.

    a.

    ​large

    b.

    ​blue

    c.

    ​flashing

    d.

    ​italicized

1 points

Question 37

  1. ​Most scripts are enclosed in HTML ____ tags so browsers that cannot execute the script will ignore the script.

    a.

    ​paragraph

    b.

    ​body

    c.

    ​comment

    d.

    ​JS

1 points

Question 38

  1. ​One of the most serious mistakes that home users make when installing a wireless network is ____.

    a.

    ​failing to change the default login for the device

    b.

    ​failing to register the device with the manufacturer

    c.

    ​using both letters and numbers in their SSID name

    d.

    ​sharing their SSID name with friends and family

1 points

Question 39

  1. ​Search engine ____ is the process of submitting your site’s URL to one or more search engines so they will list your site in their indexes.

    a.

    ​optimization

    b.

    ​submission

    c.

    ​spamming

    d.

    ​none of the above

1 points

Question 40

  1. ​Security experts warn against ____ in public places.

    a.

    ​online banking

    b.

    ​checking e-mail

    c.

    ​online shopping

    d.

    ​all of the above

Homework Answers

Answer #1

Q21

Most networks are left unsecured.

Q23

Computer graphics are raster and vector

Q25

It makes the device invisible to roaming devices

Q27

Encryption keys are generally 64,128 bits long

Q30

Under format option in menu bar there is word-wrap which can be used

Q33

We add items to list using li tag

Q35

Javascript is a scripting language

Q37

Most scripts are included as HTML comments

Q38

Most users fail to change the default login

Q39

None of the above is correct

Q40

Online banking should be avoided in public places

Do give a thumbs up and in case there are doubts leave a comments.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li />...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li /> c. ​<ul> d. ​<nl> 1 points Question 62 ​The term for a collection of website files stored on a web server is ____. a. ​active website b. ​local website c. ​remote website d. ​plug-in website 1 points Question 63 ​The text editor installed with Windows is called ____. a. ​web pad b. ​MS Sketch c. ​Notebook d. ​Notepad 1 points Question 64 ​The text...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
QUESTION 1 The most common type of business organisation is a. non-for-profit organisation b. partnership c....
QUESTION 1 The most common type of business organisation is a. non-for-profit organisation b. partnership c. company/corporation d. sole proprietorship 1 points    QUESTION 2 A business financial statement is meant to convey information about the business to _________________ users in order to help them make decisions about the business. a. internal and external b. internal only c. external only d. none of the above 1 points    QUESTION 3 Which of the following is an advantage of being a...
Question 5 A ____ is a technologically skilled person who uses his or her skills to...
Question 5 A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers. a. ​cracker b. ​script kiddie c. ​whacker d. ​zombie 1 points Question 6 A ____ stores items on a server as articles or postings that are sorted by topic. a. ​newsgroup b. ​chat c. ​podcast d. ​mailing list 1 points Question 7 A ____-bit key is considered a(n) ____ key. a. ​64, strong b. ​128, strong c. ​128, weak...
QUESTION 1 How do you connect a voltmeter to a circuit? a) in series b) None...
QUESTION 1 How do you connect a voltmeter to a circuit? a) in series b) None of the answers is correct. c) either way is correct d) in parallel QUESTION 2 Can you connect a Digital multimeter (Ohmmeter) to a resistor in circuit to measure the resistance of resistor? a) No. b) Yes. c) Yes, if the Ohmmeter has a low internal resistance. d) Yes, if the Ohmmeter has a high internal resistance. QUESTION 3 Three resistors R1, R2 and...
QUESTION 1 Personas are useful in the a product costing stage b product design phase c...
QUESTION 1 Personas are useful in the a product costing stage b product design phase c the entire life cycle d product testing phase QUESTION 2 Select all which are benefits of using personas. a they help in making design decisions. b they help identify user needs c they help define the software architecture d they make real users memorable for the design team QUESTION 3 A scenario is a one specific use for the interface b a typical day...
QUESTION 1 If you have a workstation that cannot connect to a server, what is the...
QUESTION 1 If you have a workstation that cannot connect to a server, what is the first test you could perform to establish whether the cabling is OK? a Ping the loopback b Ping sweep the entire network. c Yell at IT to fix it. d Ping another local system e ipconfig QUESTION 21 What is the correct sequence to ping items to identify connectivity issues? A. 1. Establish Connection 2. Ping Host Name 3. Ping Remote Host 4. Ping...
QUESTION 1 This is the most effective treatment for phobia. A. Attribution retraining B. Benzodiazepines C....
QUESTION 1 This is the most effective treatment for phobia. A. Attribution retraining B. Benzodiazepines C. Exposure therapy D. SSRIs QUESTION 2 This is the most popular model of psychological disorders today. A. Psychodynamic B. Sociocultural C. Cognitive-behavioral D. Humanistic QUESTION 3 This side effect can occur when people take antipsychotic medication. A. Psychomotor retardation B. Interoceptive sensitivity C. Extrapyramidal symptoms D. Flat affect QUESTION 4 Which of the following suggests that the attributions one makes about failure influence whether...
QUESTION 44 The key phrase that describes the concept of quantum computing is A. Exponentially scalable...
QUESTION 44 The key phrase that describes the concept of quantum computing is A. Exponentially scalable and highly parallel computing B. Able to accommodate massive quantities of data C. Able to connect to an increased number of devices D. Accommodates a quantum leap in the number of memory cards in a device 2 points    QUESTION 45 Revenue models for most Social Media companies include the following, EXCEPT: A. Charging a fee for their basic service level B. Advertising revenues...
SCENARIO: Imagine a fictional social media firm called ShareMe. ShareMe is similar to Facebook; it is...
SCENARIO: Imagine a fictional social media firm called ShareMe. ShareMe is similar to Facebook; it is an online, virtual meeting place for friends and family to share photos, videos, and messages. With increased social media competition in the marketplace, ShareMe is struggling to stay profitable. Many advertisers are refusing to renew their ShareMe contracts for the upcoming calendar year. ShareMe currently has 300 employees. If ShareMe does not increase revenue this upcoming year, the firm will have to layoff 100...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT