Ch 5 Technology at Your Service

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

TPS

Which type of information system handles the processing and tracking of transactions?

switch

A ____________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

RAID

A(n) ________ is a storage system that links any number of disk drives so that they act as a single disk.

fiber-optic

A(n) _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

information system

A(n) ____________ is a complex system for acquiring, storing, organizing, using, and sharing data and information.

expert system

A(n) ____________ is a type of information system that performs analytical tasks traditionally done by a human.

wireless access point

A(n) __________________ is the device that all nodes connect to in order to communicate wirelessly.

virtual private network (VPN)

A(n) _____________________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

packets

Data moves through networks in structures known as _______, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

rogue hotspots

Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:

gateway

In its simplest form, a(n) ____________ is a node on a network that serves as an entrance to another network.

node

Network media helps carry data from one _______, or connection point, to another.

protocol

Networks must follow rules, known as communication __________ to ensure that data is sent, received, and interpreted properly.

intranet

Some organizations offer an internal version of the Internet, called a(n):

star

The _________ topology, where nodes connect to a hub, is the most common type used today.

hub

The network standard known as ______ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

ac

Which of the following Wi-Fi standards is the fastest?

worm

Which type of malware is fully contained program that self-replicates and spreads through networks?

redundant

_____________ computers are ones that have multiple hardware systems performing the same task at the same time.

bandwidth

________________ is the amount of data that can be transmitted over a given amount of time.


Ensembles d'études connexes

FINAL CIS, IT101, CSC 220 CH 9, CTS115 Final, IS 220 Exam 3, CSC 220 Chapter 6, CTS115-L6B-Fall-2017 Unit 8, CTS 115 Fall 2017 Information Systems Unit 6

View Set

Disorders and conditions of the knee

View Set

"Road Rules & Road Signs" Practice Test

View Set

Documentation, Electronic Health Records, and Reporting

View Set

Townsend Ch 20 Electroconvulsive Therapy

View Set