× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
7
n
3
j
3
o
2
x
2
c
2
2
p
2
n
2
3
2
C
2
z
2
New Topic  
dindsi dindsi
wrote...
Posts: 564
Rep: 0 0
6 years ago
Main data routes between large, high-capacity academic commercial, and government routers are collectively called the _________________.
 
  Fill in the blank(s) with correct word

Q. 2

When you send a message, the ___________ software in your computer looks at the address to see if the destination address is one of the devices attached to your computer or some other device.
 
  Fill in the blank(s) with correct word

Q. 3

A _______________ is a device used to translate the electrical signals for transmission over connections so that computers can talk to each other.
 
  Fill in the blank(s) with correct word

Q. 4

Attorney Kate Sandberg needed to upgrade the basic office software (such as MS Office) for her small firm. She asked her paralegal, Mary Worth, to research and purchase a new suite of office applications for their existing computer hardware. Most of the computers in the office were at least 4 years old. What information about the computers should Mary carefully review? What factors are most important to consider when selecting the software?
 
  What will be an ideal response?

Q. 5

When a file is saved, a file extension:
 
  a. is added to the end of the file name to identify the format in which the file has been saved.
  b. is an instruction to see features and hidden information such as track changes information.
  c. is the way to later find the file on the hard drive.
  d. is created with a preset, predesigned page.

Q. 6

Explain the importance of computer security and the steps that a law firm may take to protect the information contained in a computer network.
 
  What will be an ideal response?

Q. 7

If you are citing a range of section numbers in the CFR, you should use the double () symbol.
 
  Indicate whether the statement is true or false
Read 15 times
2 Replies

Related Topics

Replies
wrote...
6 years ago
(Answer to #1)  Internet backbone

(Answer to #2)  routing

(Answer to #3)  modem

(Answer to #4)  Mary should look at the minimum and recommended requirements of the software. The minimum requirements are the minimum memory, speed, and other characteristics necessary for software to run properly. If the systems in the office do not meet these minimum requirements, the software will run much more slowly than expected, or not at all. She should also look at the recommended requirements, which are necessary for the maximum utilization of the software. There may be no point in upgrading if the computers are not powerful enough to take advantage of the upgrades in the software.

(Answer to #5)  a

(Answer to #6)  With a single computer, the security issues are related to installing corrupted software or accessing something from the Internet that has a virus. By contrast, on a network, every computer work station represents a possible source of security issues and if a single station introduces a virus, the entire network will be impacted. One solution is to limit access, such as the ability to make changes to the operating system, add or delete software, and retrieve files. Network security protocols limit access to the file server and peripherals, such as printers or other work stations. Network rights and privileges determine who on the network may access the information and who has authority to access the server, the data stored on the server, and the flow of information. A network administrator is the person with the highest level of access to, or authority over, the network. Passwords can be used to grant access to files and computers. Firewalls are programs designed to limit access to computer or a computer network but may also prevent working at an off-site location. Antivirus Software scans the computer to identify the presence of viruses, and in some better programs, eliminates the virus. Despite the existence of antivirus software, viruses do get through, and there are certain precautions that should be followed: (1) do not open files or attachments from unknown email senders; (2) scan every disk with antivirus software before using it; (3) downloaded files should be scanned, and; (4) be sure antivirus software is continually updated. Finally, data should be backed up by creating a copy of data as a precaution against the loss or damage of the original data. It is a good policy to back up on a daily basis and store the backup media off-site.

(Answer to #7)  TRUE
dindsi Author
wrote...
6 years ago
I just wanted to write to say thanks a bunch for the answer!
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  963 People Browsing
Related Images
  
 1437
  
 4718
  
 1077
Your Opinion
Who's your favorite biologist?
Votes: 587

Previous poll results: What's your favorite coffee beverage?