COSC 1401 Final – Flashcards

Unlock all answers in this set

Unlock answers
question
Fiber-optic cabling sends signals much more slowly than twisted pair or coaxial cabling.
answer
False
question
A DSL modem is similar to a satellite connection and provides high-speed Internet service over telephone lines.
answer
False
question
The language of telecommunications is governed by ____. a. servers b. the Web c. protocols d. hardware specifications
answer
Protocols
question
Signal frequency is measured in ____. bits per second hertz gigabytes nanobits
answer
hertz
question
Three types of physical cables that carry a signal are twisted pair, fiber optic, and ____. wave coaxial Ethernet satellite
answer
coaxial
question
____ is a popular cable type used as network backbone by major telecommunications companies. Twisted pair Fiber optic Coaxial FCC
answer
Fiber-optic
question
To prevent interference and improve transmission of data, services such as cell phones are allocated at different ____. frequencies bytes per second access points light beams
answer
frequencies
question
With the help of a ____, devices can modulate signals from one form to another to allow them to connect to the Internet. Question options: twisted-pair cable spectrum radio wave modem
answer
modem
question
Through ____, signals can be received from one point and resent to a different location on a different frequency. Question options: analog connections ISPs satellites cellular networks
answer
satellites
question
Cell phone towers have a limited communication range of one mile.
answer
False
question
Today's cell phone networks use an analog signal.
answer
False
question
When choosing a cell phone service, you should consider all of the following EXCEPT ____. Question options: router type carrier plan of service device features
answer
router type
question
A(n) ____ network includes transmission towers that connect to area handsets. Question options: Ethernet local metro cellular
answer
Cellular
question
Competing with LTE is RFID, a similar technology used by cellular carriers such as Verizon.
answer
False
question
Bluetooth technology is a possible solution to the "last mile" problem.
answer
False
question
A WiMAX access point has a ____-mile range. 1.3 3 13 31
answer
31
question
An area of a building where you can connect to the Internet wirelessly is often referred to as a ____. GPS spot hotspot cell tower signal
answer
hotspot
question
We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives. Question options: cell towers text messaging Code Division Multiple Access wireless fidelity
answer
wireless fidelity
question
LTE access promises faster speeds for mobile wireless users and is aimed to be the successor to ____ technologies. 2G 3G 4G 5G
answer
3G
question
A new fourth-generation technology called ____ is competing to become the wireless network of choice for high-speed connectivity. Question options: Wi-Fi Bluetooth Long Term Evolution smart phones
answer
long term evolution
question
____ technology enables you to connect to your cell phone through a display on your car's dashboard. Question options: Global positioning Bluetooth Narrowband Fiber-optic
answer
Bluetooth
question
____ technology may someday replace today's bar code system for identifying items in inventory. Question options: VPN RFID SIM WAP
answer
RFID
question
Tagging a photo with geographic data is known as ____. Question options: metatagging geotagging metacartography digital geography
answer
geotagging
question
Wirelessly synchronizing your laptop with your cell phone requires at least a PAN setup
answer
True
question
A personal area network is created when two local area networks are connected to share information.
answer
False
question
Devices attached to a network are identified as ____. Question options: routers tags pinpoints nodes
answer
nodes
question
The ____ oversees the setup, maintenance, and implementation of a network in a business environment. Question options: node worker database analyst system administrator software engineer
answer
System administrator
question
Bluetooth is an example of a ____ area network. Question options: local personal wide metro
answer
personal
question
A typical setup for a ____ network would include computer users sharing a single Internet connection. Question options: home wide area star bus
answer
home
question
A(n) ____ expands the boundaries of a company's intranet to include networks outside of its local area network setting. Question options: EPN APN EDI VPN
answer
VPN
question
Local area networks designed to serve an entire city are called ____ area networks. Question options: urban metropolitan city major
answer
metropolitan
question
Wide area networks use telecommunications devices such as ____ to transmit data. Question options: havens fortresses coves satellites
answer
Satellites
question
The ease of access to information on the Internet has made it harder to maintain personal privacy.
answer
True
question
Surveillance cameras in public places are not considered a potential threat to privacy.
answer
False
question
The First Amendment to the Constitution of the United States includes the phrase "the right of each citizen to expect and enjoy a reasonable degree of personal privacy."
answer
False
question
Data mining involves collecting and analyzing large amounts of information generated about a person, including financial, medical, communications, and entertainment data.
answer
True
question
Throttling is a way that ISPs can shape traffic and rein in the heavy-bandwidth users.
answer
True
question
The term ____ describes everything collected from the Internet including postings to a Facebook wall, digital pictures and videos, and online purchase receipts to name a few.
answer
Big Data
question
Citizens of free and democratic nations expect, at the least, privacy ____.
answer
Within the home
question
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.
answer
Privacy Act of 1974
question
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.
answer
Satellite Imagery
question
____ can tell more about a person than all other kinds of electronic surveillance.
answer
Data mining
question
Studying the way people use the Web—what sites they visit, what products they buy, etc.—is an example of ____.
answer
One-to-one marketing
question
Of the following, ____ contains the most information about citizens of the United States.
answer
Time Warner LexisNexis
question
____ is a form of traffic shaping.
answer
Throttling
question
Full transparency is a scenario in which surveillance and information are ____.
answer
easily available to every law-abiding member of a society
question
Twitter is a ____ site.
answer
Microblogging
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
Pirate
question
Biometrics uses a token system to authenticate users of a device.
answer
False
question
Information security is implemented at the individual machine level, the computer network level, and the ____ level.
answer
Internet
question
An item such as a smart card is an example of the ____ form of authentication.
answer
something you have
question
A popular encryption method used to protect data that travels over a network is ____.
answer
WPA
question
Businesses prefer to use technology known as ____ to create an exact copy of their files for backup.
answer
RAID
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
User
question
You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of ____.
answer
data-entry error
question
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
answer
True
question
Information theft is a problem that only exists here in the United States.
answer
False
question
People's mistakes can lead to problems with ____ of computer systems and information.
answer
security accuracy reliability
question
Businesses are working to control information ____ by not allowing employees to store important data on their laptop computers.
answer
theft
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
question
Once installed, antivirus software is effective for the life of the computer.
answer
False
question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
answer
social engineering
question
Criminals collect items such as credit card numbers without the knowledge of the user through the use of ____.
answer
spyware
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
question
All of the following are examples of malware EXCEPT ____. worms viruses spyware updates
answer
updates
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
Sites such as eBay are a popular target for ____.
answer
Internet fraud
question
The https:// protocol in a URL indicates the use of a(n) ____ by the Web site.
answer
SSL connection
question
Receiving a fraudulent e-mail that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) ____ attack.
answer
phishing
question
Two of the landmark laws ensuring accessibility of computer technology to those with disabilities are the U.S. Telecommunications Act and the Americans with Disabilities Act.
answer
True
question
Environmentally conscious manufacture and use of computer technologies is known as green computing.
answer
True
question
In general, governmental computer ethics involves two main types of responsibilities: ____ and ____.
answer
protection; empowerment
question
The ability of people with disabilities to interact with and make use of computer resources is known as ____.
answer
accessibility
question
How are LEDs used in green computing?
answer
They reduce the energy used in displays.
question
Programs such as ____ support energy conservation for electronic devices.
answer
Energy Star
question
In the past 10 years, the digital divide in the United States has ____.
answer
shrunk
question
Personal computer ethics involves ____.
answer
the legality or illegality of a behavior or an action the effect of a behavior or an action on the public good the effect of a behavior or an action on a person's own well-being
question
IT Access for Everyone is an initiative for increasing access to digital technology for ____.
answer
developing nations
question
An ethical perspective can be taken with personal, business, and even governmental actions.
answer
True
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New