Chapter 5 - Networking & Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following Wi-Fi standards is the fastest?

AC

_________ is the amount of data that can be transmitted over a given amount of time.

Bandwidth

A(n) _________ is a type of information system that performs analytical tasks traditionally down by a human.

Expert System

A Kenisngton lock is an effective countermeasure against phishing threats.

False

For mission-critical systems, technology companies construct computer hardware and software that can never fail.

False

Scalability is the ability of each organization's informaiton system to work with the other, sharing both data and services.

False

A(n) _________ cable consists of a thin stand of glass that transmits pulsating beams of light rather than electric current.

Fiber-Optic

In its simplest form, a(n) _________ is a node on a network that serves as an entrance to another network.

Gateway

The network standard known as _________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Hub

A(n) _________ is a complex system for acquiring, storing, organizing, using, and sharing data and information.

Information System

Some organizations offer an internal version of the Internt, called a(n):

Intranet

Network media helps carry data from one _________, or connection point, to another.

Node

Data moves through networks in structures know as _________, which are pieces of a message broken down into small units by the sending device reassembled by the receiving device.

Packets

Networks must follow rules, knows as communication _________, to ensure that data is sent, received, and interpreted properly.

Protocol

A(n) _________ is a storage system that links any number of disk drives so that they act as a single disk.

RAID

_________ Computers are one that have multiple hardware systems performing the same task at the same time.

Redundant

Hackers often set up their own wireless access point in popular areas with the hope that users connect to them. These are known as:

Rogue Hotspots

The _________ topology, where nodes connect to a hub, is the most common type used today.

Star

A _________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attaced to it.

Switch

Which type of information system handles the prcessing and tracking of transactions?

TPS

A decision support system can include or access other types of data, such as stock market reports or data about competitiors.

True

Wireless networks use radio signals that travel through the air in order to transmit.

True

A(n) _________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the internet.

Virtual Private Network

A(n) _________ is the device that all nodes connect to in order to communicate wirelessly.

Wireless Access Point

Which type of malware is a fully contained program that self-replicates and spreads through networks?

Worm


Conjuntos de estudio relacionados

International Marketing Final Exam NDSU WRIGHT

View Set

physiological psychology chapter 10

View Set

AutoCAD Selected Response Test 2

View Set

45: Performance Measures & Management Techniques

View Set

Money Management - Chapter 5 - The Banking System

View Set

Ch. 2 AP Microeconomics (Thinking Like an Economist)

View Set

Bus1B Ch 11 Capital Budgeting and Investment Analysis

View Set