IT 190 unit 3 milestone

21 September, 2024 | 8 Min Read

Alexis received an email message from an unknown sender that included an attachment.

If she opens the attachment, what kind of malicious softwar

e might be activated, and what ar

e the

consequences?

Opening the attachment would release an active worm, which would infect her system with adware.

Opening the attachment would release a worm, which would infect her system with a virus.

Opening the attachment would release a passive worm, which would infect her system with adware.

Opening the attachment would release a worm, which would infect her system with spyware.

RATIONALE

Senders can transmit files to recipients by attaching them to email messages. Like “junk mail” delivered by the postal service, email users regularly receive unsolicited messages from unknown senders. These messages sometimes contain links to malicious websites or include attachments that contain malicious software (e.g., a worm).

CONCEPT

Network Security 2

Select the true statement about CIPA.

Parental consent is required if a child wants to use a site.

It can restrict a minor’s access to harmful content.

It is enforced by the federal E-rate program.

All schools are required to adopt it.

RATIONALE

The Children’s Internet Protection Act (CIPA) established regulations that require the blocking of access by minors to obscene or pornographic pictures. CIPA also requires an Internet safety policy if an entity receives discounted Internet service.

CONCEPT

Protecting Minors from Online Dangers 3

Clay works for a company that has offices in major cities across the United States. His department regularly holds videoconferences with teams in the other branches.

Which type of network does Clay’s business most likely use for videoconferencing?

LAN

WAN

MAN

PAN

RATIONALE

Clay’s business uses a wide area network (WAN) — a type of computer network that covers a large geographical area, such as an area that includes cities across the United States. The other network types listed are not suitable because their range is not large enough to connect locations across the country.

CONCEPT

Computer Network Types 4

Which of the following can be controlled by copyright?

The advertising slogan for a national car sales chain

The Adidas stripe logo

A song written by the Beatles

The name of a college football team

RATIONALE

Copyright cannot protect the Adidas stripes logo, the advertising logo, or the football team name, but all three can be trademarked. Copyright can protect a song written by the Beatles. Copyright protects original works of authorship including literary, dramatic, musical, and artistic works (e.g., poetry, novels, movies, songs, photographs, drawings, computer software, and architecture).

CONCEPT

Copyright, Trademark and Intellectual Property 5

In which of the following scenarios can a trademark be applied?

Mark writes and records a new song for his rock band.

Twila paints a picture of Hawaiian scenery.

Peter names his new business ā€œGarden Ornaments.ā€

Merle designs a web page for Peter’s business.

RATIONALE

The main difference between copyright and trademark is that a copyright protects content and a trademark protects a brand. Twila, Merle, and Mark are protected by copyright because they are the creators of particular content. Peter’s business brand is protected by trademark.

CONCEPT

Copyright, Trademark and Intellectual Property 6

Internet Big Box is a global retailer that has networked devices in many small networks in North America, Europe, and Asia. Maria, an executive who works in the United States, communicates regularly with Chen, an executive in China.

Which network type do the executives at Internet Big Box use to communicate with each other?

PAN

MAN

WAN

LAN

RATIONALE

WAN (Wide Area Network) is the type of network used by Internet Big Box, because it enables the sharing of data and resources across a large geographic area (e.g., across states and countries).

A PAN is not appropriate for Internet Big Box, because PANs are used to connect devices that are physically close to each other.

A LAN is also not appropriate for Internet Big Box because LANs connect the devices in a local area, such as a home or office building.

A MAN is not appropriate for Internet Big Box because it does not establish connections across global regions, but only across areas as large as a college campus.

CONCEPT

Computer Network Types

7

Select the true statement about HTML.

HTML stands for hidden transfer markup language.

HTML is a network protocol.

HTML enables users to format the components of a web page.

HTML defines blocks of text to receive URL instructions.

RATIONALE

HTML is a content-formatting language that enables users to specify the appearance and location of the components of a web page. HTML uses code “tags” to apply formatting instructions to text and other content that will be displayed on web pages.

CONCEPT

Website Development 8

______ is a mobile application used primarily to share photos and videos with others.

QQ

LinkedIn

Twitter

Instagram

RATIONALE

Instagram is a mobile photo sharing application, which enables users to share photos and videos with “followers.”

CONCEPT

Benefits and Risks of Social Media 9

Select the FALSE statement about the history of the Internet.

