Details of this Paper

saint com203 all quizes, modules assignments,Multimedia Project,Globalization Project,Critical Thinking Project




Question;Chapter 1, Multimedia ProjectScreenshots can be useful tools for learning, documentation, and troubleshooting. Any time you need to show someone what?s displayed on your computer screen, you can press the Print Screen (PrtScr) key, which stores a copy of the screen into memory. On a Mac, hold down the Command (Apple) key while you press the Shift key and the 3 key. From there, you can paste the screenshot into a document you?re creating with a word processor. You can also paste it into a graphics program, such as Microsoft Paint, and then edit it. For this project, take a screenshot and paste it into a Word document. Under the screenshot, enter a description of the software and the purpose of the screen you captured.Throughout this class, you will complete a number of Hands-On Projects which will serve to reinforce the ideas of the module. Since doing is learning, these will include such activities as creating a spreadsheet to investigate character codes and binary numbers, creating a simple HTML document using Notepad and Paint, using Trace-route to investigate local Internet topology, and creating a digital media files. A PDF containing the requirements for this assignment can be found in Doc Sharing.During this module, you will complete the following project:? Excel Binary Numbers - Learn to manipulate binary numbers and investigate ASCII codes using functions built into Microsoft Excel?Submit this assignment to the Dropboxno later thanmodul 2Chapter 2, Resume Builder ProjectUse the Web and other resources to learn about the computers and other digital technologies used in your career field or a profession of interest to you. Develop the information you find into a format similar to the Technology in Context section of each chapter in the textbook. Make sure you select two photos to accompany your narrative and include a list of relevant Web links to additional resources.Chapter 2, Critical Thinking ProjectSteve Jobs, co-founder of Apple Inc., coined the idea that computers should be consumer appliances like toasters that could be set up easily, used by anyone, and ?democratically priced? so they are affordable to everyone. An opposing philosophy, championed by many PC owners, is that computers should be flexible modular systems that can be easily customized, upgraded, and modified by anyone with a moderate degree of technical savvy. Which philosophy do you personally prefer? What do you think is the preference of the majority of computer shoppers? If you were a computer designer, how would you provide your customers with flexibility while making it approachable for non-techies? Incorporate your ideas in a one-page paper you will submit to the appropriate Dropbox basket.mod 3Create a proposal document and annotated bibliography (at least four references) for your Term Paper. Please see the Term Paper guideline document and sample proposal document in Doc Sharing. Model your proposal using those documentsHave you heard about the ?24-hour rule? for software that says you can legally use any software for free for 24 hours without paying for it? How about your right to use so-called abandoned software that?s no longer supported or that was created by a company now out of business? Both the 24-hour rule and the concept of abandoned software are urban legends and have no basis in copyright law. Does it seem to you that most people don?t have the facts about copyrights? How strong a factor is that in the proliferation of software piracy? What are your thoughts about the connection between knowing the copyright rules and following them? Put your thoughts in order, write them up, and submit to the appropriate Dropbox basket.In the Critical Thinking project (you will write a one-page statement of your opinions about some common misconceptions regarding copyright and software, especially in light of the core value of respect.Chapter 3, Resume BuilderUse the Web and other resources to compile a list of the software used in your current or future career field. Are there standard packages that job applicants should know how to use? If so, what can you find out about those packages on the Web? If your career field does not use any standard software packages, explain why you think that is the case. Also, make a list of the software packages you?re familiar with. As you consider your school and career goals for the next year, list at least five additional software packages you would like to learn. Explain why they would be helpful. Submit your lists to the appropriate Dropbox basket.module 4Computers are used worldwide, but most of the major operating systems originated in English-speaking countries. Take a look at the operating system that you use in the context of global users who might not speak English and who might not have grown up with Western customs. Describe at least five aspects of your operating system that would have to be modified to be acceptable to global users.In the Globalization project (, you will consider the effects of language on operating system interfaces. Additionally, you will make at least five suggestions for improvement in light of the Saint Leo core values of community and respect.Submit this assignment to the DropboxMODULE 4 Critical Thinking ProjectThink about the ways you typically interact with a computer and how the operating system factors into that interaction. What aspects of the operating system do you like? Which aspects could be improved? Organize your thoughts into an annotated list and submit to the appropriate Dropbox basket.In the Critical Thinking project, you will write an annotated list evaluating operating system features, including your suggestions as to the aspects you like and those you would like to see improved.mod 5Chapter 5, Globalization ProjectThe model for telecommunications in most technologically advanced countries depends on large telecommunications corporations for telephone and Internet access. Can you envision ways in which people in technologically underdeveloped countries could benefit from inexpensive LAN and WLAN technologies? Jot down your initial thoughts, and then search the Web for additional ideas. Write a one-page executive summary that describes your ideas.In the Globalization project (), you are going to write about using low cost technologies to connect underprivileged people. While you are reflecting on this before writing, please take into consideration our Saint Leo core value of responsible stewardship.Chapter 5, Critical Thinking ProjectWireless technology has become quite pervasive. Not only are computing devices wireless, but most people have other devices, such as security systems, baby monitors, and entertainment systems, that could be wirelessly networked. Play the role of a futurist and think about the ultimate wireless home. Sketch out floor plans and show how you would set up wireless devices, including wireless access points.mod 6Chapter 6, Critical Thinking Project="5">?The Internet treats censorship like damage and routes around it.? Do you agree with this observation? Does it seem like the Internet-similar to banned books, music, videos, and satellite dishes-has a way of infiltrating even the most repressive societies? Does this tendency make censorship more tolerable in the short run?Chapter 6, Resume Builder ProjectThe Internet provides resources for career development. Think about your ideal job and make a table that lists (in the first column) the top ten qualifications and skills you?ll need to be a successful applicant. In the second column, indicate whether you currently possess each qualification or skill. For those you need to develop in the future, indicate how you plan to obtain them (for example, from a college course, on-the-job-training, or self-paced study). Find out if you can develop any of these skills and qualifications using online resource, such as online courses. Provide addresses for any Internet resources that you find.In the Resume Builder project, you will create a list of job skills you believe that you will need and find resources, including online resources, to help you learn them.Submit this assignmmod 7Chapter 7, Critical Thinking ProjectIn this chapter you read about some of the pitfalls of shopping online. Reflect on what you read within the context of your own online usage habits. What aspects of your online activities could you change to become more secure, more private, or more efficient? What do you have to give up to get these benefits? Is it worth it to you? Incorporate your thoughts in a one-page summary. Follow your instructor?s guidelines for submission.In the Critical Thinking project (click), you will think about and address some of the dangers of shopping online. Incorporate your answers to the questions posed in the text in a one-page document.Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDTYour Term Paper will be completed in this module. Hopefully this has been a rewarding experience and you have used the opportunity to investigate some aspects of computers and digital technology about which you have been curious.Please ensure that you kept the University?s policies about citations and plagiarism in mind and that all of your citations and works cited section are in order. In the event that the instructor asked for any corrections in this area, please make sure you complied in order to avoid issues with the Academic Standards Committee.Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT. (The Dropbox basket is linked to Turnitin.)Chapter 7, Resume Builder Project="4">Many companies have a Web site that provides information about their products and services. Use a search engine to locate a company in your career field. Suppose you are a recruiter for that company and you?ll be attending a series of college career fairs. Create a one-page information flyer that you can hand out to prospective recruits. The flyer should include:? The company name, URL, and physical location(s)? A brief description of the company?s mission, products, and services? Instructions on how to submit a resume electronicallyIn the Resume Builder project (click), you will research a company in your intended career and create a recruiting flyer. Researching potential employers and their recruiting strategies is good practice for your post-graduation job hunt. Incorporate your answers to the required items as a one-page informational flyer.Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT.mod 8Please write a one-page essay examining one of the issues discussed in this class through the lens of the Saint Leo core value of integrity.Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT. (This Dropbox basket is linked to Turnitin.)As a final culmination of your work this term, you will prepare and submit an eight to ten slide PowerPoint? presentation on your Term Paper. Additional requirements for the presentation are on the PowerPoint Specs document found in Doc Sharing.Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDT.Chapter 8, Multimedia ProjectUse Windows Sound Recorder or similar software to record your own 15-second radio ad for your favorite music or video download service. Submit the text of your script along with the.wav file containing your ad.In the Multimedia project (clickHERE), you will experiment with recording digital sound. Surprisingly few people in the population at large have done this. Be sure to submit the text of your script as well as the.wav file containing your ad.Submit this assignment to the Dropboxno later than Sunday 11:59 PM EST/EDTWhich term refers to a collection of inter-linked documents, graphics, and sounds that can be accessed over the Internet?2G NetworkDigital TelevisionFreeform DatabaseVisual DatabaseWorld Wide Web/WebQuestion 2. Question:The Internet was first developed for whom?America Online (AOL)cambridge UniversityMicrosoftThe United States MilitaryVice President Al GoreQuestion 3. Question:Which of the following is a generic term used to refer to symbols that represent facts, objects, and ideas, which a computer can manipulate?Student Answer: CORRECT DataEntitiesQueriesReportsWisdomQuestion 4. Question:Which term refers a named collection of data copied unto a storage medium, such as a hard disk, CD, or flash drive?BIOSClusterFilePortSectorQuestion 5. Question:A megabyte is the same as which of the following?1,048,576 bits2 to the power of 10 (= 1,024) KilobytesExactly one million bytesOne half of a GigabyteTwo TerabytesQuestion 6. Question:How many bytes are required to store a single letter in extended ASCII?: 1282561,024Question 7. Question:Which of the following is the Extended ASCII code for an uppercase "A" in binary (base 2)?0000 00000000 000A0100 0001A000 00001111 1111Question 8. Question:Which of type of language is typically used by programmers to create programs that control digital devices?Command LanguageProgramming LanguageQuery LanguageSystem LanguageTeutonic LanguageQuestion 9. Question:Which type of computer program that translates source code of an entire program as a batch into object code which it places into a separate file?ComplierDatabaseInterpreterOperating SystemSpreadsheetQuestion 10. Question:Which term refers to any method to confirm a person's identity based upon something they know, possess, or are?Authentication ProtocolAuthorization ProtocolElectoral CollegeUser IDValidation ProcedureQuestion 11. Question:Under which act are Sarah Palin?s e-mails and the FBI?s file on Roswell made available?Affordable Health Care InitiativeFreedom of Information ActNo Child Left BehindPatriot ActSarbanes-Oxley ActQuestion 12. Question:The first major role computers played in marketing was to do which of the following?Creating graphics and typesetting print addsCustomizing mass market form lettersE-commerce web sitesStatistical analysis of surveys and sales dataVideo and audio editing of broadcast addsquiz 2Which term refers to the case which holds a computer's main circuit boards, microprocessor, memory, power supply, and storage devices?BusCachePeripheral DevicePrimary StorageSystem UnitQuestion 2. Question:Which term refers to the high speed circuitry which connects the processor to the system and transports data to and from the processor?Arithmetic Logic Unit (ALU)CacheFront Side Bus (FSB)Instruction Pointer (IP)RegistersQuestion 3. Question:A processor with which of the following word sizes would be able to manipulate the largest number of bits at one time?: 1 bit8 bit16 bit32 bit64 bitQuestion 4. Question:Which type of storage uses light reflecting areas called lands and non-reflective areas called pits to record data?Analog StorageMagnetic StorageMechanical StorageOptical StorageSolid State Storage:Question 5. Question:Which term refers to the average time it takes a computer to locate data in a storage device, such as a hard disk, and read it?Access TimeLatencySeek TimeTransfer TimeWait State TimeQuestion 6. Question:Which event occurs when the read/write head of a hard disk drive mechanically hits the platter and damages some of the data on the disk?Head CrashMagnetic LeakageMagnetic DecayPlatter SkipStack OverflowQuestion 7. Question:Which term refers to the number of colors a device can display, typically denoted as the number of bits to represent the color of each pixel?Color DepthDot PitchScreen ResolutionScreen SizeViewing Angle:Question 8. Question:Which general term refers to a