CIS Chapter 5

Ace your homework & exams now with Quizwiz!

VPN

A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

Information system

A(n) __________ is a complex system for acquiring, storing, organizing, using, and sharing data and information.

RAID

A(n) __________ is a storage system that links any number of disk drives so that they act as a single disk.

Expert System

A(n) __________ is a type of information system that performs analytical tasks traditionally done by a human.

Wireless Access Point

A(n) __________ is the device that all nodes connect to in order to communicate wirelessly.

Fiber Optic

A(n)__________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Packets

Data moves through networks in structures known as __________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

False

For mission-critical systems, technology companies construct computer hardware and software that can never fail.

Rogue Hotspots

Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:

Gateway

In its simplest form, a(n) __________ is a node on a network that serves as an entrance to another network.

Node

Network media helps carry data from one __________, or connection point, to another.

Protocols

Networks must follow rules, known as communication __________, to ensure that data is sent, received, and interpreted properly.

False

Scalability is the ability of each organization's information system to work with the other, sharing both data and services.

Intranet

Some organizations offer an internal version of the Internet, called a(n):

Star

The __________ topology, where nodes connect to a hub, is the most common type used today.

Ethernet

The network standard known as __________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

TPS

Which type of information system handles the processing and tracking of transactions?

Worm

Which type of malware is a fully contained program that self-replicates and spreads through networks?

True

Wireless networks use radio signals that travel through the air in order to transmit data.

Redundant

__________ computers are ones that have multiple hardware systems performing the same task at the same time.

Bandwidth

__________ is the amount of data that can be transmitted over a given amount of time.

False

A Kensington lock is an effective countermeasure against phishing threats.

Switch

A __________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

True

A decision support system can include or access other types of data, such as stock market reports or data about competitors.


Related study sets

A&P - Structure and Location of Body Cavities

View Set

Chapter 14 The Ferment of Reform and Culture 1790-1860

View Set

Biology B - 1. Genetics and Heredity / 10. Mendelian Genetics

View Set

Useful words to say when something happened (preterit)

View Set

MED SURGE w/L exam 3 study questions

View Set

Functions of the Large Intestine

View Set