CIS Test 2
Which of the following is NOT a standard for wireless Ethernet networks?
802.11ab
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?
802.11ac
29) Which of the following is NOT a video file extension? A) .jpg B) .mpg C) .avi D) .mov
A) .jpg
11) To protect a movie, what category of intellectual property would be used? A) Copyright B) Trademark C) Service mark D) Patent
A) Copyright
26) ________ allows only limited use of media that has been legally purchased. A) Digital rights management B) Copyright C) Copyleft D) Synchronizing
A) Digital rights management
30) A(n) ________ cable carries all audio and video information from one devices to another connected device. A) HDMI B) S component C) Ethernet D) RJ11
A) HDMI
24) How long do current U.S. laws grant copyright protection? A) The life of the author (creator) plus 70 years B) The life of the author (creator) plus 50 years C) 99 years D) 101 years
A) The life of the author (creator) plus 70 years
7) A(n) ________ chip converts sound waves from a voice into a digital signal. A) analog-to-digital converter B) digital convergence C) digital signal processor D) telephony
A) analog-to-digital converter
17) Instead of writing a term paper, some people cheat and purchase one from a(n) ________. A) paper mill B) term paper resource C) academic wholesale house D) academic paper resource
A) paper mill
21) Works without copyright protection are considered to be in the ________. A) public domain B) free use domain C) trademark zone D) copyleft domain
A) public domain
5) What is a system of access control that allows only limited use of material that has been legally purchased? A) DDM B) DRM C) DRR D) MDR
B) DRM
18) What is a popular copyleft license used for software? A) Creative Commons (CC) B) General Public License (GNU) C) Software Copy License (SCL) D) NonCommercial (NC)
B) General Public License (GNU)
8) What is NOT an example of a method to stream music? A) Pandora B) Google Tunes C) Spotify D) Apple CarPlay
B) Google Tunes
9) ________ property is a product of a person's mind and is usually considered an expression of human creativity? A) Abstract B) Intellectual C) Tangible D) Personal
B) Intellectual
22) Which of the following is NOT true about e-books? A) You can borrow them from the library. B) They are always PDF file format. C) You can annotate them with your own notes. D) Amazon sells more e-books now than printed books.
B) They are always PDF file format.
14) A violation of the holder's rights is known as copyright ________. A) violation B) infringement C) defrauding D) abuse
B) infringement
13) Creative Commons licenses are ________. A) temporary B) irrevocable C) used mostly for software D) used mostly for movies
B) irrevocable
23) ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices. A) Short message service B) SMTP C) E-text D) Digital rights management
C) E-text
28) Which of the following digital formats compress an image file? A) AAC B) RAW C) JPEG D) MPEG
C) JPEG
16) What is the act of copying text or ideas from someone else and claiming them as your own? A) Copyright abuse B) Trademark infringement C) Plagiarism D) Copyleft
C) Plagiarism
6) Google ________ is an online store that can be used for self-publishing books. A) Fun B) Games C) Play D) Sport
C) Play
4) What happens after 180 days to e-books rented through VitalSource? A) They are encrypted until you purchase them. B) They show up in your library, but cannot be read. C) They disappear from your device. D) Only the first chapter can be read.
C) They disappear from your device.
20) What is a good rule to follow to avoid plagiarism? A) Cite every fact you use. B) Never cite from another source. C) When in doubt, cite your source. D) Cite every comment.
C) When in doubt, cite your source.
19) What is a website that allows an instructor to upload a paper to check for plagiarism? A) checkit.com B) plagiarism.com C) turnitin.com D) checkthatpaper.com
C) turnitin.com
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?
Cat 7B
25) Which of the following is NOT an example of a digital music file format? A) WMA B) MP3 C) AAC D) ACCDB
D) ACCDB
27) Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? A) Converting rate B) Conversion rate C) Simplifying rate D) Sampling rate
D) Sampling rate
1) What does the Digital Living Network Alliance standardize? A) The compilation of available e-texts. B) The codecs used in video compression. C) The sampling rate used to create MP3 files. D) The convergence of devices.
D) The convergence of devices.
12) When does copyright protection begin? A) When the application for the copyright has been approved B) When the application for the copyright has been submitted C) When a work is begun D) When a work is created and fixed into a digital or physical form
D) When a work is created and fixed into a digital or physical form
2) The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs. A) multimedia message service B) telephony C) mobile switching center D) digital convergence
D) digital convergence
10) The Apple logo would be considered a(n) ________. A) copyright B) service mark C) patent D) trademark
D) trademark
55) A copyright holder cannot loan, rent, or give away the work. TRUE FALSE
FALSE
Which transmission medium transmits data the fastest?
Fiber-optic cable
Which of the following is NOT a common network architecture type?
Intraoffice area network (IAN)
51) The most common file types supported by digital cameras are raw uncompressed (RAW) data and ________.
JPEG
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
A(n) ________ device facilitates file sharing and data backup.
NAS
34) Google ________ is a subscription service that lets you listen to tracks in their catalog.
Play
56) Facts cannot be copyrighted. TRUE FALSE
TRUE
57) Plagiarism is usually considered an academic offense of dishonesty and isn't punishable under U.S. civil law. TRUE FALSE
TRUE
What transmission media is used for normal telephone service?
Twisted-pair cable
Which of the following is NOT a type of cable used in wired networks?
Unshielded coaxial
The network architecture that spans the largest physical distance is called a ________.
WAN
When setting up a home network, make sure each node has ________.
a network adapter
37) Employment ________ means that unless you're covered by an employment contract or a collective bargaining agreement, employers can fire you at any time for any reason, unless the reason violates a legal statute.
at-will
A client/server network is an example of ________ administration.
central
53) A(n) ________ is a rule that squeezes the same audio and video information into less space.
codec
48) The ________ is the number of times that an analog wave is measured each second in an analog-to-digital conversion.
conversion rate
54) ________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.
copyleft
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.
device
Which of the following is NOT a wired broadband Internet connection option?
dial-up
45) Works in the public ________ are considered public property and therefore, anyone can modify, distribute, copy, or sell them for profit.
domain
47) The main grayscale technology for e-text display on the Amazon Kindle Paperwhite and Barnes and Noble NOOK is ________.
e-ink
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.
enable SSID broadcast
42) Reproduction by a teacher or student of a small part of a work to illustrate a lesson is commonly known as educational ________ use.
fair
A P2P network needs specialized network operating system software installed on every node.
false
An access point connects to the main router wirelessly
false
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
false
Ethernet networks are always connected using twisted-pair cable technology.
false
Limiting your signal range does not help increase wireless network security.
false
WEP is a stronger form of security than WPA
false
When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router.
false
38) You have a constitutional right to ________ speech.
free
31) A(n) ________ is anything designed to deceive another person either as a practical joke or for financial gain.
hoax
A peer-to-peer (P2P) network is an example of ________ administration.
local
33) Digital ________ involves altering media so that the images captured are changed from the way they were originally seen by the human eye.
manipulation
50) Digital camera resolution is measured in ________.
megapixles
Which hardware device connects your network to the Internet?
modem
40) MLA stands for ________ Language Association.
modern
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
network
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
network adapter
Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance.
network administrators
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
network operating system (NOS)
A ________ is any device connected to a network such as a computer, printer, or game console.
node
Data are sent through a network in bundles called ________.
packets
35) The tendency of information to remains on the Internet indefinitely is known as ________ of information.
persistance
Using a wireless network without the network owner's permission is known as ________.
piggybacking
44) Illegally using copyrighted software is known as software ________.
piracy
41) Failing to identify a direct quotation with quotation marks is an example of ________.
plagiarism
Wireless network devices use ________ to communicate with each other.
radio waves
36) Your online ________ consists of the information available about you in cyberspace that can influence people's opinions of you in the real world.
reputation
52) The ________ of a digital camera refers to the number of data points recorded for a captured image.
resolution
To transfer data packets between two or more networks, a ________ is used.
router
49) The size of an MP3 file depends on the digital ________ of the song.
sampling
46) The FedEx logo is a ________ mark.
service
On a network, a(n) ________ helps prevent data packets from colliding with each other.
switch
43) Many websites that contain copyrighted material also contain lengthy legal documents that delineate the ________ of use for the material that you download.
terms
________ is the actual speed of data transfer that is achieved between two nodes on a network and is always less than or equal to the data transfer rate.
throughput
A printer connected to a wireless network is considered to be a node on that network.
true
A switch acts like a traffic signal on a network
true
Most computers today come with Ethernet adapters already installed.
true
P2P networks are most commonly used in home networks.
true
Sharing files is a benefit of a network
true
The Internet is a WAN
true
Wireless network connections are slower than wired broadband connections.
true
Wireless networks are more vulnerable to attack than wired networks.
true
All of the following is NOT a home operating systems that supports P2P networking?
unix
32) When a hoax becomes so well known that it is incorporated into society as a true event, it is known as a(n) ________.
urban legend
39) The ________ Machine is a utility that shows you what a website looked like at a previous point in time.
wayback