Question

In: Computer Science

Question 1 ​1. Text messages were first made available to cell phone users with the advent...

Question 1

  1. ​1. Text messages were first made available to cell phone users with the advent of ____ technology.

    a.

    ​3G

    b.

    ​1G

    c.

    ​2.5G

    d.

    ​2G

1 points

Question 2

  1. ​A Bluetooth-enabled smartphone will also be compatible with a Bluetooth-enabled ____.

    a.

    ​notebook computer

    b.

    ​printer

    c.

    ​car

    d.

    ​all of the above

1 points

Question 3

  1. ​A MAC address contains ____.

    a.

    ​only symbols

    b.

    ​digits and letters

    c.

    ​only digits

    d.

    ​only letters

1 points

Question 4

  1. ​A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.

    a.

    ​man-on-the-moon

    b.

    ​gotcha

    c.

    ​football-interception

    d.

    ​man-in-the-middle

1 points

Question 5

  1. ​A ____ is a webpage you access with your website’s user name and password, and includes all the tools you need to access and manage your website.

    a.

    ​file transfer protocol

    b.

    ​site traffic report

    c.

    ​backend database

    d.

    ​control panel

1 points

Question 6

  1. ​A ____ language is a general term that indicates the separation of the formatting of a document and the content of a document.

    a.

    ​content

    b.

    ​WYSIWYG

    c.

    ​markup

    d.

    ​web

1 points

Question 7

  1. ​A ____ server hosts only one site.

    a.

    ​shared

    b.

    ​dedicated

    c.

    ​both a. and b.

    d.

    ​none of the above

1 points

Question 8

  1. ​A bulleted list is also known as a(n) ____ list.

    a.

    ​unordered

    b.

    ​ordered

    c.

    ​definition

    d.

    ​numbered

1 points

Question 9

  1. ​A collection of devices connected via Bluetooth technology is called a(n) ____.

    a.

    ​wireless mesh

    b.

    ​IrDA-net

    c.

    ​bundle

    d.

    ​piconet

1 points

Question 10

  1. ​A comment tag begins with the characters ____.

    a.

    ​<!--

    b.

    ​<-<-

    c.

    ​<<--

    d.

    ​<-!-

1 points

Question 11

  1. ​A commonly used option for making filenames easier to read is to separate words with the ____ character.

    a.

    ​_

    b.

    ​˜

    c.

    ​!

    d.

    ​*

1 points

Question 12

  1. ​A numbered list is also known as a(n) ____ list.

    a.

    ​unordered

    b.

    ​ordered

    c.

    ​bulleted

    d.

    ​definition

1 points

Question 13

  1. ​A web hosting service might offer additional services such as _____.

    a.

    ​all of the above

    b.

    ​website templates

    c.

    ​site statistics

    d.

    ​email accounts

1 points

Question 14

  1. ​A wireless router broadcasts its SSID as a means of identifying the network’s ____.

    a.

    ​signal strength

    b.

    ​level of activity

    c.

    ​name

    d.

    ​security clearance

1 points

Question 15

  1. ​A(n) ____ server encrypts data, which prevents unauthorized parties from being able to read or use it.

    a.

    ​open-source

    b.

    ​dedicated

    c.

    ​shared

    d.

    ​secure

1 points

Question 16

  1. ​All devices that connect to the wireless network must use the _____.

    a.

    ​SSID

    b.

    default settings

    c.

    manufacturer-assigned passphrase

    d.

    same MAC address

1 points

Question 17

  1. ​All of the following are types of web servers EXCEPT:

    a.

    ​secure server

    b.

    ​optimized server

    c.

    ​shared server

    d.

    ​dedicated server

1 points

Question 18

  1. ​An HTML document uses the ____ tag to create the various inputs on a form.

    a.

    ​<form />

    b.

    ​<p />

    c.

    ​<input />

    d.

    ​<a href>

1 points

Question 19

  1. ​An SSID may contain up to ____ alphanumeric characters.

    a.

    ​16

    b.

    ​32

    c.

    ​64

    d.

    ​8

1 points

Question 20

  1. ​Bluetooth standards and licensing for all Bluetooth products is officially overseen by ____.

    a.

    ​Bluetooth SIG

    b.

    ​Intel

    c.

    ​Ericsson

    d.

    ​Lexus

Solutions

Expert Solution

Question 1

​1. Text messages were first made available to cell phone users with the advent of ____ technology.
d.      
​2G

Question 2
​A Bluetooth-enabled smartphone will also be compatible with a Bluetooth-enabled ____.
d.      
​all of the above


Question 3
​A MAC address contains ____.
b.      
​digits and letters


Question 4
​A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.
d.      
​man-in-the-middle


Question 5
​A ____ is a webpage you access with your website’s user name and password, and includes all the tools you need to access and manage your website.
d.      
​control panel


Question 6
​A ____ language is a general term that indicates the separation of the formatting of a document and the content of a document.
c.      
​markup


Question 7
​A ____ server hosts only one site.
b.      
​dedicated


Question 8
​A bulleted list is also known as a(n) ____ list.
a.      
​unordered


Question 9
​A collection of devices connected via Bluetooth technology is called a(n) ____.
d.      
​piconet


Question 10
​A comment tag begins with the characters ____.
a.      
​<!--


Question 11
​A commonly used option for making filenames easier to read is to separate words with the ____ character.
a.      
​_


Question 12
​A numbered list is also known as a(n) ____ list.
b.      
​ordered

Question 13
​A web hosting service might offer additional services such as _____.
a.      
​all of the above


