M7 Formative Questions Flashcards

1
Q

fiber-optic cables have all of the following advantages over cables that use wire except _____

A

lower costs and easier installation and modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For best performance of a communications channel, ____.

A

bandwidth should be high and latency low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The design of computers, devices, and media in a network, sometimes called the ____, is categorized as either client/server or peer-to-peer.

A

network architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.

A

coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating.

A

P2p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals

A

fixed wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ takes place when the modem in a computer uses a standard telephone line to connect to the Internet.

A

dial-up access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system.

A

intelligent home network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is a wireless network that provides Internet connections to mobile computers and other devices.

A

hot spot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ media consist of materials or substances capable of carrying one or more signals.

A

transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Each networked computer in a house can _____.

A

all answers are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ cable consists of one or more twisted-pair wires bundled together.

A

twisted-pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media.

A

metropolitan area network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a technology that provides high-speed Internet connection using the telephone network?

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

oversees research and sets standards and guidelines for many areas of the Internet

A

World Wide Web Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Until 1995, NSFnet handled the bulk of communications activity, or ____, on the Internet

A

traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A(n) ____ provider is a business that provides individuals and companies access to the Internet for free or for a fee.

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A newsreader enables users to access a newsgroup to read previously entered messages, called ____.

A

articles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A(n) ____ is a real-time typed conversation that takes place on a computer.

A

chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Web ____ is the development and maintenance of Web pages.

A

publishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ____ is a message that reveals a solution to a game or ending to a movie or program.

A

spoiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Most e-commerce actually takes place between businesses, which is called ____.
business-to-business (B2B) e-commerce
26
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
Netiquette
27
A chat ____ is a location on an Internet server that permits users to chat with each other.
room
28
An e-mail ____ is a combination of user name and domain name that identifies a user so he or she can receive Internet e-mail.
address
29
Use ____, such as :) or :( , to express emotion in an e-mail message or newsgroup article.
emoticons
30
Many web sites use newsgroups instead of message boards because they are easier to use
false
31
NO SINGLE PERSON OR GOVERNMENT AGENCY CONTROLS OR OWNS THE INTERNET.
true
32
A ____ is a coffeehouse or restaurant that provides computers with Internet access to its customers.
cybercafé
33
A satellite ____ communicates with a satellite dish to provide high-speed Internet connections via satellite
modem
34
One of the major reasons business, home, and other users purchase computers is for Internet access
true
35
____ means that the people who are conversing on a computer are online at the same time.
real-time
36
A computer that stores and distributes newsgroup messages is called a newsreader.
false (news server)
37
A popular Web-based type of discussion group that does not require a newsreader is a(n) ____.
message board
38
The components of a domain name are separated by ____.
periods
39
A(n) ____ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
user name
40
Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download time.
false
41
____ is the process of transferring documents, graphics, and other objects from a computer to a server
uploading
42
The ____ consists of a worldwide collection of electronic documents
world wide web
43
Programmers often build trapdoors into programs during system development.
false
44
An online UPS switches to battery power when a problem occurs in the power line.
false (Offline UPS or Standby UPS)
45
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
true
46
A ___ is someone who uses the Internet or network to destroy or damage computers for political reasons.
Cyber terrorist
47
``` A momentary overvoltage, called a ________, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second). ```
Spike
48
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power
Uninterruptible power supply (UPS
49
A ___ occurs when the incoming electrical power increases significantly above the normal 120 volts.
Overvoltage
50
A(n) ____ occurs when the electrical power supply drops.
Undervoltage
51
With a(n) ________, users choose which folders and files to include in a backup
Selective backup
52
Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network.
True
53
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations.
Malware
54
Many systems implement access controls using a two-phase process called identification and assessment.
False
55
A(n) ______ has the same intent as a cracker but does not have the technical skills and knowledge.
script kiddie
56
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
true
57
. Employee _____ involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.
Monitoring
58
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
Computer Matching and Privacy Protection Act
59
One approach to content filtering is through a rating system of ____, which is similar to those used for movies and videos.
ICRA
60
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.
False
61
A spyware program communicates information it collects to some inside source while a user is offline.
false
62
To prevent repetitive strain injury, take all of the following precautions except ____.
using the heel of the hand as a pivot point while typing or using the mouse.
63
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet.
false
64
It is illegal for employers to use software programs that monitor employees.
false
65
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
66
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
RSI
67
Many systems implement access controls using a two-phase process called identification and assessment.
true
68
The higher a surge protector’s Joule rating, the poorer the protection.
False (better protection)
69
A(n) ________ network, the most recent network standard, conforms to the government security standards and uses more sophisticated encryption techniques than WPA.
802.11i
70
A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.
false
71
A(n) ________ occurs when the electrical supply drops.
under voltage
72
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
Uninterruptible power supply (UPS)
73
A surge protector absorbs small overvoltages — generally without damage to the computer or equipment.
true
74
Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion.
true
75
A UPS connects between a computer and a ________.
power source
76
A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail.
true
77
A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.
true
78
________, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
(Transport Layer Security (TLS)
79
with a three-generation backup policy, the parent file is the ______.
Second oldest copy of the file
80
Web addresses of pages that use TLS typically begin with https, instead of http.
true
81
Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
true
82
``` A momentary overvoltage, called a ________, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second). ```
spike
83
With a three-generation backup policy, the grandparent is the _______.
Oldest copy of the file
84
A brownout is a complete power failure.
False blackout
85
Analog signatures help to prevent e-mail forgery
false digital signature
86
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.
Monitoring
87
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet.
false experts recommend an area of at least two feet by | four fee
88
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user
spyware
89
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences
false not thought to have serious or long-term | consequences.
90
To remove spyware, users need to obtain a special program that can detect and delete it.
true
91
Assume that because information is on the Web, it is accurate.
false
92
Computer addiction is an untreatable illness.
false treatable
93
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
true
94
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer
noise
95
_____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer
nosie
96
Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon.
false Tendonitis
97
Many businesses use spyware to limit employees’ Web access.
false filtering
98
A spyware program communicates information it collects to some inside source while a user is offline.
False (outside source)
99
A(n) ____ program secretly collects information about a user.
Spyware
100
Many businesses use ___ to limit employees' Web access.
Content filtering
101
Content ____ is the process of restricting access to certain material on the Web.
Filtering
102
Web ____ software is a program that restricts access to specified Web sites.
filtering
103
A communication _____, is a transmission media on which data, instructions, or information travel.
channel
104
The Internet has its roots in ____, a network that became functional in 1969, linking scientific and academic researchers across the United State
ARPANET Advanced Research Project Agency Network
105
For smaller business and home networks, a ____ allows multiple computers to share a single broadband Internet connection such as through a cable modem or DSL modem?
router
106
_______ allows users to share documents with others in real time.
An online meeting
107
Computer communications describes a process in which two or more computers or devices transfer _____, _____ and _____.
data, instructions, and information
108
``` On a(n) ____________ network, one or more computers act as a server and the other computers on the network request services from the server ```
client/server
109
The amount of data, instructions, and information that can travel over a communications channel sometimes is called _______.
bandwidth
110
a satellite internet service _____.
Is a high speed Internet connection
111
Which of the following is NOT true of a Wi-Fi network? Many home users set them up. A Wi-Fi’s Internet service can be a DSL or a cable. A Wi-Fi’s Internet service can be dial-up access. Wi-Fis networks send signals to a communication deice that is connected to a high-speed Internet service.
A Wi-Fi’s Internet service can be dial-up access.
112
FTP sites can be ________, whereby anyone can transfer some, if not all, available files
anonymous
113
Businesses seldom provide goods or services to other businesses, so little e-commerce takes place between businesses.
false
114
Gmail and Windows Live Hotmail are two popular free e-mail Web applications.
true
115
Use to create, send, receive, forward, store, print, and delete e-mail messages
E-mail Program
116
A(n) ____ is a group of email names and addresses given a single name
Mailing list
117
In a chat room, others connected to the same chat room server see what a user has typed.
true
118
Large files on FTP sites often are uncompressed (unzipped) to reduce storage space and download time.
False (compressed)
119
In a newsgroup, a ________ consists of the original article and all subsequent related replies.
THREAd
120
The Internet has its roots in a networking project started by the Pentagon’s ____________, an agency of the U.S. Department of Defense.
Advanced Research Projects Agency (ARPA)
121
A ____________ is a device that provides a central point for cables in a network.
hub
122
On a network, some servers, called ____________ servers, perform a specific task and can be placed with other servers to perform multiple tasks.
Dedicated servers
123
_______ is the time it takes a signal to travel from one location to another on a network
latency
124
____________ is an electrical disturbance that can degrade communications.
noise
125
In many public locations, people connect wirelessly to the Internet through a ____ using their mobile computers or devices.
hot spot
126
The core of a(n) ____________ cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.
Fiber-optic
127
hysical transmission media used in communications include all of the following except _____. Twisted-pair cable Broadcast radio cable Fiber-optic cable Coaxial cable
Broadcast radio cable
128
On a network, the ____________ are the computers and mobile devices on the network that rely on the server for its resources.
client
129
The type of peer-to-peer network, called a(n) ________ network, describes an Internet network on which users connect directly to each other hard disks and exchange files over the Internet.
INTERNET PEER-TO-PEER (P2P)
130
A(n) ____________ is a collection of computers and devices connected together via communications devices and transmission media.
network
131
Today, ________ is a primary communications method for both personal and business use.
e-mail
132
For ________ to work, both parties must be online at the same time, and the receiver of a message must be willing to accept messages
instant messaging
133
Each electronic document on the Web is called a Web ________, which can contain text, graphics, audio (sound), and video
page
134
A(n) ________ consists of an original newsgroup article and all subsequent related replies.
thread
135
Computers cannot get a virus through e-mail.
false can
136
Newsgroup members can add articles of their own.
true
137
Although it is an inexpensive way for users to connect to the Internet, ____________ is slow-speed technology.
A dial-up connection
138
Some Web servers can pull content from a user’s computer at regular intervals or whenever updates are made to the site.
False (Push
139
________ is an Internet standard that permits file uploading and downloading with other computers on the Internet.
FTP
140
To add an e-mail name and address to a mailing list, a user unsubscribes from it.
False (Subscribe)
141
________ enables users to speak to other users over the Internet
VoIP
142
___ occurs when one consumer sells directly to another consumer, such as in an online auction.
consumer-to-consumer (C2C) e-commerce
143
________ is a real-time Internet communications service that notifies users when one or more people are online and then allows them to exchange messages or files or join a private chat room.
Instant Messaging (IM)
144
In the past, e-commerce transactions were conducted primarily using mobile computers and devices.
false
145
A _____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
surge
146
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
true
147
undervoltages can cause equipment damage, but generally do not cause data loss
false
148
is someone who uses e-mail as a vehicle for extortion
CyberExtortionist
149
Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
war driving
150
to _____ a file means to make a copy of it
back up
151
To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret.
false
152
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
CVS
153
to start a chat session, you connect to a chat server through a program called a
chat client
154
today's browsers seldom include a chat client
false
155
what are the two widely accessed internet services
world wide web and email
156
a(n) _____ license is a legal agreement that allows multiple users to access the software on the server simultaneously
network
157
calls to other parties with the same internet telephone service often are free
true
158
to add an email name and address to a mailing list, a user unsubscribes from it
false
159
a customer (consumer) visits an online business through an electronic _____, which contains product descriptions, graphics, and a shopping cart
storefront
160
when a web address is entered, a user sends, or pushes, information to a web server
false
161
A chat is a location on an internet server that permits users to chat with each other
false chat room
162
A(n) _____ program is used to create, send, receive, forward, store, print, and delete e-mail messages
e-mail
163
is a communications technology used by some outgoing mail servers
SMTP simple mail tranfer protocol
164
the time it takes a signal to travel from one location to another on a network
latency
165
a file server is a dedicated server that _____.
stores and manages files
166
a cable allows access to high-speed internet services through the cable television network
cable modem
167
physical transmission media used in communications include all of the following except _____
broadcast radio cable
168
Many home users are connecting multiple computers and devices together into a(n)
network
169
According to netiquette, internet users should assume which of the following?
the use of all capital letters is the equivalent of shouting
170
Podcasting is a popular method of distributing video
true
171
VoIp ____. also is called internet telephony uses the public switched telephone network uses a slow speed dial-up connection all other choices are correct
all other choices are correct
172
Perpetrators of back doors trick their victims intro interacting with phony websites
false
173
Which of the following copies all of the files in a coputer
full backup
174
The higher a surge protector's Joule rating, the poorer the protection
false (better prot)
175
Many web browsers offer 128-bit encryption and ________ which are even higher levels of protection than 40-bit encryption because they have longer encryption keys.
1024-bit encryption
176
meains in a location separate from the computer site
offsite
177
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection
true
178
A computer _____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
security
179
It is illegal for employers to use software programs that monitor employees.
false