Chapter 1, Multimedia Project
Screenshots can be useful tools for learning, documentation, and troubleshooting. Any time you need to show someone what’s displayed on your computer screen, you can press the Print Screen (PrtScr) key, which stores a copy of the screen into memory. On a Mac, hold down the Command (Apple) key while you press the Shift key and the 3 key. From there, you can paste the screenshot into a document you’re creating with a word processor. You can also paste it into a graphics program, such as Microsoft Paint, and then edit it. For this project, take a screenshot and paste it into a Word document. Under the screenshot, enter a description of the software and the purpose of the screen you captured.
Throughout this class, you will complete a number of Hands-On Projects which will serve to reinforce the ideas of the module. Since doing is learning, these will include such activities as creating a spreadsheet to investigate character codes and binary numbers, creating a simple HTML document using Notepad and Paint, using Trace-route to investigate local Internet topology, and creating a digital media files. A PDF containing the requirements for this assignment can be found in Doc Sharing.
During this module, you will complete the following project:
• Excel Binary Numbers – Learn to manipulate binary numbers and investigate ASCII codes using functions built into Microsoft Excel™
Submit this assignment to the Dropboxno later than
modul 2
Chapter 2, Resume Builder Project
Use the Web and other resources to learn about the computers and other digital technologies used in your career field or a profession of interest to you. Develop the information you find into a format similar to the Technology in Context section of each chapter in the textbook. Make sure you select two photos to accompany your narrative and include a list of relevant Web links to additional resources.
Chapter 2, Critical Thinking Project
Steve Jobs, co-founder of Apple Inc., coined the idea that computers should be consumer appliances like toasters that could be set up easily, used by anyone, and “democratically priced” so they are affordable to everyone. An opposing philosophy, championed by many PC owners, is that computers should be flexible modular systems that can be easily customized, upgraded, and modified by anyone with a moderate degree of technical savvy. Which philosophy do you personally prefer? What do you think is the preference of the majority of computer shoppers? If you were a computer designer, how would you provide your customers with flexibility while making it approachable for non-techies? Incorporate your ideas in a one-page paper you will submit to the appropriate Dropbox basket.
mod 3
Create a proposal document and annotated bibliography (at least four references) for your Term Paper. Please see the Term Paper guideline document and sample proposal document in Doc Sharing. Model your proposal using those documents
Have you heard about the “24-hour rule” for software that says you can legally use any software for free for 24 hours without paying for it? How about your right to use so-called abandoned software that’s no longer supported or that was created by a company now out of business? Both the 24-hour rule and the concept of abandoned software are urban legends and have no basis in copyright law. Does it seem to you that most people don’t have the facts about copyrights? How strong a factor is that in the proliferation of software piracy? What are your thoughts about the connection between knowing the copyright rules and following them? Put your thoughts in order, write them up, and submit to the appropriate Dropbox basket.
In the Critical Thinking project (you will write a one-page statement of your opinions about some common misconceptions regarding copyright and software, especially in light of the core value of respect.
Chapter 3, Resume Builder
Use the Web and other resources to compile a list of the software used in your current or future career field. Are there standard packages that job applicants should know how to use? If so, what can you find out about those packages on the Web? If your career field does not use any standard software packages, explain why you think that is the case. Also, make a list of the software packages you’re familiar with. As you consider your school and career goals for the next year, list at least five additional software packages you would like to learn. Explain why they would be helpful. Submit your lists to the appropriate Dropbox basket.
module 4
Computers are used worldwide, but most of the major operating systems originated in English-speaking countries. Take a look at the operating system that you use in the context of global users who might not speak English and who might not have grown up with Western customs. Describe at least five aspects of your operating system that would have to be modified to be acceptable to global users.
In the Globalization project (, you will consider the effects of language on operating system interfaces. Additionally, you will make at least five suggestions for improvement in light of the Saint Leo core values of community and respect.
Submit this assignment to the Dropbox
MODULE 4 Critical Thinking Project
Think about the ways you typically interact with a computer and how the operating system factors into that interaction. What aspects of the operating system do you like? Which aspects could be improved? Organize your thoughts into an annotated list and submit to the appropriate Dropbox basket.
In the Critical Thinking project , you will write an annotated list evaluating operating system features, including your suggestions as to the aspects you like and those you would like to see improved.
mod 5
Chapter 5, Globalization Project
The model for telecommunications in most technologically advanced countries depends on large telecommunications corporations for telephone and Internet access. Can you envision ways in which people in technologically underdeveloped countries could benefit from inexpensive LAN and WLAN technologies? Jot down your initial thoughts, and then search the Web for additional ideas. Write a one-page executive summary that describes your ideas.
In the Globalization project (), you are going to write about using low cost technologies to connect underprivileged people. While you are reflecting on this before writing, please take into consideration our Saint Leo core value of responsible stewardship.
Chapter 5, Critical Thinking Project
Wireless technology has become quite pervasive. Not only are computing devices wireless, but most people have other devices, such as security systems, baby monitors, and entertainment systems, that could be wirelessly networked. Play the role of a futurist and think about the ultimate wireless home. Sketch out floor plans and show how you would set up wireless devices, including wireless access points.
mod 6
<fontsize=”5″>Chapter 6, Critical Thinking Project</fontsize=”5″>
“The Internet treats censorship like damage and routes around it.” Do you agree with this observation? Does it seem like the Internet-similar to banned books, music, videos, and satellite dishes-has a way of infiltrating even the most repressive societies? Does this tendency make censorship more tolerable in the short run?
Chapter 6, Resume Builder Project
The Internet provides resources for career development. Think about your ideal job and make a table that lists (in the first column) the top ten qualifications and skills you’ll need to be a successful applicant. In the second column, indicate whether you currently possess each qualification or skill. For those you need to develop in the future, indicate how you plan to obtain them (for example, from a college course, on-the-job-training, or self-paced study). Find out if you can develop any of these skills and qualifications using online resource, such as online courses. Provide addresses for any Internet resources that you find.
In the Resume Builder project , you will create a list of job skills you believe that you will need and find resources, including online resources, to help you learn them.
Submit this assignm
mod 7
Chapter 7, Critical Thinking Project
In this chapter you read about some of the pitfalls of shopping online. Reflect on what you read within the context of your own online usage habits. What aspects of your online activities could you change to become more secure, more private, or more efficient? What do you have to give up to get these benefits? Is it worth it to you? Incorporate your thoughts in a one-page summary. Follow your instructor’s guidelines for submission.
In the Critical Thinking project (click), you will think about and address some of the dangers of shopping online. Incorporate your answers to the questions posed in the text in a one-page document.
Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT
Your Term Paper will be completed in this module. Hopefully this has been a rewarding experience and you have used the opportunity to investigate some aspects of computers and digital technology about which you have been curious.
Please ensure that you kept the University’s policies about citations and plagiarism in mind and that all of your citations and works cited section are in order. In the event that the instructor asked for any corrections in this area, please make sure you complied in order to avoid issues with the Academic Standards Committee.
Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT. (The Dropbox basket is linked to Turnitin.)
<fontsize=”4″>Chapter 7, Resume Builder Project</fontsize=”4″>
Many companies have a Web site that provides information about their products and services. Use a search engine to locate a company in your career field. Suppose you are a recruiter for that company and you’ll be attending a series of college career fairs. Create a one-page information flyer that you can hand out to prospective recruits. The flyer should include:
• The company name, URL, and physical location(s)
• A brief description of the company’s mission, products, and services
• Instructions on how to submit a resume electronically
In the Resume Builder project (click), you will research a company in your intended career and create a recruiting flyer. Researching potential employers and their recruiting strategies is good practice for your post-graduation job hunt. Incorporate your answers to the required items as a one-page informational flyer.
Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT.
mod 8
Please write a one-page essay examining one of the issues discussed in this class through the lens of the Saint Leo core value of integrity.
Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT. (This Dropbox basket is linked to Turnitin.)
