Questions LLC
Login
or
Sign Up
Ask a New Question
Donald Craven
Questions and answers by
Donald Craven
, page 2
Questions (428)
How did Enlightenment thinkers such as Diderot and Voltaire challenge religious structures?(1 point)
Responses Diderot and
1 answer
39 views
What was a major goal of the use of satire in Enlightenment art and literature?(1 point)
Responses to accept traditional ideas as
1 answer
40 views
Which of the following is a belief about economics supported by Adam Smith?(1 point)
Responses The protection of private property
1 answer
42 views
Europe 1650 - 1815 Unit Test
6 of 196 of 19 Items Question Which policy was practiced by Louis XIV, Peter the Great, and
1 answer
40 views
Europe 1650 - 1815 Unit Test
7 of 197 of 19 Items Question Why did Louis XIV, Peter the Great, and Frederick the Great all build
1 answer
75 views
Europe 1650 - 1815 Unit Test
8 of 198 of 19 Items Question Why was the Magna Carta most important to the development of
1 answer
107 views
Which event/s had historical implications that contributed to the storming of the Bastille?(1 point)
Responses the Tennis Court
1 answer
32 views
How was the French revolution a response to Enlightenment philosophy ideas?(1 point)
Responses The French revolution was a result
1 answer
43 views
Europe 1650 - 1815 Unit Test
12 of 1912 of 19 Items Question What was Europe’s commercial hub during the Commercial
1 answer
44 views
Europe 1650 - 1815 Unit Test
13 of 1913 of 19 Items Question Identify the role of maritime voyages around the world in the
1 answer
51 views
Identify the role of maritime voyages around the world in the Commercial Revolution.
(1 point) Maritime voyages expanded
1 answer
56 views
When was paper money invented?(1 point)
Responses during the Commercial Revolution in Europe around the year 1400 during the
1 answer
38 views
Europe 1650 - 1815 Unit Test
15 of 1915 of 19 Items Question How did Adam Smith feel about institutional economic interference
1 answer
72 views
Native Americans and African Slaves Quick Check
2 of 52 of 5 Items Question Analyze Indigenous resistance movements from the
1 answer
54 views
Native Americans and African Slaves Quick Check
3 of 53 of 5 Items Question How did chattel slavery and the encomienda system
1 answer
77 views
Question
Which of the following statements best assesses the relationship between chattel slavery and the Industrial
1 answer
47 views
Native Americans and African Slaves Quick Check
5 of 55 of 5 Items Question Why did mercantilism in Spain fail to produce the
1 answer
46 views
A wave of amplitude 4.0 meters interferes with a second wave of amplitude 6.0 meters. If both waves are positive, what is the
1 answer
105 views
A taut wire has a wave with a wavelength of 4.5 meters and a frequency of 100 hertz. What is the speed of the wave in the
1 answer
28 views
A taut wire has a wave with a wavelength of 4.5 meters and a frequency of 100 hertz. What is the speed of the wave in the
1 answer
101 views
Interference of Waves Quick Check
3 of 43 of 4 Items Question A wave interference where the wave amplitudes combine to yield a
1 answer
69 views
The position of a standing wave where constructive inference is at maximum is called _________. (1 point)
Responses Antinodes
1 answer
58 views
A triangle has leg lengths of 8,12 and 14 classify the trianlge
1 answer
34 views
you are trying to measure the height of your house, but only have a surveyor tool that measures angles, and you know your
1 answer
24 views
Briefly describe the plot of the film La historia oficial
1 answer
31 views
Click on this LINK and read about the “de facto segregation” known as Jim Crow laws. Describe at least two of the
1 answer
37 views
What laws were the “freedom riders” protesting?
1 answer
28 views
What method was used by the NAACP to reach their goals in Greensboro, North Carolina?
1 answer
34 views
which shows some of the beautiful murals painted in Los Angeles, CA. What effect does seeing these murals have on people who see
1 answer
46 views
explanation of the Cuban Missile Crisis/ Bay of Pigs
Which ONE of these statements is true? Place an X in front of ONE true
1 answer
35 views
Which ONE of these statements is true? Place an X in front of ONE true statement.
___ Kennedy and Nikita Kruschev argued for the
1 answer
77 views
How will/does the Medicare Act of 1965 have a positive effect on you and the people you love
1 answer
94 views
What things do we use daily that can be traced directly to this race to get to the moon?
1 answer
31 views
Betty Friedan, a feminist writer, wrote a book called “The Feminine Mystique”. What was its overall message?
1 answer
34 views
1. Tinker v. DesMoines
2. Miranda v. Arizona 3. Gideon v. Wainwright 4. Mapp v. Ohio A. protects your right to have a lawyer if
1 answer
44 views
Cuyahoga River disaster What was the public reaction to that?
1 answer
35 views
1. NASA
2. OSHA 3. EPA 4. DEA 5. Arab-Israeli War 6. crisis 7. detente A govt. agency aimed at reducing use of illegal drugs. B
1 answer
25 views
Place an X in front of which ONE of these statements about the events surrounding “Watergate” is true.
___ Nixon lied about
1 answer
91 views
n a move that greatly increased presidential power, Congress passed the Gulf of Tonkin Resolution. What did this law allow the
1 answer
49 views
32. Read about Earth Day and the environmental disasters on slides 1-4 of 9. In your opinion, was it foolish to start a movement
1 answer
51 views
The “counterculture” movement of the 70s challenged traditional social patterns. List at least 5 ways that hippies
1 answer
42 views
Watch this video about OPEC. Explain what happened in 1973 in the U.S. when those countries placed an embargo on oil production.
