M7 Formative Questions Flashcards
fiber-optic cables have all of the following advantages over cables that use wire except _____
lower costs and easier installation and modification
For best performance of a communications channel, ____.
bandwidth should be high and latency low
The design of computers, devices, and media in a network, sometimes called the ____, is categorized as either client/server or peer-to-peer.
network architecture
____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.
coaxial
____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.
P2p
_____ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals
fixed wireless
A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network.
router
______ takes place when the modem in a computer uses a standard telephone line to connect to the Internet.
dial-up access
A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system.
intelligent home network
A ____ is a wireless network that provides Internet connections to mobile computers and other devices.
hot spot
____ media consist of materials or substances capable of carrying one or more signals.
transmission
Each networked computer in a house can _____.
all answers are correct
____ cable consists of one or more twisted-pair wires bundled together.
twisted-pair
A ____ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media.
metropolitan area network (MAN)
Which of the following is a technology that provides high-speed Internet connection using the telephone network?
DSL
oversees research and sets standards and guidelines for many areas of the Internet
World Wide Web Consortium
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network
access
Until 1995, NSFnet handled the bulk of communications activity, or ____, on the Internet
traffic
The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
internet
A(n) ____ provider is a business that provides individuals and companies access to the Internet for free or for a fee.
access
A newsreader enables users to access a newsgroup to read previously entered messages, called ____.
articles
A(n) ____ is a real-time typed conversation that takes place on a computer.
chat
Web ____ is the development and maintenance of Web pages.
publishing
A ____ is a message that reveals a solution to a game or ending to a movie or program.
spoiler
Most e-commerce actually takes place between businesses, which is called ____.
business-to-business (B2B) e-commerce
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
Netiquette
A chat ____ is a location on an Internet server that permits users to chat with each other.
room
An e-mail ____ is a combination of user name and domain name that identifies a user so he or she can receive Internet e-mail.
address
Use ____, such as :) or :( , to express emotion in an e-mail message or newsgroup article.
emoticons
Many web sites use newsgroups instead of message boards because they are easier to use
false
NO SINGLE PERSON OR GOVERNMENT AGENCY CONTROLS OR OWNS THE INTERNET.
true
A ____ is a coffeehouse or restaurant that provides computers with Internet access to its customers.
cybercafé
A satellite ____ communicates with a satellite dish to provide high-speed Internet connections via satellite
modem
One of the major reasons business, home, and other users purchase computers is for Internet access
true
____ means that the people who are conversing on a computer are online at the same time.
real-time
A computer that stores and distributes newsgroup messages is called a newsreader.
false (news server)
A popular Web-based type of discussion group that does not require a newsreader is a(n) ____.
message board
The components of a domain name are separated by ____.
periods
A(n) ____ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
user name
Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download time.
false
____ is the process of transferring documents, graphics, and other objects from a computer to a server
uploading
The ____ consists of a worldwide collection of electronic documents
world wide web
Programmers often build trapdoors into programs during system development.
false
An online UPS switches to battery power when a problem occurs in the power line.
false (Offline UPS or Standby UPS)
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of
information theft.
true
A ___ is someone who uses the Internet or network to destroy or damage computers for political
reasons.
Cyber terrorist
A momentary overvoltage, called a \_\_\_\_\_\_\_\_, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
Spike
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can
provide power during a temporary or permanent loss of power
Uninterruptible power supply (UPS
A ___ occurs when the incoming electrical power increases significantly above the normal 120 volts.
Overvoltage
A(n) ____ occurs when the electrical power supply drops.
Undervoltage
With a(n) ________, users choose which folders and files to include in a backup
Selective backup
Most multiuser operating systems require that users correctly enter a user name and password
before they can access the data, information, and programs stored on a computer network.
True
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are
programs that act without a user’s knowledge and deliberately alter the computer’s operations.
Malware
Many systems implement access controls using a two-phase process called identification and
assessment.
False
A(n) ______ has the same intent as a cracker but does not have the technical skills and knowledge.
script kiddie
Many organizations and businesses have strict written policies governing the installation and use of
software and enforce their rules by checking networked or online computers periodically to ensure
that all software is licensed properly.
true
. Employee _____ involves the use of computers to observe, record, and review an employee’s use
of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites
visited.
Monitoring
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for
federal benefits.
Computer Matching and Privacy Protection Act
One approach to content filtering is through a rating system of ____, which is similar to those used
for movies and videos.
ICRA
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive
or unpleasant, it has serious long-term consequences.
False
A spyware program communicates information it collects to some inside source while a user is
offline.
false
To prevent repetitive strain injury, take all of the following precautions except ____.
using the heel of the hand as a pivot point while typing or using the mouse.
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four
feet.
false
It is illegal for employers to use software programs that monitor employees.
false
The 1986 ____ provides the same protection that covers mail and telephone communications to
electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
RSI
Many systems implement access controls using a two-phase process called identification and
assessment.
true
The higher a surge protector’s Joule rating, the poorer the protection.
False (better protection)
A(n) ________ network, the most recent network standard, conforms to the government security
standards and uses more sophisticated encryption techniques than WPA.
802.11i
A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides
continuous protection.
false
A(n) ________ occurs when the electrical supply drops.
under voltage