CIS 141 Unit 3 Exam
Unlock all answers in this set
Unlock answersquestion
The Wi-Fi standard ____ is no longer manufactured (but is backwards compatible with one of the other newer standards)
answer
802.11b
question
____ is the use of networking technology to provide medical information and services
answer
Telemedicine
question
Some wireless ____ are created by cities or large organizations to provide free or low-cost Internet access to residents of a particular area
answer
MANs
question
Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger
answer
WiMAX
question
One type of mobile phone that might be used when mountain climbing far from any cellular towers is a ____
answer
satellite phone
question
Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa
answer
modem
question
The accompanying figure displays a ____
answer
coaxial cable
question
____ transmissions are used with cell phones and are sent and received via cellular (cell) towers
answer
Cellular radio
question
The ____ allows individuals to "placeshift" multimedia content from their home TVs and DVRs to their portable computer or mobile device
answer
Slingbox
question
The technique used for data sent over the Internet is ____
answer
packet switching
question
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network
answer
network interface card (NIC)
question
A global positioning system (GPS) consists of ____ and a group of GPS satellites
answer
GPS receivers
question
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the network for which the data is intended and sends the data to that device only
answer
switch
question
____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles
answer
Microwave stations
question
____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period
answer
Bandwidth
question
____ is typically used with LANs that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-optic cabling
answer
Ethernet
question
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle would like to purchase a new ____, which would be used to connect the company's LAN and the Internet
answer
router
question
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service
answer
coaxial cable
question
A means to provide a wireless connection to a peripheral devices. This is similar to, but different from, Bluetooth
answer
wireless USB
question
In a ____ network, there are a number of different connections between the devices on the network so that data can take any of several possible paths from source to destination
answer
mesh
question
____ satellites travel at a speed and direction that keeps pace with the earth's rotation, so they appear (from earth) to remain stationary over a given spot
answer
Geosynchronous
question
____ is a wireless standard that is designed for very short-range (10 meters, approximately 33 feet, or less) connections
answer
Bluetooth
question
Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert's job is a(n) ____ job
answer
telecommuting
question
The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes
answer
global positioning system (GPS)
question
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____
answer
access point
question
A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to
answer
hub
question
Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted
answer
sensors
question
The accompanying figure shows a ____ network
answer
star
question
____ is the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places
answer
Videoconferencing
question
__________ technology is commonly used to monitor the status of objects, such as shipping boxes, livestock, or expensive equipment to which these types of tags are attached
answer
RFID
question
A ____ is a network that covers a relatively small geographical area, such as a home, office building, or school
answer
local area network (LAN)
question
Which of the following is NOT a web browser?
answer
Camtasia
question
Anthony is passionate about politics and enjoys sharing his views with others over the Internet. A couple of times a week, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order
answer
blog
question
The program in the accompanying figure allows you to ____
answer
instant message and video chat
question
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others
answer
wikis
question
Conventional dial-up connects to the Internet at a maximum of ____
answer
56 Kbps
question
Video content delivered at the user's request is called ____
answer
video-on-demand
question
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search
answer
phrase searching
question
Online shopping and online investing are examples of ____
answer
e-commerce
question
A(n) ____ is a collection of an individual's work accessible through a Web site
answer
e-portfolio
question
____ is charged with such responsibilities as IP address allocation and domain name management
answer
ICANN (Internet Corporation for Assigned Names and Numbers)
question
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other
answer
ARPANET
question
The standard term for the technology that allows you to make voice calls using a broadband Internet connection instead of a traditional phone line is ____
answer
VoIP
question
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies
answer
Internet backbone
question
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company
answer
Third-party
question
____ allows you to exchange real-time messages
answer
Instant messaging
question
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box
answer
Internet Options
question
The ____ is cited as a disadvantage of Web-based training and distance learning by some educators
answer
lack of face-to-face contact
question
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking
answer
search engine
question
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom
answer
Privacy
question
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online
answer
Web 2.0
question
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences
answer
cookies
question
____ are businesses or other organizations that provide Internet access to others, typically for a fee
answer
Internet service providers (ISPs)
question
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site
answer
RSS
question
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source
answer
author
question
Direct Internet connections are typically ____ connections
answer
broadband
question
The accompanying figure shows the MSN ____ , a specially designed web page that brings information together from diverse sources in a uniform way
answer
web portal
question
____ is the most widely used type of home broadband connection, with over half of the home broadband market
answer
Cable Internet access
question
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify
answer
online portfolio
question
Online music ____ allow you to purchase and then download music singles and albums to your computer, mobile phone, or portable digital media player
answer
stores
question
____ are companies that provide computer-based services to customers over a network
answer
Application service providers (ASPs)
question
Computer crime is sometimes referred to as ____
answer
cybercrime
question
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access
answer
firewall
question
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country
answer
the United States
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis
answer
threat definitions
question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to
answer
virus
question
____ identify users by a particular unique biological characteristic
answer
Biometric access systems
question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network
answer
virtual private network
question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name
answer
Identity theft
question
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____
answer
codes of conduct
question
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used
answer
tokens
question
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them
answer
war driving
question
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____
answer
dot cons
question
The best protection against many dot cons is ____
answer
common sense
question
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business)
answer
Wi-Fi piggybacking
question
____ includes any acts of malicious destruction to a computer or computer resource
answer
Computer sabotage
question
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies
answer
Homeland Security Act of 2002
question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature
answer
public
question
Repeated threats or other harassment carried out online between adults is referred to as ____
answer
cyberstalking
question
A ____ is a malicious program that masquerades as something else—usually as some type of application program
answer
Trojan horse
question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network
answer
worm
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites
answer
typo-squatting
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual
answer
Passwords
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____
answer
bot
question
____ uses a single secret key to both encrypt and decrypt the file or message
answer
Private key encryption
question
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems
answer
Possessed object
question
____ refers to the act of breaking into a computer or network
answer
Hacking
question
Like a computer virus, a ____ is a malicious program designed to cause damage
answer
computer worm
question
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive
answer
Identity theft
question
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications
answer
USA Patriot Act
question
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities
answer
Pharming
question
____ is a generic term that refers to any type of malicious software
answer
Malware