sophia milestone.docx - You passed this Milestone 15...

This preview shows page 1 - 3 out of 10 pages.

You passed this Milestone15questions were answeredcorrectly.1Select the true statement about network protocols.Using a protocol other than TCP/IP can result in data loss.Communication cannot take place unless the protocol is executed in the sameway on all devices.One function of a protocol is to decompress data when it is delivered to thereceiving computer.Computers that are distributed across a large geographic area need a specialprotocol to resolve errors.RATIONALEA protocol is a system of rules that enables two or more entities (computer devices) in acommunications system to send and receive information. Communication cannot takeplace unless the protocol is executed in exactly the same way on all devices.CONCEPTIntroduction to Computer Networks2Kirby visited a sweepstakes website and agreed to download a new program.Later, when he tried to use a word processing program, his document filesbecame corrupted.How can Kirby try to remove the offending program and preventfuture attacks?Kirby should change the password on his computer.Kirby should run an antivirus program.Kirby should install a biometric reader.
Kirby should use WPA network encryption.RATIONALEKirby should try to remove the offending program by running an antivirus program. Tosolve problems resulting from Kirby's risky online behavior, his computer should bescanned to locate and eliminate viruses, malware, and spyware.CONCEPTNetwork Security3Select the true statement about COPPA.The COPPA regulations restrict a child's access to harmful content.The COPPA regulations apply to websites that collect information from children.The COPPA regulations state that websites may not collect information fromminors under the age of 13.The COPPA regulations require that parents of children under the age of 13 begiven instructions on how to maintain privacy.RATIONALEThe Children's Online Privacy Protection Act (COPPA) manages regulations that applyto websites which collect information from children. The Act establishes criteria to beused to determine whether a website or online service is directed at children. Theseinclude the following: the subject matter of the site or service, its visual content, the useof animated characters or child-oriented activities and incentives, music or other audiocontent, the age of models, the presence of child celebrities or celebrities who appeal tochildren, language or other characteristics of the website or online service, and whetheradvertising promoting or appearing on the website or online service is directed atchildren.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 10 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A
Tags
Computer Networks, Computer network

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture