Uploaded by ocartagena-barrera9190

Final%20Concepts%20review

advertisement
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
1.
Questions Attempted: 85/85
________ is the maximum speed at which data can be transferred between two nodes.
a.
Through speed
b.
Bandwidth
c.
Broadband
d.
Throughput
Grade:
User Responses:
1
b.Bandwidth
Feedback:
2.
A network that spans a large physical distance is called a ________.
a.
MAN
b.
PAN
c.
WAN
d.
LAN
Grade:
User Responses:
1
c.WAN
Feedback:
3.
Submission No: 1/1
Normal telephone cable is a type of ________.
a.
Ethernet cable
b.
twisted-pair cable
c.
coaxial cable
d.
fiber-optic cable
Grade:
User Responses:
1
b. twisted-pair cable
Feedback:
1
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
4.
Questions Attempted: 85/85
Submission No: 1/1
For the nodes on a network to communicate with each other and access the network, each
node needs a ________.
a.
hub
b.
DSL modem
c.
router
d.
network adapter
Grade:
User Responses:
1
d.network adapter
Feedback:
5.
On a network, a(n) ________ helps prevent data packets from colliding with each other.
a.
switch
b.
hub
c.
adapter
d.
access point
Grade:
User Responses:
1
a.switch
Feedback:
6.
Sophisticated networks generally use which of the following hardware devices to ease the flow
of data through the network?
a.
USB ports
b.
Routers and switches
c.
Firmware
d.
Firewalls
Grade:
User Responses:
1
b.Routers and switches
Feedback:
2
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
7.
Questions Attempted: 85/85
Submission No: 1/1
To transfer data packets between two or more networks, a ________ is used.
a.
router
b.
switch
c.
firewall
d.
hub
Grade:
User Responses:
1
a.router
Feedback:
8.
Data are sent through a network in bundles called ________.
a.
packets
b.
packages
c.
pouches
d.
nodes
Grade:
User Responses:
1
a.packets
Feedback:
9.
Using a network without the network owner's permission is known as ________.
a.
phishing
b.
spamming
c.
piggybacking
d.
hijacking
Grade:
User Responses:
1
c.piggybacking
Feedback:
3
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
10.
Questions Attempted: 85/85
Submission No: 1/1
The unique number assigned to a network adapter by the manufacturer is referred to as the
________ address.
a.
MAC
b.
IP
c.
network
d.
SSID
Grade:
User Responses:
1
a.MAC
Feedback:
11.
The operating system of a cell phone is stored in ________.
a.
an SD card
b.
ROM
c.
RAM
d.
the CPU
Grade:
User Responses:
1
b.ROM
Feedback:
12.
A(n) ________ chip converts sound waves from a voice into digital signal.
a.
analog-to-digital converter
b.
digital signal processor
c.
telephony
d.
digital convergence
Grade:
User Responses:
1
a.analog-to-digital converter
Feedback:
4
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
13.
Questions Attempted: 85/85
Submission No: 1/1
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly
transmitted to another phone.
a.
modem
b.
compression utility
c.
analog-to-digital converter
d.
digital signal processor chip
Grade:
User Responses:
1
d.digital signal processor chip
Feedback:
14.
A ________ is a geographical area with a base transceiver station at its center.
a.
hot-spot
b.
cell
c.
wave
d.
port
Grade:
User Responses:
1
b.cell
Feedback:
15.
Which is true of SMS messages?
a.
They are used in web page development.
b.
They can contain pictures and videos.
c.
They are no longer used.
d.
They can only contain a limited number of characters.
Grade:
User Responses:
1
d.They can only contain a limited number of characters.
Feedback:
5
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
16.
Questions Attempted: 85/85
Submission No: 1/1
You can send messages that include photos and videos between mobile devices using
________ technology.
a.
multimedia message service (MMS)
b.
short message service (SMS)
c.
multimedia delivery service (MDS)
d.
delivery multimedia service (DMS)
Grade:
User Responses:
1
a.multimedia message service (MMS)
Feedback:
17.
The distance between two near field communication (NFC) devices is limited to about
________.
a.
10 meters
b.
1.5 inches
c.
1.5 meters
d.
1.5 feet
Grade:
User Responses:
1
b.1.5 inches
Feedback:
18.
________ allows only limited use of media that have been legally purchased.
a.
Synchronizing
b.
Copyleft
c.
Digital rights management
d.
Copyright
Grade:
User Responses:
1
c.Digital rights management
Feedback:
6
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
19.
Questions Attempted: 85/85
Submission No: 1/1
Which of the following describes the number of times an analog wave is measured each
second during an analog-to-digital conversion?
a.
Converting rate
b.
Sampling rate
c.
Conversion rate
d.
Simplifying rate
Grade:
User Responses:
1
b.Sampling rate
Feedback:
20.
Which of the following digital image formats compresses the image file?
a.
WAV
b.
JPEG
c.
PDF
d.
MPEG
Grade:
User Responses:
1
b.JPEG
Feedback:
21.
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
a.
FBI and National Defense Department
b.
FBI and local police departments
c.
FBI and National White Collar Crime Center
d.
National White Collar Crime Center and U.S. Department of Defense
Grade:
User Responses:
1
c.FBI and National White Collar Crime Center
Feedback:
7
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
22.
Questions Attempted: 85/85
Submission No: 1/1
________ viruses are often transmitted by a flash drive left in a USB port.
a.
Boot-sector
b.
Time bomb
c.
Macro
d.
Logic bomb
Grade:
User Responses:
1
a.Boot-sector
Feedback:
23.
A(n) ________ takes advantage of file transport methods to spread on its own.
a.
macro virus
b.
worm
c.
script virus
d.
encryption virus
Grade:
User Responses:
1
b.worm
Feedback:
24.
A ________ is a virus that is attached to documents such as Word or Excel files.
a.
macro virus
b.
script virus
c.
Trojan horse
d.
polymorphic virus
Grade:
User Responses:
1
a.macro virus
Feedback:
8
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
25.
Questions Attempted: 85/85
Submission No: 1/1
Which of the following classifications of viruses can change its own code to avoid detection?
a.
Worm
b.
Multipartite
c.
Stealth
d.
Polymorphic
Grade:
User Responses:
1
d.Polymorphic
Feedback:
26.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
a.
compression code
b.
virus pattern
c.
virus signature
d.
encryption code
Grade:
User Responses:
1
c.virus signature
Feedback:
27.
________ hackers break into systems for non-malicious reasons such as to test system
security vulnerabilities.
a.
Gray-hat
b.
Black-hat
c.
Green-hat
d.
White-hat
Grade:
User Responses:
1
d.White-hat
Feedback:
9
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
28.
Questions Attempted: 85/85
Submission No: 1/1
A ________ allows a hacker to gain access to your computer and take almost complete control
of it without your knowledge.
a.
zombie
b.
logic bomb
c.
denial of service (DoS)
d.
rootkit
Grade:
User Responses:
1
d.rootkit
Feedback:
29.
Configuring a firewall to ignore all incoming packets that request access to a specific port is
known as ________.
a.
static addressing
b.
packet filtering
c.
logical port blocking
d.
packet switching
Grade:
User Responses:
1
c.logical port blocking
Feedback:
30.
CAPTCHA is ________.
a.
password method
b.
the wavy hard-to-read letter and number sequence that you type to prove that you are human to
a website
c.
a rootkit virus
d.
antivirus software
Grade:
User Responses:
1
b.the wavy hard-to-read letter and number sequence that you type to prove
that you are human to a website
Feedback:
10
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
31.
Questions Attempted: 85/85
Submission No: 1/1
Adware and spyware are referred to collectively as ________.
a.
viruses
b.
grayware
c.
alertware
d.
firmware
Grade:
User Responses:
1
b.grayware
Feedback:
32.
Social ________ is any technique that uses social skills to generate human interaction that
entices individuals to reveal sensitive information.
a.
theft
b.
pharming
c.
engineering
d.
pretexting
Grade:
User Responses:
1
c.engineering
Feedback:
33.
When malicious code is planted on your computer and alters your browser's ability to find web
addresses, it is known as ________.
a.
pretexting
b.
pharming
c.
aphishing
d.
polymorphing
Grade:
User Responses:
1
b.pharming
Feedback:
11
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
34.
