98%(83)81 out of 83 people found this document helpful
This preview shows page 1 - 4 out of 20 pages.
The standard interface technology for wireless networks is __________. The hardware component necessary for computers to connect to these networks is a __________.transmission control protocol; IPwireless-internet protocol; TCPwireless-defined networking; WAPwireless fidelity; WAP2While Kari was searching the Internet, her computer was infected by a virus. What problem can Kari expect as a result?The code will install software that looks useful but compromises her system's security.A toolbar will be installed that redirects her Web browser to pirated sites.Her keystrokes will be recorded and used by hackers to steal her personal and financial information.The virus will attach itself to the computer's RAM, then attach itself to executable files in RAM.3Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate.During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen hewould address her concern with their supervisor. When Victor met privately
with his supervisor, he claimed that he had discovered the problem, and thatEllen had dismissed it.Which principle of the Software Engineering Code of Ethics has Victor violated?Principle 8: SelfPrinciple 7: ColleaguesPrinciple 3: ProductPrinciple 6: Profession4Select the true statement about COPPA.The COPPA regulations state that websites may not collect information from minors under the age of 13.The COPPA regulations apply to websites that collect information from children.The COPPA regulations require that parents of children under the age of 13 be given instructions on how to maintain privacy.The COPPA regulations restrict a child's access to harmful content.-Protecting Minors from Online Dangers5Select the sign of computer addiction that indicates a lack of control.While driving his car, Mitch rear-ended another car when he was checking his social media account.
After moving to a new town, Sal spends most of his time online to keep his mind off the friends he misses.Ever since his mother died, Charlie stays up late every night playing an online game.Even though she knows that she should, Jacqueline cannot stop playing her favorite online game.Computer Addiction6Kirby visited a sweepstakes website and agreed to download a new program.Later, when he tried to use a word processing program, his document files became corrupted.How can Kirby try to remove the offending program and prevent future attacks?Kirby should runan antivirus program.Kirby should install a biometric reader.Kirby should use WPA network encryption.