Question: Please answer the following short questions: 1. Explain how data and information as assets in IT field. 2. Consider the following troubleshooting scenario: If a

 Please answer the following short questions: 1. Explain how data and

information as assets in IT field. 2. Consider the following troubleshooting scenario:

Please answer the following short questions: 1. Explain how data and information as assets in IT field. 2. Consider the following troubleshooting scenario: If a technician has a problem, and he's been trying to resolve the problem. His co-worker on the other side went to the workstation to test it out at the same time this is called: A. Duplicate the problem. B. Divide the problem. C. Conquer the problem. D. Basic knowledge search 3. What is the purpose of each one: A. FireWire B. Thunderbolt C. Bluetooth D. RF E. NFC 4. Compare the following: A. Fiber Optic B. Cable C. DSL D. Radio frequency E. Satellite F. Cellular 5. Difference between Local network storage types: A. NAS B. File server 6. Compare the following 802.11a, 802.11b, 802.11g, 802.11g, 802.1lac as following: A. Older Vs. newer standards. B. Speed limitations C. Interference and attenuation factors. 7. Consider the following scenario, a guest is trying to login into the hospital Wi-Fi. The best option for the guest to choose is: A. WEP B. WPA C. WPA2 8. What are these file systems AND in which OS they are used: A. NTFS B. FAT32 C. HFS D. Ext4 9. Difference between: A. Single-platform software. B. Cross-platform software. 10. Difference between Licensing: A. Single use. B. Group use/site license. C. Concurrent license. D. Subscription Vs. one-time purchase. E. Open source Vs. proprietary. 11. Give example on the following languages: A. Scripting languages: B. Scripted languages: C. Markup languages: D. Compiled languages: E. Query languages: F. Machine languages: machine code and Assembly language. G. Interpreted languages. If there are similarities between languages you may combine them under one subject. 12. What "Constraints" is used for in database? 13. Show the simple difference between the following confidentially concerns: A. Snooping B. Eavesdropping Replay attack. C. Wiretapping D. Social Engineering E. Dumpster diving F. Patching/Updates: 14. Difference between: A. OEMS websites B. Third-party websites. 15. Difference between: A. Role-based access B. Rule-based access C. Mandatory access control D. Discretionary access control 16. Difference between: A. Plain text B. Cipher text 17. Difference between: A. SATA B. PATA

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!