small circuit board which plugs into an expansion slot, and gives the computer the ability to control a storage, input, or output device?BusCoprocessorEthernet CardExpansion CardModemQuestion 9. Question:Which technology used in display devices/monitors produces an image by filtering light through a matrix of liquid crystal cells?Cathode Ray Tube (CRT)Light Emitting Diode (LED)Liquid Crystal Display (LCD)Plasma ScreenQuestion 10. Question:Which term refers to a small, reinforced, oval shaped hole in a computer case into which you can insert a lock attached to a cable, which can in turn be fastened to a desk to prevent theft?Anchor PortBolt BracketKensington Security SlotSurge ProtectorUSB SlotQuestion 11. Question:According to the Environmental Protection Agency (EPA), how much E-waste is discarded each year?30 Tons300 Tons3,000 Tons3 Million Tons3 Billion TonsQuestion 12. Question:Which military communications project evolved into the modern Internet?Area 51ARPANETManhattan ProjectOperation OverlordProject PXquiz 3Which type of software alters a devices user interface to aid individuals with physical challenges, by creating as accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text?Adaptive UtilitiesCompilersDesktop PublishingGroupwareSpreadsheetQuestion 2. Question: Which are the two main classes of software?Compilers and UtilitiesProductivity and GamesSystem and ApplicationSystem and NetworkUtilities and ApplicationQuestion 3. Question: Which type of application software are Microsoft Excel, Lotus 123, and OpenOffice Calc?DatabasePresentation SoftwareSpreadsheetWord ProcessorWeb BrowserQuestion 4. Question: In database terminology, which term refers to all of the data for a specific, single entity - a person, place, thing or event?DatabaseFieldFormQueryRecordQuestion 5. Question: Which term refers to placing a program into a computer so it can be run on?DownloadingInstallationJail BreakingRootingUploadingQuestion 6. Question: Which type of file is designed to be started by the user or automatically launched by an operating system?Assembler FileConfiguration FileData FileExecutable File (Exe)Object FileQuestion 7. Question: Which is the official term for software which has been illegally copied, distributed, or modified?Cracked SoftwareFreewareHighjacked SoftwareGasparillawarePirated SoftwareQuestion 8. Question: Which type of software license allows the software to be used on all computers at a specified location?Multiple-User LicenseShrink Wrap LicenseSingle User LicenseSite LicenseUnlimited Local LicenseQuestion 9. Question: Which software tool is used to conceal malware and backdoors that have been installed on a computer?BotRootkitVirusWormZombieQuestion 10. Question: Which term refers to a file that contains suspicious code, typically resembling a virus signature, which has been encrypted and moved so that it cannot be inadvertently opened or accessed by a hacker?Bot FileIsolated FileQuarantined FileRoot KitSecured Threat FileQuestion 11. Question: According to the textbook, what is the cash value of pirated software to date?$53 Million$530 Million$5.3 Billion$53 Billion$530 BillionQuestion 12. Question: Which reporter converted an M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom, but died during the conflict?Arthur MillerDavid BloomEthel GahwhilerJeff RaucherIrving L. Levinequiz 5Which term refers to a 32 bit binary number, often written as four groups of decimal numbers separated by commas, which potentially changeable, and is used to identify a network device on the Internet?DHD CoordinateIP AddressMAC (Media Access Control) AddressNetwork Address TranslationIN Uniform Resource LocatorPoints Received: 0 of 10Comments:Question 2. Question:Which is the official term for parcels of data which are sent across a computer network and contain some data, the addresses of its sender and destination, and a sequence number?Data WaveEncapsulated Posted FilePacketPipelineTransfer UnitComments:Question 3. Question:Which type of WI-FI configuration allows all devices to broadcast directly to each other?WIreless Ad HocWireless Discovery ModeWireless Filibuster ModeWireless InfrastructureWireless Token RingComments:Question 4. Question:Which communication media does Blue Tooth use?Category 5 or 6 Twisted Pair CableInfrared LightOptical CableRadio WavesVisible LightQuestion 5. Question:Which technology makes intercepted WI-FI signals useless to eavesdroppers/interceptors?Cyclical Redundancy Checks (CRC)Electronic CountermeasuresError ing CodesFirewallsWireless EncryptionQuestion 6. Question:Which type of network device connects two different types of networks?Network CollectiveNetwork GatewayNetwork HubNetwork SwitchNetwork RouterQuestion 7. Question:In Windows 7, which of the following is a collection of trusted networked computers that automatically share files and folders?Access groupCollective groupHome groupTrust groupWork groupComments:Question 8. Question:Which term refers to allowing other computers on a LAN to use the printer connected to your workstation?Collective Printer AccessPrinter DeprivatizationPrinter MultiplexingPrinter SharingVirtual PrintersComments:Question 9. Question:Which size