ACADEMIC GUYS

A personal area network (PAN) is a computer network used for sharing data between personal devices that are physically close to each other. In this example, Marco is using a PAN because he connects his personal devices within a close range, and does not connect to larger networks, such as a LAN (local area network) or WAN (wide area network).

12/15  that’s 80%

RETAKE

12 questions were answered correctly.

questions were answered incorrectly.

1

Gilbert is an independent consultant who helps organizations select the right accounting software for their needs. After evaluating a local nonprofit organization, Gilbert recommended an accounting software package that he believes meets specifications, secures documents, and satisfies user requirements.

Gilbert did not tell his client that he owns a 25% share in the business that developed the software, and that he will benefit if the organization decides to purchase the software he recommends.

Which principle of the Software Engineering Code of Ethics has Gilbert violated?

  • Principle 2: Client and Employer
  • Principle 3: Product
  • Principle 1: Public
  • Principle 4: Judgment 

RATIONALE

Gilbert has violated the “judgment” principle established by the Software Engineering Code of Ethics. This principle states that software engineers must maintain integrity and independence in their professional judgment. This includes disclosing conflicts of interest.

GIlbert’s selection of this product involves an obvious conflict of interest. He should have informed his client about his ties to the software development company.

CONCEPT

 Professional Code of Ethics

Report an issue with this question

2

__________ is a mobile application used primarily to share photos and videos with others.

  • QQ
  • Instagram
  • LinkedIn
  • Twitter

RATIONALE

Instagram is a mobile photo sharing application, which enables users to share photos and videos with “followers.”

CONCEPT

 Benefits and Risks of Social Media

Report an issue with this question

3

Ben borrowed his friend’s flash drive to save some files. Later, when he inserted the flash drive into his computer, everything he typed, and the address of every website he visited, was recorded and sent to a marketing company.

What should Ben do to remove the offending program and prevent future attacks?

  • Ben should install and run an antivirus program and change his network password.
  • Ben should install and run an antivirus program, and should upgrade his system to WPA security.
  • Ben should install and run antivirus and anti-spyware programs.
  • Ben should consider a different form of access control after installing and running an anti-spyware program.

RATIONALE

USB devices can contain malware and spread it to other devices without the user’s knowledge. To protect against USB threats, make sure to check all USB devices with antivirus and anti-spyware programs before connecting them to the network.

CONCEPT

 Network Security

Report an issue with this question

4

Select the true statement about HTML.

  • HTML is a network protocol.
  • HTML enables users to format the components of a web page.
  • HTML stands for hidden transfer markup language.
  • HTML defines blocks of text to receive URL instructions.

RATIONALE

HTML is a content-formatting language that enables users to specify the appearance and location of the components of a web page. HTML uses code “tags” to apply formatting instructions to text and other content that will be displayed on web pages.

CONCEPT

 Website Development

Report an issue with this question

5

Alexis received an email message from an unknown sender that included an attachment. 

If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?

  • Opening the attachment would release a passive worm, which would infect her system with adware.
  • Opening the attachment would release a worm, which would infect her system with spyware.
  • Opening the attachment would release a worm, which would infect her system with a virus.
  • Opening the attachment would release an active worm, which would infect her system with adware.

RATIONALE

Senders can transmit files to recipients by attaching them to email messages. Like “junk mail” delivered by the postal service, email users regularly receive unsolicited messages from unknown senders. These messages sometimes contain links to malicious websites or include attachments that contain malicious software (e.g., a worm).

CONCEPT

 Network Security

Report an issue with this question

6

Select the true statement about network protocols.

  • One function of a protocol is to decompress data when it is delivered to the receiving computer.
  • Communication cannot take place unless the protocol is executed in the same way on all devices.
  • Using a protocol other than TCP/IP can result in data loss.
  • Computers that are distributed across a large geographic area need a special protocol to resolve errors.

RATIONALE

A protocol is a system of rules that enables two or more entities (computer devices) in a communications system to send and receive information. Communication cannot take place unless the protocol is executed in exactly the same way on all devices. 

CONCEPT

 Introduction to Computer Networks

Report an issue with this question

7

Select the true statement about CIPA.

  • Parental consent is required if a child wants to use a site.
  • All schools are required to adopt it.
  • It can restrict a minor’s access to harmful content.
  • It is enforced by the federal E-rate program.

RATIONALE

The Children’s Internet Protection Act (CIPA) established regulations that require the blocking of access by minors to obscene or pornographic pictures. CIPA also requires an Internet safety policy if an entity receives discounted Internet service.

