CGS Ch 6-9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Using copyrighted works without permission of the copyright holder a) is possible under the "fair use" doctrine b) is only possible for photographs of public places c) is never possible d) only applies to proprietary software

a) is possible under the "fair use" doctrine

Which of the following does NOT accurately describe fiber-optic broadband? a) Data is converted into electrical pulses b) Speed drops as the distance from the main signal source increases c) It transmits data at the speed of light d) It uses strands of pure glass or plastic

b) Speed drops as the distance from the main signal source increases

What is the type of broadband internet in which the connection is degraded by adding multiple users? a) satellite b) cable c) DSL d) fiber-optic

b) cable

Windows creates "restore points" so that you can a) extend your warranty b) return your system to the way it was before you installed new software c) protect your system from hackers d) add additional hard disk storage space

b) return your system to the way it was before you installed new software

Which of the following would NOT be a benefit of networking computers? a) sharing printers and other peripherals b) sharing software licenses c) sharing an internet connection d) sharing files

b) sharing software licenses

GDDR5 and GDDR3 are types of a) HDMI b) video memory c) ROM d) GPUs

b) video memory

If you want to use your computer for recording your band, you would benefit most from a(n) a) MIDI interface b) HDMI interface c) RAID interface d) overclocking interface

a) MIDI interface

Publishing an e-book is easy enough for almost anyone to do. a) True b) False

a) True

Moore's Law refers to the a) number of transistors inside a CPU chip b) amount of memory on a memory chip c) overall system processing capabilities d) speed of DRAM

a) number of transistors inside a CPU chip

Copying Microsoft Word and giving it to a friend is "fair use." a) True b) False

b) False

P2P networks require specialized network operating system software. a) True b) False

b) False

Plagiarism is illegal. a) True b) False

b) False

What type of property is intellectual property? a) Tangible b) Intangible c) Real d) Imaginary

b) Intangible

If a Microsoft Excel file is all garbled, could it have a virus? a) It definitely has a virus. The user needs to run antivirus software. b) It could be a virus, but it could also be another problem, such as a corrupt file. c) The Excel application itself is corrupt. d) If the Excel file can't open in a previous version of Excel, it is a virus.

b) It could be a virus, but it could also be another problem, such as a corrupt file.

_______ is a set of strategies for using more than one drive in a system. a) A machine cycle b) RAID c) VPU d) GPU

b) RAID

Devices dedicated to displaying e-text (books and magazines) are known as a) book displayers b) e-readers c) e-viewers d) e-libraries

b) e-readers

Which of the following is OPEN electronic publishing format? a) PDF b) ePub c) SMS d) azw

b) ePub

Which of the following is NOT a category of intellectual property? a) copyright b) imprint c) trademark d) patent

b) imprint

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called? a) updating b) inoculation c) signature d) quarantine

b) inoculation

Before creating a home network, you should do which of the following? a) Set up a HomeGroup sharing connection b) Gather all the devices you need to connect to the network in one room c) List all the devices that will connect to the network d) all of the above

c) List all the devices that will connect to the network

Which of the following is a digital video file format? a) MP3 b) PDF c) MPEG-4 d) JPG

c) MPEG-4

A well-known hoax that many people in society now believe to be true is known as a) a public domain tale b) a persistence of information story c) an urban legend d) legend convergence

c) an urban legend

Computers are designed with a) only volatile memory b) neither volatile nor nonvolatile memory c) both volatile and nonvolatile memory d) only nonvolatile memory

c) both volatile and nonvolatile memory

Firewalls use a process of ____ to assign IP addresses to the device internal to the network so hackers will not know who they are a) VPN b) port blocking c) network address translation (NAT) d) packet filtering

c) network address translation (NAT)

Image Resolution is a) based on the kind of compression used. b) the size of the image in bytes. c) the number of data points recorded in an image d) only important with analog image capture

c) the number of data points recorded in an image

Which of the following is true about works in the public domain? a) Some works enter the public domain because their creator is unknown. b) Some works enter the public domain when their copyright term expires. c) Works in the public domain are free to be used by anyone. d) All of the above. e) None of the above.

d) All of the above.

E-books can be purchased from a) online stores set up for specific e-readers. b) directly from publishers. c) by subscription in online marketplaces (mainly for textbooks) d) All of these.

d) All of these.