length of cryptographic bit key would require the longest to break?8 bits16 bits64 bits256 bits1,024 bitsComments:Question 10. Question:Which is the official term of the encoded text of a message after it has been encrypted?Cipher textClear textPlaintextSafetextTransformed textPoints Received: 0 of 10Comments:Question 11. Question:Which brand of hand held devices was found in 2011 to keep time stamped, triangulated position data, essentially keeping a log of the location of the user carrying them?Kindle E-ReaderApple iPadApple iPhoneNook E-ReaderSportsman's Diving WatchesComments:Question 12. Question:Which term refers to the use of Internet and Computers to deliver courses when the instructor and student are not in the same physical location?Computer Aided Instruction (CAI)Computer Aided Learning (CAL)Computer Based Training (CBT)Distance Education/Distance LearningLearning Management Software (LMS)Comments:quiz 6How many bits are in a current (IPv4) IP address?216321281,024Points Received: 10 of 10Comments:Question 2. Question:Which type of Internet Access links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna?Fixed AccessIntegrated AccessMobil AccessPortable AccessSimplex AccessPoints Received: 10 of 10Comments:Question 3. Question:Which type of fixed Internet Connection has the longest latency?CableDial UpDSLISDNSatelliteQuestion 4. Question:Which type of fixed Internet Connection is NOT always on?CableDSLISDNSatelliteWiMAXQuestion 5. Question:Which level of cell phone service allows users to view simplified versions of some popular web pages, but not the all pages nor full pages?Analog1G2GMobile BroadbandWAPPoints Received: 0 of 10Comments:Question 6. Question:Which level of cell phone service is needed to access the full versions of all web pages?Analog1G2GMobile BroadbandWAPPoints Received: 10 of 10Comments:Question 7. Question:Which type of application is specifically created to aid with the transfer of large numbers of files by FTP?Encryption ApplicationFTP ClientFTP ServerInstant MessengerWeb BrowserPoints Received: 10 of 10Comments:Question 8. Question:Which term refers to the concept of using local devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices?Cloud ComputingDistributed ComputingNet RetrievalParallel ProcessingRemote StoragePoints Received: 0 of 10Comments:Question 9. Question:Which type of IP Address can be used to route packets on the Internet at large?General IP AddressLoopback IP AddressPrivate IP AddressRoutable IP AddressUntranslatable IP AddressQuestion 10. Question:Which of the following ranges are NOT private IP Addresses? to to to to Received: 10 of 10Comments:Question 11. Question:The government of which country was recently overthrown through the use of Facebook, Twitter, and blogs?AlbaniaCanadaEgyptMexicoUnited StatesQuestion 12. Question:According to the textbook, how much does it cost to purchase, install, and operate an ATM for one year?$500$5,000$50,000$500,000$5,000,000quoz 4Which term refers to the operating system process and memory management that allows two or more tasks, jobs, or programs to run simultaneously?CoordinatingExclusivityLogistics ControlMutli-taskingNon-Conflicting AllocationQuestion 2. Question:Which term refers to the time between when the coputer is first turned on and the time it is ready to accept commands?Cold Start ProcessBoot Up ProcessIgnition ProcessStart Up ProcessWake Up CycleQuestion 3. Question:Which operating system was released for free use under a GPL (General Public License) in 1991 and is loosely based upon a UINX derived operating system?Android OSDOS (Disk Operating System)LinuxMac OS XWindows 7Question 4. Question:Which operating system was specifically designed for the Apple Macintosh line of computers and is based on the UNIX operating system?Android OSDOS (Disk Operating System)LinuxMac OS XWindows 7Question 5. Question:Which term refers to the suffix at the end of a file name, following the period, which is normally used to specify the file type, in Windows?File ClassFile ExtensionFile IdentifierFile SuffixFile TagQuestion 6. Question:Which term refers to the top level directory on a disk or drive, such as "C:\" or "E:\"?Drive DirectoryMother DirectoryRoot DirectorySuper DirectoryTree DirectoryQuestion 7. Question:Which technique for writing an optical disc such as a CD, DVD, or BD, allow recording to be done in multiple sessions?Disc MasteringIncremental BurningPacket WritingDisc RippingStampingQuestion 8. Question:Which type utility software protects confidentiality by overwriting supposed empty disk sectors from deleted files with random 0's and 1's.?Backup UtilityDisk DefragmenterFile Shredder SoftwareFile Sector EditorNet NannyQuestion 9. Question:Which type of backup makes a fresh copy of all files specified to be backed up?Differential BackupFull BackupIncremental BackupRestore DiskRestore PointQuestion 10. Question:Which term refers to a bit-by-bit copy of all data from all sectors of a hard disk?Disk ImageFull BackupIncremental BackupRestore DiskRestore PointQuestion 11. Question:Robert Morris, who released a worn which brought down the ARPANET in 1988, received which sentence for this crime?None400 hours of community service and $10,000 fine5 years probation and $10,000 fine10 years in prison15 years to life in prison:Question 12. Question:Which term refers to an irresistible or web site containing fake information that allows investigators to monitor hackers until identification is possible?BaitBear TrapFly TrapHoney PotSirenquiz 7iven the URL,, which of the following is the file name with extension?