Question 14
​A wireless router broadcasts its SSID as a means of identifying the network’s ____.
c.      
​name


Question 15
​A(n) ____ server encrypts data, which prevents unauthorized parties from being able to read or use it.
d.      
​secure


Question 16
​All devices that connect to the wireless network must use the _____.
a.      
​SSID

Question 17
​All of the following are types of web servers EXCEPT:
b.      
​optimized server

Question 18
​An HTML document uses the ____ tag to create the various inputs on a form.
c.      
​<input />


Question 19
​An SSID may contain up to ____ alphanumeric characters.
b.      
​32


Question 20
​Bluetooth standards and licensing for all Bluetooth products is officially overseen by ____.
a.      
​Bluetooth SIG
**************************************************

Thanks for your question. We try our best to help you with detailed answers, But in any case, if you need any modification or have a query/issue with respect to above answer, Please ask that in the comment section. We will surely try to address your query ASAP and resolve the issue.

Please consider providing a thumbs up to this question if it helps you. by Doing that, You will help other students, who are facing similar issue.


Related Solutions

QUESTION 7 In a study of 420,095 Danish cell phone users, 135 subjects developed cancer of...
QUESTION 7 In a study of 420,095 Danish cell phone users, 135 subjects developed cancer of the brain or nervous system (based on data from the Journal of the National Cancer Institute as reported by US Today). The claim is that cell phone users develop cancer of the brain or nervous system at a rate that is greater than the rate of 0.034% (0.00034) for people that do not use cell phones. Use this information to answer this question and...
Can someone show me how to do this on excel? Question involves cell phone users. Mean...
Can someone show me how to do this on excel? Question involves cell phone users. Mean monthly data usage = 5.8 GB/month StDev monthly data usage = 2.5 GB/month "Heavy users" are those that use >= 9 GB/month a.) What is the probability a "heavy user" uses more than 10 GB/month? b.) Two users are selected at random. What is the probability at least one of them is a heavy user? c.) Five users are selected at random. What is...
Question 6 (1 point) The number of text messages sent by a random sample of students...
Question 6 (1 point) The number of text messages sent by a random sample of students at a local university was collected and the following histogram was created: Which of the following statements is likely true: Question 6 options: The distribution of number of text messages sent is approximately symmetric, so the mean is approximately the same as the median. The distribution of number of text messages sent is skewed to the left, so the mean is likely less than...
A study of 420,042 cell phone users found that 130 of them developed cancer of the...
A study of 420,042 cell phone users found that 130 of them developed cancer of the brain or nervous system. Prior to this study of cell phone​ use, the rate of such cancer was found to be 0.0323​% for those not using cell phones. Complete parts​ (a) and​ (b). a. Use the sample data to construct a 95​% confidence interval estimate of the percentage of cell phone users who develop cancer of the brain or nervous system. a. __% <...
In a study of 420,087 cell phone users, 108 subjects developed cancer of the brain or...
In a study of 420,087 cell phone users, 108 subjects developed cancer of the brain or nervous system. Test the claim of a somewhat common belief that such cancers are affected by cell phone use. That is, test the claim that cell phone users develop cancer of the brain or nervous system at a rate that is different from the rate of 0.0340% for people who do not use cell phones. Because this issue has such great importance, use a...
A study of 420,040 cell phone users found that 133 of them developed cancer of the...
A study of 420,040 cell phone users found that 133 of them developed cancer of the brain or nervous system. Prior to this study of cell phone​ use, the rate of such cancer was found to be 0.0337​% for those not using cell phones. Complete parts​ (a) and​ (b). a. Use the sample data to construct a 95​% confidence interval estimate of the percentage of cell phone users who develop cancer of the brain or nervous system. ​(Round to three...
In a study of 420,009 cell phone users found that 139 of them developed cancer of...
In a study of 420,009 cell phone users found that 139 of them developed cancer of the brain or nervous system. Prior to this study of cell phone​ use, the rate of such cancer was found to be 0.0439% for those not using cell phones. Complete parts​ (a) and​ (b). a. Use the sample data to construct a 95​% confidence interval estimate of the percentage of cell phone users who develop cancer of the brain or nervous system. ​% <...
A study of 420,026 cell phone users found that 138 of them developed cancer of the...
A study of 420,026 cell phone users found that 138 of them developed cancer of the brain or nervous system. Prior to this study of cell phone use, the rate of such cancer was found to be 0.0411% for those not using cell phones. The data are from the Journal of the National Cancer Institute. a. Use the sample data to construct a 95% confidence interval estimate of the percentage of cell phone users who develop cancer of the brain...
A study showed that 15 of 30 cell phone users with a headset missed their exit,...
A study showed that 15 of 30 cell phone users with a headset missed their exit, compared with 3 of 30 talking to a passenger. Construct a 90 percent confidence interval for the difference in proportions. (Round your answers to 4 decimal places. A negative value should be indicated by a minus sign.) The 90 percent confidence interval is from ___ to ___ .
In a study of 420,122 cell phone​ users, 103 subjects developed cancer of the brain or...
In a study of 420,122 cell phone​ users, 103 subjects developed cancer of the brain or nervous system. Test the claim of a somewhat common belief that such cancers are affected by cell phone use. That​ is, test the claim that cell phone users develop cancer of the brain or nervous system at a rate that is different from the rate of​ 0.0340% for people who do not use cell phones. Because this issue has such great​ importance, use a...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT