Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 50 Which type of storage device will store information on a storage med

ID: 3841602 • Letter: Q

Question

QUESTION 50

Which type of storage device will store information on a storage medium of 3-D crystal-like objects?

Biochip

Holographic storage device

Multi-state

CAVE

QUESTION 51

Identity theft occurs when someone forges your identity for fraudulent purposes.

True

False

QUESTION 53

What scrambles the contents of a file so you can't read it without having the right decryption key?

Encryption

Intrusion-detection software

Security-auditing software

All of the above

QUESTION 54

White-hat hackers are also called:

Black-hat hackers

Ethical hackers

Thrill-seeker hackers

Crackers

QUESTION 55

The project plan defines the what, when, and who questions of system development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity.

True

False

Biochip

Holographic storage device

Multi-state

CAVE

Explanation / Answer

50. A CAVE (cave automatic virtual environment) is a special 3-D virtual reality room that can display images of other people and objects located in other CAVEs all over the world. It is a special 3-D virtual reality room that can display images of people and objects in other CAVEs, These are holographic devices. So the answer of this queation is CAVE.

51. Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. So this statement is TRUE.

53. Encryptionscrambles the contents of afile so that you can‘t read it without having the rightdecryption key. It means scramblingyour communication in such a way that only theintended recipient can unscramble it.

One way of using encryption to protect network transmissions is called Secure SocketsLayer(SSL), or somewhat less commonly, by the name of its successor,TransferLayer Security(TLS).

SSL is a security technology that encrypts each network conversation—between one networkclient and one server—individually. Web traffic using SSLis called https, instead of just http.When you browse to a secure Web site and see thepadlock icon, it‘s telling you that yourbrowser is using SSL/TLS to encrypt your communicationswith the Web server. So the final answer is Encryption.

54. The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing. Contrasted with black hat, a malicious hacker, the name comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.

White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it can be taken advantage by others (such as black hat hackers.) Methods of telling the owners about it range from a simple phone call through sending an e-mail note to a Webmaster or administrator all the way to leaving an electronic "calling card" in the system that makes it obvious that security has been breached.

Final answer is Crakers.

55. A project plan is a formal document designed to guide the control and execution of a project. A project plan is the key to a successful project and is the most important document that needs to be created when starting any business project.

In IT, the term project plan refers to a a Gantt chart or any other document that displays project activities along a timeline. However, considering these documents alone as a project plan is inaccurate. These particular documents can be more precisely termed as project schedules, and may be considered only a part of the actual project plan.

So the final answer is FALSE.