Solved by a verified expert:Peripherals ModuleQuestion 1Points: 10 out of 10In a situation where a handicapped person can only input data into the computer using a stylus or light pen, which keyboard configuration might be the solution?• A flat waterproof keyboard• A split-style keyboard that separates and angles groups of keys into right- and left-hand portions• A keyboard with internal lighting to support work in low-light conditions• A keypad that is projected on an external flat surfaceQuestion 2Points: 10 out of 10Which device would not be appropriate for holding data, instructions, and information for future use?• Cloud storage• 1 TB external hard drive• 8 GB RAM• CD or DVDQuestion 3Points: 10 out of 10Which of the following can be considered an output device?• Microphone• Speaker• Stylus• Wireless mouseQuestion 4Points: 10 out of 10What is one of the major advantages of installing a wireless network?• It does not require a modem to access the internet.• It provides more flexibility than a wired network.• It is faster than a wired network.• It is initially more secure than a wired network.Question 5Points: 0 out of 10If you are going to network two computers together using cable connections, what must each computer have?• A router• A wireless adapter card• An Ethernet interface card• A modemQuestion 6Points: 0 out of 10How is data entered into the computer?• Using a hardware component that allows submission of data or instructions• Using the circuit board that interfaces with all external components attached to the CPU• Using an electronic device that controls the timing of all peripherals connected to the system unit• Using any type of hardware component that conveys information to one or more peopleEthics ModuleQuestion 1Points: 10 out of 10Would the following be considered a violation of a user access agreement?knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of another’s computer• yes• no• maybeQuestion 2Points: 10 out of 10Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.• Yes• No• MaybeQuestion 3Points: 0 out of 10Would the following be considered a violation of user access agreement?visiting social networking sites during lunch breaks• yes• no• maybeQuestion 4Points: 10 out of 10What is the purpose of a user access agreement?• to define all approved uses of the company’s IT resources• to define every sanction to be applied if a violation occurs• to outline in general the acceptable and unacceptable use of IT resources• to outline all acceptable and unacceptable behavior of all company employeesQuestion 5Points: 10 out of 10For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.• likely a violation• likely not a violationQuestion 6Points: 0 out of 10An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.• True• FalseQuestion 7Points: 10 out of 10Which aspect of social networking poses the most risk?• Disclosure of personal information• Communicating with people who share common interests• The ability to read others’ posts• Installing software to enable social networkingQuestion 8Points: 10 out of 10Which of the following factors determine whether a specific instance of file sharing is legal?• Is the material being shared copyrighted?• Is the sharing part of a business operation?• Does the sharing result in monetary gain for the person doing the sharing?• Is the site that is being used for the sharing primarily used for illegal sharing?Question 9Points: 10 out of 10The Digital Millennium Copyright Act…• ensures that Internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.• allows copying or distribution of copies of copyrighted software.• provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.• addresses only copyrighted software issues.Question 10Points: 10 out of 10Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?• yes• noQuestion 11Points: 10 out of 10In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?• Postings tips, project photos, and ideas on a hobby-related forum.• Posting your resume on a job-seeking or job-posting site.• Posting photos of oneself that might be considered risqué or offensive.• Posting vacation photos after you have returned home.Question 12Points: 0 out of 10Which of the following statements is true?• Cyberbullies attack only minors.• Cyberstalking is the cyberbullying of an adult.• Cyberstalkers rarely request face-to-face meetings with their victims.CloseQuestion 1Points: 10 out of 10Would the following be considered a violation of user access agreement?Visiting social networking sites during lunch breaks• Yes• No• MaybeQuestion 2Points: 10 out of 10For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: Joshua is running for a position on the local Parent/Teachers Association (PTA). In order to bolster his credentials for the position, he uses stationery from the college where he is employed.• Likely a violation• Likely not a violationQuestion 3Points: 10 out of 10You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?• The professional association code of ethics• The code of conduct• The user access agreementQuestion 4Points: 10 out of 10Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?• Yes• NoQuestion 5Points: 10 out of 10True or false? Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses.• True• FalseQuestion 6Points: 10 out of 10Which of the following statements is true?• Cyberbullies attack only minors.• Cyberstalking is the cyberbullying of an adult.• Cyberstalkers rarely request face-to-face meetings with their victims.Question 1Points: 10 out of 10State the correct response to the following questions about computer IDomises.Can messages be sent from your e-mail account without your knowledge or permission?• Yes• NoQuestion 2Points: 10 out of 10Would this incident be an example of social engineering?You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.• Social engineering• Not social engineeringQuestion 3Points: 0 out of 10Would this incident be an example of social engineering?Receiving a request by phone for your date of birth, home address, and social security number to verify your pharmacy’s prescription files• Yes• NoQuestion 4Points: 10 out of 10Would this incident be an example of social engineering?You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.• Social engineering• Not social engineeringQuestion 5Points: 10 out of 10Would this incident be an example of social engineering?Finding a music CD on the subway and playing it on your computer• Yes• NoQuestion 6Points: 10 out of 10Which of the following is generally not considered PII?