1 answer
49 views
Read about the extremely talented Shirley Chisholm at this link. and at the link at the bottom of slide 2 of 9.
36. List at least
1 answer
36 views
Read about the status of the Equal Rights Amendment at this link. Why do you think the amendment has faced such opposition, even
1 answer
33 views
The 1970s were a time of protest and activism, for Latinos and American Indians alike. As you read about them on slides 4
1 answer
57 views
The primary reason that the US decided to enter into the conflict in Vietnam can be explained by the “domino theory.” What
1 answer
58 views
Explain Lyndon B. Johnson’s “War on Poverty,” and describe key programs in the plan, which included housing programs, jobs
1 answer
52 views
3–5 sentences, explain Lyndon B. Johnson’s “War on Poverty,” and describe key programs in the plan, which included
1 answer
68 views
Kendrick just celebrated his 20th birthday. According to US laws, what does this MOST likely mean?
(1 point) Responses He can buy
1 answer
63 views
Find f(g(4))
1 answer
27 views
What is the inverse of the given relation?
y=2x−1
1 answer
23 views
Draw and label a model of an office local area network (LAN) that is using a star topology for the wired connections and a
1 answer
77 views
What is the hardware progression from a device to the internet in a wireless network?(1 point)
Responses NIC, switch, access
1 answer
40 views
Which one of these factors limits the physical topology of a network?(1 point)
Responses physical layout of nodes physical layout
1 answer
37 views
How does a client-server work?(1 point)
Responses works by allowing hosts to connect to the server via the internet works by
1 answer
48 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses port port firewall
1 answer
38 views
You have added a new wireless tablet to the network. As an approved device, what is the function that the tablet can perform on
1 answer
57 views
Why must a network architect consider scalability when designing a network?(1 point)
Responses To keep up with growing demand for
1 answer
66 views
Why must a network architect consider scalability when designing a network?(1 point)
Responses To keep up with growing demand for
1 answer
58 views
Network Communication and Organization Unit Test
13 of 2013 of 20 Items Question There are currently 254 devices connected to a
1 answer
68 views
Which of the following is the correct term used to determine the bandwidth of any network transmission?(1 point)
Responses 3.5
1 answer
47 views
Describe the role of bandwidth in a network device’s internet performance. Give your answer in 1-2 sentence
1 answer
20 views
Common Security Threats Quick Check
1 of 51 of 5 Items Question What is adware?(1 point) Responses Adware is designed to carry
1 answer
88 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
32 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
35 views
What action would be sufficient to execute code from a USB drive?(1 point)
Responses You just need to scan the drive. You just
1 answer
72 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
51 views
Digital and Social Risks Quick Check
2 of 52 of 5 Items Question What would you use to hide and encrypt your internet traffic?(1
1 answer
41 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
58 views
What type of person tries to get your personal information by sending out friend requests from a fake profile?(1 point)
Responses
1 answer
41 views
Your computer keeps having annoying pop-ups opening asking for you to purchase a software application and for your personal
1 answer
64 views
During the winter months when it is cold the internet works at full speed. The network administrator notices that during the
1 answer
36 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
31 views
A student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
36 views
Which of the following is an example of an internal threat?(1 point)
Responses a power surge from a thunderstorm a power surge
1 answer
27 views
What is generally traded when securing systems?(1 point)
Responses the time to configure the systems the time to configure the
1 answer
35 views
Which of the following passwords would be considered the strongest and most secure?(1 point)
Responses ready2go123!@
1 answer
29 views
Devising Security Solutions Quick Check
1 of 51 of 5 Items Question You install antimalware software on your computer. What is
1 answer
38 views
Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are
1 answer
37 views
Using media access control (MAC) on your Wi-Fi requires the devices to which of the following?(1 point)
Responses be on an
1 answer
49 views
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of
1 answer
54 views
Policies are the foundation of devising an effective security solution. What is the best way to implement the policies with
1 answer
55 views
What is the purpose of a firewall?(1 point)
Responses shape internet traffic shape internet traffic monitor and filter network
1 answer
40 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
55 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
38 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
39 views
A small company with 25 employees is attacked and its data are encrypted. The chief executive officer (CEO) does not think their
1 answer
42 views
What is the goal of SafeCode?(1 point)
Responses to ensure software integrity to ensure software integrity to reduce the
1 answer
46 views
What is the most complete explanation of the Zero Trust Methodology?(1 point)
Responses No one is considered trusted, and each
1 answer
38 views
Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses hash algorithms hash algorithms multifactor
1 answer
53 views
A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging
1 answer
47 views
Why is it important for developers to protect and ensure the integrity and reliability of software?(1 point)
Responses so
1 answer
41 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack causes users to constantly reboot their
1 answer
42 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack causes users to constantly reboot their
1 answer
92 views
How does spyware operate?(1 point)
Responses Spyware closely monitors computers and potentially sends sensitive or protected
1 answer
61 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
29 views
You have received several emails from a company offering you a summer internship. You are very interested in the extended
1 answer
90 views
How can installation media can be used to compromise a computer?(1 point)
Responses Installation media is designed to avoid
1 answer
76 views
How can installation media can be used to compromise a computer? (1 point)
Responses 1. Installation media is designed to avoid
1 answer
45 views
What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet?(1 point)
Responses
1 answer
59 views
Pages
1
2
3
4
5