Details of this Paper

saint com203 all quizes, modules assignments,Multimedia Project,Globalization Project,Critical Thinking Project




Question;Chapter 1, Multimedia Project;Screenshots can be useful tools for learning, documentation, and troubleshooting. Any time you need to show someone what?s displayed on your computer screen, you can press the Print Screen (PrtScr) key, which stores a copy of the screen into memory. On a Mac, hold down the Command (Apple) key while you press the Shift key and the 3 key. From there, you can paste the screenshot into a document you?re creating with a word processor. You can also paste it into a graphics program, such as Microsoft Paint, and then edit it. For this project, take a screenshot and paste it into a Word document. Under the screenshot, enter a description of the software and the purpose of the screen you captured.;Throughout this class, you will complete a number of Hands-On Projects which will serve to reinforce the ideas of the module. Since doing is learning, these will include such activities as creating a spreadsheet to investigate character codes and binary numbers, creating a simple HTML document using Notepad and Paint, using Trace-route to investigate local Internet topology, and creating a digital media files. A PDF containing the requirements for this assignment can be found in Doc Sharing.;During this module, you will complete the following project;? Excel Binary Numbers - Learn to manipulate binary numbers and investigate ASCII codes using functions built into Microsoft Excel?;Submit this assignment to the Dropboxno later than;modul 2;Chapter 2, Resume Builder Project;Use the Web and other resources to learn about the computers and other digital technologies used in your career field or a profession of interest to you. Develop the information you find into a format similar to the Technology in Context section of each chapter in the textbook. Make sure you select two photos to accompany your narrative and include a list of relevant Web links to additional resources.;Chapter 2, Critical Thinking Project;Steve Jobs, co-founder of Apple Inc., coined the idea that computers should be consumer appliances like toasters that could be set up easily, used by anyone, and ?democratically priced? so they are affordable to everyone. An opposing philosophy, championed by many PC owners, is that computers should be flexible modular systems that can be easily customized, upgraded, and modified by anyone with a moderate degree of technical savvy. Which philosophy do you personally prefer? What do you think is the preference of the majority of computer shoppers? If you were a computer designer, how would you provide your customers with flexibility while making it approachable for non-techies? Incorporate your ideas in a one-page paper you will submit to the appropriate Dropbox basket.;mod 3;Create a proposal document and annotated bibliography (at least four references) for your Term Paper. Please see the Term Paper guideline document and sample proposal document in Doc Sharing. Model your proposal using those documents;Have you heard about the ?24-hour rule? for software that says you can legally use any software for free for 24 hours without paying for it? How about your right to use so-called abandoned software that?s no longer supported or that was created by a company now out of business? Both the 24-hour rule and the concept of abandoned software are urban legends and have no basis in copyright law. Does it seem to you that most people don?t have the facts about copyrights? How strong a factor is that in the proliferation of software piracy? What are your thoughts about the connection between knowing the copyright rules and following them? Put your thoughts in order, write them up, and submit to the appropriate Dropbox basket.;In the Critical Thinking project (you will write a one-page statement of your opinions about some common misconceptions regarding copyright and software, especially in light of the core value of respect.;Chapter 3, Resume Builder;Use the Web and other resources to compile a list of the software used in your current or future career field. Are there standard packages that job applicants should know how to use? If so, what can you find out about those packages on the Web? If your career field does not use any standard software packages, explain why you think that is the case. Also, make a list of the software packages you?re familiar with. As you consider your school and career goals for the