Information Systems VII, VIII, IX Flashcards
Bluetooth
Links up to 8 devices in 10-m area using low-power, radio-based
communication
Useful for personal networking (PANs)
Packet switching
Method of slicing digital messages into parcels (packets),
sending packets along different communication paths as
they become available, and then reassembling packets at
destination
• Previous circuit-switched networks required assembly of
complete point-to-point circuit
What is the most prevalent form of computing?
Select one:
a. Printers
b. Mobile phones
c. Mobile devices Correct
d. Desktop computers
What is the most prevalent form of computing?
Select one:
c. Mobile devices
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
Select one:
a. wireless hubs
b. hot points
c. touch points
d. hotspots Correct
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
d. hotspots
What is a hacker?
a. A person who gains unauthorized access to a computer network for profit, criminal mischief,
or personal pleasure
b. The capture or collection of raw data from within the organization or from its external
environment for processing in an information system
c. Technology that aids in gathering information about a person or organization without their
knowledge
d. Malicious software programs such as computer viruses, worms, and Trojan horses
a. A person who gains unauthorized access to a computer network for profit, criminal mischief,
or personal pleasure
What is a firewall?
a. Firewall adjusts copyright laws to the Internet Age by making it illegal to make, distribute, or
use devices that circumvent technology-based protections of copyrighted materials
b. A statutory grant that protects creators of intellectual property against copying by others for
any purpose
c. All of the methods, policies, and procedures that ensure protection of the organization’s
assets
d. Hardware and software placed between an organization’s internal network and an external
network to prevent outsiders from invading private networks
What is a firewall?
d. Hardware and software placed between an organization’s internal network and an external
network to prevent outsiders from invading private networks