Unit 2 Assignment 2: Computer Basics Review

In: Computers and Technology

Submitted By bre110594
Words 669
Pages 3
Unit 2 Assignment 2: Computer Basics Review
Multiple-choice questions
1. C. Datacom
2. B. Bob’s incoming email server
3. B. The call uses only digital electrical signals. D. The call represents short sounds as a unique set of bits.

4. C. The call uses both analog and digital electrical signals D. The call represents short sounds as a unique set of bits. 5. A. A character set
6. D. Compress the video
7. C. books
8. C. The web server sees the request for the web address, dynamically creates a single graphical image of the entire web page, and sends that one graphical image to the web browser.

9. A. A website typically contains many web objects. C. A web page typically contains many web objects. D. A website typically contains many web pages.

10. C. The operating system on the PC D. The PC's NIC

11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages

12. C. Web servers D. The GET request

13. B. www.certskills.com

14. C. Node

15. A. Router D. Switch

16. D. SMB network

17. D. Switch

18. D. The Internet

19. A. Internet service provider

20. B. Any ISP's network

Define the Key Terms

Computer networking: The gerund form of the term computer network.

Computer network: A combination of many components that work together so that many different devices can communicate.

Application: Generally, a function of any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for a user.

Email: Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address.

Voice…...

Similar Documents

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Unit 2 Assignment 2: Computer Basics Review

...Tiffany Ostarly NT1210 Introduction to Networking Unit 2 Assignment 2: Computer Basics Review Chapter Review 1. A,C | 2. B | 3. C,D | 4. C,D | 5. D | 6. D | 7. B | 8. B | 9. A,C,D | 10. B,D | 11. D | 12. A,C | 13. C | 14. A | 15. A,D | 16. C,D | 17. D | 18. C | 19. A | 20. D | Key Terms Computer networking – the gerund form of the term computer network. Computer network – a combination of many components that work together so that many different devices can communicate. Application – a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for the user. Email – electronic mail. An application in which the user can type text and attach other files to create an electronic equivalent of a postal letter, and send the email to another person using his email address. Voice call – a more modern term for a telephone call that does not use the word telephone, instead emphasizing the fact that the traffic that flows between the end points is voice. Video frame – a grid of pixel locations of a chosen width by height that contains the lights/colors to be shown in a video at a single point in time. Web server – software that stores web pages and web objects, listens for requests for those pages, and sends the contents of those pages/objects to clients...

Words: 598 - Pages: 3

Unit 2 Assignment 2

...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new......

Words: 427 - Pages: 2

Unit 5 Assignment 2

...IS3340-WINDOWS SECURITY | Security Audit Procedure Guide | Unit 5 Assignment 3 | | [Type the author name] | 5/1/2014 | | This document outlines the required steps to follow, inorder to properly scan the necessary hardware (servers and workstations) in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check for Windows......

Words: 487 - Pages: 2

Unit 1 Assignment 1-Computer Basic Review

...1. Which of the following is true about 1 bit? c. Represents one binary digit. 2. Which of the following terms means approximately 106 bytes? d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? a. Used for short-term memory e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. A user has opened a word processor, types the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report? c. Character set 7. A user has opened a calculator application, typed 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer stored in RAM to represent the number 123456789? d. The binary equivalent of decimal 123456789 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? a. An actuator arm 9. A student writes a report using a word processor, saving the report...

Words: 904 - Pages: 4

Unit 2 Assignment 1

...Unit 2 Assignment 1: Strengths and Challenges Reflection Letter Course Objectives and Learning Outcomes Define terms and concepts related to strategies for technical professionals. Communicate information using Microsoft Office productivity tools and email. Assignment Requirements This assignment coordinates with Unit 2 Lab 1: Introductory Word Lab. Create and send a letter to your instructor executed in MS Word that discusses your questions, concerns, and what you look forward to in Strategies for the Technical Professional. As a part of your letter, make an assessment of your strengths, such as the skills and experience you bring to the class. Also discuss your challenges, perhaps your circumstances, habits, or past academic history, as well as the parts of the curriculum that may be new to you, may not appear as relevant to your goals and objectives, or may be difficult for you to learn and apply. Required Resources Computer with Internet access and MS Word installed. Submission Requirements Your letter should meet the following specifications: Orientation: Portrait Font: 12-point Times New Roman or 10-point Arial Spacing: Double spaced Margins: Normal, Narrow, or Moderate Length: Two to five paragraphs Header: Right justified, including your name, the course number, day, and time Text format: Body of letter left justified Salutation: Appropriate greeting to open letter Closing: Appropriate sign-off and full name as......

Words: 1181 - Pages: 5

Nt1210 Unit 2 Assignment 2

...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic......

Words: 483 - Pages: 2

Composition 2 Unit 2 Assignment 1: Chapter Review and Trace

...Unit 2 Assignment 1: Chapter Review and TRACE 1. The five elements in the rhetorical situation are text, reader, author, constraints, and exigence. 2. A reader can use the rhetorical situation to analyze an argument essay by analyzing what the author is arguing about and who his target readers are. A viewer can use the rhetorical situation to analyze an image by first analyzing what the image’s meaning is, and who the targeted viewer is. A writer can use the rhetorical situation during the planning phase of writing a paper by deciding who is target readers will be and the position it may take on the topic. 3. The audience is important in argument because without the audience you have no argument. The different positions that the audience might initially hold are a friendly, an undecided, a neutral, a resistant, an unfamiliar, or a linked audience. There are multiple outcomes that are associated with arguments directed to each of these audiences, these outcomes include, a bias, they may oppose your argument, or they may agree with your argument. 4. Discourse communities are defined as groups that are involved in and communicating about a particular topic, or issue. The reason a discourse community is helpful to establish common ground for its members is because they share a set of basic values and assumptions. 5. A universal audience is an imagined audience that serves as an ethical and argumentative test for the rhetor. A universal audience is a useful......

Words: 254 - Pages: 2

Unit 2 Assignment 2 Computer Basics Review

...Chapter Review Activities Chapter Review 1. A, C 2. B 3. C,D 4. C,D 5. D 6. D 7. B 8. B 9. A,C,D 10. B,D 11. D 12. A,C 13. C 14. A 15. A,D 16. C,D 17. D 18. C 19. A 20. D Key Terms Computer networking – the gerund form of the term computer network. Computer network – a combination of many components that work together so that many different devices can communicate. Application – a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for the user. Email – electronic mail. An application in which the user can type text and attach other files to create an electronic equivalent of a postal letter, and send the email to another person using his email address. Voice call – a more modern term for a telephone call that does not use the word telephone, instead emphasizing the fact that the traffic that flows between the end points is voice. Video frame – a grid of pixel locations of a chosen width by height that contains the lights/colors to be shown in a video at a single point in time. Web server – software that stores web pages and web objects, listens for requests for those pages, and sends the contents of those pages/objects to clients. This term refers to both the software and hardware on which it executes. Web browser – software controlled directly by a user that......

Words: 588 - Pages: 3

Unit 2 Computer Shopper

...04-02-2015 Unit 2 Analysis 1: Computer Shopper We were required to find four different computers that had different hard drive capacities, amounts of RAM, and processors speeds with 2 being desktops and 2 being laptops. Computer | Hard Drive | Processor Speed | RAM | Price | Lenovo - 15.6" Laptop | 500 GB | 2 GHz | 6 GB | $329.99 | Panasonic - Toughbook 53 | 500 GB | 2.7 GHz | 4 GB | $1,582.99 | Asus – Desktop Model: G20AJ-B09 | 2 TB | 3.6 GHz | 16 GB | $1,299.99 | Acer - Aspire TC Series Desktop | 1 TB | 3.1 GHz | 8 GB | $593.99 | (www.bestbuy.com) With the computers selected the 3 professions that I think could use these computers are Cable Technician, Accountant, and a Graphics Designer. For the Cable Technician the computer I chose for that profession would be the Panasonic Toughbook 53. This computer is tough enough to be put in the field. With having to take it into customer’s homes if it were to be dropped it could withstand the impact. With the size of hard drive, RAM, and speed it could run programs to access customer info and company records. For the Accountant I chose the Acer Aspire TC Series. With RAM, and speed of this computer an accountant could run programs to calculate figures for his or her clients. The hard drive is sufficient to be able to store a lot of spreadsheets and graphs. For the Graphic Designer I chose the Asus G20AJ-B09. With the amount of information, size of programs, and the data used for this profession this computer has......