As a final culmination of your work this term, you will prepare and submit an eight to ten slide PowerPoint™ presentation on your Term Paper. Additional requirements for the presentation are on the PowerPoint Specs document found in Doc Sharing.
Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT.
Chapter 8, Multimedia Project
Use Windows Sound Recorder or similar software to record your own 15-second radio ad for your favorite music or video download service. Submit the text of your script along with the .wav file containing your ad.
In the Multimedia project (clickHERE ), you will experiment with recording digital sound. Surprisingly few people in the population at large have done this. Be sure to submit the text of your script as well as the .wav file containing your ad.
Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT
Which term refers to a collection of inter-linked documents, graphics, and sounds that can be accessed over the Internet?
2G Network
Digital Television
Freeform Database
Visual Database
World Wide Web/Web
Question 2. Question :
The Internet was first developed for whom?
America Online (AOL)
cambridge University
Microsoft
The United States Military
Vice President Al Gore
Question 3. Question :
Which of the following is a generic term used to refer to symbols that represent facts, objects, and ideas, which a computer can manipulate?
Student Answer: CORRECT Data
Entities
Queries
Reports
Wisdom
Question 4. Question :
Which term refers a named collection of data copied unto a storage medium, such as a hard disk, CD, or flash drive?
BIOS
Cluster
File
Port
Sector
Question 5. Question :
A megabyte is the same as which of the following?
1,048,576 bits
2 to the power of 10 (= 1,024) Kilobytes
Exactly one million bytes
One half of a Gigabyte
Two Terabytes
Question 6. Question :
How many bytes are required to store a single letter in extended ASCII?
: 1
2
8
256
1,024
Question 7. Question :
Which of the following is the Extended ASCII code for an uppercase “A” in binary (base 2)?
0000 0000
0000 000A
0100 0001
A000 0000
1111 1111
Question 8. Question :
Which of type of language is typically used by programmers to create programs that control digital devices?
Command Language
Programming Language
Query Language
System Language
Teutonic Language
Question 9. Question :
Which type of computer program that translates source code of an entire program as a batch into object code which it places into a separate file?
Complier
Database
Interpreter
Operating System
Spreadsheet
Question 10. Question :
Which term refers to any method to confirm a person’s identity based upon something they know, possess, or are?
Authentication Protocol
Authorization Protocol
Electoral College
User ID
Validation Procedure
Question 11. Question :
Under which act are Sarah Palin’s e-mails and the FBI’s file on Roswell made available?
Affordable Health Care Initiative
Freedom of Information Act
No Child Left Behind
Patriot Act
Sarbanes-Oxley Act
Question 12. Question :
The first major role computers played in marketing was to do which of the following?
Creating graphics and typesetting print adds
Customizing mass market form letters
E-commerce web sites
Statistical analysis of surveys and sales data
Video and audio editing of broadcast adds
quiz 2
Which term refers to the case which holds a computer’s main circuit boards, microprocessor, memory, power supply, and storage devices?Bus
Cache
Peripheral Device
Primary Storage
System Unit
Question 2. Question :
Which term refers to the high speed circuitry which connects the processor to the system and transports data to and from the processor?
Arithmetic Logic Unit (ALU)
Cache
Front Side Bus (FSB)
Instruction Pointer (IP)
Registers
Question 3. Question :
A processor with which of the following word sizes would be able to manipulate the largest number of bits at one time?
: 1 bit
8 bit
16 bit
32 bit
64 bit
Question 4. Question :
Which type of storage uses light reflecting areas called lands and non-reflective areas called pits to record data?
Analog Storage
Magnetic Storage
Mechanical Storage
Optical Storage
Solid State Storage
:
Question 5. Question :
Which term refers to the average time it takes a computer to locate data in a storage device, such as a hard disk, and read it?
Access Time
Latency
Seek Time
Transfer Time
Wait State Time
Question 6. Question :
Which event occurs when the read/write head of a hard disk drive mechanically hits the platter and damages some of the data on the disk?
