COSC CHAPTER 4-6

Unlock all answers in this set

Unlock answers
question
Companies can attract prospective employees by setting up job-specific discussion groups and forums on the Web
answer
true
question
All devices connected to the Internet must have a unique IP address.
answer
True
question
Distance education offers students a way of working through class material on a flexible schedule.
answer
True
question
Online travel planning requires you to visit multiple Web sites to book a vacation
answer
False
question
A distinctive advantage of accessing information on the Web is the ability to dig deeper into the subject matter.
answer
True
question
Cloud computing's main task is to provide users with access to remote equipment and environments.
answer
False
question
Safari is an example of a Web browser.
answer
True
question
The private cloud model for cloud computing saves businesses money.
answer
True
question
Internet radio is limited to local stations that surround your current location.
answer
False
question
Podcasts and video podcasts are distributed using CSS technology.
answer
False / RSS
question
The popularity of ____ has encouraged everyday users to share events of the day.
answer
blog, social media, podcasts,
question
To acquire an online presence, you must subscribe to a Web ____ service that will store your files for users to access.
answer
hosting
question
A Web page can be created using Web development software such as ___
answer
Dreamweaver
question
Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes
answer
smart phone
question
A search engine attempts to catalog every Web page by topic through the use of a ____.
answer
spider
question
In a ____ portal, a user can access information related to his or her specific company, including communications tools for collaboration.
answer
corporate
question
It is much easier for people to remember ____ than IP addresses of Web site
answer
domain names
question
In an effort to fight against the illegal downloading of videos and movies, many ____ are working against networks such as BitTorrent.
answer
ISPs
question
Thanks to ____ files, a Web site can recognize you and cater to your individual tastes each time you visit.
answer
cookie
question
A popular financial service on the Web that supports mobile payment transactions is ____.
answer
PayPal
question
Protocols play an important role in defining how telecommunications work.
answer
True
question
Adding a data plan to a standard voice plan is unlikely to increase subscription cost.
answer
False
question
WiMAX requires hundreds, if not thousands, of access points to cover a city.
answer
False Wifi required it
question
Local area networks are privately owned
answer
True
question
GPS technology has become popular in social networking.
answer
True
question
No cabling or hard-wired connections are required for wireless data communications
answer
True
question
There is widespread support for using RFID technology in numerous ways including passports, driver's licenses, and tracking of ex-convicts.
answer
False
question
Today's cell phone networks use an analog signal.
answer
False
question
Analog systems were designed to support voice communications.
answer
True
question
Fiber-optic cabling sends signals much more slowly than twisted pair or coaxial cablin
answer
False
question
A(n) ____ network includes transmission towers that connect to area handsets
answer
cellular
question
Three types of physical cables that carry a signal are twisted pair, fiber optic, and __
answer
coaxial
question
We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives.
answer
wireless fidelity
question
Local area networks designed to serve an entire city are called ____ area networks.
answer
metropolitan
question
A(n) ____ signal is designed to represent computer data in a high or low state.
answer
digital
question
A typical setup for a ____ network would include computer users sharing a single Internet connection.
answer
home
question
A ____ is considered a telecommunications device that sends and receives signals.
answer
all of these cellular tower satellite network adapter
question
LTE access promises faster speeds for mobile wireless users and is aimed to be the successor to ____ technologies.
answer
3G
question
The Internet has adopted the ____ set of protocols to define its format of communications between device
answer
TCP/IP
question
A personal area network usually covers a range of around ____ feet.
answer
33
question
4. E-mail, Web pages, chat conversations, Internet TV, and radio content all travel over the Internet in small data packets.
answer
true
question
What is digital divide? you know how to get internet
answer
False
question
Web page who can create? do you have to write in HTML code only? how about MS word?
answer
everyone/ HTML : No / MS word: Yes
question
cloud computing/ which model of cloud computing except? cpph
answer
There are several cloud models that serve various environments, including private clouds, community clouds, public clouds, and hybrid clouds.
question
Synchronous v.s Asynchronous
answer
Synchronous: live; someone is there; 2 people communitcate (messenger) Asynchronous: only 1 person, temporary, 1 way communication (email)
question
how does data travel over the internet?
answer
it break into packet <- each has header/ travel over internet @ router to router Each packet includes a header with information about where the packet is going, where it originated, and other information necessary to transport the packet to its destination and recreate the original document. Data packets travel over the Internet from router to router until reaching their destinations.Each router examines incoming data packet headers to see where the packet is destined, and uses a routing table to determine the best path for the data packet to take to get closer to its destination.
