COSC CHAPTER 4-6

question

Companies can attract prospective employees by setting up job-specific discussion groups and forums on the Web
answer

true
question

All devices connected to the Internet must have a unique IP address.
answer

True
question

Distance education offers students a way of working through class material on a flexible schedule.
answer

True
question

Online travel planning requires you to visit multiple Web sites to book a vacation
answer

False
question

A distinctive advantage of accessing information on the Web is the ability to dig deeper into the subject matter.
answer

True
question

Cloud computing’s main task is to provide users with access to remote equipment and environments.
answer

False
question

Safari is an example of a Web browser.
answer

True
question

The private cloud model for cloud computing saves businesses money.
answer

True
question

Internet radio is limited to local stations that surround your current location.
answer

False
question

Podcasts and video podcasts are distributed using CSS technology.
answer

False / RSS
question

The popularity of ____ has encouraged everyday users to share events of the day.
answer

blog, social media, podcasts,
question

To acquire an online presence, you must subscribe to a Web ____ service that will store your files for users to access.
answer

hosting
question

A Web page can be created using Web development software such as ___
answer

Dreamweaver
question

Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes
answer

smart phone
question

A search engine attempts to catalog every Web page by topic through the use of a ____.
answer

spider
question

In a ____ portal, a user can access information related to his or her specific company, including communications tools for collaboration.
answer

corporate
question

It is much easier for people to remember ____ than IP addresses of Web site
answer

domain names
question

In an effort to fight against the illegal downloading of videos and movies, many ____ are working against networks such as BitTorrent.
answer

ISPs
question

Thanks to ____ files, a Web site can recognize you and cater to your individual tastes each time you visit.
answer

cookie
question

A popular financial service on the Web that supports mobile payment transactions is ____.
answer

PayPal
question

Protocols play an important role in defining how telecommunications work.
answer

True
question

Adding a data plan to a standard voice plan is unlikely to increase subscription cost.
answer

False
question

WiMAX requires hundreds, if not thousands, of access points to cover a city.
answer

False Wifi required it
question

Local area networks are privately owned
answer

True
question

GPS technology has become popular in social networking.
answer

True
question

No cabling or hard-wired connections are required for wireless data communications
answer

True
question

There is widespread support for using RFID technology in numerous ways including passports, driver’s licenses, and tracking of ex-convicts.
answer

False
question

Today’s cell phone networks use an analog signal.
answer

False
question

Analog systems were designed to support voice communications.
answer

True
question

Fiber-optic cabling sends signals much more slowly than twisted pair or coaxial cablin
answer

False
question

A(n) ____ network includes transmission towers that connect to area handsets
answer

cellular
question

Three types of physical cables that carry a signal are twisted pair, fiber optic, and __
answer

coaxial
question

We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives.
answer

wireless fidelity
question

Local area networks designed to serve an entire city are called ____ area networks.
answer

metropolitan
question

A(n) ____ signal is designed to represent computer data in a high or low state.
answer

digital
question

A typical setup for a ____ network would include computer users sharing a single Internet connection.
answer

home
question

A ____ is considered a telecommunications device that sends and receives signals.
answer

all of these cellular tower satellite network adapter
question

LTE access promises faster speeds for mobile wireless users and is aimed to be the successor to ____ technologies.
answer

3G
question

The Internet has adopted the ____ set of protocols to define its format of communications between device
answer

TCP/IP
question

A personal area network usually covers a range of around ____ feet.
answer

33
question

4. E-mail, Web pages, chat conversations, Internet TV, and radio content all travel over the Internet in small data packets.
answer

true
question

What is digital divide? you know how to get internet
answer

False
question

Web page who can create? do you have to write in HTML code only? how about MS word?
answer

everyone/ HTML : No / MS word: Yes
question

cloud computing/ which model of cloud computing except? cpph
answer

There are several cloud models that serve various environments, including private clouds, community clouds, public clouds, and hybrid clouds.
question

Synchronous v.s Asynchronous
answer

Synchronous: live; someone is there; 2 people communitcate (messenger) Asynchronous: only 1 person, temporary, 1 way communication (email)
question

how does data travel over the internet?
answer

it break into packet <- each has header/ travel over internet @ router to router Each packet includes a header with information about where the packet is going, where it originated, and other information necessary to transport the packet to its destination and recreate the original document. Data packets travel over the Internet from router to router until reaching their destinations.Each router examines incoming data packet headers to see where the packet is destined, and uses a routing table to determine the best path for the data packet to take to get closer to its destination.
question

