CIS 110 Exam A computer network is a connected system of computing devices linked together for the purpose of sharing resources.

Ace your homework & exams now with Quizwiz!

Conventional dial-up connects to the Internet at a maximum of ______.

56 Kbps

One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.

ARPANET

____ refers to the amount of data that can be transferred (such as via a bus or over a certain type of networking medium) in a given time period.

Bandwidth

A relatively new type of very fast direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building is generically called ____.

Broadband over fiber (BoF)

____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.

Coaxial cable

____________________ speeds are slower than cable speeds and the speed of the connection degrades as the distance between the modem and the switching station gets closer to the three-mile limit.

DSL

An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.

Dual-mode

_________________ is a protocol used by local area networks (LANs) to deliver data to computers attached to a network. This type of network is typically configured in a star topology and can be used with twisted-pair, coaxial, or fiber-optic ability.

Ethernet

A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data

False

All Wi-Fi hotspots are free.

False

Application service providers (ASPs) supply the information that is available through the Internet.

False

Cellular phones have better coverage in remote areas than a satellite phone.

False

Client-server networks are also referred to as peer-to-peer networks.

False

Conventional (land-based) telephone systems use digital signals.

False

Dial-up Connections are typically faster than broadband connections.

False

Most networking media send data using analog signals.

False

Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more.

False

The Internet and the Web are technically the same.

False

Transferring data from a client to a server is called downloading.

False

Wi-Fi is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.

False

____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second

Fiber-optic

____ satellites travel at a speed and direction that keeps pace with the earth's rotation, so they appear (from earth) to remain stationary over a given spot.

Geosynchronous

____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.

ICANN (Internet Corporation for Assigned Names and Numbers)

The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.

Internet backbone

The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.

Internet of Things (IoT)

There are a number of options available today for listening to online music, including ____ such as Pandora.

Internet radio stations

____ are businesses or other organizations that provide Internet access to others, typically for a fee.

Internet service providers (ISPs)

____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

Internet2

A/An __________tends to use privately owned media to carry signals. It usually covers a small geographical area such as between computers within an office, between rooms within a building, or between buildings located on the same site.

LAN

In a ____ network, each computer or device is connected to multiple (sometimes all of the other) devices on the network.

Mesh

____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles.

Microwave stations

____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network.

Mobile wireless Internet access

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Multimedia Messaging Service (MMS)

__________________ as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.

Privacy

____ are designed to withstand much more physical abuse than conventional devices.

Ruggedized devices

Monitoring systems may use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted.

Sensors

With ____, data is sent one bit at a time, one after the other along a single path.

Serial Transmission

____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.

Simplex transmission

____ networks use a central device to connect each device directly to the network.

Star

____ is the use of networking technology to provide medical information and services.

Telemedicine

A computer network is a connected system of computing devices linked together for the purpose of sharing resources.

True

Bluetooth is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.

True

Buying and selling stocks, bonds, mutual funds, and other types of securities is referred to as online investing.

True

Companies that provide mobile phone services are commonly called wireless providers.

True

Due to the issue of wireless carriers potentially running out of bandwidth available for customers, many of them have eliminated unlimited data plans and implemented mobile data caps.

True

Fixed wireless Internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites.

True

In its early years, the Internet was used primarily by the government, scientists, and educational institutions.

True

Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software. _________________________

True

System failure can occur because of a hardware problem, a software problem, or computer sabotage.

True

TCP/IP is the protocol used for transferring data over the Internet.

True

TCP/IP uses packet switching to transmit data.

True

The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.

True

The World Wide Web Consortium is an international community of over 400 organizations dedicated to developing new protocols and specifications to be used with the Web and to ensure its interoperability.

True

The most common type of mobile phones is a cellular (cell) phones.

True

Videoconferencing is the use of computers, video cameras, microphones, and networking technologies to conduct real-time, face-to-face meetings between individuals physically located in different places.

True

When parallel transmission is used, a group of bits are sent at the same time, and each bit takes a separate path.

True

With a peer-to-peer (P2P) network, a central server is not used.

True

With telesurgery, at least one of the surgeons performs the operation by controlling the robot remotely over the Internet or another network.

True

A ______________ is a networking cable consisting of wire strands twisted in sets of two and bound into a cable. Among the names it may be referred to: CAT-5, CAT-6, or Ethernet cable.

Twisted-pair cable

To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a/an ____, which contains a built-in battery, can be used.

UPS

Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.

VoIP

A/An ______tends to use public carriers such as the phone company, cable company, or satellite company to relay signals over a long distance. (Large companies may be able to provide their own media and satellite.) It usually covers a large geographical area such as across town, across the state, between states, or even around the world.

WAN

An example of a Wi-Fi security standard is ____.

WPA

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0

____ refers to any instruction delivered via the Web.

Web-based training (WBT)

____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

access control systems

Most tracking software do not ____.

automatically send videos and photos of possible suspects to law enforcement

Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

backup

Direct Internet connections are typically ____ connections.

broadband

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

codes of conduct

Many Web pages today use ____-small text files that are stored on your hard drive by a Web server-to identify return visitors and their preferences.

cookies

In ____________________ connections, your computer dials up and connects to your ISP's computer only when needed.

dial-up

To supplement backup procedures, businesses and other organizations should have a/an ____.

disaster recovery plan

Online shopping and online investing are examples of ____.

e-commerce

A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

firewall

In ____, data can move in both directions at the same time, such as with a telephone.

full-duplex transmission

The _____ network consists of 24 Department of Defense satellites. This network uses data from four satellites to determine a particular geographic location. It is often used by individuals while hiking and to obtain driving directions while traveling.

global positioning system (GPS)

In ____, data can travel in either direction, but only in one direction at a time.

half-duplex transmission

A/An ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

hotsite

A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.

hub

_____ refers to the rights of individuals and companies to control how information about them is collected and used.

information privacy

Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

kill switch hard drives

Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa.

modem

A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.

network interface card (NIC)

The technique used for data sent over the Internet is ____.

packet switching

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____-essentially typing more than one keyword in a keyword search.

phrase searching

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

phrase searching

____ Web sites provide access to specic types of useful information, such as maps and driving directions.

reference

Gabrielle would like to purchase a new ____, which would be used to connect the company's LAN and the Internet.

router

One advantage of a dial-up connection is ____.

security

To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

security slot

A hard drive that uses FDE is often referred to as a/an ____.

self-encrypting hard drive

Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the LAN for which the data is intended and sends the data to that device only.

switch

The ____________________ of a computer network indicates how the devices in the network are physically arranged.

topology

For extended power outages, generators are needed.

true

Numeric passwords are often called PINs.

true

One advantage of using a biometric access system is its very high accuracy.

true

Robert is a medical writer for a pharmaceutical company. The company allows Robert to telecommute. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.

videoconferencing

____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

war driving

Gabrielle is planning to connect selected devices to the network wirelessly with a ____.

wireless access point


Related study sets

Unit 6 American Revolution Study Guide/Unit Guide

View Set

Animal Physiology: Respiratory Pigments

View Set