Você está na página 1de 43

Page 1

Copyright2008PrenticeHall.Allrightsreserved.
CHAPTER8:
NETWORKINGANDDIGITALCOMMUNICATION
MultipleChoice:
1.
Abasiccomputernetworkcanbedescribedas:
A.aminimumoffivecomputerslinkedtogether.
B.anumberofpalmtopcomputers.
C.twoormorecomputersthatarelinkedtogether.
D.theuseofsatelliteslinkingcomputerstogether.
Answer:C
Reference:BasicNetworkAnatomy
Difficulty:Easy
2.
ThethreeessentialcomponentsofeverycomputersystemincludeallofthefollowingEXCEPT:
A.software.
B.hardware.
C.people.
D.cables.
Answer:D
Reference:BasicNetworkAnatomy
Difficulty:Easy
3.
AllofthefollowingareadvantagesofusingacomputernetworkEXCEPTthatit:
A.reducescostswhenhardwareisshared.
B.promotesindependencesousershaveexclusivecontrolovertheirowndataandapplications.
C.savesmoneywhensoftwareisshared.
D.enablesdatasharing,increasingefficiencyandproductivity.
Answer:B
Reference:BasicNetworkAnatomy
Difficulty:Easy

Page 2
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.2
4.
AllofthefollowingstatementsaretrueEXCEPT:
A.Wirelessnetworksareconvenient.
B.WirelessnetworksaregenerallyslowerthanwiredLANs.
C.Wirelessnetworksuseradiotransmitters.
D.Wirelessnetworksaregenerallyfasterthanwirednetworks.
Answer:D
Reference:NetworksNearandFar
Difficulty:Moderate
5.
A(n)____________broadcastsmessagestoalldevicesconnectedtoaLAN.
A.switch
B.port
C.hub
D.node
Answer:C
Reference:NetworksNearandFar
Difficulty:Moderate
6.
Inalocalareanetwork,a____________onlytransmitsdatatothedestinationnode.
A.switch
B.port
C.hub
D.router
Answer:A
Reference:NetworksNearandFar
Difficulty:Moderate
7.
LANstandsfor:
A.localareanodes.
B.logicalarrangementofnetworks.
C.localareanetwork.
D.linkedareanetwork.
Answer:C
Reference:NetworksNearandFar
Difficulty:Easy

Page 3
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.3
8.
TheprimarydifferencebetweenaLANandaWANisthe:
A.numberofsoftwareprogramsavailable.
B.geographicalarea.
C.varietyofhardwaredevices.
D.numberofhardwaredevices.
Answer:B
Reference:NetworksNearandFar
Difficulty:Moderate
9.
EachindividualcomputerandnetworkedperipheralattachedtoaLANisa:
A.node.
B.GPSreceiver.
C.router.
D.meshnetwork.
Answer:A
Reference:NetworksNearandFar
Difficulty:Easy
10.Standardtelephonecablescontainingcopperwiresareknownas__________cable.
A.coaxial
B.fiberoptic
C.WiFi
D.twistedpair
Answer:D
Reference:NetworksNearandFar
Difficulty:Moderate
11.AllofthefollowingaretrueofawirelessnetworkEXCEPT:
A.computersatthenodescanrundifferentoperatingsystems.
B.generallyfasterthanwiredLAN.
C.lesstroubletoinstall.
D.convenientforusersthatworkinmanylocations.
Answer:B
Reference:NetworksNearandFar
Difficulty:Moderate

Page 4
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.4
12.MANstandsfor:
A.metropolitanareanetwork.
B.multifunctionareanetwork.
C.metropolitanarrangednetwork.
D.manufacturedarrangementofnetworks.
Answer:A
Reference:NetworksNearandFar
Difficulty:Easy
13.ThecollectionofcommonpathwaysbetweennetworksonaWANisknownasa:
A.node.
B.hub.
C.backbone.
D.router.
Answer:C
Reference:NetworksNearandFar
Difficulty:Challenging
14.Thedeviceorprogramthatforwardsmessagesbetweennetworksisknownasa:
A.bridge.
B.router.
C.backbone.
D.gateway.
Answer:B
Reference:NetworksNearandFar
Difficulty:Moderate
15.A(n)____________isoftenusedtosetupatemporarycommunicationssystemthatrequiresno
centralized
router.
A.extranet
B.Ethernet
C.meshnetwork
D.intranet
Answer:C
Reference:NetworksNearandFar
Difficulty:Moderate

Page 5
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.5
16.TheU.S.DepartmentofDefenseusesa(n)____________,whichisaspecializednetworkusedto
determinelocations,maps,anddirectionsusingsignalsfromsatellitesthatareorbitingtheEarth.
A.meshnetwork
B.NIC
C.Ethernet
D.GPS
Answer:D
Reference:SpecializedNetworks:FromGPStoFinancialSystems
Difficulty:Easy
17.ThesystemofsatellitesusedtodetermineanypositionontheEarthisknownas:
A.GPS.
B.LAN.
C.WiFi.
D.MAN.
Answer:A
Reference:SpecializedNetworks:FromGPStoFinancialSystems
Difficulty:Easy
18.Asetofparallelwiresthatcarriesdigitalsignalsamongacomputerscomponentsiscalleda(n):
A.peripheral.
B.port.
C.bus.
D.medium.
Answer:C
Reference:TheNetworkInterface
Difficulty:Moderate
19.Inthe1970s,Xeroxdeveloped____________,whichcontinuestobeapopularnetworking
architecture.
A.WiFi
B.instantmessaging
C.extranet
D.Ethernet
Answer:D
Reference:TheNetworkInterface
Difficulty:Moderate