Streaming media
answer

watching movie while downloading; NOT PODCAST the media begins playing while the file is being delivered. Problems arise with this technique only when the speed of play outpaces the speed delivery
question

why GOVT not use cloud computing?
answer

not secure, privacy
question

Cookie
answer

small file (text) for website – to look up personal [email protected] data base – for crime + science forensics – identify whenever he return
question

Types of computers: sever, embedded, personal / which one responds to request from client ?
answer

server
question

Portal
answer

customize home page
question

P2P V.S client server network essay
answer

P2P: everyone are equal client server network: centralize authority
question

physical cables
answer

study COSC 2
question

Apps?
answer

question

Wimax it congested or spread out? where would it be used, distance covers
answer

wifi for entire city Spread out See COSC2
question

Describe 3 network :PAN, LAN, WAN or MAN + example
answer

question

PAN :
answer

A personal area network (PAN) is the interconnection of personal information technology devices, typically wirelessly, within the range of an individual. – typically covers a range of around 33 feet or 10 meters. A PAN is typically implemented with Bluetooth.
question

WAN
answer

– connects LANs and MANs between cities, across a country, and around the world, using microwave and satellite transmission or telephone lines. – A LAN becomes a WAN when it extends beyond one geographic location to another geographic location EX PHONE CALL TO VIETNAM – are often used in business systems to connect multiple businesses in a supply chain. that crosses an international border is considered a global or international network
question

LAN
answer

Local area networks can include personal computers, servers, printers, and other network-capable devices.
question

Modem turn ___signal to ___ signal
answer

digtal analog
question

Cell phone service?
answer

question

Hot spot
answer

spot with wifi access
question

Home network
answer

is a local area network designed for personal or business use in the home.
question

system adminitrator
answer

who control / manage / maintain network
question

protocol
answer

TCP/IP w/o internet could not run
question

cell phone’s form factor
answer

determined how it work, feel, and looks clamshell, slide, swivel, bar, flip
question

geotag
answer

adding geographic identification metadata to digital media and messages. GPS in iphone
question

Nodes
answer

every device on Network: printer, fax.
question

compare PAN & home network ; LAN & MAN Essay
answer

PAN: a network covers within the range of an individual: bluetooth, personal computer ; Home network: local area network for personal or bussiness in the home: sharing a single internet, printer; LAN: network cover limit area : school, libary; MAN: is Local area network design for reserve an entire city
question

types of authentication
answer

what you know: password what you have – token: smart key part of you: finger print
question

A Guest account
answer

is for someone who does not have a permanent account and needs to temporarily access computer or network resources. Guests can’t change settings, install hardware or software, or create passwords. An Administrator has full access to system commands and resources.
question

fishing = phoiling
answer

is a technique used to trick a person into providing personal information on a fake Web site that looks like a reputable Web site. Identity thieves might submit a change of address form for a victim in order to have personal information rerouted to their own post office box. Personal information is often stolen by stealing wallets and purses or by stealingdatabase records from businesses.
question

white hacker >< black
answer

white: job/ get pay black: for fun,
question

Antivirus software when install it will be good for lifetime T or F
answer

False b/c it need update bugs
question

http://www.mediafire.com/view/co304b95ek80qp1/Ngoi+nha+hanh+phuc-+pianist_vn%40yahoo.com.pdf
answer

question

encryption
answer

secure data tranfer over internet with mathematics function
question

who stole information
answer

hacker
question

ways to keep your information?
answer

question

firewall
answer

only block undesireable / not dangerous
question

Updates
answer

fix of sofware
question

what internet base crime? ___ crime
answer

cyber crime
question

social engineering
answer

is a technique that uses social interaction to manipulate individuals into giving up personal information. For example, a criminal may phone a system administrator, pretending to be someone else in order to get access to a network account. Criminals might also buy personal information from other thieves, using underground networks and marketplaces that exist on the Internet.
question

Malware explain 3 list: cookie spyware Adware is spyware that displays advertisements.
answer

– Adware is spyware that displays advertisements. – Spyware differs from viruses and worms in that it does not self-replicate + is software installed on a computer without the user’s knowledge, either to monitor the user or to allow an outside party to control the computer – Cookie: a small text for website, look up personal information at database and whenever user might return, that possibly to steal by hacker

Get instant access to
all materials

Become a Member