Words: 275 - Pages: 2

Unit 2: Computer Shopper

...Computer Shopper Dell Inspiron Desktop Processor - 4th Generation Intel® Core™ i3-4170 Processor (3M Cache, 3.70 GHz) Operating System - Windows 10 Home 64-bit English Memory - 8GB Dual Channel DDR3 1600MHz (4GBx2) Hard Drive - 1TB 7200 rpm Hard Drive Video Card - Intel® HD Graphics Power Supply – 300w Price - $429.99 This Desktop would be most suitable for an educator, as all they will need is enough processing power and memory to run their various teaching programs. They just need basic graphics to show videos and presentations. Asus ROG G20BM Desktop Processor - AMD® A- series Accelerated A10 Processor Operation System – Windows 8.1 64-bit Graphics Card - AMD® Radeon R9 255 2GB Memory - 2 x SO-DIMM 4 GB Up to 16 GB Hard Drive - 2.5" Up to 256GB SSD, 3.5" Up to 3TB Hard Drive Price - $849.99 This Desktop will be better for a game designer who is going to need a lot of processing power and a huge graphics card. This computer will be perfect for rendering and running those heavy gaming applications. Dell XPS 15 Notebook Processor - 4th Generation Intel® Core™ i5-4200H Processor (3M Cache, up to 3.40 GHz) Operation System - Windows 8.1 (64Bit) English Memory - 8GB DDR3L 1600MHz (4GBx2) Hard drive - 1TB 5400 rpm SATA Hard Drive + 32GB mSATA Solid State Drive Video Card - Intel® HD Graphics 4600 Display - 15.6 inch LED Backlit Touch Display with Truelife and FHD resolution (1920 x 1080) Price - $1599.99 This Notebook is going to be most...

Words: 386 - Pages: 2

Auditing Unit 2 Assignment

...Unit 2 Assignment 1-38 A. The value of an audit to investors is critical because it allows them to assess performance, which in turn allows them to vote on organizational matters such as a board of directors. It also helps them make decisions on whether or not to buy or sell stock. As for creditors, an audit report serves a basis for realizing performance. With this they are able to make loan decisions and analyze risk. As far as the community as a whole, an audit reports shows true performance and therefore helps others understand its ability for future growth. With that being said, people have a chance to make investment decisions for the future. B. An audit of internal control is vital for the investing public because it assures them that there is no corruption and that their money is safer. Before 2002 auditors weren’t required to test internal controls, which lead to huge controversy over the collapse of several big time companies. Now, auditors serve somewhat as investigators to make sure internal controls are correctly doing their job. It is also management’s responsibility to assess and report the quality of its internal controls over financial reporting. C. An audit committee is responsible for hiring and firing an audit firm. The audit committee is established by a company as an independent subcommittee under the board of directors to provide oversight for audit functions. Because this committee is independent, it reduces any possible risk of bias when......

Words: 1481 - Pages: 6

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17

Unit 2 Assignment 2

...Unit 2 Assign.2 Last 5 Published or Updated Security Advisories: Microsoft Security Advisory (2737111) Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution Published or Last Updated: Wednesday, July 25, 2012 Microsoft Security Advisory (2728973) Unauthorized Digital Certificates Could Allow Spoofing Published or Last Updated: Wednesday, July 11, 2012 Microsoft Security Advisory (2719662) Vulnerabilities in Gadgets Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2719615) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2491888) Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of Privilege Tuesday, March 08, 2011 2. Do any vulnerability involve privilege elevation? Is this considered a high priority issue? Yes one, but its importance was not considered a high priority issue as asked 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.......

Words: 337 - Pages: 2