Questions Attempted: 85/85
Submission No: 1/1
What is the first step of the system development life cycle (SDLC)?
a.
Analysis
b.
Development and documentation
c.
Problem and Opportunity Identification
d.
Design
Grade:
User Responses:
1
c.Problem and Opportunity Identification
Feedback:
35.
The set of specific, sequential steps that describe exactly what a computer program must do to
complete the work is called a(n) ________.
a.
algorithm
b.
flowchart
c.
structure chart
d.
pseudocode
Grade:
User Responses:
1
a.algorithm
Feedback:
36.
The keywords used in programming languages that use decisions to redirect the flow of a
program are called ________.
a.
flowcharts
b.
operators
c.
pseudocode
d.
control structures
Grade:
User Responses:
1
d.control structures
Feedback:
12
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
37.
Questions Attempted: 85/85
Submission No: 1/1
A loop decision point consists of three features: an initial value, a set of actions to be
performed, and a(n) ________.
a.
operator
b.
test condition
c.
class
d.
testing plan
Grade:
User Responses:
1
b.test condition
Feedback:
38.
________ breaks down a problem into a series of high-level tasks and continues to break each
task into successively more detailed subtasks.
a.
Top-down design
b.
Bottom-up design
c.
Inheritance
d.
Object-oriented analysis
Grade:
User Responses:
1
a.Top-down design
Feedback:
39.
Object-oriented ________ are defined by the information (data) and the actions (methods)
associated with them.
a.
blocks
b.
classes
c.
units
d.
fields
Grade:
User Responses:
1
b.classes
Feedback:
13
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
40.
Questions Attempted: 85/85
Submission No: 1/1
An example of a first-generation language is ________.
a.
machine language
b.
BASIC
c.
COBOL
d.
assembly language
Grade:
User Responses:
1
a.machine language
Feedback:
41.
The capability of moving a completed programming solution easily from one type of computer
to another is known as ________.
a.
scalability
b.
transferability
c.
inheritance
d.
portability
Grade:
User Responses:
1
d.portability
Feedback:
42.
The process that converts program code into machine language is called ________.
a.
execution
b.
compilation
c.
variable declaration
d.
documentation
Grade:
User Responses:
1
b.compilation
Feedback:
14
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
43.
Questions Attempted: 85/85
Submission No: 1/1
________ is the set of instructions that programmers have written in a higher-level language.
a.
Compiled code
b.
Base code
c.
Executable code
d.
Source code
Grade:
User Responses:
1
d.Source code
Feedback:
44.
Division by zero is a ________ error that is caught when the program executes.
a.
syntax
b.
runtime
c.
logical
d.
compiler
Grade:
User Responses:
1
b.runtime
Feedback:
45.
A small Java-based program is called a ________.
a.
Java class
b.
JavaScript
c.
Java applet
d.
JSP
Grade:
User Responses:
1
c.Java applet
Feedback:
15
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
46.
Questions Attempted: 85/85
Submission No: 1/1
Special symbols called tags are used in which of the following languages?
a.
C#
b.
Java
c.
C++
d.
HTML/XHTML
Grade:
User Responses:
1
d.HTML/XHTML
Feedback:
47.
If a school keeps two lists, one for student registration and one for student financial
information, both containing name and address information, this is an example of data
________.
a.
integrity
b.
completeness
c.
redundancy
d.
normalization
Grade:
User Responses:
1
c.redundancy
Feedback:
48.
In a database, the term ________ is synonymous with a category of information.
a.
row
b.
record
c.
table
d.
field
Grade:
User Responses:
1
d.field
Feedback:
16
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
49.
Questions Attempted: 85/85
Submission No: 1/1
In a database, a group of related records is referred to as a(n) ________.
a.
object
b.
memo
c.
field
d.
table
Grade:
User Responses:
1
d.table
Feedback:
50.
In a Microsoft Access database, something like the Gettysburg Address would be stored in a(n)
________ field.
a.
object
b.
text
c.
short text
d.
long text
Grade:
User Responses:
1
d.long text
Feedback:
51.
