Exam 1 Quizzes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Is a virus the only way cyber criminals can steal a person's identity?

No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated

Is a home network the same kind as the one at the corporation where I work?

No. Most companies use client/server networks. You'll be setting up a P2P network

Type of network used for communication among a laptop and smartphone using Bluetooth is a

PAN

Copyright..

Protects you from having other use your work

Which is not a right granted to copyright holders?

Reduction of a work

A surge protector may look like just another power strip but it also can

Save your device if a voltage spike is sent through the electrical system

Computer viruses can be spread by

Sharing flash drives, downloading and running a file attached to an email, downloading a song from a peer to peer sharing site

Which of the following would NOT be a benefit of networking computers?

Sharing software licenses

What is true about works in the public domain?

Some enter because their creator is unknown, copyright expired, are free and can be used by anyone

How long does copyright last

The life of the creator plus 70 years

How do I share an internet connection on an ethernet network?

To share a connection you need a router

Which of the following transmission media is used most often for wired connections within a home?

Unshielded twisted pair cable

When is posting a picture on social media considered copyright infringement?

When you don't have permission from the copyright holder to post the photo, when you don't own the copyright to the photo

Which allows you to connect to the Internet wirelessly without needing a cellular plan?

Wi-Fi

Can I set up a wireless network at home?

You can have a wireless network only if each node connected to the network has a wireless network adapted attached to it or installed in it

How can I share an Internet connection on a wireless network?

You'll need a special router to share an internet connection on a wireless network

Authentication techniques that rely on personal biological traits are called

biometrics

Is there a good reason to set up a network for two computers?

By setting up a network, you can share a broadband Internet connection

What should users do if they get a popup threatening them that their system is at risk and that they need to buy a particular product to ensure its protection?

Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses.

Altering a picture so that it doesn't reflect the reality of what is being shown is known as..

Digital manipulation

Fake news is

A type of hoax

Is it safe to click on links that come in email from companies you know?

No, it is not safe. It is a better practice to go to the website yourself and login there.

What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network?

Modem and router

A __ is a program that takes complete control of your computer without your knowledge

Rootkit

What is a virus?

A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged

Which of the following is considered intellectual property?

A song, sculpture, movie

Which would not cause interference or poor connectivity between nodes on a wireless network?

A wireless extender

Viruses that load from USB drives left connected to computers when computers are turned on are known as

Boot-sector viruses

The fastest broadband internet service is usually

Fiber-optic

Which type of broadband offers connections nearing the speed of light?

Fiber-optic

A backup of all data files on your computer can be managed easily using the Windows ___ utility

File history

When someone uses your personal information to pose as you, this is

Identity theft

Using copyrighted material without the copyright holder's permission is known as copyright...

Infringement

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

Inoculation

What type of property is intellectual property?

Intangible

A packet analyzer is called a sniffer because

It captures and reads data inside each packet

If a Microsoft Excel file is all garbled, could it have a virus?

It could be a virus, but it could also be another problem, such as a corrupt file

Which of the following describes fiber-optic broadband?

It uses strands of pure glass or plastic

Which of the following should you not do to secure a wireless network?

Keep the default network name and router password

Which of the following is used to access the Internet when Wi-Fi is not available?

Mobile hotspot, 4G LTE Internet access, 3G Internet access

What is part of a combined device that brings and distributes internet to home devices

Modem, router, switch

Some of my devices don't need wireless and would work better with a wired connection. Are there different types of wired networks I need to choose from?

Most wired networks for the home are Ethernet networks

Firewalls use a process of ___ to assign IP addresses to the devices internal to the network so hackers will not know what they are

Network Address Translation (NAT)

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?

P2P network

What kind of wire do I use to set up an Ethernet network

The most popular transmission media option for wired home ethernet networks is unshielded twisted pair cable

The type of network that would be necessary to connect the networks of two college campuses would be..

WAN

Which of the following is the most secure security protocol used w routers?

WPA2


Set pelajaran terkait

Chapter 1 Technical Drawing Short Answer, Multiple Choice, and Matching

View Set

Chapter 1 & Intro: What Is Linguistics?

View Set

Judicial Process and Behavior Midterm

View Set

Psychology Chapter 3: Development

View Set