Unit 3 - Milestone 3.docx - The standard interface...

This preview shows page 1 - 4 out of 20 pages.

The preview shows page 2 - 4 out of 20 pages.
The standard interface technology for wireless networks is__________. The hardware component necessary for computers toconnect to these networks is a __________.transmission control protocol; IPwireless-internet protocol; TCPwireless-defined networking; WAPwireless fidelity; WAP2While Kari was searching the Internet, her computer was infected by a virus.What problem can Kari expect as a result?The code will install software that looks useful but compromises her system's security.A toolbar will be installed that redirects her Web browser to pirated sites.Her keystrokes will be recorded and used by hackers to steal her personal and financialinformation.The virus will attach itself to the computer's RAM, then attach itself to executable files inRAM.3Victor and Ellen are software engineers working on a popular mobile app.Victor has been in his position for 10 years longer than Ellen, who is a recentgraduate.During the development of a new feature, Ellen expressed her concern thatVIctor's proposed code would create instability in the app. Victor told Ellen hewould address her concern with their supervisor. When Victor met privately
with his supervisor, he claimed that he had discovered the problem, and thatEllen had dismissed it.Which principle of the Software Engineering Code of Ethicshas Victor violated?Principle 8: SelfPrinciple 7: ColleaguesPrinciple 3: ProductPrinciple 6: Profession4Select the true statement about COPPA.The COPPA regulations state that websites may not collect information from minorsunder the age of 13.The COPPA regulations apply to websites that collect information from children.The COPPA regulations require that parents of children under the age of 13 be giveninstructions on how to maintain privacy.The COPPA regulations restrict a child's access to harmful content.-Protecting Minors from Online Dangers5Select the sign of computer addiction that indicates a lack ofcontrol.While driving his car, Mitch rear-ended another car when he was checking his socialmedia account.
After moving to a new town, Sal spends most of his time online to keep his mind off thefriends he misses.Ever since his mother died, Charlie stays up late every night playing an online game.Even though she knows that she should, Jacqueline cannot stop playing her favoriteonline game.Computer Addiction6Kirby visited a sweepstakes website and agreed to download a new program.Later, when he tried to use a word processing program, his document filesbecame corrupted.How can Kirby try to remove the offending program and preventfuture attacks?Kirby should runan antivirus program.Kirby should install a biometric reader.Kirby should use WPA network encryption.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 20 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
Computer network

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture