Chapter questions, CGS2100 exam 2
True / False Instant messages are generally secure because most instant-messaging software provides for encryption of messages
False
True / False The main suite of protocols used on the Internet is TCP/FTP
False
True/False Data mining cannot be used to spot customer trends
False
T/F A communication server is used to control access on a client/server network
True
T/F An expert system attempts to replicate the decisions made by a live person
True
T/F Bridges are used to route data between two or more network collision domains
True
T/F Ethernet networks require each node on the network to be equipped with its own network adapter
True
T/F Even a properly installed surge protector may fail to protect a computer from all power surges
True
T/F If a password includes numbers, symbols, and upper- and lowercase letter, it is considered to be a strong password
True
T/F MANs cover a larger geographic area than HANs
True
T/F Phishing a form of social engineering
True
T/F The costs associated with running the Internet are paid primarily through ISPs collecting fees from customers and from funding by U.S. government agencies
True
T/F Two different types of network topologies can be deployed on the same network
True
True / False VoIP uses packet switching technology
True
A data system that is a subset of a larger system is known as a(n) a. data mart b. office support system c. data warehouse d. transaction-processing system
data mart
True / False 802.11n wireless networks provide faster throughput than wired gigabit Ethernet networks
False
True / False A computer needs the XML address to locate a Web page accurately
False
Which type of network topology favors equal access among nodes a. Star b. Ethernet c. Ring d. Bus
Ring
To regulate the internal timing of a computer system, the motherboard uses a. a system clock b. software simulation c. RAM d. a register
A system clock
Which part of the CPU is specifically designed to perform mathematical operations? a. fetch module b. ALU (arithmetic logic unit) c. registers d. cache memory
ALU
What makes interactivity on the Web possible? a. HTML b. CGI c. FTP d. XML
CGI
Which of the following is not a reason client/server networks are generally not installed in homes? a. Client/server networks can't handle streaming media, which is often required in home networks b. Client/server networks are more difficult to install them peer-to-peer networks c. Client/server networks provide more security than is needed for home networks d. Peer-to-peer networks are less expensive to install than client/server networks
Client/server networks can't handle streaming media, which is often required in home networks
To provide for sharing of an Internet connection, which server would a corporate network include? a. Database b. Authentication c. Communications d. Application
Communications
Which is NOT one of the four main operations of a DBMS? a. Consolidating data b. Entering data c. Sorting data d. Querying data
Consolidating data
Which of the following is not necessary in every client/server network? a. Network adapters b. Database server c. Transmission media d. NOS Software
Database server
Which of the following is not an advantage of installing a client/server network in college? a. Increased scalability b. Decentralization of network security protection c. Sharing of files and data d. Sharing of peripherals
Decentralization of network security protection
Which is a key component of cloud computing? a. Increase in IT employee headcount b. Decreased computing start-up costs c. Delivery of offline computing services d. Difficulty in increasing computing capacity
Decreased computing start-up costs
Which of the following is NOT one of the three main advantages of using databases? a. Promotion of data integrity b. Data can be easily shared c. Elimination of data recording errors d. Flexible use of data
Elimination of data recording errors
For what is PGP used? a. Creating a secure connection between client and server b. Loading Web pages into a browser c. Encrypting e-mail messages d. Uploading files to the Internet
Encrypting e-mail messages
T/F A query is used to transfer information into a database
False
T/F Actual data throughput is usually higher on wireless networks
False
T/F An incremental backup back ups all files on your computer in a specified location
False
T/F Client/server networks are less scalable than peer-to-peer networks
False
T/F Completeness checks ensure that only reasonable data values are entered into a database
False
T/F Reducing incorrect or incomplete data by recording data in only one place is called data optimization
False
T/F Twisted pair cable is never susceptible to magnetic interference
False
T/F WEP and WPA are popular wired network security protocols
False
T/F When malicious code is planted on your computer that interferes with your browser's ability to find Web addresses, it is known as phishing
False
The fastest broadband internet service is usually a. Fiber-optic b. DSL c. Cable d. satellite
Fiber optic
Which is the primary Internet protocol used for viewing Web pages? a. JavaScript b. Telnet c. HTTP d. TCP/IP
HTTP
Which is a common protocol used on the Internet? a. DNS b. IP c. XHTML d. PGP
IP
The type of network used for communication among a laptop and a smartphone using bluetooth is a a. WAN b. PAN c. LAN d. MAN
PAN