/classics/htmlhttp://main.htmlwww.miskatonic.eduQuestion 2. Question:Web pages are text files, formatted using a standard set of tags called which of the following?FTPHTMLINTPLaTexWWWQuestion 3. Question:Which component of a search engine pulls keywords from web pages and stores then in the database?ComparatorDatabaseSearch Engine IndexerQuery ProcessorWeb CrawlerComments:Question 4. Question:Which term refers to a rating of a web page based on the quality and quantity of links it contains?Anchor WeightGunning Fog IndexLink PopularityLink Power ScoreIN Link Quality IndexComments:Question 5. Question:Which type of e-commerce business model is Amazon dot Com?B2B (Business to Business)B2C (Business to Consumer)B2G (Business to Government)C2C (Consumer to Consumer)G2C (Government to Consumer)Comments:Question 6. Question:Which type of e-commerce business model are Craigslist dot Com and Ebay dot Com?B2B (Business to Business)B2C (Business to Consumer)B2G (Business to Government)C2C (Consumer to Consumer)G2C (Government to Consumer)Comments:Question 7. Question:Which process converts binary files, such as digital photos and sound files, into ASCII code based text which can be sent as an e-mail attachment and travel over the Internet with text based data?ASCII EncodingB2A ConversionMulti-Purpose Internet Mail Extensions (MIME)Text Representing Binary Data (TRBD)ZA EncodingComments:Question 8. Question:Which term refers to e-mail which contains HTML tags to format the text with fonts, colors, and effects and embed graphics?ASCII MailExtended Format MailHTML MailXML MailWeb MailComments:Question 9. Question:Which type of cookie tracks a user's browsing pattern and uses it to pick targeted, custom advertisements?Ad Serving CookieBread CrumbChart CookieTolle Haus CookieWeb BugComments:Question 10. Question:Which type of computer crime is the "Nigerian political refugee letter"?Ad Serving CookiePharmingPhishingSpamWeb BugComments:Question 11. Question:Which event has been cited to justify the erosion Fourth Amendment rights mandating judicial oversight for law enforcement to access for email or place wiretraps?Iran Contra AffairRoswell IncidentTeapot Dome ScandalTerrorist Attacks of September 11, 2001Watergate ScandalComments:Question 12. Question:How many bits of data may an RFID tag contain?1 to 4 bits4 to 8 bits8 to 32 bits64 to 128 bits256 to 1,024 bitsComments:quiz 8Which sound file format is used on commercially produced audio CDs?AACCDDAIN MP3Ogg VorbisWAVComments:Question 2. Question:Which term specifically refers to online audio that plays as the file downloads?IN Advanced Audio CodingCDDACompressed AudioPodcast AudioStreaming AudioComments:Question 3. Question:Which is the official term that refers to an individual cell of an image on a display surface?DatumDotElementPixelPointPoints Received: 10 of 10Comments:Question 4. Question:Which is the official term for a type of bitmap which stores only one bit per pixel?BinaryMonochromePolarSimpleTrue Color:Question 5. Question:Which of the following is NOT drawing software (which is application software intended for creating vector graphics)?Adobe IllustratorAdobe PhotoshopCorel DesignerInkScapeOpen Office DrawQuestion 6. Question:Which type of software converts a bitmap into a vector graphics file?Filtering SoftwareMelding SoftwareRasterizing SoftwareRendering SoftwareTracing Software:Question 7. Question:Which term refers to the general process of converting digital video from one format to another?Adaptive FilteringBarrier SynchronizingCompressionSynchronizingTranscodingQuestion 8. Question:Which digital video file format is native for DVD players?ASFBDMVFLVIN MOVVOBQuestion 9. Question:Which DRM (Digital Rights Management) technology includes a code number to specify a region of the world in which DVD players, may play which discs?Broadcast FlagIN Copy Generation ManagementCSS (Content Scramble System)FairPlayHDCP (High-bandwidth Digital Content ProtectionQuestion 10. Question:Which term refers to a collection of technologies used by copyright holders to limit access to and use of digital content?Authentication and AuthorizationCopyright Enforcement Technology (CET)Confidentiality, Integrity, and Accessibility (CIA) CriteriaDigital Rights Management (DRM)Secure Digital Vaults (SDV):Question 11. Question:Which law makes it illegal to circumvent any technological measure that controls access to a work?Antitrust Act of 1923Digital Millennium Copyright ActForth Amendment to the U.S. ConstitutionPatriot Act of 2001Piracy Act of 1820Question 12. Question:Which computer program was used to render the over two million blue hairs on the character Sully in the 2002 film, Monsters Inc.?Bullet TimeFiztHoudiniMASSIVERenderman


Paper#36672 | Written in 18-Jul-2015

Price : $162