Technology for Success Computer Concepts Module 10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

a) True Network attached storage (NAS) devices are one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks. On a home network, you might store family photos and videos so that they are accessible to all members of your family.

If you upload photos to a NAS device, everyone on the network can access them. a) True b) False

b) Intranet Organizations use intranets to communicate internally and can allow users to use a web browser to access data posted on webpages.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? a) Wired network b) Intranet c) Extranet d) Virtual private network

c) Star In a star network, each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate.

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. a) Bus b) Ring c) Star d) Mesh

b) They provide a central point for cables in a network. A switch is similar to a hub in that it provides a central point for cables in a network; however, it transfers data only to the intended recipient.

In a connected network, how are hubs and switches similar to one another? a) They are interchangeable terms for the same hardware. b) They provide a central point for cables in a network. c) They transfer data to all devices. d) They can only connect to a single device.

b) The network connection is probably not secure.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? a) He can use the network only for a limited time. b) The network connection is probably not secure. c) He cannot connect to the Internet from the network. d) The network most likely uses a firewall for protection.

c) to access shared resources Networks allow computers to share resources, such as hardware, software, data, and information. A network requires a combination of hardware and software to operate.

Why would you want to connect your computer to a network? a) to keep up with computing trends b) for added security c) to access shared resources d) to use the network's operating system

a) True

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots. a) True b) False

b) False 4G and 5G networks provide higher speed data transmission, making them more appealing users who require access to high-bandwidth content.

4G and 5G networks provide slower data transmission speeds than 3G networks. a) True b) False

c) A router Some modems also function as a wired and/or wireless router.

A modem can also function as what other piece of hardware? a) A hub b) A switch c) A router d) A network interface card

b) Encrypt the data in the report.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? a) Store the report on a flash drive that you have password-protected with the president's name. b) Encrypt the data in the report. c) Send the email without attaching the report and ask the president to call you. d) Transfer the report to the cloud.

b) Extranet An extranet might be used if a supplier needs to check a customer's inventory levels before deciding whether to ship additional product.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? a) VPN b) Extranet c) Wi-Fi d) Intranet

b) False

Bandwidth is a term that describes the number of devices connected to a network. a) True b) False

a) mobile hotspot

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? a) mobile hotspot b) Bluetooth connection c) virtual private network d) cell phone hotspot

c) standards

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. a) topologies b) architectures c) standards d) protocols

b) False Near field communication (NFC) is used in credit cards, smartphones, and tickets to facilitate close-range communication.

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. a) True b) False

d) modem The router is typically connected with a wire or cable to a device called a modem, which provides the Internet connectivity.

To access the Internet, a router must be connected to a _____. a) network b) hub c) switch d) modem

a) Copper telephone wiring A DSL modem uses existing standard copper telephone wiring to send and receive digital data.

What does a DSL modem use to send and receive digital data? a) Copper telephone wiring b) Cable TV connections c) A wireless router d) A network interface card

b) Router A router is a device that connects two or more networks and directs the flow of information along the networks.

What hardware is essential to creating a home Wi-Fi network? a) Printer b) Router c) Monitor d) Ethernet cable

d) Network interface card A network interface card (NIC) is a circuit board that connects a computer to a wired or wireless network.

What internal device does a computer use to connect to a wired or a wireless network? a) Motherboard b) Hub c) Switch d) Network interface card

a) A unique hardware address for your device A MAC address is a unique hardware address identified for your computer or device, and the MAC address control feature specifies the MAC addresses of computers and devices that can (or cannot) connect to your network.

What is a MAC address? a) A unique hardware address for your device b) The connection needed to access to a cellular network c) An IP address unique to Apple's MAC computers d) An alternate name Internet Protocol version 6

a) A telecommunications company that sells Internet access. An Internet Service Provider is a telecommunications company that sells Internet access. Most ISPs offer broadband connectivity capable of transmitting large amounts of data at high speeds.

What is an ISP? a) A telecommunications company that sells Internet access. b) A communications device that connects to a communications channel. c) A central point for cables in a network for data sharing, d) A system of two or more devices linked by wires, cables, or a telecommunications system.

b) LTE

Which of the following network standards applies to cellular networks? a) Wi-Fi b) LTE c) Phoneline d) Ethernet

a) Many public networks are not secure. Many public networks are not secure, making it easier for attackers to intercept the information you are transmitting.

