Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer the following short questions: 1. Explain how data and information as assets in IT field. 2. Consider the following troubleshooting scenario: If a

image text in transcribed

image text in transcribed

Please answer the following short questions: 1. Explain how data and information as assets in IT field. 2. Consider the following troubleshooting scenario: If a technician has a problem, and he's been trying to resolve the problem. His co-worker on the other side went to the workstation to test it out at the same time this is called: A. Duplicate the problem. B. Divide the problem. C. Conquer the problem. D. Basic knowledge search 3. What is the purpose of each one: A. FireWire B. Thunderbolt C. Bluetooth D. RF E. NFC 4. Compare the following: A. Fiber Optic B. Cable C. DSL D. Radio frequency E. Satellite F. Cellular 5. Difference between Local network storage types: A. NAS B. File server 6. Compare the following 802.11a, 802.11b, 802.11g, 802.11g, 802.1lac as following: A. Older Vs. newer standards. B. Speed limitations C. Interference and attenuation factors. 7. Consider the following scenario, a guest is trying to login into the hospital Wi-Fi. The best option for the guest to choose is: A. WEP B. WPA C. WPA2 8. What are these file systems AND in which OS they are used: A. NTFS B. FAT32 C. HFS D. Ext4 9. Difference between: A. Single-platform software. B. Cross-platform software. 10. Difference between Licensing: A. Single use. B. Group use/site license. C. Concurrent license. D. Subscription Vs. one-time purchase. E. Open source Vs. proprietary. 11. Give example on the following languages: A. Scripting languages: B. Scripted languages: C. Markup languages: D. Compiled languages: E. Query languages: F. Machine languages: machine code and Assembly language. G. Interpreted languages. If there are similarities between languages you may combine them under one subject. 12. What "Constraints" is used for in database? 13. Show the simple difference between the following confidentially concerns: A. Snooping B. Eavesdropping Replay attack. C. Wiretapping D. Social Engineering E. Dumpster diving F. Patching/Updates: 14. Difference between: A. OEMS websites B. Third-party websites. 15. Difference between: A. Role-based access B. Rule-based access C. Mandatory access control D. Discretionary access control 16. Difference between: A. Plain text B. Cipher text 17. Difference between: A. SATA B. PATA

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Repairing And Querying Databases Under Aggregate Constraints

Authors: Sergio Flesca ,Filippo Furfaro ,Francesco Parisi

2011th Edition

146141640X, 978-1461416401

More Books

Students also viewed these Databases questions

Question

=+j Describe how EU directives impact IHRM.

Answered: 1 week ago

Question

=+and reduction in force, and intellectual property.

Answered: 1 week ago