Page 6
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.6
20.Remoteaccessmeansthata:
A.computerislinkeddirectlytoanetwork.
B.transactionisaddedtoabatchthatwillbeprocessedonaremotecomputer.
C.userisconnectingtoanetworkthroughaphoneline,televisioncable,orwirelesslink.
D.LANissetupinanofficeinaremotelocation.
Answer:C
Reference:TheNetworkInterface
Difficulty:Easy
21.Aportisa:
A.socketthatenablesinformationtomoveinandout.
B.hardwaredevicethatallowsconnectiontotheInternet.
C.peripheraldeviceattachedtoacomputer.
D.virtualmemorylocation.
Answer:A
Reference:TheNetworkInterface
Difficulty:Easy
22.AnewerPCwilllikelyhaveanEthernet____________onthemaincircuitboardsoitcandirectly
connect
toanEthernetnetwork.
A.router
B.networkinterfacecard
C.port
D.jack
Answer:C
Reference:TheNetworkInterface
Difficulty:Moderate
23.A(n)____________portisfasterandmoreflexiblethanatraditionalserialorparallelport.
A.peripheral
B.USB
C.monitor
D.server
Answer:B
Reference:TheNetworkInterface
Difficulty:Moderate

Page 7
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.7
24.NICstandsfor:
A.networkinternalcard.
B.newerindustrialcomputer.
C.networkingInternetconnection.
D.networkinterfacecard.
Answer:D
Reference:TheNetworkInterface
Difficulty:Moderate
25.A(n)____________addsaspecialserialporttoacomputersoitcanbedirectlyconnectedtoa
network.
A.GPS
B.NIC
C.modem
D.hub
Answer:B
Reference:TheNetworkInterface
Difficulty:Easy
26.TheNICcontrolstheflowofdatabetweenthecomputersRAMandthe:
A.networkcable.
B.Internet.
C.harddrive.
D.CDdrive.
Answer:A
Reference:TheNetworkInterface
Difficulty:Easy
27.A(n)____________signalisrepresentedbyacontinuouswave.
A.analog
B.digital
C.bandwidth
D.baud
Answer:A
Reference:CommunicationlaModem
Difficulty:Moderate
Page 8
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.8
28.A(n)____________convertsamessagefromdigitaltoanalogorfromanalogtodigital.
A.hub
B.modem
C.switch
D.Ethernet
Answer:B
Reference:CommunicationlaModem
Difficulty:Easy
29.Avoicemessagemustbeconvertedtoa(n)____________signalsoitcanbestoredonacomputers
hard
drive.
A.WiFi
B.bitmapped
C.digital
D.analog
Answer:C
Reference:CommunicationlaModem
Difficulty:Moderate
30.____________isdefinedasmillionsofbits.
A.Megabytes
B.Megabits
C.Kilobits
D.Kilobytes
Answer:B
Reference:BroadbandConnections
Difficulty:Moderate
31.Theterm,____________,referstotheamountofinformationtransmittedthroughacommunication
mediuminagivenamountoftime.
A.dpi
B.bitdepth
C.bandwidth
D.broadband
Answer:C
Reference:BroadbandConnections
Difficulty:Moderate

Page 9
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.9
32.ABroadbandconnectioncouldbeanyofthefollowingEXCEPT:
A.cablemodem.
B.DSL.
C.wirelessconnection.
D.standardphonemodem.
Answer:D
Reference:BroadbandConnections
Difficulty:Easy
33.A(n)____________cableuseslightwavestotransmitmultimediaandvoicedata.
A.copper
B.twistedpair
C.fiberoptic
D.coaxial
Answer:C
Reference:FiberOpticConnections
Difficulty:Easy
34.A(n)____________usesradiowavestocarryinformationathighspeed.
A.cablemodem
B.fiberopticcable
C.wirelessconnection
D.phonecable
Answer:C
Reference:WirelessNetworkTechnology
Difficulty:Moderate
35.Apersonalareanetworkispossiblebecauseofthewirelesstechnologyknownas:
A.USB.
B.FireWire.
C.Bluetooth.
D.IEEE.
Answer:C
Reference:WirelessNetworkTechnology
Difficulty:Moderate

Page 10
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.10
36.____________isnewtechnologycurrentlyavailableinJapan,muchofEurope,andsomemajorUS
cities.
Ituseshighbandwidthconnectionstocommunicatemultimediaoverwirelessnetworks.
A.4GL
B.PDA
C.3G
D.WiFi
Answer:C
Reference:WirelessNetworkTechnology
Difficulty:Easy
37.Therulesforhowdataisexchangedbetweennetworknodesisknownasa(n):
A.protocol.
B.algorithm.
C.procedure.
D.codeofethics.
Answer:A
Reference:CommunicationSoftware
Difficulty:Moderate
38.A____________isahighspeed,highendcomputerthatsharesdataandotherresourceswithclient
computers.
A.server
B.supercomputer
C.client
D.PDA
Answer:A
Reference:CommunicationSoftware
Difficulty:Moderate
39.A____________isaconfigurationthatallowseverycomputeronthenetworktoactasbothaclient
anda
server.
A.client/servermodel
B.hostsystem
C.servernetwork
D.peertopeernetwork
Answer:D
Reference:CommunicationSoftware
Difficulty:Easy