Which are the virtual pathways into a computer that firewalls close? a. Packet gateways b. IP addresses c. Logical ports d. Data paths
Logical ports
All of the following are advantages of installing a home network except sharing a. Peripherals b. an Internet connection c. files d. MAC addresses
MAC addresses
The device used to connect a network to the internet is called a a. gateway b. switch c. modem d. router
Modem
Bethany is in her home, watching a video she rook on vacation, while her brother is playing FIFA soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? a. P2P network b. client/server network c. both A and B d. neither A or B
P2P network
Which of the following is not required on some simple networks a. Network adapters b. Networking software c. Network navigation devices d. Transmission media
Network navigation devices
Which is not a reason why client server networks are usually installed in large businesses? a. Peripherals can't be shared on peer-to-peer networks. b. Dedicated servers make large networks more efficient. c. Client/server networks are more scalable than peer-to-peer networks. d. Client/server networks feature centralized security
Peripherals can't be shared on peer-to-peer networks
A group of related fields in a relational database is called a a. Primary key b. Field string c. Record d. Table
Record
Which network navigation device is required to move data between two networks? a. Repeater b. Switch c. Router d. Hub
Router
The "name" of a particular wireless network is known as the a. NetID b. HAN-ID c. SSID d. Wifi-ID
SSID
Which are programs that pretend to be a useful program but do something malicious on your computer? a. Trojan horses b. Backdoor programs c. Zombies d. Spyware
Trojan horses
A numeric IP address is usually represented by an alphanumeric a. URL b. SMTP c. routing address d. DNS address
URL
Which encoding scheme can represent the alphabets of all modern and historic language? a. base-2 number system b. Unicode c. ASCII d. scientific
Unicode
Two or more networks connected over long geographic distances to form a sing network is usually referred to as a a. LAN b. MAN c. HAN d. WAN
WAN
When networks are deployed at two college campuses 30 miles apart, the networks would be classified as a a. WAN b. MAN c. PAN d. LAN
WAN
An emerging standard of wireless Ethernet, also known as 802.11ad, is a. WiGig b. Low power WiFi c. White-Fi d. Super WiFi
WiGig
If you need very fast throughput in a home network, you should use a. an 802.11n wireless Ethernet connection b. a wired power-line network c. a wired gigabit Ethernet connection d. a client/server network
a wired gigabit Ethernet connection
Which of the following allows you to connect to the internet wirelessly a. WiFi b. 4G LTE c. mobile hotspot d. all of the above
all of the above
Which of the following is used to access the internet when WiFi is not available? a. mobile hotspot b. 4G LTE c. 3G internet access d. all of the above
all of the above
Which of the following might cause interference or poor connectivity between nodes on a wireless network? a. concrete walls b. nodes that are too far apart c. some appliances d. all of the above
all of the above
A backup of the entire contents of your hard drive is known as a. a system backup b. an incremental backup c. an image backup
an image backup
What is another name for the base-2 number system? a. decimal notation b. binary number system c. hexadecimal notation d. integer system
binary number system
Why would you want to disable SSID broadcast? a. to make it more difficult for hackers to detect your network b. to make it more difficult for a neighbor to connect to your network c. both A and B d. neither A or B
both A and B
Large groups of software programs that run automatically on many computers at the same time often to perpetrate DoS attacks are known as a. Trojan horses b. backdoor programs c. zombie webs d. botnets
botnets
IP addresses that are assigned by an ISP and do not change over long periods of time are a. called static b. more secure c. called dynamic d. volatile
called static
The throughput of a network a. is the same on all Ethernet networks b. is usually higher on wireless network c. is the same in all areas covered by a wireless network d. can vary depending upon the transmission media used
can vary depending upon the transmission media used
Comparing data values to ensure reasonableness is an example of a(n) a. alphabetic check b. completeness check c. range check d. consistency check
consistency check
To share files between computers on a Windows home network, you must a. enable groupsharing b. create a homegroup c. enable windows sharing d. none of the above
create a homegroup
Having the different birthdates for the same person on two different lists is an example of a. data redundancy b. data inconsistency c. data disparity d. data duplication errors
data inconsistency
What would you use to see that network adapters are installed in your Windows computer? a. Device Manager utility b. Programs and Utilities manager c. Ethernet Manager utility d. Home Network manager
device manager utility
When hackers use many zombie computers to launch an attack on another computer or Web site, the attack is known as a a. zombie infestation b. distributed denial-of-service attack c. phishing attack d. pharming plague
distributed denial-of-service attack
T/F 4G is the latest WiFi standard
false
T/F Actual data throughput is usually higher on wireless networks than on wired networks
