NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Arizona State University
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
Alexis received an email message from an unknown sender that included an attachment.
If she opens the attachment, what kind of malicious softwar
e might be activated, and what ar
e the
consequences?
Opening the attachment would release an active worm, which would infect her system with adware.
Opening the attachment would release a worm, which would infect her system with a virus.
Opening the attachment would release a passive worm, which would infect her system with adware.
Opening the attachment would release a worm, which would infect her system with spyware.
RATIONALE
Senders can transmit files to recipients by attaching them to email messages. Like “junk mail” delivered by the postal service, email users regularly receive unsolicited messages from unknown senders. These messages sometimes contain links to malicious websites or include attachments that contain malicious software (e.g., a worm).
CONCEPT
Select the true statement about CIPA.
Parental consent is required if a child wants to use a site.
It can restrict a minor’s access to harmful content.
It is enforced by the federal E-rate program.
All schools are required to adopt it.
RATIONALE
The Children’s Internet Protection Act (CIPA) established regulations that require the blocking of access by minors to obscene or pornographic pictures. CIPA also requires an Internet safety policy if an entity receives discounted Internet service.
CONCEPT
Protecting Minors from Online Dangers 3
Clay works for a company that has offices in major cities across the United States. His department regularly holds videoconferences with teams in the other branches.
Which type of network does Clay’s business most likely use for videoconferencing?
LAN
WAN
MAN
PAN
RATIONALE
Clay’s business uses a wide area network (WAN) ā a type of computer network that covers a large geographical area, such as an area that includes cities across the United States. The other network types listed are not suitable because their range is not large enough to connect locations across the country.
CONCEPT
Which of the following can be controlled by copyright?
The advertising slogan for a national car sales chain
The Adidas stripe logo
A song written by the Beatles
The name of a college football team
RATIONALE
Copyright cannot protect the Adidas stripes logo, the advertising logo, or the football team name, but all three can be trademarked. Copyright can protect a song written by the Beatles. Copyright protects original works of authorship including literary, dramatic, musical, and artistic works (e.g., poetry, novels, movies, songs, photographs, drawings, computer software, and architecture).
CONCEPT
Copyright, Trademark and Intellectual Property 5
In which of the following scenarios can a trademark be applied?
Mark writes and records a new song for his rock band.
Twila paints a picture of Hawaiian scenery.
Peter names his new business āGarden Ornaments.ā
Merle designs a web page for Peterās business.
RATIONALE
The main difference between copyright and trademark is that a copyright protects content and a trademark protects a brand. Twila, Merle, and Mark are protected by copyright because they are the creators of particular content. Peter’s business brand is protected by trademark.
CONCEPT
Copyright, Trademark and Intellectual Property 6
Internet Big Box is a global retailer that has networked devices in many small networks in North America, Europe, and Asia. Maria, an executive who works in the United States, communicates regularly with Chen, an executive in China.
Which network type do the executives at Internet Big Box use to communicate with each other?
PAN
MAN
WAN
LAN
RATIONALE
WAN (Wide Area Network) is the type of network used by Internet Big Box, because it enables the sharing of data and resources across a large geographic area (e.g., across states and countries).
A PAN is not appropriate for Internet Big Box, because PANs are used to connect devices that are physically close to each other.
A LAN is also not appropriate for Internet Big Box because LANs connect the devices in a local area, such as a home or office building.
A MAN is not appropriate for Internet Big Box because it does not establish connections across global regions, but only across areas as large as a college campus.
CONCEPT
7
Select the true statement about HTML.
HTML stands for hidden transfer markup language.
HTML is a network protocol.
HTML enables users to format the components of a web page.
HTML defines blocks of text to receive URL instructions.
RATIONALE
HTML is a content-formatting language that enables users to specify the appearance and location of the components of a web page. HTML uses code “tags” to apply formatting instructions to text and other content that will be displayed on web pages.
CONCEPT
______ is a mobile application used primarily to share photos and videos with others.
RATIONALE
Instagram is a mobile photo sharing application, which enables users to share photos and videos with “followers.”
CONCEPT
Benefits and Risks of Social Media 9
Select the FALSE statement about the history of the Internet.
The Internet means āan interconnected network of networks.ā
ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah.
The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union.
The invention of HTML enabled computers on different networks to communicate with each other.
RATIONALE
The launch of Sputnik by the Soviet Union motivated the U.S. to develop technology that enabled data transmission between computers. APRANET connected computers at UCLA, Stanford, MIT and the University of Utah in 1969. ARPANET was a predecessor of the Internet ā “an interconnected network of networks.”
The invention of TCP/IP in 1982 provided an intermediary protocol that enabled computers on different networks to communicate with each other. HTML (Hypertext Markup Language) is the language in which most web content is written, and is a fundamental component of the “World Wide Web.”
CONCEPT
Gilbert is an independent consultant who helps organizations select the right accounting software for their needs. After evaluating a local nonprofit organization, Gilbert recommended an accounting software package that he believes meets specifications, secures documents, and satisfies user requirements.
Gilbert did not tell his client that he owns a 25% share in the business that developed the software, and that he will benefit if the organization decides to purchase the software he recommends.
Which principle of the Software Engineering Code of Ethics has Gilbert violated?
Principle 2: Client and Employer
Principle 4: Judgment
Principle 3: Product
Principle 1: Public
RATIONALE
Gilbert has violated the “judgment” principle established by the Software Engineering Code of Ethics. This principle states that software engineers must maintain integrity and independence in their professional judgment. This includes disclosing conflicts of interest.
GIlbert’s selection of this product involves an obvious conflict of interest. He should have informed his client about his ties to the software development company.
CONCEPT
Professional Code of Ethics 11
Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.
Which computer addiction symptom is Chip experiencing?
Lack of control
Uncomfortable feelings
Downplaying
Neglect
RATIONALE
Chip is experiencing the downplaying symptom of computer addiction because he attempts to justify his unreasonable interest in surfing the net.
CONCEPT
Which of the following is NOT an example of copyright infringement?
Eddie likes photos that were posted on a business’s website, so he downloads them to his computer.
Katy uses Wi-Fi at Starbucks during her lunch break to check her email, and to turn in a book report.
Chris posts a number of full-text articles onto his website without giving credit to the authors.
Melanie finds images that are in the public domain and submits them to a photography competition as her own work.
RATIONALE
Melanie, Eddie, and Chris are all guilty of of copyright infringement because they are using someone else’s work without prior explicit permission to do so.
Katy’s use of public wi-fi to complete ordinary tasks including checking email is an example of acceptable use.
CONCEPT
Ethical Behavior in the Digital World 13
Select the true statement about network protocols.
The primary function of a protocol is to compress data to reduce storage requirements.
Every computer uses the same protocol to communicate, regardless of the network type.
A protocol is a rule for transmitting data between computing devices.
Protocols determine the best method for resolving errors with data encryption.
RATIONALE
A protocol is a rule for transmitting data between devices. A protocol specifies how data is transmitted, but does not resolve errors or process data. To communicate, connected devices must execute the protocol in the same way, but there are different protocols for different networks.
CONCEPT
Introduction to Computer Networks 14
______ is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of ______.
LAN; IP
Wired fidelity; WAP
Ethernet; TCP
Ethernet; SDN
RATIONALE
Ethernet is the standard interface for wired networks. It is the most widely-installed local area network (LAN) technology.
Software-defined networking (SDN) is a concept in computer networking that makes it easier to innovate and adapt a network to meet changing demands quickly.
CONCEPT
Computer Network Components 15
Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent.
What should Eva do to remove the offending program, and prevent future attacks?
Eva should upgrade her system to WPA encryption.
Eva should change her method of user authentication.
Eva should run an anti-spyware program.
Eva should run an antivirus program.
RATIONALE
Eva should download and install a spyware removal program. These are often bundled with virus protection software and firewalls, but are also available separately. Eva should also choose her downloads carefully. She must download only from reputable companies that have posted disclosure statements for users to review.
CONCEPT
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ Name HEP 456: ā¦
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings HEP 456: Health Promotion Program ā¦