Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please answer the following short questions: 1. Explain how data and information as assets in IT field. 2. Consider the following troubleshooting scenario: If a
Please answer the following short questions: 1. Explain how data and information as assets in IT field. 2. Consider the following troubleshooting scenario: If a technician has a problem, and he's been trying to resolve the problem. His co-worker on the other side went to the workstation to test it out at the same time this is called: A. Duplicate the problem. B. Divide the problem. C. Conquer the problem. D. Basic knowledge search 3. What is the purpose of each one: A. FireWire B. Thunderbolt C. Bluetooth D. RF E. NFC 4. Compare the following: A. Fiber Optic B. Cable C. DSL D. Radio frequency E. Satellite F. Cellular 5. Difference between Local network storage types: A. NAS B. File server 6. Compare the following 802.11a, 802.11b, 802.11g, 802.11g, 802.1lac as following: A. Older Vs. newer standards. B. Speed limitations C. Interference and attenuation factors. 7. Consider the following scenario, a guest is trying to login into the hospital Wi-Fi. The best option for the guest to choose is: A. WEP B. WPA C. WPA2 8. What are these file systems AND in which OS they are used: A. NTFS B. FAT32 C. HFS D. Ext4 9. Difference between: A. Single-platform software. B. Cross-platform software. 10. Difference between Licensing: A. Single use. B. Group use/site license. C. Concurrent license. D. Subscription Vs. one-time purchase. E. Open source Vs. proprietary. 11. Give example on the following languages: A. Scripting languages: B. Scripted languages: C. Markup languages: D. Compiled languages: E. Query languages: F. Machine languages: machine code and Assembly language. G. Interpreted languages. If there are similarities between languages you may combine them under one subject. 12. What "Constraints" is used for in database? 13. Show the simple difference between the following confidentially concerns: A. Snooping B. Eavesdropping Replay attack. C. Wiretapping D. Social Engineering E. Dumpster diving F. Patching/Updates: 14. Difference between: A. OEMS websites B. Third-party websites. 15. Difference between: A. Role-based access B. Rule-based access C. Mandatory access control D. Discretionary access control 16. Difference between: A. Plain text B. Cipher text 17. Difference between: A. SATA B. PATA
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started