HBCL Exam 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The Internet's beginning can be traced back to the year _____ when four host computers were connected together into the initial ARPANET.

1969

What is a virtual private network (VPN)?

A virtual private network (VPN) is a private, secure path across a public network (usually the Internet) that is set up to allow authorized users private, secure access to the company network. For instance, a VPN could allow a traveling employee, business partner, or employee located at a satellite office to connect securely to the company network via the Internet. A process called tunneling is used to carry the data over the Internet; special encryption technology is used to protect the data, so it cannot be understood if it is intercepted during transit. Essentially, VPNs allow an organization to provide secure, remote access to the company network without the cost of physically extending the private network.

Describe the TransferJet wireless standard.

A wireless standard designed for very fast transfers between devices that are extremely close together (essentially touching each other) is TransferJet. Developed by Sony, TransferJet is designed to quickly transfer large files (such asdigitalphotos,music,andvideo)betweendevicesassoonastheycomeincontactwitheachother(such as to transfer data between mobile phones or between digital cameras, to download music or video from a consumer kioskordigitalsignagesystemtoamobilephoneorothermobiledevice,ortotransferimagesorvideo from a digital camera to a TV or printer).

_____ is free or low-cost software that is supported by on-screen advertising.

Adware

Digital certificates are obtained from a(n) _____ and typically contain the name of the person, organization, or Websitebeingcertifiedalongwithacertificateserialnumber,anexpirationdate,anda public/privatekeypair.

Certificate authority

_____ includes any illegal act involving a computer.

Computer crime

_____ often find their victims online— for instance, someone in a chat room who makes a comment or has a screen name that they do not like.

Cyberstalkers

_____ Internet access provides fast transmissions over telephone lines and uses a technology that does not tie up your telephone line.

DSL

_____ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.

Encryption

A company network that is accessible to authorized outsiders is called a(n) _____.

Extranet

_____ cable is the newest and fastest wired transmission medium.

Fiber-optic

The _____ is a satellite-based location and navigation system.

GPS (global positioning system)

A(n) _____ is a private internal network within an organization. It is set up like the Internet, with data posted on Web pages that are accessed with a Web browser.

Intranet

Describe message boards.

Message boards are Web pages designed to facilitate written discussions between people on specific subjects, such as TV shows, computers, movies, investing, gardening, music, photography, or politics. When a participant posts a message, it is displayed for anyone accessing the message board to read and respond to. Messages are usually organized by topics (called threads); participants can post new messages in response to an existing message and stay within that thread, or they can post discussion group messages that start new threads. Participants in discussion groups do not have to be online at the same time because participants can post and respond to messages at their convenience.

_____ networking devices (such as digital media receivers) can be used to share and deliver digital content throughout the home via a multimedia network.

Multimedia

Discuss the popular myth that someone controls the Internet.

No single group or organization controls the Internet. Governments in each country have the power to regulate the content and use of the Internet within their borders, as allowed by their laws. However, legislators often face serious obstacles getting legislation passed into law—let alone getting it enforced. Making governmental control even harder is the "bombproof" design of the Internet itself. If a government tries to block access to or from a specific country or Web site, for example, users can use a third party (such as an individual located in another country or a different Web site) to circumvent the block. This occurred recently in Iran when the Iranian government blocked access to social networking sites after the 2009 elections—some Iranian citizens were able to send and read Twitter updates via third-party sites.

Describe Internet filtering and its various uses.

One technology commonly used to conform to CIPA regulations, as well as by parents and employees, is Internet filtering—the act of blocking access to particular Web pages or types of Web pages. It can be used on home computers or mobile devices by individuals to protect themselves from material they would view as offensive or by parents to protect their children from material they feel is inappropriate. It is also commonly used by employers to keep employees from accessing non-work-related sites, by some ISPs and search sites to block access to potentially objectionable materials, and by many schools and libraries to control the Web content that children are able to view in order to be in compliance wtih CIPA. Internet filtering typically restricts access to Web pages that contain offensive language, sex/pornography, racism, drugs, or violence (based on either the keywords contained on each site or a database of URLs containing restricted content). It can also be used to block access to specific sites (such as social networking sites, YouTube, or eBay), as well as to restrict the total number of hours or the time of day that the Internet can be used.

Using the Internet to buy and sell stocks, bonds, and other types of securities is referred to as _____.

Online investing

_____ enables individuals to create self-published, inexpensive Internet radio broadcasts, such as to share their knowledge, express their opinions on particular subjects, or share original poems, songs, or short stories with interested individuals.

Podcasting

_____ technology enables one computing device to locate or identify the current status of another device.

Presence

_____ phones are most often used by individuals—such as soldiers, journalists, wilderness guides, and researchers—traveling in remote areas where continuous cellular service might not be available.

Satellite

What are the main characteristics of satellite Internet access?

Satellite Internet access uses a direct connection, but it is slower and more expensive than cable or DSL access (between 5 and 15 Mbps, though around 10 Mbps is typical) and almost always has a data cap. However, it is often the only broadband option for rural areas. In addition to a satellite modem, it requires a transceiver satellite dish mounted outside the home or building to receive and transmit data to and from the satellites being used. Installation requires an unobstructed view of the southern sky (to have a clear line of sight between the transceiver and appropriate satellite), and performance might degrade or stop altogether during very heavy rain or snowstorms.

_____ are Web sites designed specifically to help you find information on the Web.

Search sites

_____ networks can be used during transport to monitor the temperature inside cargo containers to ensure that products stay within the allowable temperature range.

Sensor

List some common uses for computer networks.

Sharing an single Internet connection among several users; Sharing resources such as printers, files, or application software; Facilitating Voice over IP (VoIP), e-mail, videoconferencing, IM, and other communications applications; Working collaboratively, such as sharing a company database or using collaboration tools to create or review documents; Connecting the computers and the entertainment devices (such as TVs, gaming consoles, and stereo systems) located within a home.

A(n) _____ site can be loosely defined as any site that creates a community of individuals who can communicate with and/or share information with one another.

Social networking

Describe the star network topology.

Star network topology is used in small office, home, and wireless networks. All the networked devices connect to a central device (such as a server or a switch) through which all network transmissions are sent. If the central device fails, then the network cannot function.

_____ is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient.

Telesurgery

Define and discuss the advantages of telecommuting.

The increased availability of videoconferencing, collaborative computing, and other tools (such as the Internet, e- mail, andmobilephones)thatcanallowanindividualtoworkfromaremotelocation,hasmadetelecommutinga viable option for many individuals. With telecommuting, individuals work at a remote location (typically their homes)and communicatewiththeirplacesofbusinessandclientsvianetworkingtechnologies.Telecommuting allowsthe employeetobeflexible,suchasworkingnontraditionalhoursorremainingwiththecompanyafter relocation. It also enables a company to save on office and parking space as well as office-related expenses, such as utilities. As an environmental plus, telecommuting helps cut down on the traffic and pollution caused by traditional work commuting. In addition, it gives a business the possibility to continue operations during situations thatmayaffectan employee'sabilitytogettotheoffice,suchasduringhurricanes,duringabridgeorhighway closure,orduringaflu outbreak.

Describe the use of Boolean operators as a search strategy.

To further specify exactly what you want a search engine to find, Boolean operators—most commonly AND, OR, and NOT—can often be used in keyword searches. For example, if you want a search engine to find all documents that cover both the Intel and AMD microprocessor manufacturers, you can use the search phrase Intel AND AMD if the search engine supports Boolean operators. If, instead, you want documents that discuss either of these companies, the search phrase Intel OR AMD can be used. On the other hand, if you want documents about microprocessors that are cataloged with no mention of Intel, microprocessors NOT Intel can be used. Just as with other operators, the rules for using Boolean operators might vary from search site to search site (for instance, Google automatically assumes the AND operator as the default operator any time more than one search term is listed and uses a minus sign (-) instead of the word NOT).

The _____ is a group of over 450 organizations dedicated to developing new protocols and specifications to promote the evolution of the Web and to ensure its interoperability.

W3C (World Wide Web Consortium)

A(n) _____ is a network that covers a large geographical area.

WAN (wide area network)

Backed by seven major electronics companies, _____ is designed to transfer full-quality uncompressed high- definition audio, video, and data within a single room at speeds up to 28 Gbps.

WiHD (wirelessHD)

A(n) _____ is a special symbol that is used in conjunction with a part of a word to specify the pattern of the terms you want to search for.

Wildcard

A network adapter, also called a _____ when it is in the form of an expansion card, is used to connect a computer to a network. a. network interface card (NIC) b. powerline card c. data communications card (DCC) d. USB

a (NIC)

Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as a LAN, WAN, or other type of data network) is _____. a. VoIP b. DSL c. ISDN d. BoF

a (VoIP or Voiceover IP)

_____ refers to instruction delivered via the Web. a. Web-based training (WBT) b. Web-based teaching (WBT) c. Distance lessons d. E-training

a (Web-based training)

____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period. a. Bandwidth b. Bluetooth c. Modulation d. Throughband

a (bandwidth)

Anthony enjoys sharing and discussing his views with others over the Internet. Every day, Anthony makes a new post to his personal _____, which is a Web page that displays entries in chronological order. Readers can make comments about his post, but they cannot edit his post. a. blog b. wiki c. RSS d. portal

a (blog)

Direct Internet connections are typically _____ connections, such as DSL, satellite, and cable. a. broadband b. dial-up c. bandwidth d. satellite

a (broadband)

Specialized _____ are used in conjunction with networking technology to allow multiple individuals to edit and make comments in a document without destroying the original content. a. collaboration software b. online software c. job software d. OCR software

a (collaboration software)

Many Web pages today use _____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences. a. cookies b. blogs c. podcasts d. filters

a (cookies)

_____ is typically used with LANs. a. Ethernet b. Token Ring c. Wi-Fi d. 80xx2.11

a (ethernet)

In _____ transmission, data can move in both directions at the same time, such as with a telephone. a. full-duplex b. full-simplex c. half-simplex d. half-duplex

a (full-duplex)

The _____ is the most commonly used Internet search type. a. keyword search b. character search c. directory search d. distributed search

a (keyword search)

Common online investing services include the ability to set up a(n) _____ that displays the status of the stocks you specify. a. online portfolio b. stock account c. online recorder d. e-tailer

a (online portfolio)

Most search sites use a _____ —a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking. a. search engine b. search toolbox c. search store d. search box

a (search engine)

With _____, data is sent one bit at a time, one after the other along a single path. a. serial transmission b. parallel transmission c. digital transmission d. wireless transmission

a (serial transmission)

Online music _____ allow you to purchase and then download music singles and albums to your computer, mobile phone, or portable digital media player. a. stores b. clients c. auctions d. servers

a (stores)

A _____ identifies the device on the network for which the data is intended and sends the data to that device only. a. switch b. node c. bus d. bridge

a (switch)

In _____ transmission, data is sent when it is ready to be sent, without being synchronized.

asynchronous

____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site. a. VoIP b. RSS c. Video-on-demand d. Blog

b (RSS)

Brenda orders movies and television through the Internet via a(n) _____ provider, which allows users to download video for a small fee. a. RSS b. VOD c. VoIP d. blog

b (VOD or Video OnDemand)

A(n) _____ is a collection of an individual's work accessible through a Web site. a. wiki b. e-portfolio c. blog d. e-diary

b (e-portfolio)

Anthony is passionate about gaming and regularly visits several popular gaming _____, which are Web pages designed to facilitate written discussions between people on specific subjects. a. e-mail programs b. message boards c. Webinars d. podcasts

b (message boards)

Technically, to be called a _____, a device should convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa. a. hub b. modem c. switch d. router

b (modem)

_____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom. a. Security b. Privacy c. Filtering d. Control

b (privacy)

Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert's job is a(n) _____ job. a. telemarketing b. telecommuting c. videoconferencing d. e-working

b (telecommuting)

In a nutshell, blogs are designed for primarily one-way running communications, while _____ are intended to be modified by others. a. e-portfolios b. wikis c. e-blogs d. e-diaries

b (wikis)

Biometric access systems use a(n) _____ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.

biometric reader

With their increased use and audiences, bloggers and the _____ (the complete collection of blogs on the Internet) are beginning to have increasing influence on businesses and politicians today.

blogosphere

Web logs are usually referred to as _____.

blogs

_____ is the fastest and most current Wi-Fi standard. a. 802.11a b. 802.11g c. 802.11n d. 802.11x

c (802.11n)

_____ is charged with such responsibilities as IP address allocation and domain name management. a. National Center for Supercomputing Applications (NCSA) b. Web Consortium (W3C) c. ICANN (Internet Corporation for Assigned Names and Numbers) d. Internet Society (ISOC)

c (ICANN)

A _____ is a network that covers a relatively small geographical area, such as a home, office building, or school. a. small area network (SAN) b. metropolitan area network (MAN) c. local area network (LAN) d. personal area network (PAN)

c (LAN)

_____ technology is commonly used to monitor the status of objects, such as shipping boxes, livestock, or expensive equipment to which these types of tags are attached. a. IrDA b. cellular c. RFID d. Bluetooth

c (RFID)

Similar to Wi-Fi, _____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger. a. WinMax b. EMax c. WiMAX d. 802.11b

c (WiMAX)

____ transmissions are used with cell phones and are sent and received via cellular (cell) towers. a. PM radio b. Wi-Fi radio c. Cellular radio d. Satellite radio

c (cellular radio)

_____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service. a. Twisted-pair cable b. Fiber-optic cable c. Coaxial cable d. Single-wire cable

c (coaxial cable)

Online shopping and online investing are examples of _____. a. online merchandising b. online marketing c. e-commerce d. e-trade

c (e-commerce)

_____ allows you to exchange real-time messages easily with people that you specify. a. VoIP b. Blogging c. Instant messaging d. Streaming

c (instant messaging)

The primary infrastructure that makes up the _____ is typically owned by communications companies, such as telephone and cable companies. a. main Internet b. World Net c. Internet backbone d. super net

c (internet backbone)

The technique used for data sent over the Internet is _____. a. docket switching b. wideband switching c. packet switching d. data switching

c (packet switching)

_____ is the use of networking technology to provide medical information and services. a. Telecommuting b. Remote medicine c. Telemedicine d. Remote health

c (telemedicine)

Workgroup computing is also referred to as _____ computing.

collaborative

_____ are companies that manage and distribute Web-based software services to customers over the Internet. a. Internet service providers (ISPs) b. Internet content providers c. Online conferencing service providers d. Application service providers (ASPs)

d (ASPs)

The _____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes. a. location positioning system (LPS) b. satellite positioning system (SPS) c. cellular phone d. global positioning system (GPS)

d (GPS)

_____ are businesses or other organizations that provide Internet access to others, typically for a fee. a. Application service providers (ASPs) b. Conferencing service providers c. Telephone service providers d. Internet service providers (ISPs)

d (Internet service providers)

_____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online. a. Web X b. Web Y c. Web 1.0 d. Web 2.0

d (Web 2.0)

To determine if the information from a Web page can be trusted, you should evaluate both the _____ and the source. a. technology b. hardware c. designer d. author

d (author)

_____ is a wireless standard that is designed for very short-range (10 meters, approximately 33 feet, or less) connections. a. IrDA b. xMax c. Wi-Fi d. Bluetooth

d (bluetooth)

_____ is the most widely used type of home broadband connection, with over half of the home broadband market. a. DSL (Digital Subscriber Line) Internet access b. Fixed wireless Internet access c. Mobile wireless Internet access d. Cable Internet access

d (cable internet access)

In _____ transmission, such as a walkie-talkie, data can travel in either direction, but only in one direction at a time. a. duplex b. simplex c. half-simplex d. half-duplex

d (half-duplex)

A _____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to. a. bridge b. router c. gateway d. hub

d (hub)

Internet Explorer users can view and/or delete cookies and other temporary files by using the _____ dialog box. a. Windows b. Edit c. File d. Internet Options

d (internet options)

In a _____ network, there are a number of different connections between the devices on the network so that data can take any of several possible paths from source to destination. a. bus b. star c. ring d. mesh

d (mesh)

_____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles. a. Satellite stations b. RFID stations c. Wi-Fi stations d. Microwave stations

d (microwave stations)

Monitoring systems may also use _____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted. a. transmitters b. interpreters c. IAs d. sensors

d (sensors)

_____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company. a. Outsider b. Associate c. Tagged d. Third-party

d (third-party)

Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Every day, Robert uses _____ to have a real-time, face-to-face meeting with his boss. a. intranets b. telemarketing c. virtual networks d. videoconferencing

d (videoconferencing)

In _____ connections, your computer dials up over standard telephone lines and connects to your ISP's computer only when needed, as your phone line is tied up when in use.

dial-up

Online fraud, theft, scams, and other related activities are collectively referred to as _____.

dot cons

A(n) _____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

firewall

With a(n) _____ topology, each device on the network has a connection to every other device on the network.

full mesh

Typically, _____ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.

identity theft

A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) _____.

logic bomb

A Slingbox is designed to _____ multimedia content—that is, to allow viewers to view content of their choosing at a more convenient location.

placeshift

Increasingly, computers and storage devices (particularly those used on laptop computers) are _____; that is, encrypting all data automatically and invisibly to the user.

self-encrypting

_____ is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection.

spyware

The physical _____ of a computer network indicates how the devices in the network are arranged.

topology


Kaugnay na mga set ng pag-aaral

U-Prep Chapter 21: Teacher and Counselor

View Set

Unit 2 Unity and Diversity AP Bio FINAL STUDY

View Set

Chapter 6: Business Networks and telecommunications

View Set

EMT Chapter 32 Orthopaedic Injuries

View Set

Chapter 40: Fluid, Electrolyte, and Acid-Base Balance

View Set