You can set a ________, which is automatically displayed in a field unless the user enters
something different.
a.
relation
b.
field type
c.
numeric check
d.
default value
Grade:
User Responses:
1
d.default value
Feedback:
17
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
52.
Questions Attempted: 85/85
Submission No: 1/1
________ is used to ensure that data is organized most efficiently.
a.
Range checking
b.
Consistency checking
c.
Normalization
d.
Validation
Grade:
User Responses:
1
c.Normalization
Feedback:
53.
________ databases are the most commonly used electronic databases.
a.
Flat-file
b.
Object-oriented
c.
Multidimensional
d.
Relational
Grade:
User Responses:
1
d.Relational
Feedback:
54.
________ means that for each value in the foreign key of one table, there is a corresponding
value in the primary key of another table.
a.
Database consistency
b.
Record integrity
c.
Normalization
d.
Referential integrity
Grade:
User Responses:
1
d.Referential integrity
Feedback:
18
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
55.
Questions Attempted: 85/85
Submission No: 1/1
A(n) ________ check determines whether a required field such as LastName was filled in.
a.
range
b.
consistency
c.
alphabetic
d.
completeness
Grade:
User Responses:
1
d.completeness
Feedback:
56.
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
a.
join query
b.
table query
c.
select query
d.
criteria query
Grade:
User Responses:
1
c.select query
Feedback:
57.
________ involves taking data from your database and putting it into an electronic file in a
format that another external application or database can recognize.
a.
Extracting
b.
Enhancing
c.
Exporting
d.
Importing
Grade:
User Responses:
1
c.Exporting
Feedback:
19
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
58.
Questions Attempted: 85/85
Submission No: 1/1
Big data analytics is usually associated with ________ services.
a.
management information
b.
decision support
c.
data warehouse
d.
office support
Grade:
User Responses:
1
c.data warehouse
Feedback:
59.
In a transaction-processing system (TPS), if the TPS database can be queried and updated
while the transaction is taking place, this is called ________ processing.
a.
direct
b.
real-time
c.
immediate
d.
batch
Grade:
User Responses:
1
b.real-time
Feedback:
60.
In a ________ network, each node connected to the network communicates directly with every
other node.
a.
client/server
b.
peer-to-peer
c.
router
d.
bridge
Grade:
User Responses:
1
b.peer-to-peer
Feedback:
20
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
61.
Questions Attempted: 85/85
Submission No: 1/1
A ________ uses the Internet communications infrastructure to build a secure and private
network.
a.
WAN
b.
HAN
c.
PAN
d.
VPN
Grade:
User Responses:
1
d.VPN
Feedback:
62.
A(n) ________ server is a server that stores and manages files for network users.
a.
database
b.
print
c.
file
d.
e-mail
Grade:
User Responses:
1
c.file
Feedback:
63.
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
a.
heap
b.
spooler
c.
logger
d.
stack
Grade:
User Responses:
1
b.spooler
Feedback:
21
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
64.
Questions Attempted: 85/85
Submission No: 1/1
Which of the following is the most commonly used client/server network topology?
a.
Hierarchical
b.
Star
c.
Cluster
d.
Ring
Grade:
User Responses:
1
b. Star
Feedback:
65.
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________
signal.
a.
crash
b.
jam
c.
stop
d.
hit
Grade:
User Responses:
1
b.jam
Feedback:
66.
________ is the amount of data that can be transmitted across a transmission medium in a
certain amount of time.
a.
Infusion
b.
Scalability
c.
Data capacity
d.
Bandwidth
Grade:
User Responses:
1
d.Bandwidth
Feedback:
22
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
67.
Questions Attempted: 85/85
Submission No: 1/1
________ is the standard communications protocol used on most client/server networks.
a.
VPN
b.
Ethernet
c.
NOS
d.
TCP/IP
Grade:
User Responses:
1
b.Ethernet
Feedback:
68.
The physical address assigned each network adapter is called its ________.
a.
network access control (NAC)
b.
network physical address (NPA)
c.
physical address control (PAC)
d.
media access control (MAC)
Grade:
User Responses:
1
d.media access control (MAC)
Feedback:
69.
A(n) ________ address is the address that external entities use when communicating with your
network.
a.
WAP
b.
ALU
c.
MAC
d.
IP
Grade:
User Responses:
1
d.IP
Feedback:
23
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
70.
Questions Attempted: 85/85
Submission No: 1/1
A ________ sends data from one collision domain to another.
a.
router
b.
link
c.
bridge
d.
switch
Grade:
User Responses:
1
c.bridge
Feedback:
71.
A ________ sends data between two networks.
a.
switch
b.
router
c.
repeater
d.
hub
Grade:
User Responses:
1
b.router
Feedback:
72.
Configuring an account to disable itself after a set number of login attempts using invalid
passwords is a method of countering a ________.
a.
worm
b.
brute force attack
c.
spammer
d.
Trojan horse
Grade:
User Responses:
1
b.brute force attack
Feedback:
24
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
73.
Questions Attempted: 85/85
The main path of the Internet along which data travels the fastest is known as the Internet
________.
a.
protocol
b.
highway
c.
backbone
d.
cache
Grade:
User Responses:
1
c.backbone
Feedback:
74.
High-speed ________ communication lines use fiber-optics.
a.
IP
b.
cable
c.
DSL
d.
OC
Grade:
User Responses:
1
d.OC
Feedback:
75.
Submission No: 1/1
The main suite of protocols used on the Internet is ________.
a.
TCP/IP
b.
SMTP
c.
POP
d.
FTP
Grade:
User Responses:
1
a.TCP/IP
Feedback:
25
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
76.
Questions Attempted: 85/85
Submission No: 1/1
< b > is an example of an HTML ________.
a.
marker
b.
key
c.
tag
d.
indicator
Grade:
User Responses:
1
c.tag
Feedback:
77.
________ defines the content in terms of the data that is being described rather than how it is
to be displayed.
a.
HTML
b.
CGI
c.
JavaScript
d.
XML
Grade:
User Responses:
1
d.XML
Feedback:
78.
________ enables interactive functionality beyond the simple display of information on a web
page by providing a platform which can execute a program to do things like collect data from
the user.
a.
ACK
b.
OC
c.
UDP
d.
CGI
Grade:
User Responses:
1
d.CGI
Feedback:
26
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
79.
Questions Attempted: 85/85
Submission No: 1/1
A(n) ________ is a small program that resides on a server and is designed to be downloaded
and run on a client computer.
a.
app
b.
applet
c.
CGI script
d.
JavaScript
Grade:
User Responses:
1
b.applet
Feedback:
80.
The ________ defines items on a web page such as graphics, tables, and headers as objects.
a.
DOM
b.
MIME
c.
JSON
d.
SSL
Grade:
User Responses:
1
a.DOM
Feedback:
81.
Which protocol is used when sending files as attachments by e-mail?
a.
Multipurpose Internet Mail Extensions (MIME)
b.
Simple Mail Transfer Protocol (SMTP)
c.
User Datagram Protocol (UDP)
d.
Post Office Protocol (POP)
Grade:
User Responses:
1
a.Multipurpose Internet Mail Extensions (MIME)
Feedback:
27
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
82.
Questions Attempted: 85/85
Submission No: 1/1
In public-key encryption, the two keys—one for coding and one for decoding—are known as
________.
a.
code keys
b.
a key pair
c.
key tags
d.
linked keys
Grade:
User Responses:
1
b.a key pair
Feedback:
83.
Which of the following is an example of an instant messaging service?
a.
Yahoo Messenger
b.
LinkedIn
c.
Monster
d.
Flickr
Grade:
User Responses:
1
a.Yahoo Messenger
Feedback:
84.
________ permits two or more people to communicate over the Internet in real time.
a.
Flickr
b.
Email
c.
Snapfish
d.
Instant messaging
Grade:
User Responses:
1
d.Instant messaging
Feedback:
28
Final Concepts review
CIS 111 CRN 23311 S19 Woolridge CC
Cartagena,Orfa
Submitted :5/16/2019 Gradebook Grade: 97.6%
7:13:52 PM
85.
Questions Attempted: 85/85
Strong encryption now requires ________-bit keys.
a.
40
b.
128
c.
256
d.
512
Grade:
User Responses:
1
c.256
Feedback:
29
Submission No: 1/1
Download