Lecture Test 2 Flashcards
An external hard disk_____.
usually connects to a USB or Thunderbolt port
Optical discs use these to represent data.
Pits and lands
Smartphones use which of these storage technologies?
Flash memory card
Solid-state storage devices are different than hard disks in that they_____.
have no moving parts
This allows you to upload and store documents on the Internet.
Cloud storage
Three ways to improve the performance of a hard disk include_____.
disk caching, RAID, and file compression
Which of the following is not an example of secondary storage?
RAM
Which of the following is true about an internal hard disk?
Often stores the operating system
Which of the following measures the amount of time required by the storage device to retrieve data and programs?
Access speed
Which of these is not a mass storage device?
Optical disc
A service that uses existing phone lines to provide high-speed connections is called _____.
DSL
Cellular services use _____ to provide wireless connectivity to the internet.
3G and 4G cellular networks
Every computer on the Internet has a unique numeric address called a(n) _____.
IP address
Organizations use the following to allow suppliers and others limited access to their networks.
Extranets
Remote users can connect to an organization’s network through this type of secure private connection.
VPN
The _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.
switch
The capacity of a communication channel is measured in _____.
bandwidth
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
TCP/IP
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
Client/server
Which physical connection is the fastest?
Fiber-optic cable
A _____ acts as a security buffer between a corporation’s private network and all external networks.
firewall
A program that replicates itself and clogs computers and networks.
Worm
Corporations often use this to prevent copyright violations.
Digital rights management (DRM)
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
Privacy mode
Programs used to secretly record an individual’s activities on the Internet are called _____.
spyware
Small data files that are deposited on a user’s hard disk when they visit a website are called _____.
cookies
The process of coding information to make it unreadable except to those who have a special information known as a key.
Encryption
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
Cyberbullying