false
Wireless range expanders a. are never used for home networks b. are not needed with 802.11n networks c. improve connectivity in remote areas of a home d. turn devices with wired connections into wireless nodes
improve connectivity in remote areas of a home
Providing adequate security on a corporate network involves all of these issues, except a. authentication b. packet screening c. deploying a bastion host d. installing NOS blocking software
installing NOS blocking software
A primary key a. should always contain only numbers b. is always unique for each record in a database c. does not have to be unique for every record in a database d. is only used in object-oriented databases
is always unique for each record in a database
Which of the following should you NOT do to secure a wireless network? a. implement media access control b. keep the default network name and router password c. create a security encryption passphrase d. disable SSID broadcasting
keep the default network name and router password
How can you tell what wireless devices are connected to your router? a. look at the router itself b. look at the device's wireless settings c. log in to the router's IP address and check the configuration page d. all of the above
log in to the router's IP address and check the configuration page
What two devices are often combined into one device in a small network to connect the home network to the internet and to share the connection between devices on the network? a. router hub and switch b. switch and router c. modem and router d. modem and switch
modem and router
On client server networks, switches a. transfer data between two networks b. route data between two collision domains on a single network c. move data efficiently from node to node on the network d. necessary only in networks using the ring topology
move data efficiently from node to node on the network
A(n) ____ database organizes in a cube format a. relational b. object-oriented c. rectangular d. multidimensional
multidimensional
NOS software is a. needed on all computers in a client/server networks b. needed only on the servers in a client/server network c. needed only on client computers in a client/server network d. needed only when configuring a network in a ring topology
needed on all computers in a client/server networks
A multi-core processor like the Intel i7 is a. one physical chip b. several chips joined together on the motherboard c. two separate cards installed in your system d. a software setting you can use to speed up CPU processing
one physical chip
An example of a good primary key is a(n) a. order number b. person's first name combined with their last name c. name of a pet d. street address
order number
Data is sent over the Internet using a. circuit switching b. protocol switching c. DNS switching d. packet switching
packet switching
Individuals connect to the Internet using a. points of presence b. network access points c. Internet exchange points d. Web servers
points of presence
Antivirus software segregates infected files to prevent further spread in a process known as a. inoculation b. quarantine c. disinfection d. eradication
quarantine
Special areas of memory storage built into the CPU are known as a. switches b. semiconductors c. registers d. DIMMs
registers
Encryption of Internet e-mail a. requires the use of specially designed client software b. is built into the SMTP protocol c. is built into most Web-based email d. is prohibited by the Department of Homeland Security
requires the use of specially designed client software
Hackers without sophisticated computer knowledge who use tools developed by others to break into systems are called a. black-hat hackers b. script kiddies c. amateur hackers d. white-hat hackers
script kiddies
Viruses that feature a series of commands hidden on a web site are called a. boot-sector viruses b. script viruses c. polymorphic viruses d. time bombs
script viruses
Which of the following would NOT be a benefit of networking computers? a. sharing an internet connection b. sharing printers and other peripherals c. sharing software licenses d. sharing files
sharing software licenses
Fiber optic cable most likely would be used in a corporate network when a. cost is more important than speed b. electrical or magnetic interference is not present c. short cable runs are required d. speed is more important than cost
speed is more important than cost
Programs that download to your computer, usually without your knowledge, for the purpose of collecting information, is a type of cyberannoyance known as a. pharmware b. adware c. spyware d. bloatware
spyware
Computer viruses that hide in memory to escape detection are known as a. logic bombs b. Trojan horses c. stealth viruses d. multipartite viruses
stealth viruses
The device used to move data around a single network is called a a. gateway b. switch c. router d. repeater
switch
An electronic system used to keep track of everyday business activities is an example of a(n) a. transaction-processing system b. decision support system c. expert system d. knowledge-based system
transaction-processing system
T/F 802.11ac is the current wireless ethernet standard
true
What device would you use to amplify your wireless signal? a. dual-band N router b. network extender device c. network access switch d. wireless ranger extender
wireless range extender