M7 Formative Questions Flashcards

1
Q

fiber-optic cables have all of the following advantages over cables that use wire except _____

A

lower costs and easier installation and modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For best performance of a communications channel, ____.

A

bandwidth should be high and latency low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The design of computers, devices, and media in a network, sometimes called the ____, is categorized as either client/server or peer-to-peer.

A

network architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.

A

coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.

A

P2p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals

A

fixed wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ takes place when the modem in a computer uses a standard telephone line to connect to the Internet.

A

dial-up access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system.

A

intelligent home network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is a wireless network that provides Internet connections to mobile computers and other devices.

A

hot spot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ media consist of materials or substances capable of carrying one or more signals.

A

transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Each networked computer in a house can _____.

A

all answers are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ cable consists of one or more twisted-pair wires bundled together.

A

twisted-pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media.

A

metropolitan area network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a technology that provides high-speed Internet connection using the telephone network?

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

oversees research and sets standards and guidelines for many areas of the Internet

A

World Wide Web Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Until 1995, NSFnet handled the bulk of communications activity, or ____, on the Internet

A

traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A(n) ____ provider is a business that provides individuals and companies access to the Internet for free or for a fee.

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A newsreader enables users to access a newsgroup to read previously entered messages, called ____.

A

articles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A(n) ____ is a real-time typed conversation that takes place on a computer.

A

chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Web ____ is the development and maintenance of Web pages.

A

publishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ____ is a message that reveals a solution to a game or ending to a movie or program.

A

spoiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Most e-commerce actually takes place between businesses, which is called ____.

A

business-to-business (B2B) e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A chat ____ is a location on an Internet server that permits users to chat with each other.

A

room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An e-mail ____ is a combination of user name and domain name that identifies a user so he or she can receive Internet e-mail.

A

address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Use ____, such as :) or :( , to express emotion in an e-mail message or newsgroup article.

A

emoticons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Many web sites use newsgroups instead of message boards because they are easier to use

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NO SINGLE PERSON OR GOVERNMENT AGENCY CONTROLS OR OWNS THE INTERNET.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A ____ is a coffeehouse or restaurant that provides computers with Internet access to its customers.

A

cybercafé

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A satellite ____ communicates with a satellite dish to provide high-speed Internet connections via satellite

A

modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

One of the major reasons business, home, and other users purchase computers is for Internet access

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

____ means that the people who are conversing on a computer are online at the same time.

A

real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A computer that stores and distributes newsgroup messages is called a newsreader.

A

false (news server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A popular Web-based type of discussion group that does not require a newsreader is a(n) ____.

A

message board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The components of a domain name are separated by ____.

A

periods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A(n) ____ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.

A

user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download time.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

____ is the process of transferring documents, graphics, and other objects from a computer to a server

A

uploading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The ____ consists of a worldwide collection of electronic documents

A

world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Programmers often build trapdoors into programs during system development.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An online UPS switches to battery power when a problem occurs in the power line.

A

false (Offline UPS or Standby UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of
information theft.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A ___ is someone who uses the Internet or network to destroy or damage computers for political
reasons.

A

Cyber terrorist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
A momentary overvoltage, called a \_\_\_\_\_\_\_\_, occurs when the increase in power lasts for less than
one millisecond (one thousandth of a second).
A

Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A(n) ________ is a device that contains surge protection circuits and one or more batteries that can
provide power during a temporary or permanent loss of power

A

Uninterruptible power supply (UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A ___ occurs when the incoming electrical power increases significantly above the normal 120 volts.

A

Overvoltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A(n) ____ occurs when the electrical power supply drops.

A

Undervoltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

With a(n) ________, users choose which folders and files to include in a backup

A

Selective backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Most multiuser operating systems require that users correctly enter a user name and password
before they can access the data, information, and programs stored on a computer network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are
programs that act without a user’s knowledge and deliberately alter the computer’s operations.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Many systems implement access controls using a two-phase process called identification and
assessment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A(n) ______ has the same intent as a cracker but does not have the technical skills and knowledge.

A

script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Many organizations and businesses have strict written policies governing the installation and use of
software and enforce their rules by checking networked or online computers periodically to ensure
that all software is licensed properly.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

. Employee _____ involves the use of computers to observe, record, and review an employee’s use
of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites
visited.

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The 1988 ____ regulates the use of government data to determine the eligibility of individuals for
federal benefits.

A

Computer Matching and Privacy Protection Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

One approach to content filtering is through a rating system of ____, which is similar to those used
for movies and videos.

A

ICRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive
or unpleasant, it has serious long-term consequences.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A spyware program communicates information it collects to some inside source while a user is
offline.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

To prevent repetitive strain injury, take all of the following precautions except ____.

A

using the heel of the hand as a pivot point while typing or using the mouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

For a computer workspace, ergonomics experts recommend an area smaller than two feet by four
feet.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

It is illegal for employers to use software programs that monitor employees.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The 1986 ____ provides the same protection that covers mail and telephone communications to
electronic communications such as voice mail.

A

Electronic Communications Privacy Act (ECPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints

A

RSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Many systems implement access controls using a two-phase process called identification and
assessment.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

The higher a surge protector’s Joule rating, the poorer the protection.

A

False (better protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A(n) ________ network, the most recent network standard, conforms to the government security
standards and uses more sophisticated encryption techniques than WPA.

A

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides
continuous protection.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A(n) ________ occurs when the electrical supply drops.

A

under voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A(n) ________ is a device that contains surge protection circuits and one or more batteries that can
provide power during a temporary or permanent loss of power.

A

Uninterruptible power supply (UPS)

73
Q

A surge protector absorbs small overvoltages — generally without damage to the computer or
equipment.

A

true

74
Q

Personal firewalls constantly monitor all transmissions to and from a computer and inform users of
any attempted intrusion.

A

true

75
Q

A UPS connects between a computer and a ________.

A

power source

76
Q

A fault-tolerant computer has duplicate components so that it can continue to operate when one
of its main components fail.

A

true

77
Q

A wireless access point (WAP) should be configured to broadcast a network name, in order to
increase security.

A

true

78
Q

________, which provides encryption of all data that passes between a client and an Internet
server, requires only that the client has a digital certificate.

A

(Transport Layer Security (TLS)

79
Q

with a three-generation backup policy, the parent file is the ______.

A

Second oldest copy of the file

80
Q

Web addresses of pages that use TLS typically begin with https, instead of http.

A

true

81
Q

Digital signatures often are used to ensure that an imposter is not participating in an Internet
transaction.

A

true

82
Q
A momentary overvoltage, called a \_\_\_\_\_\_\_\_, occurs when the increase in power lasts for less than
one millisecond (one thousandth of a second).
A

spike

83
Q

With a three-generation backup policy, the grandparent is the _______.

A

Oldest copy of the file

84
Q

A brownout is a complete power failure.

A

False blackout

85
Q

Analog signatures help to prevent e-mail forgery

A

false digital signature

86
Q

Employee ____ involves the use of computers to observe, record, and review an employee’s use of
a computer, including communications such as e-mail messages, keyboarding activity, and Web sites
visited.

A

Monitoring

87
Q

For a computer workspace, ergonomics experts recommend an area smaller than two feet by four
feet.

A

false experts recommend an area of at least two feet by

four fee

88
Q

____ is a program placed on a computer without the user’s knowledge that secretly collects
information about the user

A

spyware

89
Q

Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive
or unpleasant, it has serious long-term consequences

A

false not thought to have serious or long-term

consequences.

90
Q

To remove spyware, users need to obtain a special program that can detect and delete it.

A

true

91
Q

Assume that because information is on the Web, it is accurate.

A

false

92
Q

Computer addiction is an untreatable illness.

A

false treatable

93
Q

Many organizations and businesses have strict written policies governing the installation and use of
software and enforce their rules by checking networked or online computers periodically to ensure
that all software is licensed properly.

A

true

94
Q

____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering
a computer

A

noise

95
Q

_____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage
entering a computer

A

nosie

96
Q

Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress
on that tendon.

A

false Tendonitis

97
Q

Many businesses use spyware to limit employees’ Web access.

A

false filtering

98
Q

A spyware program communicates information it collects to some inside source while a user is
offline.

A

False (outside source)

99
Q

A(n) ____ program secretly collects information about a user.

A

Spyware

100
Q

Many businesses use ___ to limit employees’ Web access.

A

Content filtering

101
Q

Content ____ is the process of restricting access to certain material on the Web.

A

Filtering

102
Q

Web ____ software is a program that restricts access to specified Web sites.

A

filtering

103
Q

A communication _____, is a transmission media on which data, instructions, or information travel.

A

channel

104
Q

The Internet has its roots in ____, a network that became functional in 1969, linking scientific and
academic researchers across the United State

A

ARPANET Advanced Research Project Agency Network

105
Q

For smaller business and home networks, a ____ allows multiple computers to share a single
broadband Internet connection such as through a cable modem or DSL modem?

A

router

106
Q

_______ allows users to share documents with others in real time.

A

An online meeting

107
Q

Computer communications describes a process in which two or more computers or devices transfer
_____, _____ and _____.

A

data, instructions, and information

108
Q
On a(n) \_\_\_\_\_\_\_\_\_\_\_\_ network, one or more computers act as a server and the other computers on
the network request services from the server
A

client/server

109
Q

The amount of data, instructions, and information that can travel over a communications channel
sometimes is called _______.

A

bandwidth

110
Q

a satellite internet service _____.

A

Is a high speed Internet connection

111
Q

Which of the following is NOT true of a Wi-Fi network?

Many home users set them up.

A Wi-Fi’s Internet service can be a DSL or a cable.

A Wi-Fi’s Internet service can be dial-up access.

Wi-Fis networks send signals to a communication deice that is connected to a high-speed
Internet service.

A

A Wi-Fi’s Internet service can be dial-up access.

112
Q

FTP sites can be ________, whereby anyone can transfer some, if not all, available files

A

anonymous

113
Q

Businesses seldom provide goods or services to other businesses, so little e-commerce takes place
between businesses.

A

false

114
Q

Gmail and Windows Live Hotmail are two popular free e-mail Web applications.

A

true

115
Q

Use to create, send, receive, forward, store, print, and delete e-mail messages

A

E-mail Program

116
Q

A(n) ____ is a group of email names and addresses given a single name

A

Mailing list

117
Q

In a chat room, others connected to the same chat room server see what a user has typed.

A

true

118
Q

Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download
time.

A

False (compressed)

119
Q

In a newsgroup, a ________ consists of the original article and all subsequent related replies.

A

THREAd

120
Q

The Internet has its roots in a networking project started by the Pentagon’s ____________, an
agency of the U.S. Department of Defense.

A

Advanced Research Projects Agency (ARPA)

121
Q

A ____________ is a device that provides a central point for cables in a network.

A

hub

122
Q

On a network, some servers, called ____________ servers, perform a specific task and can be
placed with other servers to perform multiple tasks.

A

Dedicated servers

123
Q

_______ is the time it takes a signal to travel from one location to another on a network

A

latency

124
Q

____________ is an electrical disturbance that can degrade communications.

A

noise

125
Q

In many public locations, people connect wirelessly to the Internet through a ____ using their
mobile computers or devices.

A

hot spot

126
Q

The core of a(n) ____________ cable consists of dozens or hundreds of thin strands of glass or
plastic that use light to transmit signals.

A

Fiber-optic

127
Q

hysical transmission media used in communications include all of the following except _____.

Twisted-pair cable

Broadcast radio cable

Fiber-optic cable

Coaxial cable

A

Broadcast radio cable

128
Q

On a network, the ____________ are the computers and mobile devices on the network that rely
on the server for its resources.

A

client

129
Q

The type of peer-to-peer network, called a(n) ________ network, describes an Internet network on
which users connect directly to each other hard disks and exchange files over the Internet.

A

INTERNET PEER-TO-PEER (P2P)

130
Q

A(n) ____________ is a collection of computers and devices connected together via
communications devices and transmission media.

A

network

131
Q

Today, ________ is a primary communications method for both personal and business use.

A

e-mail

132
Q

For ________ to work, both parties must be online at the same time, and the receiver of a message
must be willing to accept messages

A

instant messaging

133
Q

Each electronic document on the Web is called a Web ________, which can contain text, graphics,
audio (sound), and video

A

page

134
Q

A(n) ________ consists of an original newsgroup article and all subsequent related replies.

A

thread

135
Q

Computers cannot get a virus through e-mail.

A

false can

136
Q

Newsgroup members can add articles of their own.

A

true

137
Q

Although it is an inexpensive way for users to connect to the Internet, ____________ is slow-speed
technology.

A

A dial-up connection

138
Q

Some Web servers can pull content from a user’s computer at regular intervals or whenever
updates are made to the site.

A

False (Push

139
Q

________ is an Internet standard that permits file uploading and downloading with other
computers on the Internet.

A

FTP

140
Q

To add an e-mail name and address to a mailing list, a user unsubscribes from it.

A

False (Subscribe)

141
Q

________ enables users to speak to other users over the Internet

A

VoIP

142
Q

___ occurs when one consumer sells directly to another consumer, such as in an online auction.

A

consumer-to-consumer (C2C) e-commerce

143
Q

________ is a real-time Internet communications service that notifies users when one or more
people are online and then allows them to exchange messages or files or join a private chat room.

A

Instant Messaging (IM)

144
Q

In the past, e-commerce transactions were conducted primarily using mobile computers and
devices.

A

false

145
Q

A _____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.

A

surge

146
Q

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

A

true

147
Q

undervoltages can cause equipment damage, but generally do not cause data loss

A

false

148
Q

is someone who uses e-mail as a vehicle for extortion

A

CyberExtortionist

149
Q

Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.

A

war driving

150
Q

to _____ a file means to make a copy of it

A

back up

151
Q

To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret.

A

false

152
Q

Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.

A

CVS

153
Q

to start a chat session, you connect to a chat server through a program called a

A

chat client

154
Q

today’s browsers seldom include a chat client

A

false

155
Q

what are the two widely accessed internet services

A

world wide web and email

156
Q

a(n) _____ license is a legal agreement that allows multiple users to access the software on the server simultaneously

A

network

157
Q

calls to other parties with the same internet telephone service often are free

A

true

158
Q

to add an email name and address to a mailing list, a user unsubscribes from it

A

false

159
Q

a customer (consumer) visits an online business through an electronic _____, which contains product descriptions, graphics, and a shopping cart

A

storefront

160
Q

when a web address is entered, a user sends, or pushes, information to a web server

A

false

161
Q

A chat is a location on an internet server that permits users to chat with each other

A

false chat room

162
Q

A(n) _____ program is used to create, send, receive, forward, store, print, and delete e-mail messages

A

e-mail

163
Q

is a communications technology used by some outgoing mail servers

A

SMTP simple mail tranfer protocol

164
Q

the time it takes a signal to travel from one location to another on a network

A

latency

165
Q

a file server is a dedicated server that _____.

A

stores and manages files

166
Q

a cable allows access to high-speed internet services through the cable television network

A

cable modem

167
Q

physical transmission media used in communications include all of the following except _____

A

broadcast radio cable

168
Q

Many home users are connecting multiple computers and devices together into a(n)

A

network

169
Q

According to netiquette, internet users should assume which of the following?

A

the use of all capital letters is the equivalent of shouting

170
Q

Podcasting is a popular method of distributing video

A

true

171
Q

VoIp ____.

also is called internet telephony

uses the public switched telephone network

uses a slow speed dial-up connection

all other choices are correct

A

all other choices are correct

172
Q

Perpetrators of back doors trick their victims intro interacting with phony websites

A

false

173
Q

Which of the following copies all of the files in a coputer

A

full backup

174
Q

The higher a surge protector’s Joule rating, the poorer the protection

A

false (better prot)

175
Q

Many web browsers offer 128-bit encryption and ________ which are even higher levels of protection than 40-bit encryption because they have longer encryption keys.

A

1024-bit encryption

176
Q

meains in a location separate from the computer site

A

offsite

177
Q

Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection

A

true

178
Q

A computer _____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

A

security

179
Q

It is illegal for employers to use software programs that monitor employees.

A

false