Introduction to Computers Part 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of broadband internet offers connections nearing the speed of light?

Fiber-optic

Your social security number should never be shared on a website, in an email, or through messaging

True

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

inoculation

A 32- character password is an example of using biometrics

False

Actual data throughput is usually higher on wireless networks than on wired networks

False

An authentication is used to host websites on a client/server network

False

Encrypting data is not an appropriate measure for mobile devices such as smartphones

False

If you use an internet cache, then the information displayed in your browser is automatically refreshed

False

Instant messaging is secure because of the type of encryption used

False

P2P networks require specialized network operating system software

False

The term dotted quad means you have four dots in a row in your Java source code

False

A backup of all data files on your computer can be managed easily using the Windows 10

File history utility

When someone uses your personal information to pose as you

Identity theft

Which of the following is used to access the internet when WiFi is not available?

mobile hotspot 4G LTE internet access 3G internet access

Firewalls use this process to assign IP addresses to the devices internal to the network so hackers will not know what they are

network address translation (NAT)

On client/server networks, more users can be added without affecting the performance of other nodes

Network of scalability

Multiple people in one house are using the internet on this type of net work?

P2P network

Sometimes groups of data packets are sent together in a package called a

frame

A packet analyzer is called a sniffer because

it captures and reads data inside each packet

HTTPS is different than HTTP because

it is a combination of HTTP and the secure sockets layer (SSL)

Which of the following describes fiber-optic broadband

it uses strands of pure glass or plastic

this is a program that takes complete control of your computer without your knowledge

rootkit

A surge protector may look like just another power strip but also can

save your device if a voltage spike is sent through the electrical system

SMTP is the set of rules used to

send email along the internet to its destination

Computer viruses can be spread by

sharing flash drives downloading and running a file attached to an email downloading a song from peer to peer sharing site

The information in a data packet includes

the data and the destination

Amortization

the reduction of a loan balance through payments made over a period of time

A private key is important

to decode an encrypted message

Which network cable type is most susceptible to signal interference?

UTP

Encryption is used to

code your email so only one person can decipher it

Which of the following would not cause interference or poor connectivity between nodes on a wireless network?

A wireless extender

Routers are used to send data on a specific route through an internal network

False

The process whereby users prove they have authorization to use a computer network is known as

Authentication

Which is not a key component of a typical client/server network?

Bastion host

The set of instructions that define how to display the HTML elements in your site is

CSS

Which of the following would not be a benefit of networking computers?

Sharing software licenses

The collection of large national and international networks used to establish the internet is called the

internet backbone

Which server would a client/server network include to ensure only authorized users are logging onto the network?

Authentication

Which of the following is not one of the factors used in multi-factor authentication?

Inherence

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Which of the following should you not do to secure a wireless network?

Keep the default network name and router password

Bond Amortization

Makes interest expense < interest payment Causes balance in account to decline

What two devices are often combined into one device to connect the network to the internet and to share the connection between devices on the network

Modem and router

Which topology tends to provide the fairest allocation of network resources?

Ring

This is an advantage of installing a client/server network in a business

Sharing of peripherals

A network-attached storage device is like a network-connected hard drive

True

Cat 5e and Cat 6 are types of twisted-pair cable

True

MIME is the protocol that supports sending files as email attachments

True

Most modern operating systems include some types of NOS functionality

True

Network adapters perform specific tasks to enable nodes to communicate on a network

True

Sending emails to lure people into revealing personal information is a technique known as phishing

True

Star topologies are the most widely used topology

True

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network

True

You can attach more than four wired devices to a network by using a switch

True

Your internet service provider has a default DNS server to translate a URL into an IP address

True

The type of network that would be necessary to connect the networks of two college campuses would be

WAN

Which of the following is the most secure security protocol used with routers

WPA2

An applet is

a small application located on a server computer

IPv6 uses 128 bits to assign an

address to every device connected to the internet

Authentication techniques that rely on personal biological traits are called

biometrics

Viruses that load from USB drives left connected to computers when computers are turned on are known as

boot-sector viruses

the internet is primarily funded by

your federal income taxes


Ensembles d'études connexes

What date is today 今天是几月几日?

View Set

What is Psychology? (Crossword Puzzle)

View Set