Head Crash
Magnetic Leakage
Magnetic Decay
Platter Skip
Stack Overflow
Question 7. Question :
Which term refers to the number of colors a device can display, typically denoted as the number of bits to represent the color of each pixel?
Color Depth
Dot Pitch
Screen Resolution
Screen Size
Viewing Angle
:
Question 8. Question :
Which general term refers to a small circuit board which plugs into an expansion slot, and gives the computer the ability to control a storage, input, or output device?
Bus
Coprocessor
Ethernet Card
Expansion Card
Modem
Question 9. Question :
Which technology used in display devices/monitors produces an image by filtering light through a matrix of liquid crystal cells?
Cathode Ray Tube (CRT)
Light Emitting Diode (LED)
Liquid Crystal Display (LCD)
Plasma Screen
Question 10. Question :
Which term refers to a small, reinforced, oval shaped hole in a computer case into which you can insert a lock attached to a cable, which can in turn be fastened to a desk to prevent theft?
Anchor Port
Bolt Bracket
Kensington Security Slot
Surge Protector
USB Slot
Question 11. Question :
According to the Environmental Protection Agency (EPA), how much E-waste is discarded each year?
30 Tons
300 Tons
3,000 Tons
3 Million Tons
3 Billion Tons
Question 12. Question :
Which military communications project evolved into the modern Internet?
Area 51
ARPANET
Manhattan Project
Operation Overlord
Project PX
quiz 3
Which type of software alters a devices user interface to aid individuals with physical challenges, by creating as accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text?
Adaptive Utilities
Compilers
Desktop Publishing
Groupware
Spreadsheet
Question 2. Question : Which are the two main classes of software?
Compilers and Utilities
Productivity and Games
System and Application
System and Network
Utilities and Application
Question 3. Question : Which type of application software are Microsoft Excel, Lotus 123, and OpenOffice Calc?
Database
Presentation Software
Spreadsheet
Word Processor
Web Browser
Question 4. Question : In database terminology, which term refers to all of the data for a specific, single entity – a person, place, thing or event?
Database
Field
Form
Query
Record
Question 5. Question : Which term refers to placing a program into a computer so it can be run on?
Downloading
Installation
Jail Breaking
Rooting
Uploading
Question 6. Question : Which type of file is designed to be started by the user or automatically launched by an operating system?
Assembler File
Configuration File
Data File
Executable File (Exe)
Object File
Question 7. Question : Which is the official term for software which has been illegally copied, distributed, or modified?
Cracked Software
Freeware
Highjacked Software
Gasparillaware
Pirated Software
Question 8. Question : Which type of software license allows the software to be used on all computers at a specified location?
Multiple-User License
Shrink Wrap License
Single User License
Site License
Unlimited Local License
Question 9. Question : Which software tool is used to conceal malware and backdoors that have been installed on a computer?
Bot
Rootkit
Virus
Worm
Zombie
Question 10. Question : Which term refers to a file that contains suspicious code, typically resembling a virus signature, which has been encrypted and moved so that it cannot be inadvertently opened or accessed by a hacker?
Bot File
Isolated File
Quarantined File
Root Kit
Secured Threat File
Question 11. Question : According to the textbook, what is the cash value of pirated software to date?
$53 Million
$530 Million
$5.3 Billion
$53 Billion
$530 Billion
Question 12. Question : Which reporter converted an M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom, but died during the conflict?
Arthur Miller
David Bloom
Ethel Gahwhiler
Jeff Raucher
Irving L. Levine
quiz 5
Which term refers to a 32 bit binary number, often written as four groups of decimal numbers separated by commas, which potentially changeable, and is used to identify a network device on the Internet?
DHD Coordinate
IP Address
MAC (Media Access Control) Address
Network Address Translation
IN Uniform Resource Locator
Points Received: 0 of 10
Comments:
Question 2. Question :
Which is the official term for parcels of data which are sent across a computer network and contain some data, the addresses of its sender and destination, and a sequence number?