next year, list at least five additional software packages you would like to learn. Explain why they would be helpful. Submit your lists to the appropriate Dropbox basket.;module 4;Computers are used worldwide, but most of the major operating systems originated in English-speaking countries. Take a look at the operating system that you use in the context of global users who might not speak English and who might not have grown up with Western customs. Describe at least five aspects of your operating system that would have to be modified to be acceptable to global users.;In the Globalization project (, you will consider the effects of language on operating system interfaces. Additionally, you will make at least five suggestions for improvement in light of the Saint Leo core values of community and respect.;Submit this assignment to the Dropbox;MODULE 4 Critical Thinking Project;Think about the ways you typically interact with a computer and how the operating system factors into that interaction. What aspects of the operating system do you like? Which aspects could be improved? Organize your thoughts into an annotated list and submit to the appropriate Dropbox basket.;In the Critical Thinking project, you will write an annotated list evaluating operating system features, including your suggestions as to the aspects you like and those you would like to see improved.;mod 5;Chapter 5, Globalization Project;The model for telecommunications in most technologically advanced countries depends on large telecommunications corporations for telephone and Internet access. Can you envision ways in which people in technologically underdeveloped countries could benefit from inexpensive LAN and WLAN technologies? Jot down your initial thoughts, and then search the Web for additional ideas. Write a one-page executive summary that describes your ideas.;In the Globalization project (), you are going to write about using low cost technologies to connect underprivileged people. While you are reflecting on this before writing, please take into consideration our Saint Leo core value of responsible stewardship.;Chapter 5, Critical Thinking Project;Wireless technology has become quite pervasive. Not only are computing devices wireless, but most people have other devices, such as security systems, baby monitors, and entertainment systems, that could be wirelessly networked. Play the role of a futurist and think about the ultimate wireless home. Sketch out floor plans and show how you would set up wireless devices, including wireless access points.;mod 6;Chapter 6, Critical Thinking Project;?The Internet treats censorship like damage and routes around it.? Do you agree with this observation? Does it seem like the Internet-similar to banned books, music, videos, and satellite dishes-has a way of infiltrating even the most repressive societies? Does this tendency make censorship more tolerable in the short run?;Chapter 6, Resume Builder Project;The Internet provides resources for career development. Think about your ideal job and make a table that lists (in the first column) the top ten qualifications and skills you?ll need to be a successful applicant. In the second column, indicate whether you currently possess each qualification or skill. For those you need to develop in the future, indicate how you plan to obtain them (for example, from a college course, on-the-job-training, or self-paced study). Find out if you can develop any of these skills and qualifications using online resource, such as online courses. Provide addresses for any Internet resources that you find.;In the Resume Builder project, you will create a list of job skills you believe that you will need and find resources, including online resources, to help you learn them.;Submit this assignm;mod 7;Chapter 7, Critical Thinking Project;In this chapter you read about some of the pitfalls of shopping online. Reflect on what you read within the context of your own online usage habits. What aspects of your online activities could you change to become more secure, more private, or more efficient? What do you have to give up to get these benefits? Is it worth it to you? Incorporate your thoughts in a one-page summary. Follow your instructor?s guidelines for submission.;In the Critical Thinking project (click), you will think about and address some of the dangers of shopping online. Incorporate your answers to the questions posed in the text in a one-page document.;Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT;Your Term Paper will be completed in this module. Hopefully this has been a rewarding experience and you have used the opportunity to investigate some aspects of computers and digital technology about which you have been curious.;Please ensure that you kept the University?s policies about citations and plagiarism in mind and that all of your citations and works cited section are in order. In the event that the instructor asked for any corrections in this area, please make sure you complied in order to avoid issues with the Academic Standards Committee.;Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT. (The Dropbox basket is linked to Turnitin.);Chapter 7, Resume Builder Project;Many companies have a Web site that provides information about their products and services. Use a search engine to locate a company in your career field. Suppose you are a recruiter for that company and you?ll be attending a series of college career fairs. Create a one-page information flyer that you can hand out to prospective recruits. The flyer should include;? The company name, URL, and physical location(s);? A brief description of the company?s mission, products, and services;? Instructions on how to submit a resume electronically;In the Resume Builder project (click), you will research a company in your intended career and create a recruiting flyer. Researching potential employers and their recruiting strategies is good practice for your post-graduation job hunt. Incorporate your answers to the required items as a one-page informational flyer.;Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT.;mod 8;Please write a one-page essay examining one of the issues discussed in this class through the lens of the Saint Leo core value of integrity.;Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT. (This Dropbox basket is linked to Turnitin.);As a final culmination of your work this term, you will prepare and submit an eight to ten slide PowerPoint? presentation on your Term Paper. Additional requirements for the presentation are on the PowerPoint Specs document found in Doc Sharing.;Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT.;Chapter 8, Multimedia Project;Use Windows Sound Recorder or similar software to record your own 15-second radio ad for your favorite music or video download service. Submit the text of your script along with the.wav file containing your ad.;In the Multimedia project (clickHERE), you will experiment with recording digital sound. Surprisingly few people in the population at large have done this. Be sure to submit the text of your script as well as the.wav file containing your ad.;Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT;Which term refers to a collection of inter-linked documents, graphics, and sounds that can be accessed over the Internet?;2G Network;Digital Television;Freeform Database;Visual Database;World Wide Web/Web;Question 2. Question;The Internet was first developed for whom?;America Online (AOL);cambridge University;Microsoft;The United States Military;Vice President Al Gore;Question 3. Question;Which of the following is a generic term used to refer to symbols that represent facts, objects, and ideas, which a computer can manipulate?;Student Answer: CORRECT Data;Entities;Queries;Reports;Wisdom;Question 4. Question;Which term refers a named collection of data copied unto a storage medium, such as a hard disk, CD, or flash drive?;BIOS;Cluster;File;Port;Sector;Question 5. Question;A megabyte is the same as which of the following?;1,048,576 bits;2 to the power of 10 (= 1,024) Kilobytes;Exactly one million bytes;One half of a Gigabyte;Two Terabytes;Question 6. Question;How many bytes are required to store a single letter in extended ASCII?;1;2;8;256;1,024;Question 7. Question;Which of the following is the Extended ASCII code for an uppercase "A" in binary (base 2)?;0000 0000;0000 000A;0100 0001;A000 0000;1111 1111;Question 8. Question;Which of type of language is typically used by programmers to create programs that control digital devices?;Command Language;Programming Language;Query Language;System Language;Teutonic Language;Question 9. Question;Which type of computer program that translates source code of an entire program as a batch into object code which it places into a separate file?;Complier;Database;Interpreter;Operating System;Spreadsheet;Question 10. Question;Which term refers to any method to confirm a person's identity based upon something they know, possess, or are?;Authentication Protocol;Authorization Protocol;Electoral College;User ID;Validation Procedure;Question 11. Question;Under which act are Sarah Palin?s e-mails and the FBI?s file on Roswell made available?;Affordable Health Care Initiative;Freedom of Information Act;No Child Left Behind;Patriot Act;Sarbanes-Oxley Act;Question 12. Question;The first major role computers played in marketing was to do which of the following?;Creating graphics and typesetting print adds;Customizing mass market form letters;E-commerce web sites;Statistical analysis of surveys and sales data;Video and audio editing of broadcast adds;quiz 2;Which term refers to the case which holds a computer's main circuit boards, microprocessor, memory, power supply, and storage devices?;Bus;Cache;Peripheral Device;Primary Storage;System Unit;Question 2. Question;Which term refers to the high speed circuitry which connects the processor to the system and transports data to and from the processor?;Arithmetic Logic Unit (ALU);Cache;Front Side Bus (FSB);Instruction Pointer (IP);Registers;Question 3. Question;A processor with which of the following word sizes would be able to manipulate the largest number of bits at one time?;1 bit;8 bit;16 bit;32 bit;64 bit;Question 4. Question;Which type of storage uses light reflecting areas called lands and non-reflective areas called pits to record data?;Analog Storage;Magnetic Storage;Mechanical Storage;Optical Storage;Solid State Storage;Question 5. Question;Which term refers to the average time it takes a computer to locate data in a storage device, such as a hard disk, and read it?;Access Time;Latency;Seek Time;Transfer Time;Wait State Time;Question 6. Question;Which event occurs when the read/write head of a hard disk drive mechanically hits the platter and damages some of the data on the disk?;Head Crash;Magnetic Leakage;Magnetic Decay;Platter Skip;Stack Overflow;Question 7. Question;Which term refers to the number of colors a device can display, typically denoted as the number of bits to represent the color of each pixel?;Color Depth;Dot Pitch;Screen Resolution;Screen Size;Viewing Angle;Question 8. Question;Which general term refers to a small circuit board which plugs into an expansion slot, and gives the computer the ability to control a storage, input, or output device?;Bus;Coprocessor;Ethernet Card;Expansion Card;Modem;Question 9. Question;Which technology used in display devices/monitors produces an image by filtering light through a matrix of liquid crystal cells?;Cathode Ray Tube (CRT);Light Emitting Diode (LED);Liquid Crystal Display (LCD);Plasma Screen;Question 10. Question;Which term refers to a small, reinforced, oval shaped hole in a computer case into which you can insert a lock attached to a cable, which can in turn be fastened to a desk to prevent theft?;Anchor Port;Bolt Bracket;Kensington Security Slot;Surge Protector;USB Slot;Question 11. Question;According to the Environmental Protection Agency (EPA), how much E-waste is discarded each year?;30 Tons;300 Tons;3,000 Tons;3 Million Tons;3 Billion Tons;Question 12. Question;Which military communications project evolved into the modern Internet?;Area 51;ARPANET;Manhattan Project;Operation Overlord;Project PX;quiz 3;Which type of software alters a devices user interface to aid individuals with physical challenges, by creating as accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text?;Adaptive Utilities;Compilers;Desktop Publishing;Groupware;Spreadsheet;Question 2. Question: Which are the two main classes of software?;Compilers and Utilities;Productivity and Games;System and Application;System and Network;Utilities and Application;Question 3. Question: Which type of application software are Microsoft Excel, Lotus 123, and OpenOffice Calc?;Database;Presentation Software;Spreadsheet;Word Processor;Web Browser;Question 4. Question: In database terminology, which term refers to all of the data for a specific, single entity - a person, place, thing or event?;Database;Field;Form;Query;Record;Question 5. Question: Which term refers to placing a program into a computer so it can be run on?;Downloading;Installation;Jail Breaking;Rooting;Uploading;Question 6. Question: Which type of file is designed to be started by the user or automatically launched by an operating system?;Assembler File;Configuration File;Data File;Executable File (Exe);Object File;Question 7. Question: Which is the official term for software which has been illegally copied, distributed, or modified?;Cracked Software;Freeware;Highjacked Software;Gasparillaware;Pirated Software;Question 8. Question: Which type of software license allows the software to be used on all computers at a specified location?;Multiple-User License;Shrink Wrap License;Single User License;Site License;Unlimited Local License;Question 9. Question: Which software tool is used to conceal malware and backdoors that have been installed on a computer?;Bot;Rootkit;Virus;Worm;Zombie;Question 10. Question: Which term refers to a file that contains suspicious code, typically resembling a virus signature, which has been encrypted and moved so that it cannot be inadvertently opened or accessed by a hacker?;Bot File;Isolated File;Quarantined File;Root Kit;Secured Threat File;Question 11. Question: According to the textbook, what is the cash value of pirated software to date?;$53 Million;$530 Million;$5.3 Billion;$53 Billion;$530 Billion;Question 12. Question: Which reporter converted an M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom, but died during the conflict?;Arthur Miller;David Bloom;Ethel Gahwhiler;Jeff Raucher;Irving L. Levine;quiz 5;Which term refers to a 32 bit binary number, often written as four groups of decimal numbers separated by commas, which potentially changeable, and is used to identify a network device on the Internet?;DHD Coordinate;IP Address;MAC (Media Access Control) Address;Network Address Translation;IN Uniform Resource Locator;Points Received: 0 of 10;Comments;Question 2. Question;Which is the official term for parcels of data which are sent across a computer network and contain some data, the addresses of its sender and destination, and a sequence number?;Data Wave;Encapsulated Posted File;Packet;Pipeline;Transfer Unit;Comments;Question 3. Question;Which type of WI-FI configuration allows all devices to broadcast directly to each other?;WIreless Ad Hoc;Wireless Discovery Mode;Wireless Filibuster Mode;Wireless Infrastructure;Wireless Token Ring;Comments;Question 4. Question;Which communication media does Blue Tooth use?;Category 5 or 6 Twisted Pair Cable;Infrared Light;Optical Cable;Radio Waves;Visible Light;Question 5. Question;Which technology makes intercepted WI-FI signals useless to eavesdroppers/interceptors?;Cyclical Redundancy Checks (CRC);Electronic Countermeasures;Error ing Codes;Firewalls;Wireless Encryption;Question 6. Question;Which type of network device connects two different types of networks?;Network Collective;Network Gateway;Network Hub;Network Switch;Network Router;Question 7. Question;In Windows 7, which of the following is a collection of trusted networked computers that automatically share files and folders?;Access group;Collective group;Home group;Trust group;Work group;Comments;Question 8. Question;Which term refers to allowing other computers on a LAN to use the printer connected to your workstation?;Collective Printer Access;Printer Deprivatization;Printer Multiplexing;Printer Sharing;Virtual Printers;Comments;Question 9. Question;Which size length of cryptographic bit key would require the longest to break?;8 bits;16 bits;64 bits;256 bits;1,024 bits;Comments;Question 10. Question;Which is the official term of the encoded text of a message after it has been encrypted?;Cipher text;Clear text;Plaintext;Safetext;Transformed text;Points Received: 0 of 10;Comments;Question 11. Question;Which brand of hand held devices was found in 2011 to keep time stamped, triangulated position data, essentially keeping a log of the location of the user carrying them?;Kindle E-Reader;Apple iPad;Apple iPhone;Nook E-Reader;Sportsman's Diving Watches;Comments;Question 12. Question;Which term refers to the use of Internet and Computers to deliver courses when the instructor and student are not in the same physical location?;Computer Aided Instruction (CAI);Computer Aided Learning (CAL);Computer Based Training (CBT);Distance Education/Distance Learning;Learning Management Software (LMS);Comments;quiz 6;How many bits are in a current (IPv4) IP address?;2;16;32;128;1,024;Points Received: 10 of 10;Comments;Question 2. Question;Which type of Internet Access links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna?;Fixed Access;Integrated Access;Mobil Access;Portable Access;Simplex Access;Points Received: 10 of 10;Comments;Question 3. Question;Which type of fixed Internet Connection has the longest latency?;Cable;Dial Up;DSL;ISDN;Satellite;Question 4. Question;Which type of fixed Internet Connection is NOT always on?;Cable;DSL;ISDN;Satellite;WiMAX;Question 5. Question;Which level of cell phone service allows users to view simplified versions of some popular web