CONCEPT

 Protecting Minors from Online Dangers

Report an issue with this question

8

In which of the following scenarios can a trademark be applied?

  • Tiffany records a sequence of three musical notes that appear in every ad for a company.
  • Erik uploads a new reaction video to his YouTube channel.
  • Paige creates a gluten-free dessert recipe and posts it on her blog.
  • Randy designs a bracelet for his jewelry line.

RATIONALE

Copyright protects Paige, Randy, and Erik because they are the creators of specific content. Trademark protects Tiffany’s sequence of three musical notes because it is associated with a specific company.

CONCEPT

 Copyright, Trademark and Intellectual Property

Report an issue with this question

9

Select the scenario that demonstrates plagiarism.

  • Summer finds a recent magazine article about an issue that she wants to discuss with her class, so she makes copies of it for the students.
  • Allison makes a video of herself using sound effects that she clipped from the soundtrack of a popular action movie to market her business.
  • Dylan contributes some of his own research to an entry on Wikipedia, and includes a citation for his recent book.
  • Joseph finds a written passage about a new idea to stop cyberbullying and pastes it into his blog entry without giving credit to its author.

RATIONALE

Joseph is guilty of plagiarism because he copied a written passage about a new idea to stop cyberbullying into his own blog entry without citation. It is important to cite sources when referring to the work of another.

Allison could be guilty of copyright infringement because she used the soundtrack of a popular action movie without prior consent.

Because she is sharing a recent article with students, Summer’s actions likely fall under fair use.

Dylan is not at risk for copyright infringement because he cites his own work.

CONCEPT

 Ethical Behavior in the Digital World

Report an issue with this question

10

Which of the following is the basic functionality of network software?

  • Ethernet development
  • Automation management
  • User management
  • Internet speed

RATIONALE

Out of this list, the correct basic functionality of network software is user management. Network software allows administrators to add or remove users from the network.

CONCEPT

 Computer Network Components

Report an issue with this question

11

Select the sign of computer addiction that indicates neglect.

  • While waiting in the light-rail station, David became so absorbed in an online political post that he missed his train and was late for work.
  • Fearing she would lose her place in the standings of an online game, Rachel declined to attend her cousin’s wedding.
  • When confronted by his parents about the excessive amount of time he spent playing video games, Tom claims that he plays for only an hour every day.
  • When confronted by her employer about the amount of time she spent checking her social media account at work, Heidi claimed that she only checks it during her breaks, and at lunch.

RATIONALE

Rachel declined to attend her cousin’s wedding in order to keep playing an online game. This is clear evidence of neglect.

CONCEPT

 Computer Addiction

Report an issue with this question

12

Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly.

Which type of network is best for Shayne?

  • PAN
  • LAN
  • WAN
  • MAN

RATIONALE

The most appropriate network for Shayne is a personal area network (PAN), because it is used to share data between personal devices that are close to each other (e.g., computers, mobile phones, and tablets).

CONCEPT

 Computer Network Types

Report an issue with this question

13

Select the true statement about the history of the Internet.

  • TCP/IP facilitates communication between networks running on different protocols.
  • The first four nodes of ARPANET included Harvard, MIT, Stanford, and the Department of Defense.
  • The creation of ARPANET enabled U.S. defense intelligence agencies to predict the Soviet launch of Sputnik.
  • The Internet is a global network of connected computers linked through ARPANET.

RATIONALE

Transmission-control protocol/Internet protocol (TCP/IP) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). The Advanced Research Projects Agency (ARPA) network was created in response to the launch of Sputnik, not in advance of it.

CONCEPT

 The World Wide Web

Report an issue with this question

14

Which of the following can be controlled by copyright?

  • The team logo for a minor league baseball team
  • A new type of engine for pickup trucks
  • A writer’s new murder mystery on the New York Times bestsellers list
  • The slogan for a business

RATIONALE

Neither the slogan for a business, a team name, nor a new type of engine can be controlled by a copyright. Copyright protects original works of authorship including literary, dramatic, musical, and artistic works (e.g., poetry, novels, movies, songs, photographs, drawings, computer software, and architecture).

A slogan and a team name could be trademarked, and the engine could be patented.

CONCEPT

 Copyright, Trademark and Intellectual Property

Report an issue with this question

15

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?

  • PAN
  • LAN
  • WAN
  • MAN

RATIONALE

A personal area network (PAN) is a computer network used for sharing data between personal devices that are physically close to each other. In this example, Marco is using a PAN because he connects his personal devices within a close range, and does not connect to larger networks, such as a LAN (local area network) or WAN (wide area network).

Calculate Price


Price (USD)
$