Data Wave
Encapsulated Posted File
Packet
Pipeline
Transfer Unit
Comments:
Question 3. Question :
Which type of WI-FI configuration allows all devices to broadcast directly to each other?
WIreless Ad Hoc
Wireless Discovery Mode
Wireless Filibuster Mode
Wireless Infrastructure
Wireless Token Ring
Comments:
Question 4. Question :
Which communication media does Blue Tooth use?
Category 5 or 6 Twisted Pair Cable
Infrared Light
Optical Cable
Radio Waves
Visible Light
Question 5. Question :
Which technology makes intercepted WI-FI signals useless to eavesdroppers/interceptors?
Cyclical Redundancy Checks (CRC)
Electronic Countermeasures
Error ing Codes
Firewalls
Wireless Encryption
Question 6. Question :
Which type of network device connects two different types of networks?
Network Collective
Network Gateway
Network Hub
Network Switch
Network Router
Question 7. Question :
In Windows 7, which of the following is a collection of trusted networked computers that automatically share files and folders?
Access group
Collective group
Home group
Trust group
Work group
Comments:
Question 8. Question :
Which term refers to allowing other computers on a LAN to use the printer connected to your workstation?
Collective Printer Access
Printer Deprivatization
Printer Multiplexing
Printer Sharing
Virtual Printers
Comments:
Question 9. Question :
Which size length of cryptographic bit key would require the longest to break?
8 bits
16 bits
64 bits
256 bits
1,024 bits
Comments:
Question 10. Question :
Which is the official term of the encoded text of a message after it has been encrypted?
Cipher text
Clear text
Plaintext
Safetext
Transformed text
Points Received: 0 of 10
Comments:
Question 11. Question :
Which brand of hand held devices was found in 2011 to keep time stamped, triangulated position data, essentially keeping a log of the location of the user carrying them?
Kindle E-Reader
Apple iPad
Apple iPhone
Nook E-Reader
Sportsman’s Diving Watches
Comments:
Question 12. Question :
Which term refers to the use of Internet and Computers to deliver courses when the instructor and student are not in the same physical location?
Computer Aided Instruction (CAI)
Computer Aided Learning (CAL)
Computer Based Training (CBT)
Distance Education/Distance Learning
Learning Management Software (LMS)
Comments:
quiz 6
How many bits are in a current (IPv4) IP address?
2
16
32
128
1,024
Points Received: 10 of 10
Comments:
Question 2. Question :
Which type of Internet Access links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna?
Fixed Access
Integrated Access
Mobil Access
Portable Access
Simplex Access
Points Received: 10 of 10
Comments:
Question 3. Question :
Which type of fixed Internet Connection has the longest latency?
Cable
Dial Up
DSL
ISDN
Satellite
Question 4. Question :
Which type of fixed Internet Connection is NOT always on?
Cable
DSL
ISDN
Satellite
WiMAX
Question 5. Question :
Which level of cell phone service allows users to view simplified versions of some popular web pages, but not the all pages nor full pages?
Analog
1G
2G
Mobile Broadband
WAP
Points Received: 0 of 10
Comments:
Question 6. Question :
Which level of cell phone service is needed to access the full versions of all web pages?
Analog
1G
2G
Mobile Broadband
WAP
Points Received: 10 of 10
Comments:
Question 7. Question :
Which type of application is specifically created to aid with the transfer of large numbers of files by FTP?
Encryption Application
FTP Client
FTP Server
Instant Messenger
Web Browser
Points Received: 10 of 10
Comments:
Question 8. Question :
Which term refers to the concept of using local devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices?
Cloud Computing
Distributed Computing
Net Retrieval
Parallel Processing
Remote Storage
Points Received: 0 of 10
Comments:
Question 9. Question :
Which type of IP Address can be used to route packets on the Internet at large?
General IP Address
Loopback IP Address
Private IP Address
Routable IP Address
Untranslatable IP Address
Question 10. Question :
Which of the following ranges are NOT private IP Addresses?
10.0.0.0 to 10.255.255.255
42.0.0.0 to 42.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Points Received: 10 of 10
Comments:
Question 11. Question :
The government of which country was recently overthrown through the use of Facebook, Twitter, and blogs?
Albania
Canada
Egypt
Mexico
United States
Question 12. Question :
According to the textbook, how much does it cost to purchase, install, and operate an ATM for one year?
$500
$5,000
$50,000
$500,000
$5,000,000
quoz 4
Which term refers to the operating system process and memory management that allows two or more tasks, jobs, or programs to run simultaneously?
Coordinating
Exclusivity
Logistics Control
Mutli-tasking
Non-Conflicting Allocation
Question 2. Question :
Which term refers to the time between when the coputer is first turned on and the time it is ready to accept commands?
Cold Start Process
Boot Up Process
Ignition Process
Start Up Process
Wake Up Cycle
Question 3. Question :
Which operating system was released for free use under a GPL (General Public License) in 1991 and is loosely based upon a UINX derived operating system?
Android OS
DOS (Disk Operating System)
Linux
Mac OS X
Windows 7
Question 4. Question :
Which operating system was specifically designed for the Apple Macintosh line of computers and is based on the UNIX operating system?
Android OS
DOS (Disk Operating System)
Linux
Mac OS X
Windows 7
Question 5. Question :
Which term refers to the suffix at the end of a file name, following the period, which is normally used to specify the file type, in Windows?
File Class
File Extension
File Identifier
File Suffix
File Tag
Question 6. Question :
Which term refers to the top level directory on a disk or drive, such as “C:\” or “E:\” ?
Drive Directory
Mother Directory
Root Directory
Super Directory
Tree Directory
Question 7. Question :
Which technique for writing an optical disc such as a CD, DVD, or BD, allow recording to be done in multiple sessions?
Disc Mastering
Incremental Burning
Packet Writing
Disc Ripping
Stamping
Question 8. Question :
Which type utility software protects confidentiality by overwriting supposed empty disk sectors from deleted files with random 0’s and 1’s.?
Backup Utility
Disk Defragmenter
File Shredder Software
File Sector Editor
Net Nanny
Question 9. Question :
Which type of backup makes a fresh copy of all files specified to be backed up?
Differential Backup
Full Backup
Incremental Backup
Restore Disk
Restore Point
Question 10. Question :
Which term refers to a bit-by-bit copy of all data from all sectors of a hard disk?
Disk Image
Full Backup
Incremental Backup
Restore Disk
Restore Point
Question 11. Question :
Robert Morris, who released a worn which brought down the ARPANET in 1988, received which sentence for this crime?
None
400 hours of community service and $10,000 fine
5 years probation and $10,000 fine
10 years in prison
15 years to life in prison
:
Question 12. Question :
Which term refers to an irresistible or web site containing fake information that allows investigators to monitor hackers until identification is possible?
Bait
Bear Trap
Fly Trap
Honey Pot
Siren
quiz 7
iven the URL, http://www.miskatonic.edu/classics/main.html, which of the following is the file name with extension?
/classics/
html
http://
main.html
www.miskatonic.edu
Question 2. Question :
Web pages are text files, formatted using a standard set of tags called which of the following?
FTP
HTML
INTP
LaTex
WWW
Question 3. Question :
Which component of a search engine pulls keywords from web pages and stores then in the database?
Comparator
Database
Search Engine Indexer
Query Processor
Web Crawler
Comments:
Question 4. Question :
Which term refers to a rating of a web page based on the quality and quantity of links it contains?
Anchor Weight
Gunning Fog Index
Link Popularity
Link Power Score
IN Link Quality Index
Comments:
Question 5. Question :
Which type of e-commerce business model is Amazon dot Com?
B2B (Business to Business)
B2C (Business to Consumer)
B2G (Business to Government)
C2C (Consumer to Consumer)
G2C (Government to Consumer)
Comments:
Question 6. Question :
Which type of e-commerce business model are Craigslist dot Com and Ebay dot Com?