• Your library card number• Your bank account number• Your social security number• Your driver license numberQuestion 7Points: 0 out of 10Which of the following measures is least to help you protect your PII?• Logging off or shutting down your computer when it’s not in use• Locking your computer in the back of your car knowing that your car has an alarm• Keeping the “remember me” button checked on a social networking siteQuestion 8Points: 10 out of 10If messages are being sent from your email account without your knowledge, this is a sign that your computer is infected with .Question 9Points: 0 out of 10Which of the following email scenarios is more likely than the others to involve phishing?• An email that goes to your email program’s spam folder• An email containing a clickable url• An email sent to multiple recipients• An email from someone you knowQuestion 10Points: 10 out of 10Which of the following is not characteristic of a phishing email?• A tone of urgency about an action to be taken• Long links to urls that you don’t recognize• Addressing you by name• Spelling and grammar errorsQuestion 11Points: 10 out of 10Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.Clicking on a provided link instead of typing the known web address into a web browser. It’s faster and more reliable.• Phishing victim• Not a phishing victimQuestion 12Points: 10 out of 10Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.Replying to an e-mail requesting your user ID and password• Phishing victim• Not a phishing victimQuestion 13Points: 10 out of 10For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.Dale uses his first name as a password.• Good practice• Bad practiceQuestion 14Points: 10 out of 10For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.Sierra uses a long pass phrase such as “A stitch in time saves 9” with special characters between the words for her bank account password.• Good practice• Bad practiceQuestion 15Points: 10 out of 10For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.Terry uses the same password on most of his online accounts so that he can easily remember his login information.• Good practice• Bad practiceQuestion 1Points: 0 out of 10True or false? It’s more important to understand risk and compromise than it is to use strong passwords.• True• FalseQuestion 2Points: 0 out of 10True or false? The computer crashed just as Tatiana was accessing her e-mail. The computer was scrapped because it couldn’t be fixed. The availability of Tatiana’s e-mail is compromised.• True• FalseQuestion 3Points: 10 out of 10Which type of malware is most likely to pose as a security program offering to remove a virus from your computer if you sign up and pay right away?• A worm• Spam• A Trojan horse• SpywareQuestion 4Points: 10 out of 10Which of the following is most likely to protect you against cyber criminal attacks?• Keeping your software and operating system up to date• Having your email program remember your password• Sharing your password only for a good reason• Using an easy to remember passwordQuestion 5Points: 10 out of 10Your computer shuts down every time you try to access the internet with your browser. Which of the following is the most likely cause?• Your internet connection is faulty.• Your identity has been stolen.• Your browser needs to be reinstalled.• Your computer has been compromised.Issues in Computing UnitQuestion 1Points: 0 out of 10Which of the following statements would be most likely to appear in a professional association’s code of ethics for its members?• I will maintain the confidentiality of my username and password.• I will use my network account only for the purpose specified in my job description.• I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.• I will be use organizational supplies for official purposes only.Question 2Points: 10 out of 10How is “compromise” defined in the context of information technology and information security?• A compromise is a security breach that is always perpetrated by a malicious attacker.• A compromise is the potential for an intrusion into a computer system or unauthorized access to an online account, file, or other resource.• A compromise is a breach in the security of a computer system, an account, a file, or another online resource.• A compromise is a security breach that is never the result of an accidental action by a user.Question 3Points: 0 out of 10What is a cyberstalker?• The intended victim of repeated continuous, unwanted communication• One whose online hostile behavior is intended to harm another or others• A person whose online hostile behavior avoids confronting the victim face-to-face• A person who acts alone and anonymously when targeting others with continuous, unwanted communications.Question 4Points: 0 out of 10Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?• Your driver’s license number• Your social security number• Your user ID and passwordQuestion 5Points: 10 out of 10True or false? A friend gives you his single-user copy of a copyrighted software application program so that you can load it on your computer. Both of you are guilty of an inappropriate use of digital content sharing.• True• FalseQuestion 6Points: 10 out of 10Would the following behavior most likely be a violation of an employee code of conduct?Using your work computer to invite friends and co-workers to a party at your home.• Yes• No• More information is needed.Question 7Part 1: 10 out of 10Part 2: 10 out of 10Part 3: 10 out of 10Points: 30 out of 30You live “out in the middle of nowhere” and feel there is no need to protect your internet connection because there is no one that lives near you. One day you are unable to connect to the internet. After calling tech support you find that someone has hacked into your router and has changed all the settings. Fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. Your decision to leave your router unprotected opened you to which of the following risks? Select Yes or No for each option.The confidentiality of the information on your computerThe integrity of the information on your computerThe accessibility to informationQuestion 8Points: 10 out of 10The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called .Question 9Points: 10 out of 10Which of the following is a sure sign that your computer is compromised?