pages, but not the all pages nor full pages?;Analog;1G;2G;Mobile Broadband;WAP;Points Received: 0 of 10;Comments;Question 6. Question;Which level of cell phone service is needed to access the full versions of all web pages?;Analog;1G;2G;Mobile Broadband;WAP;Points Received: 10 of 10;Comments;Question 7. Question;Which type of application is specifically created to aid with the transfer of large numbers of files by FTP?;Encryption Application;FTP Client;FTP Server;Instant Messenger;Web Browser;Points Received: 10 of 10;Comments;Question 8. Question;Which term refers to the concept of using local devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices?;Cloud Computing;Distributed Computing;Net Retrieval;Parallel Processing;Remote Storage;Points Received: 0 of 10;Comments;Question 9. Question;Which type of IP Address can be used to route packets on the Internet at large?;General IP Address;Loopback IP Address;Private IP Address;Routable IP Address;Untranslatable IP Address;Question 10. Question;Which of the following ranges are NOT private IP Addresses?; to; to; to; to;Points Received: 10 of 10;Comments;Question 11. Question;The government of which country was recently overthrown through the use of Facebook, Twitter, and blogs?;Albania;Canada;Egypt;Mexico;United States;Question 12. Question;According to the textbook, how much does it cost to purchase, install, and operate an ATM for one year?;$500;$5,000;$50,000;$500,000;$5,000,000;quoz 4;Which term refers to the operating system process and memory management that allows two or more tasks, jobs, or programs to run simultaneously?;Coordinating;Exclusivity;Logistics Control;Mutli-tasking;Non-Conflicting Allocation;Question 2. Question;Which term refers to the time between when the coputer is first turned on and the time it is ready to accept commands?;Cold Start Process;Boot Up Process;Ignition Process;Start Up Process;Wake Up Cycle;Question 3. Question;Which operating system was released for free use under a GPL (General Public License) in 1991 and is loosely based upon a UINX derived operating system?;Android OS;DOS (Disk Operating System);Linux;Mac OS X;Windows 7;Question 4. Question;Which operating system was specifically designed for the Apple Macintosh line of computers and is based on the UNIX operating system?;Android OS;DOS (Disk Operating System);Linux;Mac OS X;Windows 7;Question 5. Question;Which term refers to the suffix at the end of a file name, following the period, which is normally used to specify the file type, in Windows?;File Class;File Extension;File Identifier;File Suffix;File Tag;Question 6. Question;Which term refers to the top level directory on a disk or drive, such as "C:\" or "E:\"?;Drive Directory;Mother Directory;Root Directory;Super Directory;Tree Directory;Question 7. Question;Which technique for writing an optical disc such as a CD, DVD, or BD, allow recording to be done in multiple sessions?;Disc Mastering;Incremental Burning;Packet Writing;Disc Ripping;Stamping;Question 8. Question;Which type utility software protects confidentiality by overwriting supposed empty disk sectors from deleted files with random 0's and 1's.?;Backup Utility;Disk Defragmenter;File Shredder Software;File Sector Editor;Net Nanny;Question 9. Question;Which type of backup makes a fresh copy of all files specified to be backed up?;Differential Backup;Full Backup;Incremental Backup;Restore Disk;Restore Point;Question 10. Question;Which term refers to a bit-by-bit copy of all data from all sectors of a hard disk?;Disk Image;Full Backup;Incremental Backup;Restore Disk;Restore Point;Question 11. Question;Robert Morris, who released a worn which brought down the ARPANET in 1988, received which sentence for this crime?;None;400 hours of community service and $10,000 fine;5 years probation and $10,000 fine;10 years in prison;15 years to life in prison;Question 12. Question;Which term refers to an irresistible or web site containing fake information that allows investigators to monitor hackers until identification is possible?;Bait;Bear Trap;Fly Trap;Honey Pot;Siren;quiz 7;iven the URL,, which of the following is the file name with extension?;/classics/;html;http://;main.html;;Question 2. Question;Web pages are text files, formatted using a standard set of tags called which of the following?;FTP;HTML;INTP;LaTex;WWW;Question 3. Question;Which component of a search engine pulls keywords from web pages and stores then in the database?;Comparator;Database;Search Engine Indexer;Query Processor;Web Crawler;Comments;Question 