Deck 7: The Connected Computer

Full screen (f)
exit full mode
Question
Some networks combine signals to connect smaller networks and form one larger network.
Use Space or
up arrow
down arrow
to flip the card.
Question
An Internet Service Provider connects personal digital devices within a range of 30 feet.
Question
The first page a website displays is the web index.
Question
Cyberterrorism, which is the intentional attacks that disrupt computers, networks, and public and financial services on a large scale, is a risk that results from networked computers.
Question
Bandwith is a common term used to describe information-carrying capacity.
Question
Networks can span unlimited areas outside of your home office or school.
Question
Data in a wireless network travels from one device to another over cables.
Question
Networks can be simple or complex.
Question
Net neutrality supports the Internet's core principle that all websites have an equal chance of providing services to you.
Question
The largest network in the world is the Internet.
Question
The Internet2 project is working to ensure that Internet technology keeps pace with growing demands.
Question
Mobile computing connects devices wirelessly to networks.
Question
The Internet2 is a for-profit project founded in 1996.
Question
A worm damages data or changes computer settings without your knowledge.
Question
To connect people in a small geographic area, use a LAN.
Question
The Ethernet standard dictates how devices transmit data.
Question
One way to secure your computer is to set permission to determine who can access which resources on your device.
Question
Internet-based computing does not pose a security and privacy risks.
Question
A cable modem attaches to a laptop or tablet using a USB port.
Question
Authentication methods are the only way to verify identity on a computer or network.
Question
A Wi-Fi ____ lets you connect your laptop, tablet, or smartphone to the Internet in a public space.

A) obstruction
B) tether
C) configuration
D) hotspot
Question
A ____ manages network traffic by evaluating network messages and routing them on the best path to their destination.

A) hub
B) router
C) NIC
D) modem
Question
Network ____ determines how networked computers interact.

A) infrastructure
B) panel
C) architecture
D) configuration
Question
Which of the following is NOT a type of modem?

A) cable
B) fiber
C) DSL
D) wireless
Question
Which of the following uses biosensors?

A) a BAN
B) a PAN
C) a WAN
D) a LAN
Question
Storage devices, printers, servers, and communications hardware are ____.

A) data
B) input
C) resources
D) programs
Question
To connect your mobile phone to your computer, you ____ it.

A) download
B) hotspot
C) tether
D) network
Question
A common set of rules or ____, must be followed by network devices to communicate to each other.
Bandwith bandwith

A) protocols
B) bandwith
C) topology
D) architecture
Question
Each computer or device on a network is called a ____ .

A) server
B) peer
C) node
D) client
Question
A(n) ____ is a communications device that connects a communications channel such as the Internet to a device such as a computer.

A) coax
B) modem
C) port
D) ethernet
Question
A ____ is a server that controls access to hardware, software, and other resources.

A) domain controller
B) domain master
C) peer controller
D) administrator
Question
Which of the following is NOT a type of broadband connection?

A) DSL
B) dial-up
C) FTTP
D) Fixed wireless
Question
To guard against data theft, most cell networks use data ____.

A) encryption
B) ports
C) modems
D) cables
Question
All of the following are Network standards except ____?

A) PoE
B) 4G
C) TCP/IP
D) Bluetooth
Question
LTE and WiMAX are competing ____ standards offered by different cellular providers.

A) 4G
B) NIC
C) 3G
D) 4K
Question
Which of the following is NOT a network device?

A) LAN
B) Broadband modem
C) Wireless access point
D) Router
Question
A ____ network is best suited for networks of 10 or fewer computers.

A) client/server
B) peer-to-peer
C) cloud
D) external
Question
To transmit data wirelessly from a media player to your computer speakers, use which of the following technologies?

A) USB
B) Bluetooth
C) Infrared
D) Radio
Question
Network ____ specify the way computers access a network.

A) wires
B) files
C) instructions
D) standards
Question
Networked computers need all but which of the following components?

A) NIC
B) Hub
C) Router
D) DSL
Question
Which of the following offers Internet access to individuals, businesses, and smaller ISPs?

A) ISP
B) NSP
C) NAS
D) DoS
Question
Which of the following is NOT an authentication method?

A) CAPTCHA
B) DoS
C) Password
D) Physical object
Question
_______ software agreements allow businesses to share software resources while saving a significant amount of money.

A) Licensed
B) Groupware
C) Shared
D) Cloud
Question
____ is the essential infrastructure of the Internet.

A) The Internet backbone
B) The network service provider
C) Cloud Computing
D) The World Wide Web
Question
Network hardware does NOT include which of the following?

A) TCP/IP
B) hubs
C) routers
D) switches
Question
Which of the following is NOT a network risk?

A) hacker
B) cracker
C) malware
D) VoIP
Question
The _______ consists of a huge collection of interconnected webpages.

A) web
B) website
C) cloud
D) web browser
Question
Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.

A) TCP/IP attack
B) denial of service (DoS) attack
C) Theft by computer
D) Trojan horse attack
Question
Links can include ____.

A) sound
B) graphics
C) video
D) all of the above
Question
________ are actions that can damage or misuse your computer and data when you are connected to a network.

A) Online security risks
B) Zombies
C) Crackers
D) Evil twins
Question
With _______, several colleagues can work together on a single document at the same time.

A) groupware
B) network attached storage
C) remote storage
D) Wi-Fi
Question
Which of the following is NOT a network topology?

A) bus
B) star
C) ring
D) peer
Question
Devices with _______ technology communicate with direct light between ports on the devices.

A) infrared
B) Bluetooth
C) cable
D) wired
Question
Unauthorized access might be committed by all of the following except _______ .

A) an evil twin
B) a hacker
C) a cracker
D) a war driver
Question
Illegal acts committed using a computer on a network or over the Internet are called _______ .

A) cybercrimes
B) computer crimes
C) malicious software
D) zombie attacks
Question
Organizations and individuals use network storage devices called ____.

A) network attached storage (NAS)
B) network administrator storage (NAS)
C) network attached system (NAS)
D) network administrator system (NAS)
Question
_________ is the practice of storing files and accessing applications over the Internet.

A) Cloud computing
B) Linking
C) Remote accessing
D) Surfing
Question
Bluetooth and Wi-Fi devices use _______ to transmit signals.

A) radio waves
B) cables
C) cell towers
D) infrared
Question
Which of the following uses 128 bits, which vastly expands the possible number of IP addresses?

A) IPv6
B) IPv8
C) IPv2
D) IPv4
Question
Text messaging includes all of the following except ________ .

A) cloud computing
B) instant messaging
C) chat
D) text messaging
Question
_______ are designed to block intruders from accessing corporate or personal networks.

A) Firewalls
B) Network security keys
C) SSIDs
D) Routers
Question
Match between columns
Used for cellular networks
Wi-Fi
Used for cellular networks
4G
Used for cellular networks
Firewalls
Used for cellular networks
Encryption
Used for cellular networks
Ethernet
Used to create a blockade between corporate or personal networks and the Internet
Wi-Fi
Used to create a blockade between corporate or personal networks and the Internet
4G
Used to create a blockade between corporate or personal networks and the Internet
Firewalls
Used to create a blockade between corporate or personal networks and the Internet
Encryption
Used to create a blockade between corporate or personal networks and the Internet
Ethernet
Used to scramble messages sent over networks
Wi-Fi
Used to scramble messages sent over networks
4G
Used to scramble messages sent over networks
Firewalls
Used to scramble messages sent over networks
Encryption
Used to scramble messages sent over networks
Ethernet
Used to create wireless networks
Wi-Fi
Used to create wireless networks
4G
Used to create wireless networks
Firewalls
Used to create wireless networks
Encryption
Used to create wireless networks
Ethernet
Used to create wired networks
Wi-Fi
Used to create wired networks
4G
Used to create wired networks
Firewalls
Used to create wired networks
Encryption
Used to create wired networks
Ethernet
Question
A strong password includes all of the following except _______ .

A) your name
B) at least eight characters
C) letters and numbers
D) at least one symbol
Question
Computers that are controlled by outsiders without the owner's knowledge are called _______ .

A) zombies
B) bots
C) botnets
D) evil twins
Question
_______ authenticate by scanning a person's physical characteristics.

A) Biometric devices
B) Physical objects
C) CAPTCHA systems
D) Encryption methods
Question
________ software allows businesses to track its employees' remote connections and check for unauthorized data use.

A) Monitoring
B) Safety
C) Risk-checking
D) Spyware
Question
All of the following are examples of malware except _______ .

A) adware
B) viruses
C) ransomware
D) Trojan horses
Question
You can use a(n) _______ to scramble and unscramble the data being transmitted between wireless devices.

A) wireless network key
B) digital key
C) firewall
D) biometric device
Question
All of the following are digital modems except _______ .

A) WPAN
B) ISDN
C) DSL
D) cable
Question
Computers use _______ to scramble or code data as it is transmitted over a network

A) encryption
B) firewalls
C) authentication methods
D) biometric devices
Question
_______ scams use email to try and trick you into revealing personal information, usually on the pretense of being your bank.

A) Phishing
B) Cookie
C) Spyware
D) Adware
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: The Connected Computer
1
Some networks combine signals to connect smaller networks and form one larger network.
False
2
An Internet Service Provider connects personal digital devices within a range of 30 feet.
False
3
The first page a website displays is the web index.
False
4
Cyberterrorism, which is the intentional attacks that disrupt computers, networks, and public and financial services on a large scale, is a risk that results from networked computers.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
Bandwith is a common term used to describe information-carrying capacity.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
Networks can span unlimited areas outside of your home office or school.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
Data in a wireless network travels from one device to another over cables.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Networks can be simple or complex.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
Net neutrality supports the Internet's core principle that all websites have an equal chance of providing services to you.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
The largest network in the world is the Internet.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
The Internet2 project is working to ensure that Internet technology keeps pace with growing demands.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
Mobile computing connects devices wirelessly to networks.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
The Internet2 is a for-profit project founded in 1996.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
A worm damages data or changes computer settings without your knowledge.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
To connect people in a small geographic area, use a LAN.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
The Ethernet standard dictates how devices transmit data.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
One way to secure your computer is to set permission to determine who can access which resources on your device.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
Internet-based computing does not pose a security and privacy risks.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
A cable modem attaches to a laptop or tablet using a USB port.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Authentication methods are the only way to verify identity on a computer or network.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
A Wi-Fi ____ lets you connect your laptop, tablet, or smartphone to the Internet in a public space.

A) obstruction
B) tether
C) configuration
D) hotspot
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ manages network traffic by evaluating network messages and routing them on the best path to their destination.

A) hub
B) router
C) NIC
D) modem
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
Network ____ determines how networked computers interact.

A) infrastructure
B) panel
C) architecture
D) configuration
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is NOT a type of modem?

A) cable
B) fiber
C) DSL
D) wireless
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following uses biosensors?

A) a BAN
B) a PAN
C) a WAN
D) a LAN
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
Storage devices, printers, servers, and communications hardware are ____.

A) data
B) input
C) resources
D) programs
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
To connect your mobile phone to your computer, you ____ it.

A) download
B) hotspot
C) tether
D) network
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
A common set of rules or ____, must be followed by network devices to communicate to each other.
Bandwith bandwith

A) protocols
B) bandwith
C) topology
D) architecture
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
Each computer or device on a network is called a ____ .

A) server
B) peer
C) node
D) client
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) ____ is a communications device that connects a communications channel such as the Internet to a device such as a computer.

A) coax
B) modem
C) port
D) ethernet
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
A ____ is a server that controls access to hardware, software, and other resources.

A) domain controller
B) domain master
C) peer controller
D) administrator
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is NOT a type of broadband connection?

A) DSL
B) dial-up
C) FTTP
D) Fixed wireless
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
To guard against data theft, most cell networks use data ____.

A) encryption
B) ports
C) modems
D) cables
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
All of the following are Network standards except ____?

A) PoE
B) 4G
C) TCP/IP
D) Bluetooth
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
LTE and WiMAX are competing ____ standards offered by different cellular providers.

A) 4G
B) NIC
C) 3G
D) 4K
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is NOT a network device?

A) LAN
B) Broadband modem
C) Wireless access point
D) Router
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
A ____ network is best suited for networks of 10 or fewer computers.

A) client/server
B) peer-to-peer
C) cloud
D) external
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
To transmit data wirelessly from a media player to your computer speakers, use which of the following technologies?

A) USB
B) Bluetooth
C) Infrared
D) Radio
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
Network ____ specify the way computers access a network.

A) wires
B) files
C) instructions
D) standards
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
Networked computers need all but which of the following components?

A) NIC
B) Hub
C) Router
D) DSL
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following offers Internet access to individuals, businesses, and smaller ISPs?

A) ISP
B) NSP
C) NAS
D) DoS
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is NOT an authentication method?

A) CAPTCHA
B) DoS
C) Password
D) Physical object
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
_______ software agreements allow businesses to share software resources while saving a significant amount of money.

A) Licensed
B) Groupware
C) Shared
D) Cloud
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
____ is the essential infrastructure of the Internet.

A) The Internet backbone
B) The network service provider
C) Cloud Computing
D) The World Wide Web
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
Network hardware does NOT include which of the following?

A) TCP/IP
B) hubs
C) routers
D) switches
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is NOT a network risk?

A) hacker
B) cracker
C) malware
D) VoIP
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
The _______ consists of a huge collection of interconnected webpages.

A) web
B) website
C) cloud
D) web browser
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.

A) TCP/IP attack
B) denial of service (DoS) attack
C) Theft by computer
D) Trojan horse attack
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
Links can include ____.

A) sound
B) graphics
C) video
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
________ are actions that can damage or misuse your computer and data when you are connected to a network.

A) Online security risks
B) Zombies
C) Crackers
D) Evil twins
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
With _______, several colleagues can work together on a single document at the same time.

A) groupware
B) network attached storage
C) remote storage
D) Wi-Fi
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is NOT a network topology?

A) bus
B) star
C) ring
D) peer
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
Devices with _______ technology communicate with direct light between ports on the devices.

A) infrared
B) Bluetooth
C) cable
D) wired
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
Unauthorized access might be committed by all of the following except _______ .

A) an evil twin
B) a hacker
C) a cracker
D) a war driver
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
Illegal acts committed using a computer on a network or over the Internet are called _______ .

A) cybercrimes
B) computer crimes
C) malicious software
D) zombie attacks
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
Organizations and individuals use network storage devices called ____.

A) network attached storage (NAS)
B) network administrator storage (NAS)
C) network attached system (NAS)
D) network administrator system (NAS)
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
_________ is the practice of storing files and accessing applications over the Internet.

A) Cloud computing
B) Linking
C) Remote accessing
D) Surfing
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
Bluetooth and Wi-Fi devices use _______ to transmit signals.

A) radio waves
B) cables
C) cell towers
D) infrared
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following uses 128 bits, which vastly expands the possible number of IP addresses?

A) IPv6
B) IPv8
C) IPv2
D) IPv4
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
Text messaging includes all of the following except ________ .

A) cloud computing
B) instant messaging
C) chat
D) text messaging
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
_______ are designed to block intruders from accessing corporate or personal networks.

A) Firewalls
B) Network security keys
C) SSIDs
D) Routers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Used for cellular networks
Wi-Fi
Used for cellular networks
4G
Used for cellular networks
Firewalls
Used for cellular networks
Encryption
Used for cellular networks
Ethernet
Used to create a blockade between corporate or personal networks and the Internet
Wi-Fi
Used to create a blockade between corporate or personal networks and the Internet
4G
Used to create a blockade between corporate or personal networks and the Internet
Firewalls
Used to create a blockade between corporate or personal networks and the Internet
Encryption
Used to create a blockade between corporate or personal networks and the Internet
Ethernet
Used to scramble messages sent over networks
Wi-Fi
Used to scramble messages sent over networks
4G
Used to scramble messages sent over networks
Firewalls
Used to scramble messages sent over networks
Encryption
Used to scramble messages sent over networks
Ethernet
Used to create wireless networks
Wi-Fi
Used to create wireless networks
4G
Used to create wireless networks
Firewalls
Used to create wireless networks
Encryption
Used to create wireless networks
Ethernet
Used to create wired networks
Wi-Fi
Used to create wired networks
4G
Used to create wired networks
Firewalls
Used to create wired networks
Encryption
Used to create wired networks
Ethernet
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
A strong password includes all of the following except _______ .

A) your name
B) at least eight characters
C) letters and numbers
D) at least one symbol
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
Computers that are controlled by outsiders without the owner's knowledge are called _______ .

A) zombies
B) bots
C) botnets
D) evil twins
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
_______ authenticate by scanning a person's physical characteristics.

A) Biometric devices
B) Physical objects
C) CAPTCHA systems
D) Encryption methods
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
________ software allows businesses to track its employees' remote connections and check for unauthorized data use.

A) Monitoring
B) Safety
C) Risk-checking
D) Spyware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
All of the following are examples of malware except _______ .

A) adware
B) viruses
C) ransomware
D) Trojan horses
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
You can use a(n) _______ to scramble and unscramble the data being transmitted between wireless devices.

A) wireless network key
B) digital key
C) firewall
D) biometric device
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
All of the following are digital modems except _______ .

A) WPAN
B) ISDN
C) DSL
D) cable
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
Computers use _______ to scramble or code data as it is transmitted over a network

A) encryption
B) firewalls
C) authentication methods
D) biometric devices
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
_______ scams use email to try and trick you into revealing personal information, usually on the pretense of being your bank.

A) Phishing
B) Cookie
C) Spyware
D) Adware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 71 flashcards in this deck.