When the CPU actually performs the work described in the commands during a machine cycle, this stage is known as a) Store b) Fetch c) Decode d) Execute

d) Execute

If I buy the fastest processor, does that always ensure the best performance for my computer? a) Yes. Having the fastest processor will ensure that you get the best performance from your computer. b) Yes. Speed is all that matters for performance. c) Apart from a fast processor, just make sure you get a large hard drive to ensure best performance. d) Not necessarily. A computer's overall performance depends on many other factors than just the processing speed.

d) Not necessarily. A computer's overall performance depends on many other factors than just the processing speed.

How long does copyright last. a) 10 years b) 15 years c) The life of the creator. d) The life of the creator plus 70 years

d) The life of the creator plus 70 years

The type of network that would be necessary to connect the networks of two college campuses would be: a) PAN b) MAN c) LAN d) WAN

d) WAN

Are there different kinds of firewalls? a) The most effective firewalls are hardware devices designed to restrict access to your computer. b) The most effective firewalls are software programs designed to restrict access to your computer. c) The most effective firewall is the Norton Internet Security suite. d) You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

d) You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

Can I set up a wireless network at home? a) You can have a wireless network only if each node connected to the network has a router attached to it or installed in it. b) You can have a wireless network only if each node connected to the network has a wireless access point device attached to it or installed in it. c) You can have a wireless network only if each node connected to the network has a transceiver attached to it or installed in it. d) You can have a wireless network only if each node connected to the network has a wireless network adapter attached to it or installed in it.

d) You can have a wireless network only if each node connected to the network has a wireless network adapter attached to it or installed in it.

How can I add Dolby surround sound to a system? a) You'll need to buy a new computer if yours cannot handle Dolby surround sound.​ b) All current systems include surround sound.​ c) You need multiple sound cards in one system.​ d) You need a Dolby Digital compatible sound card.​

d) You need a Dolby Digital compatible sound card.

Are there any good hard drives designed for video editing? a) Any mechanical hard drive can be used for video editing. b) For video editing, you'll need a hard drive that spins at 500 RPM. c) You'll need a hard drive with data transfer rates of at least 54 MB per second. d) You'll want to get a hard drive with storage capacity that exceeds 500 GB.

d) You'll want to get a hard drive with storage capacity that exceeds 500 GB.

Computer viruses can be spread by a) sharing flash drives b) downloading a song from a peer-to-peer sharing site c) downloading and running a file attached to an email d) all of the above

d) all of the above

Which of the following might cause interference or poor connectivity between nodes on a wireless network? a) some appliances b) concrete walls c) nodes that are too far apart d) all of the above

d) all of the above

Authentication techniques that rely on personal biological traits are called a) scanners b) Trojan horses c) botnets d) biometrics

d) biometrics

The fastest memory in a computer is a) ROM b) RAM c) HDMI d) cache

d) cache

DRM is an acronym for a) digital role maker b) digital real movie c) distribution regional media d) digital rights management

d) digital rights management

The number of times the analog wave is measured each second is the a) MP3 rate b) DAW rate c) digitization rate d) sampling rate

d) sampling rate

A surge protector may look like another power strip but it also can a) prevent theft b) help manage heat c) detect viruses d) save your device if a voltage spike is sent through the electrical system

d) save your device if a voltage spike is sent through the electrical system

Is there anything besides storage that I should consider when getting a hard drive? a) It's also important to consider access time, which is the time it takes a storage device to locate data its stored for processing, and the data transfer rate, which is the speed at which it transfers data to other computer components. b) It's also important to consider access time, which is the speed at which the hard drive transfers data to other computer components, and the data transfer rate, which is the speed with which the drive locates data for processing. c) You should consider a manufacturer that offers Integrated Drive Electronics (IDE) drives, which have high data transfer rates and good access times. d) You should consider a manufacturer that offers Serial Advanced Technology Attachment (Serial ATA) drives, which have high data transfer rates and good access times.

a) It's also important to consider access time, which is the time it takes a storage device to locate data its stored for processing, and the data transfer rate, which is the speed at which it transfers data to other computer components

