Unit 3 Test Essay
A normal telephone cable is a type of ________.
Any device connected to a network, such as a computer, printer or game console.
A large network designed to provide access to a specific geographic area, such as a large city is a _______?
On a network,a(n) _________ helps prevent data packets from colliding with each other.
A client/server network is an example of _________ administration
A peer-to-peer (P2P) network is an example of ________administration
Data are sent through a network on bundles called ________.
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
For the nodes on a network to communicate with each other and access the network; each node needs a __________
Which transmission medium transmits data the fastest?
Microphone and Touch Pad
The primary input devices for smartphones are ________.
The global positioning system is a network of 21 ________ plus 3 working spares
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
The operating system of a phone is called a ____________.
converts the sound waves from a voice into a digital signal
The screen size
A main difference between the tablet and the smartphone is the _______
An Internet connectivity plan is also known as a ________ plan.
Short Message Service (SMS)
Text messaging is also called ________.
The distance between two near field communication (NFC) devices is limited to about ________.
Using your computer for non-work activities while you are being paid to work is known as ________.
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
A ________ is a virus that is attached to documents such as Word or Excel files.
Creating and distributing ________ is one of the most widespread types of cybercrimes.
When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as ________.
Which of the following classifications of viruses can change its own code to avoid detection?
A _____ is a virus that is triggered on a certain date.
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.