Ask a New Question
Search
Questions and answers by
Donald Craven
Questions (428)
Evaluating Product Design Quick Check
4 of 54 of 5 Items Question Nathan is playing an online video game. He discovers that all
1 answer
89 views
Paola downloads the latest first-person shooter (FPS) game all her friends are talking about. She starts to create her avatar
1 answer
87 views
A student designer is creating an app for release. They need to choose a font for their app. The student thinks back to their
1 answer
100 views
You are looking at a website on the internet that has interesting stories. You want to introduce it to your sight impaired
1 answer
106 views
Which form of bias might be caused by a scenario where you only grew up with role models that were all male and went to an
1 answer
68 views
Which of the following biases is caused by the logical error of concentrating on the people or things that survived some process
1 answer
75 views
Which of the following is a cause of someone to develop a bias in which they have a tendency to view their own experiences as
1 answer
65 views
If you were trying to put into effect and execute a computer science program for your school next year and add it to the
1 answer
121 views
Which of the following best describes an example where someone goes to dinner with a friend who never pays for the check, and
1 answer
108 views
Which of the following best describes when someone is researching for evidence or data to prove an idea, theory, or hypothesis
1 answer
59 views
Which of the following best describes when there are repeatable unintentional errors in a computer system that is systemic and
1 answer
78 views
Which of the following is a leading infrastructure fund for helping to deliver high speed internet for underserved areas?(1
1 answer
57 views
What is the most common barrier to equitable access of computing devices?(1 point)
Responses internet web funding International
1 answer
61 views
How do the internet of things (IoT) devices communicate?(1 point)
Responses with sensor interference without sensor interaction
1 answer
85 views
Which of the following is an example of an activity that can be automated?(1 point)
Responses security assessment risk assessment
1 answer
59 views
What is one possible negative aspect of working from home?(1 point)
Responses less promotion potential less economic advantage
1 answer
98 views
What is the technology that emulates a computer but with software not physical components?(1 point)
Responses Wi-Fi social media
1 answer
108 views
How did Wi-Fi advance individual technological capabilities? (1 point)
Responses It prevented cybersecurity attacks. It created a
1 answer
111 views
How did Wi-Fi advance individual technological capabilities?(1 point)
Responses It prevented cybersecurity attacks. It prevented
1 answer
86 views
What is a hash and how does hashing work? Give your answer in 1-2 sentences
1 answer
81 views
A strong password policy helps protect against unauthorized access by requiring users to create unique and complex passwords
1 answer
102 views
n 1–2 sentences, describe how does a strong password policy help provide strong security in an environment.
1 answer
98 views
Your organization has a gross sales of $40 million, and you have 100 employees. What is the maximum amount of loss in dollars
1 answer
120 views
What is the best way to prevent people from reading your data on a hard disk?(1 point)
Responses Encrypt the data. Hide the
1 answer
63 views
A router that connects your local area network (LAN) to the internet has a basic built-in firewall that does not have any
1 answer
162 views
You are surfing the internet and see an advertisement for an online contest. It wants you to enter a bunch of information about
1 answer
62 views
You are surfing the internet and see an advertisement for an online contest. It wants you to enter a bunch of information about
1 answer
57 views
The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed
1 answer
123 views
What role does access control have within a physical setting?(1 point)
Responses It allows for users to freely move around a
1 answer
87 views
your cellphone social media application keeps changing and getting new pictures. The pictures are not any that you know. This
1 answer
134 views
You have just befriended someone on social media and the person is asking you for a gift card from a video game store. The
1 answer
65 views
Cybersecurity Unit Test
7 of 207 of 20 Items Question You have received a bunch of emails from the same company that makes your
1 answer
78 views
What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet?(1 point)
Responses
1 answer
92 views
How can installation media can be used to compromise a computer? (1 point)
Responses 1. Installation media is designed to avoid
1 answer
80 views
How can installation media can be used to compromise a computer?(1 point)
Responses Installation media is designed to avoid
1 answer
115 views
You have received several emails from a company offering you a summer internship. You are very interested in the extended
1 answer
135 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
48 views
How does spyware operate?(1 point)
Responses Spyware closely monitors computers and potentially sends sensitive or protected
1 answer
103 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack causes users to constantly reboot their
1 answer
137 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack causes users to constantly reboot their
1 answer
66 views
Why is it important for developers to protect and ensure the integrity and reliability of software?(1 point)
Responses so
1 answer
69 views
A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging
1 answer
86 views
Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses hash algorithms hash algorithms multifactor
1 answer
91 views
What is the most complete explanation of the Zero Trust Methodology?(1 point)
Responses No one is considered trusted, and each
1 answer
64 views
What is the goal of SafeCode?(1 point)
Responses to ensure software integrity to ensure software integrity to reduce the
1 answer
83 views
A small company with 25 employees is attacked and its data are encrypted. The chief executive officer (CEO) does not think their
1 answer
74 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
73 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
66 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
111 views
What is the purpose of a firewall?(1 point)
Responses shape internet traffic shape internet traffic monitor and filter network
1 answer
80 views
Policies are the foundation of devising an effective security solution. What is the best way to implement the policies with
1 answer
94 views
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of
1 answer
103 views
Using media access control (MAC) on your Wi-Fi requires the devices to which of the following?(1 point)
Responses be on an
1 answer
89 views
Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are
1 answer
69 views
Devising Security Solutions Quick Check
1 of 51 of 5 Items Question You install antimalware software on your computer. What is
1 answer
85 views
Which of the following passwords would be considered the strongest and most secure?(1 point)
Responses ready2go123!@
1 answer
51 views
What is generally traded when securing systems?(1 point)
Responses the time to configure the systems the time to configure the
1 answer
102 views
Which of the following is an example of an internal threat?(1 point)
Responses a power surge from a thunderstorm a power surge
1 answer
54 views
A student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
53 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
66 views
During the winter months when it is cold the internet works at full speed. The network administrator notices that during the
1 answer
56 views
Your computer keeps having annoying pop-ups opening asking for you to purchase a software application and for your personal
1 answer
121 views
What type of person tries to get your personal information by sending out friend requests from a fake profile?(1 point)
Responses
1 answer
78 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
113 views
Digital and Social Risks Quick Check
2 of 52 of 5 Items Question What would you use to hide and encrypt your internet traffic?(1
1 answer
81 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
78 views
What action would be sufficient to execute code from a USB drive?(1 point)
Responses You just need to scan the drive. You just
1 answer
97 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
68 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
56 views
Common Security Threats Quick Check
1 of 51 of 5 Items Question What is adware?(1 point) Responses Adware is designed to carry
1 answer
149 views
Describe the role of bandwidth in a network device’s internet performance. Give your answer in 1-2 sentence
1 answer
34 views
Which of the following is the correct term used to determine the bandwidth of any network transmission?(1 point)
Responses 3.5
1 answer
85 views
Network Communication and Organization Unit Test
13 of 2013 of 20 Items Question There are currently 254 devices connected to a
1 answer
113 views
Why must a network architect consider scalability when designing a network?(1 point)
Responses To keep up with growing demand for
1 answer
99 views
Why must a network architect consider scalability when designing a network?(1 point)
Responses To keep up with growing demand for
1 answer
111 views
You have added a new wireless tablet to the network. As an approved device, what is the function that the tablet can perform on
1 answer
88 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses port port firewall
1 answer
66 views
How does a client-server work?(1 point)
Responses works by allowing hosts to connect to the server via the internet works by
1 answer
88 views
Which one of these factors limits the physical topology of a network?(1 point)
Responses physical layout of nodes physical layout
1 answer
60 views
What is the hardware progression from a device to the internet in a wireless network?(1 point)
Responses NIC, switch, access
1 answer
64 views
Draw and label a model of an office local area network (LAN) that is using a star topology for the wired connections and a
1 answer
182 views
What is the inverse of the given relation?
y=2x−1
1 answer
37 views
Find f(g(4))
1 answer
42 views
Kendrick just celebrated his 20th birthday. According to US laws, what does this MOST likely mean?
(1 point) Responses He can buy
1 answer
94 views
In a paragraph of 3–5 sentences, evaluate how the civil rights movement increased participation in the political process. In
1 answer
262 views
3–5 sentences, explain Lyndon B. Johnson’s “War on Poverty,” and describe key programs in the plan, which included
1 answer
115 views
Explain Lyndon B. Johnson’s “War on Poverty,” and describe key programs in the plan, which included housing programs, jobs
1 answer
90 views
The primary reason that the US decided to enter into the conflict in Vietnam can be explained by the “domino theory.” What
1 answer
100 views
The 1970s were a time of protest and activism, for Latinos and American Indians alike. As you read about them on slides 4
1 answer
101 views
Read about the status of the Equal Rights Amendment at this link. Why do you think the amendment has faced such opposition, even
1 answer
58 views
Read about the extremely talented Shirley Chisholm at this link. and at the link at the bottom of slide 2 of 9.
36. List at least
1 answer
62 views
Watch this video about OPEC. Explain what happened in 1973 in the U.S. when those countries placed an embargo on oil production.
1 answer
83 views
The “counterculture” movement of the 70s challenged traditional social patterns. List at least 5 ways that hippies
1 answer
68 views
32. Read about Earth Day and the environmental disasters on slides 1-4 of 9. In your opinion, was it foolish to start a movement
1 answer
80 views
n a move that greatly increased presidential power, Congress passed the Gulf of Tonkin Resolution. What did this law allow the
1 answer
82 views
Place an X in front of which ONE of these statements about the events surrounding “Watergate” is true.
___ Nixon lied about
1 answer
157 views
1. NASA
2. OSHA 3. EPA 4. DEA 5. Arab-Israeli War 6. crisis 7. detente A govt. agency aimed at reducing use of illegal drugs. B
1 answer
49 views
Cuyahoga River disaster What was the public reaction to that?
1 answer
58 views
1. Tinker v. DesMoines
2. Miranda v. Arizona 3. Gideon v. Wainwright 4. Mapp v. Ohio A. protects your right to have a lawyer if
1 answer
70 views
Betty Friedan, a feminist writer, wrote a book called “The Feminine Mystique”. What was its overall message?
1 answer
65 views
Pages
1
2
3
4
5