What does the term "GHz" mean? a) Processor speed is measured in gigahertz, or GHz, which refers to the number of machine cycles per second that the processor goes through. So, for example, a 3 GHz processor performs 3 billion machine cycles per second. b) Processor speed is measured in gigahertz, or GHz, which refers to the speed with which the CPU fetches data or instructions from RAM. So, for example, a 3 GHz processor performs 3 billion program instructions per second. c) Processor speed is measured in gigahertz, or GHz, which refers to the speed with which the CPU can decode instructions into something the computer can understand. So, for example, a 3 GHz processor decodes 3 billion program instructions per second. d) Processor speed is measured in the number of programs in the system cycle. So, for example, a 3 GHz processor performs 3 billion machine cycles per second.

a) Processor speed is measured in gigahertz, or GHz, which refers to the number of machine cycles per second that the processor goes through. So, for example, a 3 GHz processor performs 3 billion machine cycles per second.

What is RAM? What kind of data is stored in RAM? a) RAM is the computer's temporary storage space. Data stored in the RAM is volatile. b) RAM is the computer's permanent memory. Data stored in RAM is not erased when you shut off the computer. c) RAM is where the operating system is stored. Data in RAM is stored on a long-term basis. d) RAM is the computer's permanent storage space. Data stored in the RAM is nonvolatile.

a) RAM is the computer's temporary storage space. Data stored in the RAM is volatile.

Sending emails to lure people into revealing personal information is a technique known as phishing. a) True b) False

a) True

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network. a) True b) False

a) True

You can attach more than four wired devices to a network by using a switch. a) True b) False

a) True

Your social security number should never be shared on a website, in an email or through messaging. a) True b) False

a) True

Are external hard drives better for archiving videos than optical media? a) Yes, an external hard drive with a USB 3.0 port has high storage capacity and transfers files quickly. b) Yes, a flash drive with a USB port has high storage capacity and transfers files at speeds up to 3 Gbps. c) No, optical media such as CDs, which are available in rewritable formats, are the best format for storing video files. d) Yes, an external hard drive with an eSATA port has high storage capacity and transfer files at speeds up to 4 Mbps.

a) Yes, an external hard drive with a USB 3.0 port has high storage capacity and transfers files quickly.

A _____________ is a program that takes complete control of your computer without your knowledge a) rootkit b) sniffer c) bootnet d) VPN

a) rootkit

But how will a firewall help if I'm not exchanging any valuable information over the Internet and don't have any important files on my computer? a) A firewall protects your computer by blocking all the logical ports that allow data to come in. As long as you send and receive attachments over e-mail, you need a firewall. b) A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft. c) A firewall protects your computer by blocking off access to all physical ports or communications gateways to the computer. It is in essence a packet filtering device that prevents hacker intrusion. d) A firewall protects your computer by blocking access to all logical and physical ports.

b) A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft.

Viruses that load from USB drives left connected to computers when computers are turned on are known as a) Encryption viruses b) Boot-sector viruses c) script viruses d) polymorphic viruses

b) Boot-sector viruses

What should users do if they get a popup threatening them that their system is at risk and that they need to buy a particular product to ensure its protection? a) They should follow the instructions they see right away to make their system secure. b) Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses. c) Check your email to see if the company has contacted you and follow the instructions in the email. d) Change your credit cards to protect yourself.

b) Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses.

Actual data throughout is usually higher on wireless networks than on wired networks a) True b) False

b) False

Encrypting data is not an appropriate measure for mobile devices such as smartphones a) True b) False

b) False

Moore's Law describes the pace at which graphics processing units (GPUs) improve a) True b) False

b) False

Password strength is soley determined by the length of the password a) True b) False

b) False

Satellite Internet is the fastest broadband option. a) True b) False

b) False

What's the best way to keep my system running efficiently? a) For optimal performance, one thing you can do is run the Adware Cleanup utility.​ b) For optimal performance, one thing you can do is run the Disk Defragmenter utility.​ c) For optimal performance, one thing you can do is reset your computer to its original factory settings. d) For optimal performance, one thing you can do is delete the spyware utility.

b) For optimal performance, one thing you can do is run the Disk Defragmenter utility

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? a) Client/server network b) P2P network c) both a and b d) neither a and b

b) P2P network

What kind of wire do I use to set up an Ethernet network? a) The most popular transmission media option for wired home Ethernet networks is fiber-optic cable. b) The most popular transmission media option for wired home Ethernet networks is unshielded twisted-pair (UTP) cable. c) The most popular transmission media option for wired home Ethernet networks is coaxial cable. d) The most popular transmission media option for wired home Ethernet networks is RJ-45.

b) The most popular transmission media option for wired home Ethernet networks is unshielded twisted-pair (UTP) cable.

