M7 Formative Questions Flashcards
fiber-optic cables have all of the following advantages over cables that use wire except _____
lower costs and easier installation and modification
For best performance of a communications channel, ____.
bandwidth should be high and latency low
The design of computers, devices, and media in a network, sometimes called the ____, is categorized as either client/server or peer-to-peer.
network architecture
____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.
coaxial
____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.
P2p
_____ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals
fixed wireless
A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network.
router
______ takes place when the modem in a computer uses a standard telephone line to connect to the Internet.
dial-up access
A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system.
intelligent home network
A ____ is a wireless network that provides Internet connections to mobile computers and other devices.
hot spot
____ media consist of materials or substances capable of carrying one or more signals.
transmission
Each networked computer in a house can _____.
all answers are correct
____ cable consists of one or more twisted-pair wires bundled together.
twisted-pair
A ____ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media.
metropolitan area network (MAN)
Which of the following is a technology that provides high-speed Internet connection using the telephone network?
DSL
oversees research and sets standards and guidelines for many areas of the Internet
World Wide Web Consortium
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network
access
Until 1995, NSFnet handled the bulk of communications activity, or ____, on the Internet
traffic
The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
internet
A(n) ____ provider is a business that provides individuals and companies access to the Internet for free or for a fee.
access
A newsreader enables users to access a newsgroup to read previously entered messages, called ____.
articles
A(n) ____ is a real-time typed conversation that takes place on a computer.
chat
Web ____ is the development and maintenance of Web pages.
publishing
A ____ is a message that reveals a solution to a game or ending to a movie or program.
spoiler
Most e-commerce actually takes place between businesses, which is called ____.
business-to-business (B2B) e-commerce
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
Netiquette
A chat ____ is a location on an Internet server that permits users to chat with each other.
room
An e-mail ____ is a combination of user name and domain name that identifies a user so he or she can receive Internet e-mail.
address
Use ____, such as :) or :( , to express emotion in an e-mail message or newsgroup article.
emoticons
Many web sites use newsgroups instead of message boards because they are easier to use
false
NO SINGLE PERSON OR GOVERNMENT AGENCY CONTROLS OR OWNS THE INTERNET.
true
A ____ is a coffeehouse or restaurant that provides computers with Internet access to its customers.
cybercafé
A satellite ____ communicates with a satellite dish to provide high-speed Internet connections via satellite
modem
One of the major reasons business, home, and other users purchase computers is for Internet access
true
____ means that the people who are conversing on a computer are online at the same time.
real-time
A computer that stores and distributes newsgroup messages is called a newsreader.
false (news server)
A popular Web-based type of discussion group that does not require a newsreader is a(n) ____.
message board
The components of a domain name are separated by ____.
periods
A(n) ____ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
user name
Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download time.
false
____ is the process of transferring documents, graphics, and other objects from a computer to a server
uploading
The ____ consists of a worldwide collection of electronic documents
world wide web
Programmers often build trapdoors into programs during system development.
false
An online UPS switches to battery power when a problem occurs in the power line.
false (Offline UPS or Standby UPS)
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of
information theft.
true
A ___ is someone who uses the Internet or network to destroy or damage computers for political
reasons.
Cyber terrorist
A momentary overvoltage, called a \_\_\_\_\_\_\_\_, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
Spike
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can
provide power during a temporary or permanent loss of power
Uninterruptible power supply (UPS
A ___ occurs when the incoming electrical power increases significantly above the normal 120 volts.
Overvoltage
A(n) ____ occurs when the electrical power supply drops.
Undervoltage
With a(n) ________, users choose which folders and files to include in a backup
Selective backup
Most multiuser operating systems require that users correctly enter a user name and password
before they can access the data, information, and programs stored on a computer network.
True
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are
programs that act without a user’s knowledge and deliberately alter the computer’s operations.
Malware
Many systems implement access controls using a two-phase process called identification and
assessment.
False
A(n) ______ has the same intent as a cracker but does not have the technical skills and knowledge.
script kiddie
Many organizations and businesses have strict written policies governing the installation and use of
software and enforce their rules by checking networked or online computers periodically to ensure
that all software is licensed properly.
true
. Employee _____ involves the use of computers to observe, record, and review an employee’s use
of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites
visited.
Monitoring
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for
federal benefits.
Computer Matching and Privacy Protection Act
One approach to content filtering is through a rating system of ____, which is similar to those used
for movies and videos.
ICRA
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive
or unpleasant, it has serious long-term consequences.
False
A spyware program communicates information it collects to some inside source while a user is
offline.
false
To prevent repetitive strain injury, take all of the following precautions except ____.
using the heel of the hand as a pivot point while typing or using the mouse.
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four
feet.
false
It is illegal for employers to use software programs that monitor employees.
false
The 1986 ____ provides the same protection that covers mail and telephone communications to
electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
RSI
Many systems implement access controls using a two-phase process called identification and
assessment.
true
The higher a surge protector’s Joule rating, the poorer the protection.
False (better protection)
A(n) ________ network, the most recent network standard, conforms to the government security
standards and uses more sophisticated encryption techniques than WPA.
802.11i
A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides
continuous protection.
false
A(n) ________ occurs when the electrical supply drops.
under voltage
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can
provide power during a temporary or permanent loss of power.
Uninterruptible power supply (UPS)
A surge protector absorbs small overvoltages — generally without damage to the computer or
equipment.
true
Personal firewalls constantly monitor all transmissions to and from a computer and inform users of
any attempted intrusion.
true
A UPS connects between a computer and a ________.
power source
A fault-tolerant computer has duplicate components so that it can continue to operate when one
of its main components fail.
true
A wireless access point (WAP) should be configured to broadcast a network name, in order to
increase security.
true
________, which provides encryption of all data that passes between a client and an Internet
server, requires only that the client has a digital certificate.
(Transport Layer Security (TLS)
with a three-generation backup policy, the parent file is the ______.
Second oldest copy of the file
Web addresses of pages that use TLS typically begin with https, instead of http.
true
Digital signatures often are used to ensure that an imposter is not participating in an Internet
transaction.
true
A momentary overvoltage, called a \_\_\_\_\_\_\_\_, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
spike
With a three-generation backup policy, the grandparent is the _______.
Oldest copy of the file
A brownout is a complete power failure.
False blackout
Analog signatures help to prevent e-mail forgery
false digital signature
Employee ____ involves the use of computers to observe, record, and review an employee’s use of
a computer, including communications such as e-mail messages, keyboarding activity, and Web sites
visited.
Monitoring
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four
feet.
false experts recommend an area of at least two feet by
four fee
____ is a program placed on a computer without the user’s knowledge that secretly collects
information about the user
spyware
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive
or unpleasant, it has serious long-term consequences
false not thought to have serious or long-term
consequences.
To remove spyware, users need to obtain a special program that can detect and delete it.
true
Assume that because information is on the Web, it is accurate.
false
Computer addiction is an untreatable illness.
false treatable
Many organizations and businesses have strict written policies governing the installation and use of
software and enforce their rules by checking networked or online computers periodically to ensure
that all software is licensed properly.
true
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering
a computer
noise
_____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage
entering a computer
nosie
Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress
on that tendon.
false Tendonitis
Many businesses use spyware to limit employees’ Web access.
false filtering
A spyware program communicates information it collects to some inside source while a user is
offline.
False (outside source)
A(n) ____ program secretly collects information about a user.
Spyware
Many businesses use ___ to limit employees’ Web access.
Content filtering
Content ____ is the process of restricting access to certain material on the Web.
Filtering
Web ____ software is a program that restricts access to specified Web sites.
filtering
A communication _____, is a transmission media on which data, instructions, or information travel.
channel
The Internet has its roots in ____, a network that became functional in 1969, linking scientific and
academic researchers across the United State
ARPANET Advanced Research Project Agency Network
For smaller business and home networks, a ____ allows multiple computers to share a single
broadband Internet connection such as through a cable modem or DSL modem?
router
_______ allows users to share documents with others in real time.
An online meeting
Computer communications describes a process in which two or more computers or devices transfer
_____, _____ and _____.
data, instructions, and information
On a(n) \_\_\_\_\_\_\_\_\_\_\_\_ network, one or more computers act as a server and the other computers on the network request services from the server
client/server
The amount of data, instructions, and information that can travel over a communications channel
sometimes is called _______.
bandwidth
a satellite internet service _____.
Is a high speed Internet connection
Which of the following is NOT true of a Wi-Fi network?
Many home users set them up.
A Wi-Fi’s Internet service can be a DSL or a cable.
A Wi-Fi’s Internet service can be dial-up access.
Wi-Fis networks send signals to a communication deice that is connected to a high-speed
Internet service.
A Wi-Fi’s Internet service can be dial-up access.
FTP sites can be ________, whereby anyone can transfer some, if not all, available files
anonymous
Businesses seldom provide goods or services to other businesses, so little e-commerce takes place
between businesses.
false
Gmail and Windows Live Hotmail are two popular free e-mail Web applications.
true
Use to create, send, receive, forward, store, print, and delete e-mail messages
E-mail Program
A(n) ____ is a group of email names and addresses given a single name
Mailing list
In a chat room, others connected to the same chat room server see what a user has typed.
true
Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download
time.
False (compressed)
In a newsgroup, a ________ consists of the original article and all subsequent related replies.
THREAd
The Internet has its roots in a networking project started by the Pentagon’s ____________, an
agency of the U.S. Department of Defense.
Advanced Research Projects Agency (ARPA)
A ____________ is a device that provides a central point for cables in a network.
hub
On a network, some servers, called ____________ servers, perform a specific task and can be
placed with other servers to perform multiple tasks.
Dedicated servers
_______ is the time it takes a signal to travel from one location to another on a network
latency
____________ is an electrical disturbance that can degrade communications.
noise
In many public locations, people connect wirelessly to the Internet through a ____ using their
mobile computers or devices.
hot spot
The core of a(n) ____________ cable consists of dozens or hundreds of thin strands of glass or
plastic that use light to transmit signals.
Fiber-optic
hysical transmission media used in communications include all of the following except _____.
Twisted-pair cable
Broadcast radio cable
Fiber-optic cable
Coaxial cable
Broadcast radio cable
On a network, the ____________ are the computers and mobile devices on the network that rely
on the server for its resources.
client
The type of peer-to-peer network, called a(n) ________ network, describes an Internet network on
which users connect directly to each other hard disks and exchange files over the Internet.
INTERNET PEER-TO-PEER (P2P)
A(n) ____________ is a collection of computers and devices connected together via
communications devices and transmission media.
network
Today, ________ is a primary communications method for both personal and business use.
For ________ to work, both parties must be online at the same time, and the receiver of a message
must be willing to accept messages
instant messaging
Each electronic document on the Web is called a Web ________, which can contain text, graphics,
audio (sound), and video
page
A(n) ________ consists of an original newsgroup article and all subsequent related replies.
thread
Computers cannot get a virus through e-mail.
false can
Newsgroup members can add articles of their own.
true
Although it is an inexpensive way for users to connect to the Internet, ____________ is slow-speed
technology.
A dial-up connection
Some Web servers can pull content from a user’s computer at regular intervals or whenever
updates are made to the site.
False (Push
________ is an Internet standard that permits file uploading and downloading with other
computers on the Internet.
FTP
To add an e-mail name and address to a mailing list, a user unsubscribes from it.
False (Subscribe)
________ enables users to speak to other users over the Internet
VoIP
___ occurs when one consumer sells directly to another consumer, such as in an online auction.
consumer-to-consumer (C2C) e-commerce
________ is a real-time Internet communications service that notifies users when one or more
people are online and then allows them to exchange messages or files or join a private chat room.
Instant Messaging (IM)
In the past, e-commerce transactions were conducted primarily using mobile computers and
devices.
false
A _____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
surge
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
true
undervoltages can cause equipment damage, but generally do not cause data loss
false
is someone who uses e-mail as a vehicle for extortion
CyberExtortionist
Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
war driving
to _____ a file means to make a copy of it
back up
To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret.
false
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
CVS
to start a chat session, you connect to a chat server through a program called a
chat client
today’s browsers seldom include a chat client
false
what are the two widely accessed internet services
world wide web and email
a(n) _____ license is a legal agreement that allows multiple users to access the software on the server simultaneously
network
calls to other parties with the same internet telephone service often are free
true
to add an email name and address to a mailing list, a user unsubscribes from it
false
a customer (consumer) visits an online business through an electronic _____, which contains product descriptions, graphics, and a shopping cart
storefront
when a web address is entered, a user sends, or pushes, information to a web server
false
A chat is a location on an internet server that permits users to chat with each other
false chat room
A(n) _____ program is used to create, send, receive, forward, store, print, and delete e-mail messages
is a communications technology used by some outgoing mail servers
SMTP simple mail tranfer protocol
the time it takes a signal to travel from one location to another on a network
latency
a file server is a dedicated server that _____.
stores and manages files
a cable allows access to high-speed internet services through the cable television network
cable modem
physical transmission media used in communications include all of the following except _____
broadcast radio cable
Many home users are connecting multiple computers and devices together into a(n)
network
According to netiquette, internet users should assume which of the following?
the use of all capital letters is the equivalent of shouting
Podcasting is a popular method of distributing video
true
VoIp ____.
also is called internet telephony
uses the public switched telephone network
uses a slow speed dial-up connection
all other choices are correct
all other choices are correct
Perpetrators of back doors trick their victims intro interacting with phony websites
false
Which of the following copies all of the files in a coputer
full backup
The higher a surge protector’s Joule rating, the poorer the protection
false (better prot)
Many web browsers offer 128-bit encryption and ________ which are even higher levels of protection than 40-bit encryption because they have longer encryption keys.
1024-bit encryption
meains in a location separate from the computer site
offsite
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection
true
A computer _____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
security
It is illegal for employers to use software programs that monitor employees.
false