CIS 110 Exam A computer network is a connected system of computing devices linked together for the purpose of sharing resources.
Conventional dial-up connects to the Internet at a maximum of ______.
56 Kbps
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
ARPANET
____ refers to the amount of data that can be transferred (such as via a bus or over a certain type of networking medium) in a given time period.
Bandwidth
A relatively new type of very fast direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building is generically called ____.
Broadband over fiber (BoF)
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.
Coaxial cable
____________________ speeds are slower than cable speeds and the speed of the connection degrades as the distance between the modem and the switching station gets closer to the three-mile limit.
DSL
An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.
Dual-mode
_________________ is a protocol used by local area networks (LANs) to deliver data to computers attached to a network. This type of network is typically configured in a star topology and can be used with twisted-pair, coaxial, or fiber-optic ability.
Ethernet
A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data
False
All Wi-Fi hotspots are free.
False
Application service providers (ASPs) supply the information that is available through the Internet.
False
Cellular phones have better coverage in remote areas than a satellite phone.
False
Client-server networks are also referred to as peer-to-peer networks.
False
Conventional (land-based) telephone systems use digital signals.
False
Dial-up Connections are typically faster than broadband connections.
False
Most networking media send data using analog signals.
False
Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more.
False
The Internet and the Web are technically the same.
False
Transferring data from a client to a server is called downloading.
False
Wi-Fi is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.
False
____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second
Fiber-optic
____ satellites travel at a speed and direction that keeps pace with the earth's rotation, so they appear (from earth) to remain stationary over a given spot.
Geosynchronous
____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.
ICANN (Internet Corporation for Assigned Names and Numbers)
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
Internet backbone
The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.
Internet of Things (IoT)
There are a number of options available today for listening to online music, including ____ such as Pandora.
Internet radio stations
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
Internet service providers (ISPs)
____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.
Internet2
A/An __________tends to use privately owned media to carry signals. It usually covers a small geographical area such as between computers within an office, between rooms within a building, or between buildings located on the same site.
LAN
In a ____ network, each computer or device is connected to multiple (sometimes all of the other) devices on the network.
Mesh
____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles.
Microwave stations
____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network.
Mobile wireless Internet access
Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.
Multimedia Messaging Service (MMS)
__________________ as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.
Privacy
____ are designed to withstand much more physical abuse than conventional devices.
Ruggedized devices
Monitoring systems may use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted.
Sensors
With ____, data is sent one bit at a time, one after the other along a single path.
Serial Transmission
____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.
Simplex transmission
____ networks use a central device to connect each device directly to the network.
Star
____ is the use of networking technology to provide medical information and services.
Telemedicine
A computer network is a connected system of computing devices linked together for the purpose of sharing resources.
True
Bluetooth is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.
True
Buying and selling stocks, bonds, mutual funds, and other types of securities is referred to as online investing.
True
Companies that provide mobile phone services are commonly called wireless providers.
True
Due to the issue of wireless carriers potentially running out of bandwidth available for customers, many of them have eliminated unlimited data plans and implemented mobile data caps.
True
Fixed wireless Internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
True
In its early years, the Internet was used primarily by the government, scientists, and educational institutions.
True
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software. _________________________
True
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
True
TCP/IP is the protocol used for transferring data over the Internet.
True
TCP/IP uses packet switching to transmit data.
True
The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.
True
The World Wide Web Consortium is an international community of over 400 organizations dedicated to developing new protocols and specifications to be used with the Web and to ensure its interoperability.
True
The most common type of mobile phones is a cellular (cell) phones.
True
Videoconferencing is the use of computers, video cameras, microphones, and networking technologies to conduct real-time, face-to-face meetings between individuals physically located in different places.
True
When parallel transmission is used, a group of bits are sent at the same time, and each bit takes a separate path.
True
With a peer-to-peer (P2P) network, a central server is not used.
True
With telesurgery, at least one of the surgeons performs the operation by controlling the robot remotely over the Internet or another network.
True
A ______________ is a networking cable consisting of wire strands twisted in sets of two and bound into a cable. Among the names it may be referred to: CAT-5, CAT-6, or Ethernet cable.
Twisted-pair cable
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a/an ____, which contains a built-in battery, can be used.
UPS
Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.
VoIP
A/An ______tends to use public carriers such as the phone company, cable company, or satellite company to relay signals over a long distance. (Large companies may be able to provide their own media and satellite.) It usually covers a large geographical area such as across town, across the state, between states, or even around the world.
WAN
An example of a Wi-Fi security standard is ____.
WPA
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
Web 2.0
____ refers to any instruction delivered via the Web.
Web-based training (WBT)
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
access control systems
Most tracking software do not ____.
automatically send videos and photos of possible suspects to law enforcement
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
backup
Direct Internet connections are typically ____ connections.
broadband
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
codes of conduct
Many Web pages today use ____-small text files that are stored on your hard drive by a Web server-to identify return visitors and their preferences.
cookies
In ____________________ connections, your computer dials up and connects to your ISP's computer only when needed.
dial-up
To supplement backup procedures, businesses and other organizations should have a/an ____.
disaster recovery plan
Online shopping and online investing are examples of ____.
e-commerce
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
firewall
In ____, data can move in both directions at the same time, such as with a telephone.
full-duplex transmission
The _____ network consists of 24 Department of Defense satellites. This network uses data from four satellites to determine a particular geographic location. It is often used by individuals while hiking and to obtain driving directions while traveling.
global positioning system (GPS)
In ____, data can travel in either direction, but only in one direction at a time.
half-duplex transmission
A/An ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
hotsite
A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.
hub
_____ refers to the rights of individuals and companies to control how information about them is collected and used.
information privacy
Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?
kill switch hard drives
Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa.
modem
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.
network interface card (NIC)
The technique used for data sent over the Internet is ____.
packet switching
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____-essentially typing more than one keyword in a keyword search.
phrase searching
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.
phrase searching
____ Web sites provide access to specic types of useful information, such as maps and driving directions.
reference
Gabrielle would like to purchase a new ____, which would be used to connect the company's LAN and the Internet.
router
One advantage of a dial-up connection is ____.
security
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.
security slot
A hard drive that uses FDE is often referred to as a/an ____.
self-encrypting hard drive
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the LAN for which the data is intended and sends the data to that device only.
switch
The ____________________ of a computer network indicates how the devices in the network are physically arranged.
topology
For extended power outages, generators are needed.
true
Numeric passwords are often called PINs.
true
One advantage of using a biometric access system is its very high accuracy.
true
Robert is a medical writer for a pharmaceutical company. The company allows Robert to telecommute. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.
videoconferencing
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
war driving
Gabrielle is planning to connect selected devices to the network wirelessly with a ____.
wireless access point