How do I determine how much hard drive space I need? a) Hard drives have the largest storage capacity of any storage device, so you'll never run out of space. b) You need to calculate the amount of storage required by all of the types of programs and files you will be keeping on your system, including the operating system. c) As long as you have enough space to hold the operating system, currently up to 20 GB with Windows, you have enough space. d) As long as you have enough RAM, you have enough space.

b) You need to calculate the amount of storage required by all of the types of programs and files you will be keeping on your system, including the operating system.

How can I share an Internet connection on a wireless network? a) You'll need a special Internet connection if you want to share it on a wireless network. b) You'll need a special router to share an Internet connection on a wireless network. c) To share an Internet connection on a wireless network, you'll need to install a wireless Internet sharing adapter. d) To share an Internet connection on a wireless network, you'll need to install Net Meter.

b) You'll need a special router to share an Internet connection on a wireless network.

What is a virus? a) A computer virus is a computer program that appears to be something useful or desirable (like a game or a screensaver), but at the same time does something malicious in the background without your knowledge, such as destroying your files. b) A computer virus is a computer program that looks at packets as they travel on the Internet and infects them with debilitating code. c) A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged. d) A computer virus is a computer program deployed by hackers that looks at each packet as it travels on the Internet.

c) A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged.

What are logical ports? a) A logical port is an external port that allows you to transfer data and make requests from other computers. b) A logical port is like a filter fitted to your computer. The logical port checks to be sure that any information that you send or receive is logically acceptable. If it's not, it is rejected by the logical port. c) A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers. d) A logical port is a large group of software programs that runs autonomously on zombie computers.

c) A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers.

How can I make sure my games display at their best? a) You'll want to make sure you have a graphics processing unit, or GPU, which sits next to the CPU on the motherboard. b) Be sure to get a video card with a highly rated graphics processing unit, or GPU, and over 500 MB of video RAM. c) Be sure to get a video card with a highly rated graphics processing unit, or GPU, and 2 GB or more of video RAM. d) Be sure to get a video card with a highly rated graphics processing unit, or GPU, and over 128 MB of video RAM.

c) Be sure to get a video card with a highly rated graphics processing unit, or GPU, and 2 GB or more of video RAM.

Is there a good reason to set up a network for two computers? a) With just two computers, it probably isn't worth it for you to set up a network. b) By setting up a network, you'll be able to take advantage of the power of a server. c) By setting up a network, you can share a broadband Internet connection. d) By setting up a network, you can share your hard drive and just need a monitor.

c) By setting up a network, you can share a broadband Internet connection.

What else can hackers do? a) Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is an attack on your Disk Operating System. It enables the hacker to gain control of your OS by which he can create problems in the files stored in your unprotected computer. b) Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is actually a virus that attacks the hard drive, corrupting the files stored in your computer. c) Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer. d) Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is when the hacker uses your personal information for the purpose of defrauding you.

c) Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer.

Is it safe to click on links that come in email from companies you know? a) Yes—if you recognize the logo then you can go ahead and click on links inside the email safely. b) As long as you know that you are a customer of that company, it is safe to follow links in their emails to you. c) No, it is not safe. It is a better practice to go to the website yourself and login there. d) Email systems have filters, so any email you get is safe to read and to use the links inside it.

c) No, it is not safe. It is a better practice to go to the website yourself and login there.

Which of the following is not a right granted to copyright holders? a) Public performance of a work b) Public display of a work c) Reduction of a work d) Distribution of the work to the public.

c) Reduction of a work

Free e-books a) are always illegal copies. b) can only be obtained directly from authors. c) are available from many sites such as Project Gutenberg. d) are never available at public libraries.

c) are available from many sites such as Project Gutenberg.