The Internet means ā€œan interconnected network of networks.ā€

ARPANET began transmission in 1969, when it connected computers at UCLA, Stanford, MIT, and the University of Utah.

The U.S. government created ARPA in response to the successful launch of a satellite by the Soviet Union.

The invention of HTML enabled computers on different networks to communicate with each other.

RATIONALE

The launch of Sputnik by the Soviet Union motivated the U.S. to develop technology that enabled data transmission between computers. APRANET connected computers at UCLA, Stanford, MIT and the University of Utah in 1969. ARPANET was a predecessor of the Internet — “an interconnected network of networks.”

The invention of TCP/IP in 1982 provided an intermediary protocol that enabled computers on different networks to communicate with each other. HTML (Hypertext Markup Language) is the language in which most web content is written, and is a fundamental component of the “World Wide Web.”

CONCEPT

The World Wide Web 10

Gilbert is an independent consultant who helps organizations select the right accounting software for their needs. After evaluating a local nonprofit organization, Gilbert recommended an accounting software package that he believes meets specifications, secures documents, and satisfies user requirements.

Gilbert did not tell his client that he owns a 25% share in the business that developed the software, and that he will benefit if the organization decides to purchase the software he recommends.

Which principle of the Software Engineering Code of Ethics has Gilbert violated?

Principle 2: Client and Employer

Principle 4: Judgment

Principle 3: Product

Principle 1: Public

RATIONALE

Gilbert has violated the “judgment” principle established by the Software Engineering Code of Ethics. This principle states that software engineers must maintain integrity and independence in their professional judgment. This includes disclosing conflicts of interest.

GIlbert’s selection of this product involves an obvious conflict of interest. He should have informed his client about his ties to the software development company.

CONCEPT

Professional Code of Ethics 11

Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.

Which computer addiction symptom is Chip experiencing?

Lack of control

Uncomfortable feelings

Downplaying

Neglect

RATIONALE

Chip is experiencing the downplaying symptom of computer addiction because he attempts to justify his unreasonable interest in surfing the net.

CONCEPT

Computer Addiction 12

Which of the following is NOT an example of copyright infringement?

Eddie likes photos that were posted on a business’s website, so he downloads them to his computer.

Katy uses Wi-Fi at Starbucks during her lunch break to check her email, and to turn in a book report.

Chris posts a number of full-text articles onto his website without giving credit to the authors.

Melanie finds images that are in the public domain and submits them to a photography competition as her own work.

RATIONALE

Melanie, Eddie, and Chris are all guilty of of copyright infringement because they are using someone else’s work without prior explicit permission to do so.

Katy’s use of public wi-fi to complete ordinary tasks including checking email is an example of acceptable use.

CONCEPT

Ethical Behavior in the Digital World 13

Select the true statement about network protocols.

The primary function of a protocol is to compress data to reduce storage requirements.

Every computer uses the same protocol to communicate, regardless of the network type.

A protocol is a rule for transmitting data between computing devices.

Protocols determine the best method for resolving errors with data encryption.

RATIONALE

A protocol is a rule for transmitting data between devices. A protocol specifies how data is transmitted, but does not resolve errors or process data. To communicate, connected devices must execute the protocol in the same way, but there are different protocols for different networks.

CONCEPT

Introduction to Computer Networks 14

______ is the standard interface for all wired networks. The addition or removal of users from a wired network by an administrator is an example of ______.

LAN; IP

Wired fidelity; WAP

Ethernet; TCP

Ethernet; SDN

RATIONALE

Ethernet is the standard interface for wired networks. It is the most widely-installed local area network (LAN) technology.

Software-defined networking (SDN) is a concept in computer networking that makes it easier to innovate and adapt a network to meet changing demands quickly.

CONCEPT

Computer Network Components 15

Eva downloaded an audio file from a file-sharing website. The download contained a file that recorded her computer usage without her knowledge or consent.

What should Eva do to remove the offending program, and prevent future attacks?

Eva should upgrade her system to WPA encryption.

Eva should change her method of user authentication.

Eva should run an anti-spyware program.

Eva should run an antivirus program.

RATIONALE

Eva should download and install a spyware removal program. These are often bundled with virus protection software and firewalls, but are also available separately. Eva should also choose her downloads carefully. She must download only from reputable companies that have posted disclosure statements for users to review.

CONCEPT

Network Securit

y

Abou

t

Contact U

s

Privac

y

Polic

y

T

erms of Us

e

Related posts