Chapter questions, CGS2100 exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

True / False Instant messages are generally secure because most instant-messaging software provides for encryption of messages

False

True / False The main suite of protocols used on the Internet is TCP/FTP

False

True/False Data mining cannot be used to spot customer trends

False

T/F A communication server is used to control access on a client/server network

True

T/F An expert system attempts to replicate the decisions made by a live person

True

T/F Bridges are used to route data between two or more network collision domains

True

T/F Ethernet networks require each node on the network to be equipped with its own network adapter

True

T/F Even a properly installed surge protector may fail to protect a computer from all power surges

True

T/F If a password includes numbers, symbols, and upper- and lowercase letter, it is considered to be a strong password

True

T/F MANs cover a larger geographic area than HANs

True

T/F Phishing a form of social engineering

True

T/F The costs associated with running the Internet are paid primarily through ISPs collecting fees from customers and from funding by U.S. government agencies

True

T/F Two different types of network topologies can be deployed on the same network

True

True / False VoIP uses packet switching technology

True

A data system that is a subset of a larger system is known as a(n) a. data mart b. office support system c. data warehouse d. transaction-processing system

data mart

True / False 802.11n wireless networks provide faster throughput than wired gigabit Ethernet networks

False

True / False A computer needs the XML address to locate a Web page accurately

False

Which type of network topology favors equal access among nodes a. Star b. Ethernet c. Ring d. Bus

Ring

To regulate the internal timing of a computer system, the motherboard uses a. a system clock b. software simulation c. RAM d. a register

A system clock

Which part of the CPU is specifically designed to perform mathematical operations? a. fetch module b. ALU (arithmetic logic unit) c. registers d. cache memory

ALU

What makes interactivity on the Web possible? a. HTML b. CGI c. FTP d. XML

CGI

Which of the following is not a reason client/server networks are generally not installed in homes? a. Client/server networks can't handle streaming media, which is often required in home networks b. Client/server networks are more difficult to install them peer-to-peer networks c. Client/server networks provide more security than is needed for home networks d. Peer-to-peer networks are less expensive to install than client/server networks

Client/server networks can't handle streaming media, which is often required in home networks

To provide for sharing of an Internet connection, which server would a corporate network include? a. Database b. Authentication c. Communications d. Application

Communications

Which is NOT one of the four main operations of a DBMS? a. Consolidating data b. Entering data c. Sorting data d. Querying data

Consolidating data

Which of the following is not necessary in every client/server network? a. Network adapters b. Database server c. Transmission media d. NOS Software

Database server

Which of the following is not an advantage of installing a client/server network in college? a. Increased scalability b. Decentralization of network security protection c. Sharing of files and data d. Sharing of peripherals

Decentralization of network security protection

Which is a key component of cloud computing? a. Increase in IT employee headcount b. Decreased computing start-up costs c. Delivery of offline computing services d. Difficulty in increasing computing capacity

Decreased computing start-up costs

Which of the following is NOT one of the three main advantages of using databases? a. Promotion of data integrity b. Data can be easily shared c. Elimination of data recording errors d. Flexible use of data

Elimination of data recording errors

For what is PGP used? a. Creating a secure connection between client and server b. Loading Web pages into a browser c. Encrypting e-mail messages d. Uploading files to the Internet

Encrypting e-mail messages

T/F A query is used to transfer information into a database

False

T/F Actual data throughput is usually higher on wireless networks

False

T/F An incremental backup back ups all files on your computer in a specified location

False

T/F Client/server networks are less scalable than peer-to-peer networks

False

T/F Completeness checks ensure that only reasonable data values are entered into a database

False

T/F Reducing incorrect or incomplete data by recording data in only one place is called data optimization

False

T/F Twisted pair cable is never susceptible to magnetic interference

False

T/F WEP and WPA are popular wired network security protocols

False

T/F When malicious code is planted on your computer that interferes with your browser's ability to find Web addresses, it is known as phishing

False

The fastest broadband internet service is usually a. Fiber-optic b. DSL c. Cable d. satellite

Fiber optic

Which is the primary Internet protocol used for viewing Web pages? a. JavaScript b. Telnet c. HTTP d. TCP/IP

HTTP

Which is a common protocol used on the Internet? a. DNS b. IP c. XHTML d. PGP

IP

The type of network used for communication among a laptop and a smartphone using bluetooth is a a. WAN b. PAN c. LAN d. MAN

PAN

Which are the virtual pathways into a computer that firewalls close? a. Packet gateways b. IP addresses c. Logical ports d. Data paths

