Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please just provide the answer, do not struggle wit explanations. 1) What do IT professionals do to help keep user data safe? -They wait to

Please just provide the answer, do not struggle wit explanations.

1)

What do IT professionals do to help keep user data safe?

-They wait to fix software bugs in the next release.

-They create weak usernames and passwords for users.

-They ask you if you are connected to the internet.

-They keep devices and systems up to date.

2)

How were mathematical computations performed before the use of electronic computers?

-Using transistor chips

-Using vacuum tubes and circuits

-Using hand-written notes from clerks

-Using mechanical gears and levers

3)

Which of the following is an example of why using biometrics is more secure than using a password?

-Your face is more convenient to use.

-Every person has a retina that can scanned for access.

-It allows you to back up your data automatically.

-A fingerprint is unique and difficult to copy.

4)

Your local professional sports team has made the playoffs, and soon tickets for the playoffs will be available for sale on their website.

In anticipation of the increase in visitors to the website, what might the team website do to ensure the site is able to handle the increase in demand?

-They use better designed and implemented application programming interfaces (APIs).

-They use cloud services that will automatically scale up when demand is high.

-They purchase more hardware and sportswear for when the team wins the championship.

-They use their cloud services to scale down when demand is high.

5)

What is one way that a company can be sure that their devices and systems are safe from security threats and attack vectors?

-The company uses one common password for all employees and customers who access their website.

-The company locks all of their doors.

-The company educates users about how to recognize potential security threats.

-The company installs security cameras and places a security guard in their building lobby.

6)

Which of the following is an advantage of distributing computer operations in the cloud?

-People spend a lot of extra money on computers and on power that they do not need or will not use.

-Software engineers keep applications smaller, making download and load times smaller.

-You call a friend with the touch of a button and have a conversation with them.

-The software for banking applications keep track of how much money you've spent and where you are.

7)

What types of data storage would you have used before cloud storage?

Select all that apply.

-Plastic disks

-Drivers

-Websites

-Servers

8)

What are some software innovations that support accessibility for people with impairments?

Select all that apply.

-A wireless mouse

-Keyboard shortcuts

-A screen reader

-Monochrome monitors

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2010 Barcelona Spain September 2010 Proceedings Part 1 Lnai 6321

Authors: Jose L. Balcazar ,Francesco Bonchi ,Aristides Gionis ,Michele Sebag

2010th Edition

364215879X, 978-3642158797

More Books

Students also viewed these Databases questions

Question

7. Identify six intercultural communication dialectics.

Answered: 1 week ago