Exam 1 Quizzes
Is a virus the only way cyber criminals can steal a person's identity?
No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated
Is a home network the same kind as the one at the corporation where I work?
No. Most companies use client/server networks. You'll be setting up a P2P network
Type of network used for communication among a laptop and smartphone using Bluetooth is a
PAN
Copyright..
Protects you from having other use your work
Which is not a right granted to copyright holders?
Reduction of a work
A surge protector may look like just another power strip but it also can
Save your device if a voltage spike is sent through the electrical system
Computer viruses can be spread by
Sharing flash drives, downloading and running a file attached to an email, downloading a song from a peer to peer sharing site
Which of the following would NOT be a benefit of networking computers?
Sharing software licenses
What is true about works in the public domain?
Some enter because their creator is unknown, copyright expired, are free and can be used by anyone
How long does copyright last
The life of the creator plus 70 years
How do I share an internet connection on an ethernet network?
To share a connection you need a router
Which of the following transmission media is used most often for wired connections within a home?
Unshielded twisted pair cable
When is posting a picture on social media considered copyright infringement?
When you don't have permission from the copyright holder to post the photo, when you don't own the copyright to the photo
Which allows you to connect to the Internet wirelessly without needing a cellular plan?
Wi-Fi
Can I set up a wireless network at home?
You can have a wireless network only if each node connected to the network has a wireless network adapted attached to it or installed in it
How can I share an Internet connection on a wireless network?
You'll need a special router to share an internet connection on a wireless network
Authentication techniques that rely on personal biological traits are called
biometrics
Is there a good reason to set up a network for two computers?
By setting up a network, you can share a broadband Internet connection
What should users do if they get a popup threatening them that their system is at risk and that they need to buy a particular product to ensure its protection?
Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses.
Altering a picture so that it doesn't reflect the reality of what is being shown is known as..
Digital manipulation
Fake news is
A type of hoax
Is it safe to click on links that come in email from companies you know?
No, it is not safe. It is a better practice to go to the website yourself and login there.
What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network?
Modem and router
A __ is a program that takes complete control of your computer without your knowledge
Rootkit
What is a virus?
A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged
Which of the following is considered intellectual property?
A song, sculpture, movie
Which would not cause interference or poor connectivity between nodes on a wireless network?
A wireless extender
Viruses that load from USB drives left connected to computers when computers are turned on are known as
Boot-sector viruses
The fastest broadband internet service is usually
Fiber-optic
Which type of broadband offers connections nearing the speed of light?
Fiber-optic
A backup of all data files on your computer can be managed easily using the Windows ___ utility
File history
When someone uses your personal information to pose as you, this is
Identity theft
Using copyrighted material without the copyright holder's permission is known as copyright...
Infringement
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
Inoculation
What type of property is intellectual property?
Intangible
A packet analyzer is called a sniffer because
It captures and reads data inside each packet
If a Microsoft Excel file is all garbled, could it have a virus?
It could be a virus, but it could also be another problem, such as a corrupt file
Which of the following describes fiber-optic broadband?
It uses strands of pure glass or plastic
Which of the following should you not do to secure a wireless network?
Keep the default network name and router password
Which of the following is used to access the Internet when Wi-Fi is not available?
Mobile hotspot, 4G LTE Internet access, 3G Internet access
What is part of a combined device that brings and distributes internet to home devices
Modem, router, switch
Some of my devices don't need wireless and would work better with a wired connection. Are there different types of wired networks I need to choose from?
Most wired networks for the home are Ethernet networks
Firewalls use a process of ___ to assign IP addresses to the devices internal to the network so hackers will not know what they are
Network Address Translation (NAT)
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?
P2P network
What kind of wire do I use to set up an Ethernet network
The most popular transmission media option for wired home ethernet networks is unshielded twisted pair cable
The type of network that would be necessary to connect the networks of two college campuses would be..
WAN
Which of the following is the most secure security protocol used w routers?
WPA2