Logical ports

All of the following are advantages of installing a home network except sharing a. Peripherals b. an Internet connection c. files d. MAC addresses

MAC addresses

The device used to connect a network to the internet is called a a. gateway b. switch c. modem d. router

Modem

Bethany is in her home, watching a video she rook on vacation, while her brother is playing FIFA soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? a. P2P network b. client/server network c. both A and B d. neither A or B

P2P network

Which of the following is not required on some simple networks a. Network adapters b. Networking software c. Network navigation devices d. Transmission media

Network navigation devices

Which is not a reason why client server networks are usually installed in large businesses? a. Peripherals can't be shared on peer-to-peer networks. b. Dedicated servers make large networks more efficient. c. Client/server networks are more scalable than peer-to-peer networks. d. Client/server networks feature centralized security

Peripherals can't be shared on peer-to-peer networks

A group of related fields in a relational database is called a a. Primary key b. Field string c. Record d. Table

Record

Which network navigation device is required to move data between two networks? a. Repeater b. Switch c. Router d. Hub

Router

The "name" of a particular wireless network is known as the a. NetID b. HAN-ID c. SSID d. Wifi-ID

SSID

Which are programs that pretend to be a useful program but do something malicious on your computer? a. Trojan horses b. Backdoor programs c. Zombies d. Spyware

Trojan horses

A numeric IP address is usually represented by an alphanumeric a. URL b. SMTP c. routing address d. DNS address

URL

Which encoding scheme can represent the alphabets of all modern and historic language? a. base-2 number system b. Unicode c. ASCII d. scientific

Unicode

Two or more networks connected over long geographic distances to form a sing network is usually referred to as a a. LAN b. MAN c. HAN d. WAN

WAN

When networks are deployed at two college campuses 30 miles apart, the networks would be classified as a a. WAN b. MAN c. PAN d. LAN

WAN

An emerging standard of wireless Ethernet, also known as 802.11ad, is a. WiGig b. Low power WiFi c. White-Fi d. Super WiFi

WiGig

If you need very fast throughput in a home network, you should use a. an 802.11n wireless Ethernet connection b. a wired power-line network c. a wired gigabit Ethernet connection d. a client/server network

a wired gigabit Ethernet connection

Which of the following allows you to connect to the internet wirelessly a. WiFi b. 4G LTE c. mobile hotspot d. all of the above

all of the above

Which of the following is used to access the internet when WiFi is not available? a. mobile hotspot b. 4G LTE c. 3G internet access d. all of the above

all of the above

Which of the following might cause interference or poor connectivity between nodes on a wireless network? a. concrete walls b. nodes that are too far apart c. some appliances d. all of the above

all of the above

A backup of the entire contents of your hard drive is known as a. a system backup b. an incremental backup c. an image backup

an image backup

What is another name for the base-2 number system? a. decimal notation b. binary number system c. hexadecimal notation d. integer system

binary number system

Why would you want to disable SSID broadcast? a. to make it more difficult for hackers to detect your network b. to make it more difficult for a neighbor to connect to your network c. both A and B d. neither A or B

both A and B

Large groups of software programs that run automatically on many computers at the same time often to perpetrate DoS attacks are known as a. Trojan horses b. backdoor programs c. zombie webs d. botnets

botnets

IP addresses that are assigned by an ISP and do not change over long periods of time are a. called static b. more secure c. called dynamic d. volatile

called static

The throughput of a network a. is the same on all Ethernet networks b. is usually higher on wireless network c. is the same in all areas covered by a wireless network d. can vary depending upon the transmission media used

can vary depending upon the transmission media used

Comparing data values to ensure reasonableness is an example of a(n) a. alphabetic check b. completeness check c. range check d. consistency check

consistency check

To share files between computers on a Windows home network, you must a. enable groupsharing b. create a homegroup c. enable windows sharing d. none of the above

create a homegroup

Having the different birthdates for the same person on two different lists is an example of a. data redundancy b. data inconsistency c. data disparity d. data duplication errors

data inconsistency

What would you use to see that network adapters are installed in your Windows computer? a. Device Manager utility b. Programs and Utilities manager c. Ethernet Manager utility d. Home Network manager

device manager utility

When hackers use many zombie computers to launch an attack on another computer or Web site, the attack is known as a a. zombie infestation b. distributed denial-of-service attack c. phishing attack d. pharming plague

distributed denial-of-service attack

T/F 4G is the latest WiFi standard

false

T/F Actual data throughput is usually higher on wireless networks than on wired networks

false

Wireless range expanders a. are never used for home networks b. are not needed with 802.11n networks c. improve connectivity in remote areas of a home d. turn devices with wired connections into wireless nodes

improve connectivity in remote areas of a home

Providing adequate security on a corporate network involves all of these issues, except a. authentication b. packet screening c. deploying a bastion host d. installing NOS blocking software

installing NOS blocking software

A primary key a. should always contain only numbers b. is always unique for each record in a database c. does not have to be unique for every record in a database d. is only used in object-oriented databases

is always unique for each record in a database

Which of the following should you NOT do to secure a wireless network? a. implement media access control b. keep the default network name and router password c. create a security encryption passphrase d. disable SSID broadcasting

keep the default network name and router password

How can you tell what wireless devices are connected to your router? a. look at the router itself b. look at the device's wireless settings c. log in to the router's IP address and check the configuration page d. all of the above

log in to the router's IP address and check the configuration page

What two devices are often combined into one device in a small network to connect the home network to the internet and to share the connection between devices on the network? a. router hub and switch b. switch and router c. modem and router d. modem and switch

modem and router

On client server networks, switches a. transfer data between two networks b. route data between two collision domains on a single network c. move data efficiently from node to node on the network d. necessary only in networks using the ring topology

move data efficiently from node to node on the network

A(n) ____ database organizes in a cube format a. relational b. object-oriented c. rectangular d. multidimensional

multidimensional

NOS software is a. needed on all computers in a client/server networks b. needed only on the servers in a client/server network c. needed only on client computers in a client/server network d. needed only when configuring a network in a ring topology

needed on all computers in a client/server networks

A multi-core processor like the Intel i7 is a. one physical chip b. several chips joined together on the motherboard c. two separate cards installed in your system d. a software setting you can use to speed up CPU processing

one physical chip

An example of a good primary key is a(n) a. order number b. person's first name combined with their last name c. name of a pet d. street address

order number

Data is sent over the Internet using a. circuit switching b. protocol switching c. DNS switching d. packet switching

packet switching

Individuals connect to the Internet using a. points of presence b. network access points c. Internet exchange points d. Web servers

points of presence

Antivirus software segregates infected files to prevent further spread in a process known as a. inoculation b. quarantine c. disinfection d. eradication

quarantine

Special areas of memory storage built into the CPU are known as a. switches b. semiconductors c. registers d. DIMMs

registers

Encryption of Internet e-mail a. requires the use of specially designed client software b. is built into the SMTP protocol c. is built into most Web-based email d. is prohibited by the Department of Homeland Security

requires the use of specially designed client software

Hackers without sophisticated computer knowledge who use tools developed by others to break into systems are called a. black-hat hackers b. script kiddies c. amateur hackers d. white-hat hackers

script kiddies

Viruses that feature a series of commands hidden on a web site are called a. boot-sector viruses b. script viruses c. polymorphic viruses d. time bombs

script viruses

Which of the following would NOT be a benefit of networking computers? a. sharing an internet connection b. sharing printers and other peripherals c. sharing software licenses d. sharing files

sharing software licenses

Fiber optic cable most likely would be used in a corporate network when a. cost is more important than speed b. electrical or magnetic interference is not present c. short cable runs are required d. speed is more important than cost

speed is more important than cost

Programs that download to your computer, usually without your knowledge, for the purpose of collecting information, is a type of cyberannoyance known as a. pharmware b. adware c. spyware d. bloatware

spyware

Computer viruses that hide in memory to escape detection are known as a. logic bombs b. Trojan horses c. stealth viruses d. multipartite viruses

stealth viruses

The device used to move data around a single network is called a a. gateway b. switch c. router d. repeater

switch

An electronic system used to keep track of everyday business activities is an example of a(n) a. transaction-processing system b. decision support system c. expert system d. knowledge-based system

transaction-processing system

T/F 802.11ac is the current wireless ethernet standard

true

What device would you use to amplify your wireless signal? a. dual-band N router b. network extender device c. network access switch d. wireless ranger extender

wireless range extender


Conjuntos de estudio relacionados

SIE Exam (Regulatory Entities, Agencies)

View Set

Financial Accounting Exam 2 Study Guide

View Set

CompTIA Network+ Easy Subnetting / Variable Length Subnet Masks (VLSMs), Summarization, and Troubleshooting TCP/IP

View Set

Types of Concepts according to Dubin

View Set

foundations of information security

View Set

Medical Scribe: Common Medications

View Set