4. Question;Which term refers to a rating of a web page based on the quality and quantity of links it contains?;Anchor Weight;Gunning Fog Index;Link Popularity;Link Power Score;IN Link Quality Index;Comments;Question 5. Question;Which type of e-commerce business model is Amazon dot Com?;B2B (Business to Business);B2C (Business to Consumer);B2G (Business to Government);C2C (Consumer to Consumer);G2C (Government to Consumer);Comments;Question 6. Question;Which type of e-commerce business model are Craigslist dot Com and Ebay dot Com?;B2B (Business to Business);B2C (Business to Consumer);B2G (Business to Government);C2C (Consumer to Consumer);G2C (Government to Consumer);Comments;Question 7. Question;Which process converts binary files, such as digital photos and sound files, into ASCII code based text which can be sent as an e-mail attachment and travel over the Internet with text based data?;ASCII Encoding;B2A Conversion;Multi-Purpose Internet Mail Extensions (MIME);Text Representing Binary Data (TRBD);ZA Encoding;Comments;Question 8. Question;Which term refers to e-mail which contains HTML tags to format the text with fonts, colors, and effects and embed graphics?;ASCII Mail;Extended Format Mail;HTML Mail;XML Mail;Web Mail;Comments;Question 9. Question;Which type of cookie tracks a user's browsing pattern and uses it to pick targeted, custom advertisements?;Ad Serving Cookie;Bread Crumb;Chart Cookie;Tolle Haus Cookie;Web Bug;Comments;Question 10. Question;Which type of computer crime is the "Nigerian political refugee letter"?;Ad Serving Cookie;Pharming;Phishing;Spam;Web Bug;Comments;Question 11. Question;Which event has been cited to justify the erosion Fourth Amendment rights mandating judicial oversight for law enforcement to access for email or place wiretraps?;Iran Contra Affair;Roswell Incident;Teapot Dome Scandal;Terrorist Attacks of September 11, 2001;Watergate Scandal;Comments;Question 12. Question;How many bits of data may an RFID tag contain?;1 to 4 bits;4 to 8 bits;8 to 32 bits;64 to 128 bits;256 to 1,024 bits;Comments;quiz 8;Which sound file format is used on commercially produced audio CDs?;AAC;CDDA;IN MP3;Ogg Vorbis;WAV;Comments;Question 2. Question;Which term specifically refers to online audio that plays as the file downloads?;IN Advanced Audio Coding;CDDA;Compressed Audio;Podcast Audio;Streaming Audio;Comments;Question 3. Question;Which is the official term that refers to an individual cell of an image on a display surface?;Datum;Dot;Element;Pixel;Point;Points Received: 10 of 10;Comments;Question 4. Question;Which is the official term for a type of bitmap which stores only one bit per pixel?;Binary;Monochrome;Polar;Simple;True Color;Question 5. Question;Which of the following is NOT drawing software (which is application software intended for creating vector graphics)?;Adobe Illustrator;Adobe Photoshop;Corel Designer;InkScape;Open Office Draw;Question 6. Question;Which type of software converts a bitmap into a vector graphics file?;Filtering Software;Melding Software;Rasterizing Software;Rendering Software;Tracing Software;Question 7. Question;Which term refers to the general process of converting digital video from one format to another?;Adaptive Filtering;Barrier Synchronizing;Compression;Synchronizing;Transcoding;Question 8. Question;Which digital video file format is native for DVD players?;ASF;BDMV;FLV;IN MOV;VOB;Question 9. Question;Which DRM (Digital Rights Management) technology includes a code number to specify a region of the world in which DVD players, may play which discs?;Broadcast Flag;IN Copy Generation Management;CSS (Content Scramble System);FairPlay;HDCP (High-bandwidth Digital Content Protection;Question 10. Question;Which term refers to a collection of technologies used by copyright holders to limit access to and use of digital content?;Authentication and Authorization;Copyright Enforcement Technology (CET);Confidentiality, Integrity, and Accessibility (CIA) Criteria;Digital Rights Management (DRM);Secure Digital Vaults (SDV);Question 11. Question;Which law makes it illegal to circumvent any technological measure that controls access to a work?;Antitrust Act of 1923;Digital Millennium Copyright Act;Forth Amendment to the U.S. Constitution;Patriot Act of 2001;Piracy Act of 1820;Question 12. Question;Which computer program was used to render the over two million blue hairs on the character Sully in the 2002 film, Monsters Inc.?;Bullet Time;Fizt;Houdini;MASSIVE;Renderman


Paper#32195 | Written in 18-Jul-2015

Price : $177