Deck 7: The Connected Computer
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
Play
Full screen (f)
Deck 7: The Connected Computer
1
Some networks combine signals to connect smaller networks and form one larger network.
False
2
An Internet Service Provider connects personal digital devices within a range of 30 feet.
False
3
The first page a website displays is the web index.
False
4
Cyberterrorism, which is the intentional attacks that disrupt computers, networks, and public and financial services on a large scale, is a risk that results from networked computers.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
Bandwith is a common term used to describe information-carrying capacity.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
Networks can span unlimited areas outside of your home office or school.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
Data in a wireless network travels from one device to another over cables.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Networks can be simple or complex.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
Net neutrality supports the Internet's core principle that all websites have an equal chance of providing services to you.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
The largest network in the world is the Internet.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
The Internet2 project is working to ensure that Internet technology keeps pace with growing demands.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
Mobile computing connects devices wirelessly to networks.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
The Internet2 is a for-profit project founded in 1996.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
A worm damages data or changes computer settings without your knowledge.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
To connect people in a small geographic area, use a LAN.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
The Ethernet standard dictates how devices transmit data.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
One way to secure your computer is to set permission to determine who can access which resources on your device.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
Internet-based computing does not pose a security and privacy risks.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
A cable modem attaches to a laptop or tablet using a USB port.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Authentication methods are the only way to verify identity on a computer or network.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
A Wi-Fi ____ lets you connect your laptop, tablet, or smartphone to the Internet in a public space.
A) obstruction
B) tether
C) configuration
D) hotspot
A) obstruction
B) tether
C) configuration
D) hotspot
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ manages network traffic by evaluating network messages and routing them on the best path to their destination.
A) hub
B) router
C) NIC
D) modem
A) hub
B) router
C) NIC
D) modem
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
Network ____ determines how networked computers interact.
A) infrastructure
B) panel
C) architecture
D) configuration
A) infrastructure
B) panel
C) architecture
D) configuration
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is NOT a type of modem?
A) cable
B) fiber
C) DSL
D) wireless
A) cable
B) fiber
C) DSL
D) wireless
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following uses biosensors?
A) a BAN
B) a PAN
C) a WAN
D) a LAN
A) a BAN
B) a PAN
C) a WAN
D) a LAN
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
Storage devices, printers, servers, and communications hardware are ____.
A) data
B) input
C) resources
D) programs
A) data
B) input
C) resources
D) programs
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
To connect your mobile phone to your computer, you ____ it.
A) download
B) hotspot
C) tether
D) network
A) download
B) hotspot
C) tether
D) network
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
A common set of rules or ____, must be followed by network devices to communicate to each other.
Bandwith bandwith
A) protocols
B) bandwith
C) topology
D) architecture
Bandwith bandwith
A) protocols
B) bandwith
C) topology
D) architecture
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
Each computer or device on a network is called a ____ .
A) server
B) peer
C) node
D) client
A) server
B) peer
C) node
D) client
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) ____ is a communications device that connects a communications channel such as the Internet to a device such as a computer.
A) coax
B) modem
C) port
D) ethernet
A) coax
B) modem
C) port
D) ethernet
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
A ____ is a server that controls access to hardware, software, and other resources.
A) domain controller
B) domain master
C) peer controller
D) administrator
A) domain controller
B) domain master
C) peer controller
D) administrator
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is NOT a type of broadband connection?
A) DSL
B) dial-up
C) FTTP
D) Fixed wireless
A) DSL
B) dial-up
C) FTTP
D) Fixed wireless
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
To guard against data theft, most cell networks use data ____.
A) encryption
B) ports
C) modems
D) cables
A) encryption
B) ports
C) modems
D) cables
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
All of the following are Network standards except ____?
A) PoE
B) 4G
C) TCP/IP
D) Bluetooth
A) PoE
B) 4G
C) TCP/IP
D) Bluetooth
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
LTE and WiMAX are competing ____ standards offered by different cellular providers.
A) 4G
B) NIC
C) 3G
D) 4K
A) 4G
B) NIC
C) 3G
D) 4K
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is NOT a network device?
A) LAN
B) Broadband modem
C) Wireless access point
D) Router
A) LAN
B) Broadband modem
C) Wireless access point
D) Router
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
A ____ network is best suited for networks of 10 or fewer computers.
A) client/server
B) peer-to-peer
C) cloud
D) external
A) client/server
B) peer-to-peer
C) cloud
D) external
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
To transmit data wirelessly from a media player to your computer speakers, use which of the following technologies?
A) USB
B) Bluetooth
C) Infrared
D) Radio
A) USB
B) Bluetooth
C) Infrared
D) Radio
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
Network ____ specify the way computers access a network.
A) wires
B) files
C) instructions
D) standards
A) wires
B) files
C) instructions
D) standards
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
Networked computers need all but which of the following components?
A) NIC
B) Hub
C) Router
D) DSL
A) NIC
B) Hub
C) Router
D) DSL
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following offers Internet access to individuals, businesses, and smaller ISPs?
A) ISP
B) NSP
C) NAS
D) DoS
A) ISP
B) NSP
C) NAS
D) DoS
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is NOT an authentication method?
A) CAPTCHA
B) DoS
C) Password
D) Physical object
A) CAPTCHA
B) DoS
C) Password
D) Physical object
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
_______ software agreements allow businesses to share software resources while saving a significant amount of money.
A) Licensed
B) Groupware
C) Shared
D) Cloud
A) Licensed
B) Groupware
C) Shared
D) Cloud
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
____ is the essential infrastructure of the Internet.
A) The Internet backbone
B) The network service provider
C) Cloud Computing
D) The World Wide Web
A) The Internet backbone
B) The network service provider
C) Cloud Computing
D) The World Wide Web
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
Network hardware does NOT include which of the following?
A) TCP/IP
B) hubs
C) routers
D) switches
A) TCP/IP
B) hubs
C) routers
D) switches
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is NOT a network risk?
A) hacker
B) cracker
C) malware
D) VoIP
A) hacker
B) cracker
C) malware
D) VoIP
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
The _______ consists of a huge collection of interconnected webpages.
A) web
B) website
C) cloud
D) web browser
A) web
B) website
C) cloud
D) web browser
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.
A) TCP/IP attack
B) denial of service (DoS) attack
C) Theft by computer
D) Trojan horse attack
A) TCP/IP attack
B) denial of service (DoS) attack
C) Theft by computer
D) Trojan horse attack
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
Links can include ____.
A) sound
B) graphics
C) video
D) all of the above
A) sound
B) graphics
C) video
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
________ are actions that can damage or misuse your computer and data when you are connected to a network.
A) Online security risks
B) Zombies
C) Crackers
D) Evil twins
A) Online security risks
B) Zombies
C) Crackers
D) Evil twins
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
With _______, several colleagues can work together on a single document at the same time.
A) groupware
B) network attached storage
C) remote storage
D) Wi-Fi
A) groupware
B) network attached storage
C) remote storage
D) Wi-Fi
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is NOT a network topology?
A) bus
B) star
C) ring
D) peer
A) bus
B) star
C) ring
D) peer
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
Devices with _______ technology communicate with direct light between ports on the devices.
A) infrared
B) Bluetooth
C) cable
D) wired
A) infrared
B) Bluetooth
C) cable
D) wired
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
Unauthorized access might be committed by all of the following except _______ .
A) an evil twin
B) a hacker
C) a cracker
D) a war driver
A) an evil twin
B) a hacker
C) a cracker
D) a war driver
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
Illegal acts committed using a computer on a network or over the Internet are called _______ .
A) cybercrimes
B) computer crimes
C) malicious software
D) zombie attacks
A) cybercrimes
B) computer crimes
C) malicious software
D) zombie attacks
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
Organizations and individuals use network storage devices called ____.
A) network attached storage (NAS)
B) network administrator storage (NAS)
C) network attached system (NAS)
D) network administrator system (NAS)
A) network attached storage (NAS)
B) network administrator storage (NAS)
C) network attached system (NAS)
D) network administrator system (NAS)
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
_________ is the practice of storing files and accessing applications over the Internet.
A) Cloud computing
B) Linking
C) Remote accessing
D) Surfing
A) Cloud computing
B) Linking
C) Remote accessing
D) Surfing
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
Bluetooth and Wi-Fi devices use _______ to transmit signals.
A) radio waves
B) cables
C) cell towers
D) infrared
A) radio waves
B) cables
C) cell towers
D) infrared
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following uses 128 bits, which vastly expands the possible number of IP addresses?
A) IPv6
B) IPv8
C) IPv2
D) IPv4
A) IPv6
B) IPv8
C) IPv2
D) IPv4
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
Text messaging includes all of the following except ________ .
A) cloud computing
B) instant messaging
C) chat
D) text messaging
A) cloud computing
B) instant messaging
C) chat
D) text messaging
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
_______ are designed to block intruders from accessing corporate or personal networks.
A) Firewalls
B) Network security keys
C) SSIDs
D) Routers
A) Firewalls
B) Network security keys
C) SSIDs
D) Routers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
A strong password includes all of the following except _______ .
A) your name
B) at least eight characters
C) letters and numbers
D) at least one symbol
A) your name
B) at least eight characters
C) letters and numbers
D) at least one symbol
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
Computers that are controlled by outsiders without the owner's knowledge are called _______ .
A) zombies
B) bots
C) botnets
D) evil twins
A) zombies
B) bots
C) botnets
D) evil twins
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
_______ authenticate by scanning a person's physical characteristics.
A) Biometric devices
B) Physical objects
C) CAPTCHA systems
D) Encryption methods
A) Biometric devices
B) Physical objects
C) CAPTCHA systems
D) Encryption methods
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
________ software allows businesses to track its employees' remote connections and check for unauthorized data use.
A) Monitoring
B) Safety
C) Risk-checking
D) Spyware
A) Monitoring
B) Safety
C) Risk-checking
D) Spyware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
All of the following are examples of malware except _______ .
A) adware
B) viruses
C) ransomware
D) Trojan horses
A) adware
B) viruses
C) ransomware
D) Trojan horses
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
You can use a(n) _______ to scramble and unscramble the data being transmitted between wireless devices.
A) wireless network key
B) digital key
C) firewall
D) biometric device
A) wireless network key
B) digital key
C) firewall
D) biometric device
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
All of the following are digital modems except _______ .
A) WPAN
B) ISDN
C) DSL
D) cable
A) WPAN
B) ISDN
C) DSL
D) cable
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
Computers use _______ to scramble or code data as it is transmitted over a network
A) encryption
B) firewalls
C) authentication methods
D) biometric devices
A) encryption
B) firewalls
C) authentication methods
D) biometric devices
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
_______ scams use email to try and trick you into revealing personal information, usually on the pretense of being your bank.
A) Phishing
B) Cookie
C) Spyware
D) Adware
A) Phishing
B) Cookie
C) Spyware
D) Adware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck