Test Two for Computer Part 2

Unlock all answers in this set

Unlock answers
question
Microwave communication uses high-frequency _______.
answer
radio waves
question
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
answer
client/server
question
The GPS device in an automobile uses which communication channel?
answer
satellite
question
WiMax stands for _______.
answer
Worldwide Interoperability for Microwave Access
question
Which physical connection is the fastest?
answer
Fiber-optic cable
question
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
answer
TCP/IP
question
A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.
answer
Hotspot
question
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.
answer
Broadband
question
Remote users can connect to an organization's network through this type of secure private connection.
answer
VPN
question
Cellular services use _______ to provide wireless connectivity to the Internet.
answer
3G and 4G cellular networks
question
Which among the following is considered a line-of-sight communication medium?
answer
Microwave
question
The _______ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.
answer
switch
question
_______ is a term relating to sending data to a satellite.
answer
Uplink
question
Every computer on the Internet has a unique numeric address called a(n) _______.
answer
IP address
question
In a communication system, which among the following convert messages into packets that can travel across the communication channel?
answer
Connective Devices
question
In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?
answer
Sending and receiving devices
question
All communications between a company's internal networks and the outside world pass through this server.
answer
Proxy
question
The capacity of a communication channel is measured in _______.
answer
bandwidth
question
This type of network topology does not use a specific physical layout.
answer
Mesh
question
A network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other sub-ordinate nodes.
answer
Tree
question
This device enables connectivity between two LANS or a LAN and a larger network.
answer
Network gateway
question
In a computer network, this node that requests and uses resources available from other nodes.
answer
Client
question
_______ is the process of breaking down information sent or transmitted across the Internet into small parts.
answer
Packetization
question
A service that uses existing phone lines to provide high-speed connections is called _______.
answer
DSL
question
Organizations use the following to allow suppliers and others limited access to their networks.
answer
Extranets
question
One of the most dramatic changes in connectivity and communications in the past few years has been _______.
answer
widespread use of mobile devices with wireless Internet connectivity
question
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
answer
cookies
question
These are used by advertisers to keep track of your web activity as you move from one site to the next.
answer
Third-party cookies
question
_______ is concerned with protecting software and data from unauthorized tampering or damage.
answer
Data security
question
Programs used to secretly record an individual's activities on the Internet are called _______.
answer
spyware
question
This is a legal concept that gives content creators the right to control use and distribution of their work.
answer
Copyright
question
Corporations often use this to prevent copyright violations.
answer
Digital rights management (DRM)
question
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
answer
Rogue
question
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away
answer
Digital Millennium Copyright Act
question
Which of the following is not malware?
answer
Ad-Aware
question
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
answer
Keystroke logger
question
This type of computer criminal creates and distributes malicious programs.
answer
cracker
question
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
answer
Privacy
question
Which of the following is the most widely used wireless network encryption for home wireless networks?
answer
WPA2
question
Which among the following is a way to shut down an ISP or website?
answer
Denial of service attack
question
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
answer
Employee-monitoring software
question
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
answer
Privacy mode
question
Free computer games and free screen saver programs are typical carriers of _______.
answer
Trojan horses
question
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
answer
Dictionary attack
question
Computer criminals that create and spread viruses are punished under this law.
answer
Computer Fraud and Abuse Act
question
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
answer
Internet scam
question
This law gives you the right to look at your personal records held by government agencies.
answer
Freedom of Information Act
question
A program that replicates itself and clogs computers and networks.
answer
Worm
question
A(n) _______ acts as a security buffer between a corporation's private network and all external networks.
answer
Firewall
question
Which of the following is not a measure to protect computer security?
answer
Keeping the same password on all systems consistently
question
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
answer
Cyberbullying
question
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
answer
Encryption
question
People that collect and sell personal data are called _______.
answer
information resellers
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New