Our ability to use a single device to meet our digital needs is known as a) digital cohesion b) digital collision c) digital convergence d) digital shrinkage

c) digital convergence

What two devices are often combined into one device in a small network to connect the home network to the internet and to share the connection between devices on the network? a) modem and switch b) switch and hub c) modem and router d) router hub and switch

c) modem and router

Which of the following is a factor when determining the type of data plan you might need? a) How many photos you upload to social media b) The amount of time spent streaming music c) How many web pages you view d) All the above

d) All the above

It is important to maintain your online reputation a) to ensure information about you is accurate b) because of the persistance of information c) because employers often review social media d) all of the above

d) all of the above

Malicious software includes the following? a) spyware b) viruses c) adware d) all of the above

d) all of the above

A good way to assess your CPU usage is to a) Check the Performance tab of the Task Manager b) check the number reported by the system defrag utility c) feel the temperature of the CPU with your hand d) listen for the sound of a spinning hard disk drive

a) Check the Performance tab of the Task Manager

What is the basis for all e-books? a) E-text b) E ink c) ePub d) Kindle

a) E-text

A backup of all the data files on your computer can managed easily using the Windows 10___ utility? a) File History b) Recovery c) Windows Update d) Windows Defender

a) File History

Besides committing identity theft, what else can hackers do? a) Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge. b) Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is an unwanted piggyback program run in the background of your system that gathers information about you, usually your Internet surfing habits, without your knowledge. c) Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse blocks all the logical ports in your computer without your permission. d) Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse blocks all the physical ports in your computer without your permission.

a) Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge.

Using copyrighted material without the copyright holder's permission is known as copyright __________. a) Infringement. b) Violation. c) Trespass. d) Theft.

a) Infringement.

Some of my devices don't need wireless and would work better with a wired connection. Are there different types of wired networks I need to choose from? a) Most wired networks for the home are Ethernet networks. b) Most wired networks for the home are 802.11 networks. c) Most wired networks for the home are power-line networks. d) Most wired networks for the home are NOS networks.

a) Most wired networks for the home are Ethernet networks.

Is a home network the same kind as the one at the corporation where I work? a) No. Most companies use client/server networks. You'll be setting up a P2P network. b) No. Most companies use P2P networks. You'll be setting up a client/server network. c) Yes. You'll be setting up the same type of network that you find in most offices. d) Yes. You'll be setting up a P2P/server network as in your office.

a) No. Most companies use client/server networks. You'll be setting up a P2P network.

What is optical media used to archive videos? a) Optical media includes things like compact discs (CDs), digital video discs (DVDs), or Blu-ray discs (BDs), which come in prerecorded, recordable, and rewritable formats. b) Optical media are drives that use a laser to store data within established tracks and sectors, just like on a hard drive. c) Optical media store their data on magnetized platters, just like on hard drives. d) Optical media stores their data on external hard drives.

a) Optical media includes things like compact discs (CDs), digital video discs (DVDs), or Blu-ray discs (BDs), which come in prerecorded, recordable, and rewritable formats.

Before donating your Windows computer, you should perform a Windows a) Reset b) Reclaim c) Refresh d) Restore

a) Reset

Where is the CPU located? a) The CPU is located on the motherboard. b) The CPU is located on RAM. c) The CPU is located on the hard drive. d) The CPU is located in the front side bus.

a) The CPU is located on the motherboard.

SSD drives are preferable to conventional hard drives because they transfer data more quickly. a) True b) False

a) True

There is no limit to how much RAM you can add to modern computers. a) True b) False

a) True

To facilitate sharing peripherals and files on a Windows network, you need to establish a HomeGroup a) True b) False

a) True

Which of the following is NOT a major type of cyber crime reported to the IC3? a) malware fraud b) identity theft c) advance fee fraud d) government impersonation scams

a) malware fraud

Analog signals are not continuous. a) True b) False

b) False

Copyright lasts for only 40 years. a) True b) False

b) False

Desktop systems are invariably a worse value than lighter, more mobile computers. a) True b) False

b) False

In Windows, if you experience unreliable behavior, try a System Restore before doing a Windows Refresh. a) True b) False

b) False

What are ways to improve a wireless signal? a) The way to receive the best signal from a wireless network is to move your wireless device as close to the router as possible. b) Installing an access point or wireless range extender are good options to extend a Wi-Fi signal. c) You should upgrade your wireless router. d) You can move the router to a more central location.

b) Installing an access point or wireless range extender are good options to extend a Wi-Fi signal.