Which of the following statements is true about public networks? a) Many public networks are not secure. b) All public networks are free. c) Your home network is a public network. d) Hackers cannot intercept data transmitted over public networks.

a) peer-to-peer

A network administrator is usually not required on a _____ network. a) peer-to-peer b) client/server c) intranet d) metropolitan area

b) False A network is a system of two or more devices linked by wires, cables, or a telecommunications system.

A router is a system of two or more devices linked by wires or cables. a) True b) False

d) It contained typos and other grammatical errors.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? a) It did not include a promotional offer. b) It was written in an overly formal tone. c) The signature was consistent with other emails from his bank. d) It contained typos and other grammatical errors.

b) protocol

Computers communicating on a network must follow a _____, a common set of rules for exchanging information. a) standard b) protocol c) syntax d) topology

d) personal Devices on a personal area network typically are connected via Bluetooth.

Devices on a _____ area network are connected via Bluetooth. a) local b) wide c) metropolitan d) personal

b) The sending and receiving devices must know the wireless network key to communicate. Both the sending and receiving device must know the key to communicate on the wireless network.

How does a wireless network key work with an encrypted wireless network? a) The wireless key is the encryption code needed by the receiver to decode the file. b) The sending and receiving devices must know the wireless network key to communicate. c) The wireless network needs the key to decode the data before sending. d) The wireless network key is your password for logging onto an Internet email system to receive files.

b) False If you connect to a wireless network that does not require a wireless network key, that often means the network is unsecure, and you should avoid transmitting private information.

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. a) True b) False

b) firewall A firewall is a protective barrier between a computer or a network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges.

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. a) ethernet b) firewall c) protocol d) rootkit

d) Virtual private network A VPN can allow an individual to access an organization's network by using encryption and other technologies to secure the data transmitted along the path.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? a) Extranet b) Intranet c) Wireless network d) Virtual private network

a) Social engineering Social engineering is an attempt to exploit human weaknesses by building relationships with victims for the purpose of stealing confidential information.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? a) Social engineering b) A zombie attack c) An evil twin d) Spyware

c) They disguise the network as an evil twin. An evil twin is a normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information while users are using it. Evil twins can be impossible to identify, so it is important to treat all public networks as unsecure.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? a) They use adware to fill your screen with unwanted advertisements until you click one. b) They overload the server with network traffic so webpages will not load. c) They disguise the network as an evil twin. d) They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

d) To release rules surrounding Internet access Although the Internet is a global resource, the U.S. Federal Communication Commission (FCC) is responsible for releasing rules surrounding Internet access.

What is the U.S. Federal Communication Commission's role in regard to Internet access? a) To rate Internet sites similar to movie ratings b) To restrict Internet access by location and population c) To regulate the bandwidth each website can have d) To release rules surrounding Internet access

c) Wireless network A wireless network sends signals through airwaves and usually does not require cables.

What type of network sends signals through airwaves and usually does not require cables? a) Wired network b) Intranet c) Wireless network d) Virtual private network

c) Laptop A client is a computer or mobile device on the network that relies on the server for its resources. Client/server networks often are controlled by a network administrator.

When describing a client/server network, which of the following would be considered a client? a) External hard drive b) Modem c) Laptop d) Printer

c) Roles can be granted to individuals to view files and make changes to files on a network. When you store files on a network, you might have the ability to specify users who can view the files, as well as users who can view and make changes to the files.

When it comes to secure data storage on a network, which of the following statements is true? a) You cannot save encrypted files on a network attached storage device. b) Wireless network keys are the safest method for protecting files on a network. c) Roles can be granted to individuals to view files and make changes to files on a network. d) Files stored on a network are accessible to all who can access that network.

a) You can use the wireless router to set the encryption key and type of encryption. You can specify the type of encryption, as well as the desired wireless network key, through the wireless router's configuration utility that is often accessible using a web browser.

When using encryption from your home computer, how would you configure the router? a) You can use the wireless router to set the encryption key and type of encryption. b) You can use the wireless router to intercept encrypted information and block it from entering the network. c) You can use the wireless router to verify the security certificate of the encrypted data being sent. d) You can use the wireless router to encrypt and then decode the encryption on information sent and received.

c) Bluetooth Bluetooth devices communicate with each other over a short range (usually less than 30 feet/9 meters)

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? a) RFID b) NFC c) Bluetooth d) IrDA

c) Customers cannot view the website on their device because the page will not load. If a server responsible for hosting websites is the recipient of a denial of service attack, it might be unable to display websites for visitors attempting to view them.

Which of the following could indicate a DoS attack on your company server? a) Customers are required to enter personal information as they complete an order form. b) Customers are receiving too many emails about special offers. c) Customers cannot view the website on their device because the page will not load. d) Customers cannot download the most recent newsletter.

b) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. Evil twins can be impossible to identify, so it is important to treat all public networks as unsecure.

Which of the following describes an evil twin? a) A device infected with malware that an attacker uses to control the device remotely. b) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. c) A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. d) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.

b) The inability to access your files if you lose your Internet connection. In addition to the many advantages cloud computing offers, there are also some disadvantages, including the inability to access your files if you lose your Internet connection.

Which of the following is a disadvantage of using cloud computing to share files? a) The amount of space that files will take up on your computer. b) The inability to access your files if you lose your Internet connection. c) The files you will lose if your computer crashes. d) How long it will take to access a backup of files.

a) Fingerprint scanner The most common form of authentication is providing a user name and password. However, additional forms of authentication exist such as using biometric devices to scan physical characteristics. Windows Hello is a feature in Windows that authenticates users by scanning a user's fingerprint, face, or iris.

Which of the following is an authentication method to keep your data safe? a) Fingerprint scanner b) Body area network c) Encryption d) Software firewall

c) smartwatch and phone connected via Bluetooth

Which of the following is an example of a personal area network? a) computers connected within a city b) computers connected within a home c) smartwatch and phone connected via Bluetooth d) phone and computer connected via Wi-Fi

b) Broadband connections are "always-on" connections. Broadband connections are usually "always-on" connections, which means that the computers and devices on the network are always connected to the Internet.

Which of the following is true about broadband connections? a) Broadband connections turn off after a specified amount of idle time. b) Broadband connections are "always-on" connections. c) Only a few of today's Internet connections are broadband connections. d) Broadband connections require a wireless router to increase their speed.

d) ISPs should charge more for high-bandwidth connections. The concept of net neutrality is that one website has the same value or priority as other websites, resulting in equal, unrestricted access to each site.

Which of the following statements do opponents of net neutrality agree with? a) Access to websites should not be restricted based on content. b) All Internet traffic should be treated equally. c) The same level of service should be provided to all websites, regardless of purpose. d) ISPs should charge more for high-bandwidth connections.

**This question is keyed incorrectly.** The factually correct answer: a) It is a physical device that acts as a protective barrier. The answer marked correct by the key: b) It is also called software firewall.

Which of the following statements is NOT true about a local firewall? a) It is a physical device that acts as a protective barrier. b) It is also called software firewall. c) It is often built into a company's operating system. d) It inspects data being transmitted to or from a network.

d) Wbcm2!4!820! A strong password is a long combination of letters, numbers, and/or symbols that unlocks access to protected electronic data.

Which of the following would be considered a strong password? a) Password123 b) Abc123456789 c) CatCatCatCat d) Wbcm2!4!820!

a) My Verizon VPN When you connect to a public Wi-Fi network, be careful not to enter confidential information on websites or send personal data in an email message. Your smartphone or personal VPN are secure networks.

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? a) My Verizon VPN b) Starbucks Wi-Fi c) Jenn's iPhone d) xfinitywifi

b) It sends and receives digital data over a digital line. Most of today's modems are digital, which means that they send and receive data to and from a digital line. Cable and DSL are two common types of digital modems.

Why is a cable modem classified as a digital model? a) It only sends digital data over a digital line. b) It sends and receives digital data over a digital line. c) It only receives digital data over a digital line. d) It uses copper wires to enable efficient digital data transfers.

c) She has a home network with smart home devices. Home networks, which typically exist in a single structure and are easy to install and configure, provide home users with the following capabilities: Smart home devices such as thermostats, light switches, smart speakers, and personal assistants can connect to the Internet and apps on your smartphone

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a) She uses a hub at her home that she connects to through the app. b) She has installed switches that interact with the installed app on her phone. c) She has a home network with smart home devices. d) She dialed into her home modem through the app and sent a command through the router.


संबंधित स्टडी सेट्स

Chapter 61: Management of Patients with Dermatologic Problems

View Set

Online Economics Final Exam- Multiple Choice

View Set

Topics in Demand and Supply Analysis

View Set

Nutrition Spotlight E nutrition for pregnancy

View Set

HIST 1302 Chapter 16 Inquizitive

View Set

Managing Finance and Capital Exam Two

View Set