Exam 6: Communications, Networks, and Cyberthreats: the Wired and Wireless World
Exam 1: Introduction to Information Technology: the Future Now205 Questions
Exam 2: The Internet and the World Wide Web: Exploring Cyberspace232 Questions
Exam 3: Software: Tools for Productivity and Creativity263 Questions
Exam 4: Hardware: the Cpu and Storage: the Source of Computing Power198 Questions
Exam 5: Hardware: Input and Output: Taking Charge of Computing and Communications202 Questions
Exam 6: Communications, Networks, and Cyberthreats: the Wired and Wireless World171 Questions
Exam 7: Personal Technology: the Future Is You81 Questions
Exam 8: The Era of Big Data: Databases, Information Systems, and Artificial Intelligence182 Questions
Exam 9: The Challenges of the Digital Age: Society and Information Technology Today86 Questions
Exam 10: Building Systems and Applications: Software Development, Programming, and Languages209 Questions
Select questions type
Which of the following is NOT a type of long-distance wireless two-way communications device?
(Multiple Choice)
4.8/5
(27)
A ________ attack disables a computer system or network by making so many requests of it that it overloads it and keeps other users from accessing it.
(Multiple Choice)
4.9/5
(34)
What short-distance wireless standard is used to link portable computers and handheld wireless devices so they may communicate at high speeds at distances of 100-228 feet?
(Multiple Choice)
4.8/5
(32)
An interface device used to connect the same types of networks is called a node.
(True/False)
4.8/5
(40)
Signals such as sound and temperature,which continuously vary in strength and quality,are said to be digital.
(True/False)
4.8/5
(38)
Infrared and microwave transmission signals cannot work around obstacles or travel in curved lines,so they are called _________.
(Short Answer)
4.8/5
(40)
Bluetooth is a short-range,wireless communications method for linking cellphones,computers,and some other peripherals up to distances of 33 feet.
(True/False)
5.0/5
(42)
What set of rules is used to link nearly all mobile devices to a telecommunications carrier's wireless network and content providers?
(Multiple Choice)
4.9/5
(30)
"File server" and "database server" are different names for the same type of server.
(True/False)
4.9/5
(30)
A ________ network topology is one in which all microcomputers and other devices are connected in a continuous loop.
(Short Answer)
4.9/5
(40)
A private intranet that allows access to selected outside users is a(n)________.
(Short Answer)
4.8/5
(40)
A ________ is a system of interconnected computers,telephones,or communications devices that can communicate and share resources.
(Multiple Choice)
4.9/5
(40)
In a network,communications protocols specify the type of electrical connections,the timing of message exchanges,and error-detection techniques.
(True/False)
4.7/5
(39)
What is the science,often used in computer security systems,of measuring individual body characteristics?
(Multiple Choice)
4.9/5
(33)
The highest level that a satellite can occupy is the ________ earth orbit.
(Short Answer)
4.9/5
(38)
Showing 141 - 160 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)