Which of the following should you NOT do to secure a wireless network? a) Create a security encryption passphrase b) Keep the default network name and router password c) Disable SSID broadcasting d) Implement media access control

b) Keep the default network name and router password

Once I download or buy the firewall software, how do I get it installed and tested? a) You need a software programmer to create a special drive to install the firewall and use the Error-Check utility. It will check for any errors in the firewall tests and you can proceed accordingly.​ b) Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe. c) Just call the local technician. Do not try to install it on your own. It will cause system problems. You can test it on your own though, because all firewalls come with testing software.​ d) You can install the firewall on your own but testing requires a certified professional or you will have a hard drive crash.​

b) Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe.

Is there a limit to how much RAM I can add to my computer? a) There is no limit to the amount of RAM that you can add to a computer. b) Yes. Every computer is designed with a maximum limit on the amount of RAM it can support. c) The limit depends entirely on your budget, as RAM upgrades are expensive. d) Yes. The most RAM you can add at one time is 512 MB.

b) Yes. Every computer is designed with a maximum limit on the amount of RAM it can support.

What are the risks of an unsecured wireless network? a) There are no real risks. b) Your wireless network can be piggybacked or hacked. c) The only risk is that your neighbor can use your signal to stream Netflix movies. d) As long as you have an access point on the network, the network is not vulnerable to additional risks.

b) Your wireless network can be piggybacked or hacked.

What special problems can occur with wireless networks? a) There are no special problems associated with wireless networks. b) Poor weather conditions may interfere with a wireless signal, but otherwise it is as good as a wired signal. c) Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity. d) Wireless networks have a slower throughput than wired networks, but otherwise there are no other problems with a wireless network.

c) Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity.

Is it important to have a firewall on a home network? a) If you're using a dial-up Internet connection, you don't need a firewall. b) You need it only if you're going to buy things online with a credit card. If not, you can do without a firewall. c) To be safe, you should always have a firewall if you plan to connect to the Internet. d) Hackers don't bother home computers.

c) To be safe, you should always have a firewall if you plan to connect to the Internet.

How do I share an Internet connection on an Ethernet network? a) To share an Internet connection on an Ethernet network, you need a switch.​ b) To share an Internet connection on an Ethernet network, you need a hub.​ c) To share an Internet connection on an Ethernet network, you need a router.​ d) To share an Internet connection on an Ethernet network, you need a packet.​

c) To share an Internet connection on an Ethernet network, you need a router.​

Which of the following statements is true about e-readers? a) All e-readers are basically the same. b) E ink readers are superior to backlit e-readers. c) Backlit e-readers are superior to E ink readers. d) Both E ink and backlit e-readers have their own advantages and disadvantages

d) Both E ink and backlit e-readers have their own advantages and disadvantages

What steps can be taken to secure a wireless network? a) Ensuring that a firewall is installed is the only precaution needed. b) You only need to change the default password on your router. c) To secure your wireless signal from extending beyond the walls of your home or apartment move the router to a more central location within your home. d) Ensure a firewall is installed and make changes to several settings with your router and on your network.

d) Ensure a firewall is installed and make changes to several settings with your router and on your network.

Is a virus the only way cyber criminals can steal a person's identity? a) Yes, so if a person is careful about using and updating his or her anti-virus software, he or she doesn't have to worry. b) No—you can also catch a virus during denial of service attacks. c) One way you risk identity theft is if you block pop-up windows. d) No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated.

d) No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated.


संबंधित स्टडी सेट्स

Thyroid, Parathyroid, Adrenal, and Pituitary

View Set

Population & Society: Exam 1, Population & Society Exam 2, Population and Society Exam 3

View Set

Answers to the 2006 AP Comparative Government and Politics Exam

View Set

Writing Polynomial Functions from Complex Roots Assignment Study Guide

View Set

"First Aid- Chapter 7: Breathing Emergencies"

View Set

NUR108 #4 - Chapter 18: Nursing Management of the Newborn

View Set

الدرس الرابع (مقاييس الانتشار والإحصائيات الاستنتاجية)

View Set

Exploration and Conquest Unit Test Study

View Set