Exam 8: Communicating With Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cyber criminals rarely target organizations.

(True/False)
4.8/5
(41)

Web 3.0:

(Multiple Choice)
4.8/5
(34)

The transmission of electronic information (text, data, voice, video, and images) from one location to another is:

(Multiple Choice)
4.7/5
(36)

A network that covers a small geographical area is known as a:

(Multiple Choice)
4.9/5
(35)

For the security of your computer data:

(Multiple Choice)
4.9/5
(48)

A fax machine copies or scans a document containing text or pictures and sends the image to a destination fax machine, printer, or computer.

(True/False)
4.9/5
(41)
Match each item with the correct statement below.
A system that allows someone to work online more securely by using encryption
wiki
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
virtual private network
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
IP telephony
Correct Answer:
Verified
Premises:
Responses:
A system that allows someone to work online more securely by using encryption
wiki
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
virtual private network
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
IP telephony
The transmission of voice over a private network or a public network such as the Internet
blog
Uses an IP network to bring people in different geographic areas together using a website interface
tablet computer
A website or group of web pages on which anyone can add, edit, or delete content
passphrase
When you use more than a password to log into an account
semantic technologies
Using multiple words in a password
web conference
A web-based journal
the cloud
A remote network of servers that provide a service or run applications
two-factor authentication
(Matching)
4.8/5
(34)

Two or more telephones, computers, or other devices connected for purposes of communicating and sharing resources is a(n) :

(Multiple Choice)
4.9/5
(51)

An unaware employee can be an organization's greatest weakness when it comes to data security.

(True/False)
4.7/5
(44)

In a video conference, two or more people located in separate geographical areas communicate by exchanging text messages.

(True/False)
4.9/5
(41)

The content of a wiki entry can be edited by the person who posted the entry or by the wiki administrator but not by others who read the entry.

(True/False)
4.8/5
(41)
Showing 21 - 31 of 31
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)