• Programs failing to start because Windows is “low on resources”• Getting a notice to update your antivirus software subscription• Certain web pages not loading unless you disable a popup blocker for that siteQuestion 10Points: 10 out of 10Having your personally identifiable information compromised is most closely related to .Question 11Points: 10 out of 10Which option here would be a way to remember the user IDs and passwords that poses less risk than other options listed.• Use the same ID and password for all, and change them frequently (every 30 days).• Use the same ID but a different password for all.• Scramble the IDs and passwords among the sites and keep a secure record somewhere.• Create a base word/phrase and change the same 2-3 characters in that word/phrase for each site.Question 12Points: 0 out of 10Which of the following measures is likely to help you protect your PII?• Leaving your computer on when it’s not in use to make returning to your work quicker• Locking your computer in the back of your car, knowing that your car has an alarm• Never enabling the “remember me” option on a social networking siteQuestion 13Points: 10 out of 10True or false? Online social networks are a totally safe environment in which to expand one’s contacts and meet people from any part of the world.• True• FalseQuestion 14Points: 0 out of 10A user access agreement typically is than the list of employee expected behaviors within an organization.Basics of Databases ModuleQuestion 1Points: 10 out of 10True or false? Spreadsheets provide more options for graphical representation of the data than databases.• True• FalseQuestion 2Points: 0 out of 10In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?• A CRM can optimize the information shared among departments, resulting in better management of existing accounts.• A CRM can provide a company’s marketing department with information needed to identify and target the company’s best customers.• A CRM can enable members of pertinent departments to have access to all the relevant information, enabling them to answer queries and resolve problems quickly and easily.• A CRM can provide a more rapid response to queries and concerns by forwarding the query to the right department.Question 3Points: 0 out of 10True or false? Data warehousing is the process of extracting data from a data warehouse.• True• FalseQuestion 4Points: 0 out of 10A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?• Malicious data leak• Malicious data loss• Intentional data leak• Accidental data lossQuestion 5Points: 10 out of 10Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. This could be considered a .Question 6Points: 10 out of 10True or false? The largest component of a database is a field.• True• FalseQuestion 7Points: 10 out of 10What are procedures that help keep a database current?• Database query procedures• Report generation procedures• File maintenance procedures• Data entry proceduresQuestion 8Points: 10 out of 10A savvy hacker uses a poorly secured vendor’s website to obtain all the information needed to access the main database of a large chain store, including the store’s database password. Which threat best describes this database breach?• Weak authentication• Unprotected personal hardware collection• Accidental breach resulting from incorrect (but not malicious) usage• Theft of database backup tapes or hard drivesQuestion 9Points: 10 out of 10You are annoyed by receiving identical marketing messages from an online shopping site you have used. If the company wishes to maintain a good relationship with you, which of the following CRM components needs to be addressed to improve customer satisfaction?• Mining social media inputs• Customers expect more• Privacy• Cleaning up the dataQuestion 10Points: 10 out of 10If Company B reaches out with ads sent to customers of Company A, the CRM tool used here is .Question 11Points: 0 out of 10Which of the following would be an example of a loss of record confidentialityin a database?• Your credit card company issued you a new card when your old one was about to expire.• Although you clicked the option to “Do not share information with any other companies or sites” on an online bookstore’s website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.• You make all your personal information on the Facebook site “public” and available to everyone.• Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.Question 12Part 1: 10 out of 10Part 2: 10 out of 10Part 3: 10 out of 10Part 4: 10 out of 10Points: 40 out of 40Are the following examples of increasing brand awareness through groups or fans? Select Yes or No for each option.Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.You “Friend” or “Like” a page on your favorite social media page that advertises a product you approve.Your friends on a social media site receive messages from you that encourages them to start watching a television series that premiered this past week.When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.Question 13Points: 10 out of 10True or false? Not all of the top database breaches in 2013 involved U.S. companies.• True• FalseQuestion 14Points: 10 out of 10True or false? Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.• True• FalseQuestion 15Points: 10 out of 10What is one advantage of using a relational database over a spreadsheet or flat file to store data?• It enables reduced memory and storage allocation.• It allows for reduced complexity in the design and implementation.• It reduces data redundancy.• It reduces risk of unauthorized access to the data.Question 16Points: 10 out of 10True or false? It is just too challenging to have different passwords for every device you use and every online site that requires an ID and password. It would be OK to use a very strong base word or phrase and change the same 2 or 3 characters in that word/phrase for each site.• True• False
Expert answer:MD University College BIOTECHNOL 301 Quizes Module
by | Sep 2, 2021 | Uncategorized
How it works
- Paste your instructins in the instructions box. You can also attach an instructions file
- Select the writer category, deadline, education level and review the instructions
- Make a payment for the order to be assignment to a writer
- Download the paper after the writer uploads it
Will the writer plagiarize my essay?
You will get a plagiarism-free paper and you can get an originality report upon request.
Is this service safe?
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades