CH.7 - Quiz
Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables?
Bluetooth
A company needing reliable network speeds at 1.5 Mbps would probably need to lease a dedicated:
T1 line
According to the information in this video, computers represent data using _____.
bits
Education being represented by .edu and business represented by .com are examples of:
top level domains
Which single word below best describes Web 2.0?
Dynamic
What is the name of the organization responsible for assigning public IP addresses?
ICANN
Which of the following is FALSE about the Domain Name Service (DNS)?
The first name in the domain name is the organization name.
According to the information in this video, the telephone system is an example of a _____ network.
circuit-switched
In this video, Special Agent Macey says the single largest threat to the Internet is _____.
denial-of-service attacks
A ________ is a set of rules that programs on two communicating devices follow.
protocol
The Internet is based on which of the following three key technologies?
Client/server computing, packet switching, and TCP/IP and related communications standards for linking networks and computers
Which of the following is FALSE about the TCP/IP protocol?
IP helps to recover any packets that are lost or damaged during transmission.
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a:
wide area network.
At its most basic level, a(n) _________ simply consists of two computers that are connected together.
network
If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed:
100 meters.
Which of the following could represent a current IP address?
207.46.250.119
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.
In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety?
An underground wireless Wi-Fi network
In this video, Kevin describes _____ as a set of integrated software modules that support nearly all of their organization's business processes.
ERP
Which of the following TCP/IP application-layer protocols is used for email transmission?
SMTP
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides applications services.
Which is the BEST definition of hertz?
The number of cycles per second that can be sent through a medium
analog signal.
The signal from your iPod earphone is a(n):
According to this video, which of the following statements is true regarding enterprise resource planning systems?
They integrate data with a centralized database.
In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____.
analog signal
A(n) __________________ is a way to communicate in a network that is recognized by a continuous waveform:
analog signal
In this video dramatization, Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments?
customer relationship management (CRM)
Bandwidth is determined by:
determining the difference between the highest and lowest frequency on a channel.
Network signals that are represented by on-off pulses indicate a(n):
digital signal.
As Kevin explains, _____ processes support activities in multiple departments and span an organization.
enterprise
According to the information provided in this video, any business that has an online presence is at risk of _____.
exposure to hacker activity B. denial-of-service attack C. unauthorized data disclosure D. loss of customer data E. all of the above
Mary's company is implementing an ERP system to achieve which main business objective?
improved decision making
If you were building a network intended to service two buildings that were next to each other, you would construct a:
local area network.
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
As Zero and One explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.
modem
Microsoft Windows Server and Linux are examples of:
network operating systems.
In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.
packet switching
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________.
packet switching
If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices.
router
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.
spoofer