Exam 6: Communications, Networks, and Cyberthreats: the Wired and Wireless World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Worms,viruses,and Trojan horse are all malware.

(True/False)
4.8/5
(31)

A network that covers a city or a suburb is called a ________.

(Multiple Choice)
4.9/5
(38)

A network is a system of interconnected computers and communications devices that can communicate and share resources.

(True/False)
4.8/5
(36)

Communications signals represented in a binary format are said to be ________.

(Multiple Choice)
4.8/5
(30)

Because of the excellence of satellite technology,GPS location IDs are 100% accurate.

(True/False)
4.9/5
(42)

A ________ is a program that copies itself repeatedly into a computer's memory or onto a disk / flash drive.

(Multiple Choice)
4.8/5
(33)

Any device that is attached to a network is referred to as a ________.

(Multiple Choice)
4.7/5
(33)

The ________ is the range of frequencies that a transmission medium (channel)can carry in a particular period of time.

(Multiple Choice)
4.8/5
(35)

A Wi-Fi enabled laptop computer accesses the available network (say,at an airport)through an access point,which is connected to a land-based Internet connection.

(True/False)
4.8/5
(34)

A _________ is a network that connects computers to a network; data can be sent in both directions at the same time.

(Short Answer)
4.8/5
(21)

A virus is capable of destroying or corrupting data.

(True/False)
4.8/5
(25)

The short-range,wireless digital standard aimed at linking hand-held devices up to 33 feet apart is called ________.

(Short Answer)
4.8/5
(31)

"Modem" is short for modulate / demodulate.

(True/False)
4.8/5
(30)

Worms,viruses,Trojan horses,and rootkits are all types of programs called ________.

(Short Answer)
4.8/5
(34)

The frequency of an electromagnetic wave is the number of times the wave repeats,or makes a cycle,in a second.

(True/False)
4.9/5
(37)

A client-server network has a _________ computer,a central computer that controls the network; The devices connected to the network are called _________.

(Short Answer)
4.8/5
(36)

What is the process of altering readable data (plain text)into unreadable form to prevent unauthorized access?

(Multiple Choice)
4.8/5
(38)

The process of altering readable data into unreadable form to prevent unauthorized access is known as ________.

(Short Answer)
4.8/5
(37)

Routers join multiple wired and / or wireless networks commonly in offices and home offices.

(True/False)
4.8/5
(33)

All wired and wireless communications media use the electromagnetic spectrum of radiation.

(True/False)
4.8/5
(33)
Showing 61 - 80 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)