Page 11
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.11
40.____________softwareenablesacomputertofunctionasasimpleinput/outputdeviceforsending
messagestoahostcomputer.
A.Multimedia
B.Compression
C.Datatranslation
D.Terminalemulation
Answer:D
Reference:CommunicationSoftware
Difficulty:Easy
41.The____________storesdataandsoftwarethatcantobesharedbyseveralusers.
A.fileserver
B.mainframe
C.printserver
D.client
Answer:A
Reference:TheNetworkAdvantage
Difficulty:Moderate
42.UsingaPCtocopysoftwareordatafromaserver,itisknownas:
A.uploading.
B.terminalemulating.
C.downloading.
D.serversharing.
Answer:C
Reference:TheNetworkAdvantage
Difficulty:Moderate
43.Whenabusinesscanlegallycopysoftwaretoallofthecomputerstheyown,thecompanyhasa(n)
____________license:
A.site
B.upload
C.fileserver
D.groupware
Answer:A
Reference:TheNetworkAdvantage
Difficulty:Moderate

Page 12
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.12
44.A(n)____________iscodeembeddedasaonepixelgraphicsfileinaWebpageoremailmessage.
A.Webdot
B.Webbug
C.cookie
D.virus
Answer:B
Reference:InterpersonalComputing
Difficulty:Moderate
45.Mostwebbasedemailsystemsuse____________toretrievemailandstorethemessagesinafolder
ona
remotemailserver.
A.Listserv
B.POP
C.groupware
D.P2P
Answer:B
Reference:TheManyFacesofEmail
Difficulty:Moderate
46.A(n)____________isaninvisiblepieceofcodethatnotifiesthesenderthatanemailwasopenedand
may
evenrecordotherinformationabouttheuserscomputeroremailsoftware.
A.applet
B.popup
C.Webbug
D.phish
Answer:C
Reference:TheManyFacesofEmail
Difficulty:Moderate
47.AworldwidepublicnewsgroupavailableontheInternetis:
A.TCP/IP
B.USENET
C.Listserv
D.NIC
Answer:B
Reference:Newsgroups
Difficulty:Moderate

Page 13
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.13
48.Asynchronouscommunicationiswhenthesenderandrecipient:
A.mustbeonlineatthesametime.
B.donotusethesameoperatingsystem.
C.donothavetobeonlineatthesametime.
D.usedifferentsoftwarebutareabletocommunicatethroughtheInternet.
Answer:C
Reference:InstantMessagingandTeleconferencing:RealTimeCommunication
Difficulty:Moderate
49.IMstandsfor:
A.internalmessaging.
B.instantmessaging.
C.internationalmarket.
D.instantaneousmessages.
Answer:B
Reference:InstantMessagingandTeleconferencing:RealTimeCommunication
Difficulty:Easy
50.Graphicalbodiesusedtorepresentapersoninavirtualmeetingplaceareknownas:
A.agents.
B.emulators.
C.avatars.
D.Webbugs.
Answer:C
Reference:InstantMessagingandTeleconferencing:RealTimeCommunication
Difficulty:Moderate
51.___________softwareandhardwareallowsaPCtoactlikeaspeakerphone.
A.Telephony
B.Instantmessaging
C.Videoconferencing
D.Avatar
Answer:A
Reference:ComputerTelephony
Difficulty:Moderate

Page 14
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.14
52.MMORPGsare:
A.protocolsfortheinternet.
B.softwarestandardsforwirelesstechnology
C.circuitboardsforenhancedhandlingofmultimedia
D.onlineroleplayinggamesinvolvinghundredsofthousandsofplayers
Answer:D
Reference:SocialNetworkingandInformationSharing
Difficulty:Moderate
53.Unwantedjunkemailisknownas:
A.IM.
B.telephony.
C.spam.
D.avatar.
Answer:C
Reference:OnlineRisks
Difficulty:Easy
54.____________isdesignedtocapturesensitivefinancialinformationfromthepersonvisitingaWeb
site.
A.IM
B.Phishing
C.VoIP
D.MMORPG
Answer:B
Reference:EmailIssues
Difficulty:Moderate

Page 15
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.15
55.A____________helpsblockunauthorizedaccesstoacomputer.
A.bridge
B.VPN
C.WEP
D.firewall
Answer:D
Reference:WirelessIssues
Difficulty:Moderate
56.The____________encryptionschemeimprovesthesecurityofwirelessnetworks.
A.Ethernet
B.phishing
C.VPN
D.WEP
Answer:D
Reference:WirelessIssues
Difficulty:Moderate
57.____________isasecureelectronictunnelthroughtheInternetthatpreventsunauthorizedaccessor
eavesdropping.
A.NOS
B.VPN
C.Bluetooth
D.MMORPG
Answer:B
Reference:WirelessIssues
Difficulty:Moderate

Page 16
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.16
FillintheBlank:
58.____________islongdistanceelectroniccommunicationsinavarietyofforms.
Answer:TelecommunicationsReference:ArthurC.ClarksMagicalProphecy
Difficulty:Moderate
59.Acomputer____________isasystemwheretwoormorecomputersarelinkedtogether.
Answer:network
Reference:BasicNetworkAnatomy
Difficulty:Easy
60.Thethreeessentialcomponentsofeverycomputersystemarehardware,software,and____________.
Answer:people
Reference:BasicNetworkAnatomy
Difficulty:Moderate
61.A(n)____________networklinkstwoormoreLANswithinacity.
Answer:metropolitanarea
Reference:NetworksNearandFar
Difficulty:Moderate
62.InaWAN,thecollectionofcommonpathwaysiscalledthenetworks____________.
Answer:backbone
Reference:NetworksNearandFar
Difficulty:Moderate
63.A(n)____________networkisagroupofcomputersconnectedoveralongdistance.
Answer:widearea
Reference:NetworksNearandFar
Difficulty:Easy
64.A(n)____________isadeviceorprogramusedtopushtrafficthroughaseriesofnetworks.
Answer:router
Reference:NetworksNearandFar
Difficulty:Moderate
65.A(n)____________networkallowsamessagetojumpfromwirelessdevicetowirelessdeviceuntilit
findsthecorrectdestination.
Answer:mesh
Reference:NetworksNearandFar
Difficulty:Moderate
66.ThemostcommoncablingforaLANis____________.
Answer:twistedpair
Reference:NetworksNearandFar
Difficulty:Challenging
67.A(n)____________isacomputerorsharedperipheralattachedtoanetwork.
Answer:node
Reference:NetworksNearandFar
Difficulty:Moderate
68.A(n)____________networkconnectscomputersusingradioorinfraredtransmittersconnectedto
network
ports.
Answer:wireless
Reference:NetworksNearandFar
Difficulty:Moderate
69.A(n)____________canpinpointanylocationintheworld.
Answer:GPS
Reference:SpecializedNetworks
Difficulty:Moderate

Page 17
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.17
70.A(n)____________isagroupofwiresonacomputerscircuitboardusedtocarrydigitalsignals.
Answer:bus
Reference:TheNetworkInterface
Difficulty:Moderate
71.A(n)____________isasocketthatallowsdatatopassinandout.
Answer:port
Reference:TheNetworkInterface
Difficulty:Moderate
72.USBstandsfor____________.
Answer:UniversalSerialBusReference:TheNetworkInterface
Difficulty:Moderate
73.A(n)____________cardonthemaincircuitboardaddsanadditionalporttothecomputersoitcan
connecttoanetwork.
Answer:networkinterfacecard
Reference:TheNetworkInterface
Difficulty:Moderate
74.MostnewcomputersdontneedaNICbecausetheyhavea(n)____________portonthemaincircuit
board.
Answer:Ethernet
Reference:TheNetworkInterface
Difficulty:Challenging
75.Acontinualwaveofbitstransmittedthroughadeviceisknownasa(n)____________signal.
Answer:analog
Reference:CommunicationlaModem
Difficulty:Moderate
76.A(n)____________isahardwaredevicethatconnectsacomputertoatelephoneline.
Answer:modem
Reference:CommunicationlaModem
Difficulty:Moderate
77.Bpsstandsfor____________.
Answer:bitspersecond
Reference:CommunicationlaModem
Difficulty:Easy
78.____________isthequantityofinformationthatcanbetransmittedthroughacommunicationmedium
ina
givenamountoftime.
Answer:bandwidth
Reference:BroadbandConnections
Difficulty:Moderate
79.Bandwidthismeasuredinkilobitsor____________.
Answer:megabits
Reference:BroadbandConnections
Difficulty:Moderate
80.____________cablesarefasterthanDSLorcablemodems.
Answer:Fiberoptic
Reference:FiberOpticConnections
Difficulty:Moderate

Page 18
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.18
81.Manylaptopsandhandheldcomputershave____________portsthatcansendandreceivedigital
informationovershortdistanceswithouttheuseofcables.
Answer:infrared
Reference:WirelessNetworkTechnology
Difficulty:Moderate
82.A(n)____________isasetofrulesforefficientlytransmittingdatafromonenetworknodetoanother.
Answer:protocol
Reference:CommunicationSoftware
Difficulty:Moderate
83.____________softwaresendsrequestsfromtheusertotheserver.
Answer:Client
Reference:CommunicationSoftware
Difficulty:Moderate
84.A(n)____________accepts,prioritizes,andprocessesprintjobsfrommanycomputers.
Answer:printserver
Reference:TheNetworkAdvantage
Difficulty:Moderate
85.Copyingsoftwareordatafilesfromaclientcomputertoaserverisknownas____________.
Answer:uploading
Reference:TheNetworkAdvantage
Difficulty:Easy
86.Softwaredesignedtoallowseveralnetworkeduserstoworkonthesamedocumentatthesametimeis
knownas____________.
Answer:groupware
Reference:TheNetworkAdvantage
Difficulty:Moderate
87.WhenaMicrosoftWorddocumentorpicturefileisincludedalongwithanemailmessage,itisknown
as
a(n)____________.
Answer:attachment
Reference:TheManyFacesofEmail
Difficulty:Easy
88.MostWebbasedemailsystemsuse____________protocoltoretrievemailandstorethemessagesin
a
folder.
Answer:PostOffice
Reference:TheManyFacesofEmail
Difficulty:Moderate
89.A(n)____________isaninvisiblepieceofcodethatsilentlynotifiesthesenderwhenthemessagewas
openedandmayalsoreportotherinformationfromtheuserscomputer.
Answer:Webbug
Reference:TheManyFacesofEmail
Difficulty:Moderate
90.A(n)____________listisusedtosendanemailmessagetomanypeople.
Answer:mailing
Reference:MailingLists
Difficulty:Easy
91.A(n)____________isanonlinepublicdiscussiononaparticularsubject.
Answer:newsgroup
Reference:Newsgroups
Difficulty:Easy
92.____________.isanetworkofnewsgroupsavailableworldwidethroughtheInternet.
Answer:USENET
Reference:Newsgroups
Difficulty:Moderate

Page 19
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.19
93.Mailinglistsandnewsgroupsuse____________communicationssothatthesenderandrecipientdo
not
havetobeloggedonatthesametime.
Answer:asynchronous
Reference:InstantMessagingandTeleconferencing:RealTimeCommunication
Difficulty:Moderate
94.Whenaparticipantinachatroomrepresentshimselfusingacartooncharacter,heisusinga(n)
__________.
Answer:avatar
Reference:InstantMessagingandTeleconferencing:RealTimeCommunication
Difficulty:Moderate
95.Whenacompanylinksalltheircomputerswiththetelephonesystem,thecompanyisembracinga
growing
trendcalled____________integration.
Answer:computertelephonyReference:ComputerTelephony
Difficulty:Moderate
96.With____________,phonecallsarecarriedovertheInternetinsteadofusingthepublicphone
network.
Answer:Internettelephony(VoIP)Reference:ComputerTelephony
Difficulty:Moderate
97.____________gameslikeEverQuestIIandWorldofWarCraftsupporthundredsofthousandsof
people
playinggamesinanonlinevirtualworld.
Answer:MMORPG
Reference:SocialNetworkingandInformationSharingDifficulty:Challenging
98.____________isanonlineencyclopediathatletsanyonewithanInternetconnectionmodifyoraddto
its
content.
Answer:Wikipedia
Reference:SocialNetworkingandInformationSharingDifficulty:Challenging
99.____________isacollaborativeinformationresourceofphotographsavailableontheWeb.
Answer:Flickr
Reference:SocialNetworkingandInformationSharingDifficulty:Challenging
100.A(n)____________Websiteisdesignedtocollectconfidentialandsensitiveinformationfrom
visitorsto
thesite.
Answer:phishing
Reference:EmailIssues
Difficulty:Moderate
101.Unsolicitedemailiscalled____________.
Answer:spam
Reference:EmailIssues
Difficulty:Easy
102.Publiclyaccessiblewirelessaccesspointsareknownas___________.
Answer:hotspots
Reference:WirelessIssues
Difficulty:Easy
103.Toenablecustomerstochecktheiremailusingtheirlaptop,acoffeeshopmayprovidea
____________
whichisawirelessaccesspoint.
Answer:hotspot
Reference:WirelessIssues
Difficulty:Moderate

Page 20
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.20
104.____________isanencryptionschemeprovidingsecurityfordatatransmissiononawireless
network.
Answer:WEP
Reference:WirelessIssues
Difficulty:Moderate
105.A(n)____________networkprovidesatunnelthroughtheInternetpreventingunauthorizedaccess
or
eavesdropping.
Answer:virtualprivate
Reference:WirelessIssues
Difficulty:Moderate
Matching:
106.Matchthefollowingtermstotheirmeanings:
I.modem
A.continuouswaveofbits
II.bandwidth
B.deviceusedtoconnectcomputertophoneline
III.blog
C.securenetworkthatusesencryption
IV.broadband
D.transmissioncapacitymeasuredinkilobitsormegabitspersecond
V.analogsignal
E.personalWebpagethatcanbeusedforapersonaldiary
VI.VPN
F.fastInternetconnectionlikeDSL
VII.NIC
G.installationaddsportdesignedtoconnectdirectlytoanetwork
Answers:B,D,E,F,A,C,GReference:Multiplelocations
Difficulty:Moderate

Page 21
Chapter8:NetworkingandDigitalCommunication
Copyright2008PrenticeHall.Allrightsreserved.21
107.Matchthefollowing[number]termstotheirmeanings:
I.port
A.popularwirelessLANtechnology
II.TCP/IP
B.onlineroleplayinggamesinvolvinghundredsofthousandsofparticipants
III.MMORPG
C.socketusedwheninformationpassedinandoutofthesystem
IV.WiFi
D.websitethatpermitsanyonetoalteritscontent
V.wiki
E.rulesfordataexchangeovertheInternet
Answer:C,E,B,A,D
Reference:Multiplelocations
Difficulty:Moderate

analog signal
a continuous wave.
asynchronous communication
delayed communication, such as that used for newsgroups and mailing lists, where the sender
and the recipients don't have to be logged in at the same time.
attachment
a way to send formatted word processor documents, pictures, and other multimedia files via
email.
avatars
graphical bodies used to represent a person in a virtual meeting place.
bandwidth
the quantity of information that can be transmitted through a communication medium in a
given amount of time.
bits per second (bps)
the standard unit of measure for modem speed.
blog
short for Web log, a personal Web page that often carries diary-like entries or political
commentaries.
blogger
people who write blogs or micro-blogs.
bluetooth
a type of wireless technology that enables mobile phones, handheld computers, and PCs to
communicate with each other regardless of operating system.
bounce
the automatic return of an undeliverable email message to its sender.
broadband connection
an Internet connection such as DSL or cable modem that offers higher bandwidth, and
therefore faster transmission speed, than standard modem connections.
cable modem
a type of broadband Internet connection that uses the same network of cables that delivers TV
signals.
chat room
public real-time teleconference.
client
computers in a network program that are not acting as dedicated servers.
client/server model
for a local-area network, a hierarchical model in which one or more computers act as
dedicated servers and all the remaining computers act as cliets.
cloud computing
a type of grid computing in which resources are distributed across the Internet rather than
confined to a single machine.
communication software
software that enables computer to interact with each other over a phone line or other network.
digital signal
a stream of bits.
dial-up connection
a connection to the internet that uses a modem and standard phone lines.
download
to copy software from an online source to a local computer.
DSL (digital subscriber lines)
a type of broadband connection to the Internet offered by phone companies.
electronic commerce (e-commerce)
business transactions through electronic networks.
Ethernet
a popular networking architecture developed in 1976 at Xerox.
FAQS (frequently asked questions)
posted lists of common queries and their answers.
file server
in a LAN, a computer used as a storehouse for software and data that are shared by several
users
Global Positioning System (GPS)
a defense department system with 24 satellites that can pinpoint any location on the Earth.
grid computing
a form of distributed computing in which not files, but processing power is shared between
networked computers.
host system
a computer that provides services to multiple users.
hotspot
publicly accessible wireless access points.
instant messaging (IM
a technology that enables users to create buddy lists, check for buddies who are logged in,
and exchange typed messages and files with those who are.
Internet telephony (Voice-over IP)
a combination of software and hardware technology that enables the Internet to, in effect,
serve as a telephone network.
intranet
a self-contained, intra-organizational network that is designed using the same technology as
the Internet.
local area network (LAN)
multiple personal computers connected on a network.
mailing lists
email discussion groups on special-interest topics.
massively multi-player online role-playing game (MMORPG)
internet games that support thousands of simultaneous players, allowing them to assume roles
of particular characters in shared virtual worlds.
modem
a hardware device that connects a computer to a telephone line
narrowband connection
dial-up internet connections.
netiquette
rules of etiquette that applies to internet communication.
network license
license for multiple copies or removing restrictions on software copying and use at a network
site.
network operating system (NOS)
server operating system software for a local-area network.
newsgroup
ongoing public discussions on a particular subject consisting of notes written to a central
Internet site and redistributed through a worldwide newsgroup network called Usenet.
peer-to-peer computing (P2P)
a LAN model that allows every computer on the network to be both client and server.
peer-to-peer model (P2P)
a LAN model that allows every computer on the network to be both client and server.
phishing
the use of a deceptive email message or Web site to lure a person into divulging credit card
numbers or other sensitive information.
protocol
a set of rules for the exchange of data between a terminal and a computer or between two
computers.
real-time communication
Internet communication that enables you to communicate with other users who are logged on
at the same time.
router
programs or devices that decide how to route Internet transmissions.
satellite Internet connection
a broadband technology available through many of the same satellite dishes that provide
television channels to viewers.
site license
license for multiple copies or removing restrictions on software copying and use at a network
site.
social networking
a term used to describe web sites that make it easy for members to connect with friends, meet
people with common interests, and create online communities.
spam
internet junk mail
TCP/IP
protocols developed as an experiment in inter-networking, now the language of the Internet,
allowing cross-network communication for almost every type of computer and network.
telecommunication
long-distance electronic communication in a variety of forms.
terminal emulation software
software that allows a PC to act as a dumb terminal-an input/output device that enables the
user to send commands to and view information on the host computer.
text messaging
a popular form of communication among mobile phone users that relies on SMS technology.
upload
to post software or documents to an online source so they're available for others.
video teleconference
face-to-face communication over long distances using video and computer technology.
voice-mail
a telephone-based messaging system with many of the features of an email system.
VPN (virtual private network)
a network that uses encryption software to create secure "tunnels" through the public Internet
or between intranets.
Webmail
web-based e-mail.
Web forum
functionally similar to a newsgroup, but it's built on a Web application and is accessed
through a Web browser.
wide area network (WAN)
a network that extends over a long distance.
Wi-Fi
a popular wireless LAN technology that allows multiple computers to connect to a LAN
through a base station up to feet away.
wiki
a web site that lets anyone with access to a Web browser to modify its pages.
WiMAX
a wireless alternatives to cable or DSL service.
wireless access point (WAP)
a communication device, typically connected to a wired network, that is used to create a
wireless network.
wireless network
a network in which a node has a tiny radio or infrared transmitter connected to its network
port so it can send and receive data through the air rather than through cables.

Chapter 8: Networking and Telecommunication

CHAPTER 8:
NETWORKING AND TELECOMMUNICATION
Multiple Choice:

1. A basic computer network can be described as:

A. a minimum of five computers linked together.

B. computer and cables that link the network together.

C. two or more computers that are linked together.

D. the use of satellites linking computers together.

Answer: C Reference: Basic Network Anatomy Difficulty: Easy

2. The three essential components of every computer system include all EXCEPT:

A. software.

B. hardware.

C. people or users.

D. cables.

Answer: D Reference: Basic Network Anatomy Difficulty: Easy

3. Which statement is FALSE about wireless networks?

A. Wireless networks are convenient.

B. Wireless networks are slower than wired LANs.

C. Wireless networks use radio transmitters.

D. Wireless networks are faster than wired networks.

Answer: D Reference: Networks Near and Far Difficulty: Moderate


4. LAN stands for:

A. local area nodes.

B. logical arrangement of networks.

C. local area network.

D. linked-area network.

Answer: C Reference: Networks Near and Far Difficulty: Moderate

5. The primary difference between a LAN and a WAN is:

A. the number of software programs available.

B. distance.

C. the variety of hardware devices.

D. the number of hardware devices.

Answer: B Reference: Networks Near and Far Difficulty: Moderate

6. Each individual computer and component attached to a network is a:

A. node.

B. connection point.

C. switch.

D. hub.

Answer: A Reference: Networks Near and Far Difficulty: Moderate

7. In a traditional LAN, each node on the network is connected through:

A. cables.

B. satellites.

C. microwaves.

D. wireless transmission.

Answer: A Reference: Networks Near and Far Difficulty: Moderate


8. MAN stands for:

A. metropolitan area network.

B. marked area network.

C. metropolitan arranged network.

D. manufactured arrangement of networks.

Answer: A Reference: Networks Near and Far Difficulty: Easy

9. The common pathways on a WAN are known as:

A. nodes.

B. hubs.

C. the backbone.

D. routers.

Answer: C Reference: Networks Near and Far Difficulty: Challenging

10. Crossing from one LAN to another LAN or a WAN is done over:

A. bridges and gateways.

B. routers.

C. backbones.

D. MANs.

Answer: A Reference: Networks Near and Far Difficulty: Moderate

11. The hardware device or software program that sends messages between networks is known as
a:

A. bridge.

B. router.

C. backbone.

D. gateway.

Answer: B Reference: Networks Near and Far Difficulty: Moderate


12. The system of satellites that circle the earth and can determine any position is known as a:

A. GPS.

B. LAN.

C. receiver.

D. MAN.

Answer: A Reference: Specialized Networks: From GPS to Financial Systems


Difficulty: Easy

13. Remote access means that:

A. a computer is linked directly to a network.

B. you can access the Internet from anywhere.

C. you connect to a network through a phone line, television cable, or satellite.

D. your Internet connection is through a satellite rather than phone lines.

Answer: C Reference: The Network Interface Difficulty: Moderate

14. A port is a:

A. socket that enables information to move through a system.

B. hardware device that allows connection to the Internet.

C. peripheral device attached to a computer.

D. space located in the front of a computer to install additional drives.

Answer: A Reference: The Network Interface Difficulty: Moderate

15. Older printers were typically connected to computers through a:

A. serial port.

B. NIC card.

C. parallel port.

D. jack.

Answer: C Reference: The Network Interface Difficulty: Moderate


16. A modem is typically connected to a computer through a:

A. serial port.

B. NIC card.

C. parallel port.

D. jack.

Answer: A Reference: The Network Interface Difficulty: Moderate

17. What port is a fast connection that is more flexible than traditional serial and parallel ports?

A. Serial

B. USB

C. Parallel

D. Ethernet

Answer: B Reference: The Network Interface Difficulty: Moderate

18. NIC stands for:

A. network internal card.

B. newer industrial computer.

C. networking Internet connection.

D. network interface card.

Answer: D Reference: The Network Interface Difficulty: Moderate

19. A NIC allows direct connection to:

A. the Internet.

B. a network.

C. a printer.

D. a modem.

Answer: B Reference: The Network Interface Difficulty: Easy


20. The NIC controls the flow of data between the computers RAM and the:

A. network cable.

B. Internet.

C. hard drive.

D. CD drive.

Answer: A Reference: The Network Interface Difficulty: Easy

21. Computer bits must be ___________ to travel over phone lines.

A. analog signals

B. digital signals

C. modem signals

D. converted to bytes

Answer: A Reference: Communication la Modem Difficulty: Moderate

22. Prior to computer bits entering a modem, the bits are:

A. stored in the hard drive.

B. bitmapped.

C. digital.

D. analog.

Answer: C Reference: Communication la Modem Difficulty: Moderate

23. Modems use ____________ cable to connect to a telephone network through a modular phone
jack.

A. phone

B. coaxial

C. digital

D. analog

Answer: A Reference: Communication la Modem Difficulty: Moderate


24. Modem speed is measured in:

A. bits per second.

B. bytes per second.

C. bits per millisecond.

D. bytes per minute.

Answer: A Reference: Communication la Modem Difficulty: Challenging

25. What is the term for the amount of information transmitted through a communication medium
in a certain amount of time?