B2B (Business to Business)
B2C (Business to Consumer)
B2G (Business to Government)
C2C (Consumer to Consumer)
G2C (Government to Consumer)
Comments:
Question 7. Question :
Which process converts binary files, such as digital photos and sound files, into ASCII code based text which can be sent as an e-mail attachment and travel over the Internet with text based data?
ASCII Encoding
B2A Conversion
Multi-Purpose Internet Mail Extensions (MIME)
Text Representing Binary Data (TRBD)
ZA Encoding
Comments:
Question 8. Question :
Which term refers to e-mail which contains HTML tags to format the text with fonts, colors, and effects and embed graphics?
ASCII Mail
Extended Format Mail
HTML Mail
XML Mail
Web Mail
Comments:
Question 9. Question :
Which type of cookie tracks a user’s browsing pattern and uses it to pick targeted, custom advertisements?
Ad Serving Cookie
Bread Crumb
Chart Cookie
Tolle Haus Cookie
Web Bug
Comments:
Question 10. Question :
Which type of computer crime is the “Nigerian political refugee letter”?
Ad Serving Cookie
Pharming
Phishing
Spam
Web Bug
Comments:
Question 11. Question :
Which event has been cited to justify the erosion Fourth Amendment rights mandating judicial oversight for law enforcement to access for email or place wiretraps?
Iran Contra Affair
Roswell Incident
Teapot Dome Scandal
Terrorist Attacks of September 11, 2001
Watergate Scandal
Comments:
Question 12. Question :
How many bits of data may an RFID tag contain?
1 to 4 bits
4 to 8 bits
8 to 32 bits
64 to 128 bits
256 to 1,024 bits
Comments:
quiz 8
Which sound file format is used on commercially produced audio CDs?
AAC
CDDA
IN MP3
Ogg Vorbis
WAV
Comments:
Question 2. Question :
Which term specifically refers to online audio that plays as the file downloads?
IN Advanced Audio Coding
CDDA
Compressed Audio
Podcast Audio
Streaming Audio
Comments:
Question 3. Question :
Which is the official term that refers to an individual cell of an image on a display surface?
Datum
Dot
Element
Pixel
Point
Points Received: 10 of 10
Comments:
Question 4. Question :
Which is the official term for a type of bitmap which stores only one bit per pixel?
Binary
Monochrome
Polar
Simple
True Color
:
Question 5. Question :
Which of the following is NOT drawing software (which is application software intended for creating vector graphics)?
Adobe Illustrator
Adobe Photoshop
Corel Designer
InkScape
Open Office Draw
Question 6. Question :
Which type of software converts a bitmap into a vector graphics file?
Filtering Software
Melding Software
Rasterizing Software
Rendering Software
Tracing Software
:
Question 7. Question :
Which term refers to the general process of converting digital video from one format to another?
Adaptive Filtering
Barrier Synchronizing
Compression
Synchronizing
Transcoding
Question 8. Question :
Which digital video file format is native for DVD players?
ASF
BDMV
FLV
IN MOV
VOB
Question 9. Question :
Which DRM (Digital Rights Management) technology includes a code number to specify a region of the world in which DVD players, may play which discs?
Broadcast Flag
IN Copy Generation Management
CSS (Content Scramble System)
FairPlay
HDCP (High-bandwidth Digital Content Protection
Question 10. Question :
Which term refers to a collection of technologies used by copyright holders to limit access to and use of digital content?
Authentication and Authorization
Copyright Enforcement Technology (CET)
Confidentiality, Integrity, and Accessibility (CIA) Criteria
Digital Rights Management (DRM)
Secure Digital Vaults (SDV)
:
Question 11. Question :
Which law makes it illegal to circumvent any technological measure that controls access to a work?
Antitrust Act of 1923
Digital Millennium Copyright Act
Forth Amendment to the U.S. Constitution
Patriot Act of 2001
Piracy Act of 1820
Question 12. Question :
Which computer program was used to render the over two million blue hairs on the character Sully in the 2002 film, Monsters Inc.?
Bullet Time
Fizt
Houdini
MASSIVE
Renderman