CIS 141 Unit 3 Exam
Unlock all answers in this set
Unlock answersquestion
            The Wi-Fi standard ____ is no longer manufactured (but is backwards compatible with one of the other newer standards)
answer
        802.11b
question
            ____ is the use of networking technology to provide medical information and services
answer
        Telemedicine
question
            Some wireless ____ are created by cities or large organizations to provide free or low-cost Internet access to residents of a particular area
answer
        MANs
question
            Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger
answer
        WiMAX
question
            One type of mobile phone that might be used when mountain climbing far from any cellular towers is a ____
answer
        satellite phone
question
            Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa
answer
        modem
question
            The accompanying figure displays a ____
answer
        coaxial cable
question
            ____ transmissions are used with cell phones and are sent and received via cellular (cell) towers
answer
        Cellular radio
question
            The ____ allows individuals to "placeshift" multimedia content from their home TVs and DVRs to their portable computer or mobile device
answer
        Slingbox
question
            The technique used for data sent over the Internet is ____
answer
        packet switching
question
            A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network
answer
        network interface card (NIC)
question
            A global positioning system (GPS) consists of ____ and a group of GPS satellites
answer
        GPS receivers
question
            Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.  Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the network for which the data is intended and sends the data to that device only
answer
        switch
question
            ____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles
answer
        Microwave stations
question
            ____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period
answer
        Bandwidth
question
            ____ is typically used with LANs that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-optic cabling
answer
        Ethernet
question
            Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.  Gabrielle would like to purchase a new ____, which would be used to connect the company's LAN and the Internet
answer
        router
question
            ____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service
answer
        coaxial cable
question
            A means to provide a wireless connection to a peripheral devices. This is similar to, but different from, Bluetooth
answer
        wireless USB
question
            In a ____ network, there are a number of different connections between the devices on the network so that data can take any of several possible paths from source to destination
answer
        mesh
question
            ____ satellites travel at a speed and direction that keeps pace with the earth's rotation, so they appear (from earth) to remain stationary over a given spot
answer
        Geosynchronous
question
            ____ is a wireless standard that is designed for very short-range (10 meters, approximately 33 feet, or less) connections
answer
        Bluetooth
question
            Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert's job is a(n) ____ job
answer
        telecommuting
question
            The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes
answer
        global positioning system (GPS)
question
            Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.  Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____
answer
        access point
question
            A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to
answer
        hub
question
            Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted
answer
        sensors
question
            The accompanying figure shows a ____ network
answer
        star
question
            ____ is the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places
answer
        Videoconferencing
question
            __________ technology is commonly used to monitor the status of objects, such as shipping boxes, livestock, or expensive equipment to which these types of tags are attached
answer
        RFID
question
            A ____ is a network that covers a relatively small geographical area, such as a home, office building, or school
answer
        local area network (LAN)
question
            Which of the following is NOT a web browser?
answer
        Camtasia
question
            Anthony is passionate about politics and enjoys sharing his views with others over the Internet. A couple of times a week, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order
answer
        blog
question
            The program in the accompanying figure allows you to ____
answer
        instant message and video chat
question
            In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others
answer
        wikis
question
            Conventional dial-up connects to the Internet at a maximum of ____
answer
        56 Kbps
question
            Video content delivered at the user's request is called ____
answer
        video-on-demand
question
            One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search
answer
        phrase searching
question
            Online shopping and online investing are examples of ____
answer
        e-commerce
question
            A(n) ____ is a collection of an individual's work accessible through a Web site
answer
        e-portfolio
question
            ____ is charged with such responsibilities as IP address allocation and domain name management
answer
        ICANN (Internet Corporation for Assigned Names and Numbers)
question
            One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other
answer
        ARPANET
question
            The standard term for the technology that allows you to make voice calls using a broadband Internet connection instead of a traditional phone line is ____
answer
        VoIP
question
            The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies
answer
        Internet backbone
question
            ____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company
answer
        Third-party
question
            ____ allows you to exchange real-time messages
answer
        Instant messaging
question
            Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box
answer
        Internet Options
question
            The ____ is cited as a disadvantage of Web-based training and distance learning by some educators
answer
        lack of face-to-face contact
question
            Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking
answer
        search engine
question
            ____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom
answer
        Privacy
question
            ____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online
answer
        Web 2.0
question
            Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences
answer
        cookies
question
            ____ are businesses or other organizations that provide Internet access to others, typically for a fee
answer
        Internet service providers (ISPs)
question
            ____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site
answer
        RSS
question
            To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source
answer
        author
question
            Direct Internet connections are typically ____ connections
answer
        broadband
question
            The accompanying figure shows the MSN ____ , a specially designed web page that brings information together from diverse sources in a uniform way
answer
        web portal
question
            ____ is the most widely used type of home broadband connection, with over half of the home broadband market
answer
        Cable Internet access
question
            Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify
answer
        online portfolio
question
            Online music ____ allow you to purchase and then download music singles and albums to your computer, mobile phone, or portable digital media player
answer
        stores
question
            ____ are companies that provide computer-based services to customers over a network
answer
        Application service providers (ASPs)
question
            Computer crime is sometimes referred to as ____
answer
        cybercrime
question
            A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access
answer
        firewall
question
            According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country
answer
        the United States
question
            Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis
answer
        threat definitions
question
            A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to
answer
        virus
question
            ____ identify users by a particular unique biological characteristic
answer
        Biometric access systems
question
            A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network
answer
        virtual private network
question
            ____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name
answer
        Identity theft
question
            To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____
answer
        codes of conduct
question
            Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used
answer
        tokens
question
            Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them
answer
        war driving
question
            A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____
answer
        dot cons
question
            The best protection against many dot cons is ____
answer
        common sense
question
            The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business)
answer
        Wi-Fi piggybacking
question
            ____ includes any acts of malicious destruction to a computer or computer resource
answer
        Computer sabotage
question
            The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies
answer
        Homeland Security Act of 2002
question
            When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature
answer
        public
question
            Repeated threats or other harassment carried out online between adults is referred to as ____
answer
        cyberstalking
question
            A ____ is a malicious program that masquerades as something else—usually as some type of application program
answer
        Trojan horse
question
            A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network
answer
        worm
question
            Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites
answer
        typo-squatting
question
            ____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual
answer
        Passwords
question
            A computer that is controlled by a hacker or other computer criminal is referred to as a ____
answer
        bot
question
            ____ uses a single secret key to both encrypt and decrypt the file or message
answer
        Private key encryption
question
            ____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems
answer
        Possessed object
question
            ____ refers to the act of breaking into a computer or network
answer
        Hacking
question
            Like a computer virus, a ____ is a malicious program designed to cause damage
answer
        computer worm
question
            ____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive
answer
        Identity theft
question
            The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications
answer
        USA Patriot Act
question
            ____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities
answer
        Pharming
question
            ____ is a generic term that refers to any type of malicious software
answer
        Malware