question
Streaming media
answer
watching movie while downloading; NOT PODCAST the media begins playing while the file is being delivered. Problems arise with this technique only when the speed of play outpaces the speed delivery
question
why GOVT not use cloud computing?
answer
not secure, privacy
question
Cookie
answer
small file (text) for website - to look up personal information@ data base - for crime + science forensics - identify whenever he return
question
Types of computers: sever, embedded, personal / which one responds to request from client ?
answer
server
question
Portal
answer
customize home page
question
P2P V.S client server network essay
answer
P2P: everyone are equal client server network: centralize authority
question
physical cables
answer
study COSC 2
question
Apps?
answer
...
question
Wimax it congested or spread out? where would it be used, distance covers
answer
wifi for entire city Spread out See COSC2
question
Describe 3 network :PAN, LAN, WAN or MAN + example
answer
...
question
PAN :
answer
A personal area network (PAN) is the interconnection of personal information technology devices, typically wirelessly, within the range of an individual. - typically covers a range of around 33 feet or 10 meters. A PAN is typically implemented with Bluetooth.
question
WAN
answer
- connects LANs and MANs between cities, across a country, and around the world, using microwave and satellite transmission or telephone lines. - A LAN becomes a WAN when it extends beyond one geographic location to another geographic location EX PHONE CALL TO VIETNAM - are often used in business systems to connect multiple businesses in a supply chain. that crosses an international border is considered a global or international network
question
LAN
answer
Local area networks can include personal computers, servers, printers, and other network-capable devices.
question
Modem turn ___signal to ___ signal
answer
digtal analog
question
Cell phone service?
answer
...
question
Hot spot
answer
spot with wifi access
question
Home network
answer
is a local area network designed for personal or business use in the home.
question
system adminitrator
answer
who control / manage / maintain network
question
protocol
answer
TCP/IP w/o internet could not run
question
cell phone's form factor
answer
determined how it work, feel, and looks clamshell, slide, swivel, bar, flip
question
geotag
answer
adding geographic identification metadata to digital media and messages. GPS in iphone
question
Nodes
answer
every device on Network: printer, fax.
question
compare PAN & home network ; LAN & MAN Essay
answer
PAN: a network covers within the range of an individual: bluetooth, personal computer ; Home network: local area network for personal or bussiness in the home: sharing a single internet, printer; LAN: network cover limit area : school, libary; MAN: is Local area network design for reserve an entire city
question
types of authentication
answer
what you know: password what you have - token: smart key part of you: finger print
question
A Guest account
answer
is for someone who does not have a permanent account and needs to temporarily access computer or network resources. Guests can't change settings, install hardware or software, or create passwords. An Administrator has full access to system commands and resources.
question
fishing = phoiling
answer
is a technique used to trick a person into providing personal information on a fake Web site that looks like a reputable Web site. Identity thieves might submit a change of address form for a victim in order to have personal information rerouted to their own post office box. Personal information is often stolen by stealing wallets and purses or by stealingdatabase records from businesses.
question
white hacker >< black
answer
white: job/ get pay black: for fun,
question
Antivirus software when install it will be good for lifetime T or F
answer
False b/c it need update bugs
question
http://www.mediafire.com/view/co304b95ek80qp1/Ngoi+nha+hanh+phuc-+pianist_vn%40yahoo.com.pdf
answer
...
question
encryption
answer
secure data tranfer over internet with mathematics function
question
who stole information
answer
hacker
question
ways to keep your information?
answer
...
question
firewall
answer
only block undesireable / not dangerous
question
Updates
answer
fix of sofware
question
what internet base crime? ___ crime
answer
cyber crime
question
social engineering
answer
is a technique that uses social interaction to manipulate individuals into giving up personal information. For example, a criminal may phone a system administrator, pretending to be someone else in order to get access to a network account. Criminals might also buy personal information from other thieves, using underground networks and marketplaces that exist on the Internet.
question
Malware explain 3 list: cookie spyware Adware is spyware that displays advertisements.
answer
- Adware is spyware that displays advertisements. - Spyware differs from viruses and worms in that it does not self-replicate + is software installed on a computer without the user's knowledge, either to monitor the user or to allow an outside party to control the computer - Cookie: a small text for website, look up personal information at database and whenever user might return, that possibly to steal by hacker
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New