CIS Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is NOT a standard for wireless Ethernet networks?

802.11ab

If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

802.11ac

29) Which of the following is NOT a video file extension? A) .jpg B) .mpg C) .avi D) .mov

A) .jpg

11) To protect a movie, what category of intellectual property would be used? A) Copyright B) Trademark C) Service mark D) Patent

A) Copyright

26) ________ allows only limited use of media that has been legally purchased. A) Digital rights management B) Copyright C) Copyleft D) Synchronizing

A) Digital rights management

30) A(n) ________ cable carries all audio and video information from one devices to another connected device. A) HDMI B) S component C) Ethernet D) RJ11

A) HDMI

24) How long do current U.S. laws grant copyright protection? A) The life of the author (creator) plus 70 years B) The life of the author (creator) plus 50 years C) 99 years D) 101 years

A) The life of the author (creator) plus 70 years

7) A(n) ________ chip converts sound waves from a voice into a digital signal. A) analog-to-digital converter B) digital convergence C) digital signal processor D) telephony

A) analog-to-digital converter

17) Instead of writing a term paper, some people cheat and purchase one from a(n) ________. A) paper mill B) term paper resource C) academic wholesale house D) academic paper resource

A) paper mill

21) Works without copyright protection are considered to be in the ________. A) public domain B) free use domain C) trademark zone D) copyleft domain

A) public domain

5) What is a system of access control that allows only limited use of material that has been legally purchased? A) DDM B) DRM C) DRR D) MDR

B) DRM

18) What is a popular copyleft license used for software? A) Creative Commons (CC) B) General Public License (GNU) C) Software Copy License (SCL) D) NonCommercial (NC)

B) General Public License (GNU)

8) What is NOT an example of a method to stream music? A) Pandora B) Google Tunes C) Spotify D) Apple CarPlay

B) Google Tunes

9) ________ property is a product of a person's mind and is usually considered an expression of human creativity? A) Abstract B) Intellectual C) Tangible D) Personal

B) Intellectual

22) Which of the following is NOT true about e-books? A) You can borrow them from the library. B) They are always PDF file format. C) You can annotate them with your own notes. D) Amazon sells more e-books now than printed books.

B) They are always PDF file format.

14) A violation of the holder's rights is known as copyright ________. A) violation B) infringement C) defrauding D) abuse

B) infringement

13) Creative Commons licenses are ________. A) temporary B) irrevocable C) used mostly for software D) used mostly for movies

B) irrevocable

23) ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices. A) Short message service B) SMTP C) E-text D) Digital rights management

C) E-text

28) Which of the following digital formats compress an image file? A) AAC B) RAW C) JPEG D) MPEG

C) JPEG

16) What is the act of copying text or ideas from someone else and claiming them as your own? A) Copyright abuse B) Trademark infringement C) Plagiarism D) Copyleft

C) Plagiarism

6) Google ________ is an online store that can be used for self-publishing books. A) Fun B) Games C) Play D) Sport

C) Play

4) What happens after 180 days to e-books rented through VitalSource? A) They are encrypted until you purchase them. B) They show up in your library, but cannot be read. C) They disappear from your device. D) Only the first chapter can be read.

C) They disappear from your device.

20) What is a good rule to follow to avoid plagiarism? A) Cite every fact you use. B) Never cite from another source. C) When in doubt, cite your source. D) Cite every comment.

C) When in doubt, cite your source.

19) What is a website that allows an instructor to upload a paper to check for plagiarism? A) checkit.com B) plagiarism.com C) turnitin.com D) checkthatpaper.com

C) turnitin.com

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?

Cat 7B

25) Which of the following is NOT an example of a digital music file format? A) WMA B) MP3 C) AAC D) ACCDB

D) ACCDB

27) Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? A) Converting rate B) Conversion rate C) Simplifying rate D) Sampling rate

D) Sampling rate

1) What does the Digital Living Network Alliance standardize? A) The compilation of available e-texts. B) The codecs used in video compression. C) The sampling rate used to create MP3 files. D) The convergence of devices.

D) The convergence of devices.

12) When does copyright protection begin? A) When the application for the copyright has been approved B) When the application for the copyright has been submitted C) When a work is begun D) When a work is created and fixed into a digital or physical form

D) When a work is created and fixed into a digital or physical form

2) The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs. A) multimedia message service B) telephony C) mobile switching center D) digital convergence

D) digital convergence

10) The Apple logo would be considered a(n) ________. A) copyright B) service mark C) patent D) trademark

D) trademark

55) A copyright holder cannot loan, rent, or give away the work. TRUE FALSE

FALSE

Which transmission medium transmits data the fastest?

Fiber-optic cable

Which of the following is NOT a common network architecture type?

Intraoffice area network (IAN)

51) The most common file types supported by digital cameras are raw uncompressed (RAW) data and ________.

JPEG

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

MAC

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN

A(n) ________ device facilitates file sharing and data backup.

NAS

34) Google ________ is a subscription service that lets you listen to tracks in their catalog.

Play

56) Facts cannot be copyrighted. TRUE FALSE

TRUE

57) Plagiarism is usually considered an academic offense of dishonesty and isn't punishable under U.S. civil law. TRUE FALSE

TRUE

What transmission media is used for normal telephone service?

Twisted-pair cable

Which of the following is NOT a type of cable used in wired networks?

Unshielded coaxial

The network architecture that spans the largest physical distance is called a ________.

WAN

When setting up a home network, make sure each node has ________.

a network adapter

37) Employment ________ means that unless you're covered by an employment contract or a collective bargaining agreement, employers can fire you at any time for any reason, unless the reason violates a legal statute.

at-will

A client/server network is an example of ________ administration.

central

53) A(n) ________ is a rule that squeezes the same audio and video information into less space.

codec

48) The ________ is the number of times that an analog wave is measured each second in an analog-to-digital conversion.

conversion rate

54) ________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.

copyleft

You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.

device

Which of the following is NOT a wired broadband Internet connection option?

dial-up

45) Works in the public ________ are considered public property and therefore, anyone can modify, distribute, copy, or sell them for profit.

domain

47) The main grayscale technology for e-text display on the Amazon Kindle Paperwhite and Barnes and Noble NOOK is ________.

e-ink

All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.

enable SSID broadcast

42) Reproduction by a teacher or student of a small part of a work to illustrate a lesson is commonly known as educational ________ use.

fair

A P2P network needs specialized network operating system software installed on every node.

false

An access point connects to the main router wirelessly

false

Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.

false

Ethernet networks are always connected using twisted-pair cable technology.

false

Limiting your signal range does not help increase wireless network security.

false

WEP is a stronger form of security than WPA

false

When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router.

false

38) You have a constitutional right to ________ speech.

free

31) A(n) ________ is anything designed to deceive another person either as a practical joke or for financial gain.

hoax

A peer-to-peer (P2P) network is an example of ________ administration.

local

33) Digital ________ involves altering media so that the images captured are changed from the way they were originally seen by the human eye.

manipulation

50) Digital camera resolution is measured in ________.

megapixles

Which hardware device connects your network to the Internet?

modem

40) MLA stands for ________ Language Association.

modern

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

network

For the nodes on a network to communicate with each other and access the network, each node needs a ________.

network adapter

Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance.

network administrators

Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

network operating system (NOS)

A ________ is any device connected to a network such as a computer, printer, or game console.

node

Data are sent through a network in bundles called ________.

packets

35) The tendency of information to remains on the Internet indefinitely is known as ________ of information.

persistance

Using a wireless network without the network owner's permission is known as ________.

piggybacking

44) Illegally using copyrighted software is known as software ________.

piracy

41) Failing to identify a direct quotation with quotation marks is an example of ________.

plagiarism

Wireless network devices use ________ to communicate with each other.

radio waves

36) Your online ________ consists of the information available about you in cyberspace that can influence people's opinions of you in the real world.

reputation

52) The ________ of a digital camera refers to the number of data points recorded for a captured image.

resolution

To transfer data packets between two or more networks, a ________ is used.

router

49) The size of an MP3 file depends on the digital ________ of the song.

sampling

46) The FedEx logo is a ________ mark.

service

On a network, a(n) ________ helps prevent data packets from colliding with each other.

switch

43) Many websites that contain copyrighted material also contain lengthy legal documents that delineate the ________ of use for the material that you download.

terms

________ is the actual speed of data transfer that is achieved between two nodes on a network and is always less than or equal to the data transfer rate.

throughput

A printer connected to a wireless network is considered to be a node on that network.

true

A switch acts like a traffic signal on a network

true

Most computers today come with Ethernet adapters already installed.

true

P2P networks are most commonly used in home networks.

true

Sharing files is a benefit of a network

true

The Internet is a WAN

true

Wireless network connections are slower than wired broadband connections.

true

Wireless networks are more vulnerable to attack than wired networks.

true

All of the following is NOT a home operating systems that supports P2P networking?

unix

32) When a hoax becomes so well known that it is incorporated into society as a true event, it is known as a(n) ________.

urban legend

39) The ________ Machine is a utility that shows you what a website looked like at a previous point in time.

wayback


Set pelajaran terkait

Pedi Quiz 3: Musculoskeletal Disorders and Fractures

View Set

10.8 End of Topic Review--Test 10 - Benefits

View Set

7.16.W - Test Review: Europe, Russia & Central Asia (Practice) [SECTION 2]

View Set

Psych 322: Biological Basis of Learning and Memory

View Set

Quantitative Reasoning Final Exam

View Set

BIO 183 Fall 2017 Benoit Jacquet Exams 1, 2, and 3 Multiple Choice

View Set

3C - Financial Valuation Methods and Decision Models. Questions from review

View Set