A. DPI

B. BPS

C. Bandwidth

D. Baud rate

Answer: C Reference: Broadband Connections Difficulty: Moderate

26. Broadband connections include all EXCEPT:

A. cable modems.

B. DSL.

C. wireless.

D. phone modems.

Answer: D Reference: Broadband Connections Difficulty: Moderate

27. What type of cable uses light waves to carry information at high speed?

A. Cable modems

B. fiber-optic cables

C. Wireless cables

D. Phone lines

Answer: B Reference: Fiber-Optic Connections Difficulty: Moderate


28. Which type of media has the longest maximum distance?

A. Twisted pair

B. Wireless

C. Coaxial cable

D. Fiber-optic

Answer: B Reference: Basic Network Anatomy Difficulty: Challenging

29. Palm users often connect through:

A. cable modems.

B. fiber optic cables.

C. infrared wireless.

D. phone lines.

Answer: C Reference: Wireless Network Technology Difficulty: Moderate

30. The next generation of wireless technology is known as:

A. G4.

B. modem wireless.

C. 3G.

D. NIC wireless.

Answer: C Reference: Wireless Network Technology Difficulty: Challenging

31. The rules for exchanging data between a terminal and one or more computers is known as
a(n):

A. protocol.

B. algorithm.

C. procedure.

D. set of laws.

Answer: A Reference: Communication Software Difficulty: Moderate


32. What is a LAN that has one or more dedicated computers and all others act as recipients?

A. Peer-to-peer model

B. P-to-p model

C. Ring network

D. Client/server model

Answer: D Reference: Communication Software Difficulty: Moderate

33. A ____________ is a high-speed, high-end computer with data and other resources to be
shared with client computers.

A. server

B. super computer

C. client

D. PDA

Answer: A Reference: Communication Software Difficulty: Moderate

34. In a client/server environment, most or all of the network operating system resides on the:

A. client machine.

B. CD.

C. server computer.

D. mainframe.

Answer: C Reference: Communication Software Difficulty: Easy

35. The network configuration that allows every computer to act as both a client and a server is a:

A. client/server model.

B. host system.

C. server network.

D. peer-to-peer network.

Answer: D Reference: Communication Software Difficulty: Easy


36. The computer that accepts, prioritizes, and processes print jobs is known as the:

A. print client.

B. printer file server.

C. print server.

D. mainframe.

Answer: C Reference: The Network Advantage Difficulty: Moderate

37. The ____________ stores data and software that are to be shared by several users.

A. file server

B. mainframe

C. print server

D. client

Answer: A Reference: The Network Advantage Difficulty: Moderate

38. When you are using a PC and copy software or data from a server, it is known as:

A. uploading.

B. terminal emulation.

C. downloading.

D. server sharing.

Answer: C Reference: The Network Advantage Difficulty: Moderate

39. When a business can legally copy software to all of the computers that they own, the company
has a(n):

A. site license.

B. upload license.

C. file server license.

D. groupware license.

Answer: A Reference: The Network Advantage Difficulty: Moderate


40. What is code embedded as one-pixel graphics files in Web pages or email messages called?

A. Web dot

B. Web bug

C. A cookie

D. A virus

Answer: B Reference: The Many Faces of Email Difficulty: Moderate

41. A(n) ____________ enables a user to participate in email discussion groups on topics of
particular interest to the user.

A. subscriber list

B. mailing list

C. news list

D. email list

Answer: B Reference: Mailing Lists Difficulty: Easy

42. A newsgroup is different from a mailing list in that:

A. the newsgroup is email and the mailing list is not.

B. a newsgroup is only accessible on a LAN and a mailing list can be on the Internet.

C. a newsgroup is a public discussion and a mailing list is information sent to your


email.

D. a newsgroup is private and a mailing list is not.

Answer: C Reference: Network News Difficulty: Moderate

43. Asynchronous communication is when the sender and recipient:

A. are online at the same time.

B. do not use the same operating system.

C. do not have to be online at the same time.

D. use different software but are able to communicate through the Internet.

Answer: C Reference: Instant Messaging and Teleconferencing Difficulty: Moderate


44. An IM session stands for:

A. internal messaging.

B. instant messaging.

C. instantaneous market.

D. instantaneous messages.

Answer: B Reference: Instant Messaging and Teleconferencing Difficulty:


Easy

45. ___________ software and hardware allows a PC to function similar to a telephone.

A. Telephony

B. Instant messaging

C. Video conferencing

D. Avatars

Answer: A Reference: Computer Telephony Difficulty: Moderate

46. Unwanted junk email is known as:

A. IM.

B. telephony.

C. spam.

D. avatars.

Answer: C Reference: Online Issues Difficulty: Easy

47. Following the rules of correct behavior of the Internet is known as:

A. netiquette.

B. FAQs.

C. emoticons.

D. netmanners.

Answer: A Reference: Working Wisdom: Netiquette and Text Messaging Difficulty:


Easy
48. FAQ stands for:

A. frequently asked questions.

B. frequent assistance for questions.

C. frequently assisted query.

D. frequently asked queries.

Answer: A Reference: Working Wisdom: Netiquette and Text Messaging Difficulty:


Easy

49. Text-based graphical substitutes for body language over the Internet is known as:

A. netiquette.

B. FAQs.

C. emoticons.

D. netmanners.

Answer: C Reference: Working Wisdom: Netiquette and Text Messaging Difficulty:


Easy

50. What helps block unauthorized access and data transfer?

A. A bridge

B. A VPN

C. A WEP

D. A firewall

Answer: D Reference: Wireless Issues: Access, Security, and Privacy Difficulty:


Moderate

Fill in the Blank:

51. A(n) ____________ is a network of networked computers that are physically located far apart
from one another.

Answer: WAN or wide area network Reference: Networks Near and Far Difficulty:
Easy

52. The most common cabling for a LAN is ____________.

Answer: twisted pair Reference: Networks Near and Far Difficulty: Challenging
53. A(n) ____________ is a computer or peripheral device attached to a network.

Answer: node Reference: Networks Near and Far Difficulty: Moderate

54. A(n)____________ network connects computers through radio transmitters connected to the
network port.

Answer: wireless Reference: Networks Near and Far Difficulty: Moderate

55. A(n)____________ includes 24 satellites that circle the Earth.

Answer: GPS Reference: Specialized Networks: From GPS to Financial Systems


Difficulty: Moderate

56. A(n) ____________ connection to a network means that cabling from the computer is cabled
to the network.

Answer: direct Reference: The Network Interface Difficulty: Moderate

57. A computer communicates with a network through a(n) ____________.

Answer: port Reference: The Network Interface Difficulty: Moderate

58. A port that bits pass through one at a time is a(n) ____________ port.

Answer: serial Reference: The Network Interface Difficulty: Moderate

59. A port that bits pass through in groups of 8, 16, or 32 is a(n) ____________ port.

Answer: parallel Reference: The Network Interface Difficulty: Moderate

60. Modern Macs and PCs have ____________ ports that are faster and more flexible than
traditional ports.

Answer: USB or FireWire Reference: The Network Interface Difficulty:


Challenging

61. A(n) ____________ is designed specifically for a direct network connection.

Answer: NIC, network interface card Reference: The Network Interface Difficulty:
Challenging

62. If a computer has a(n) ____________ port, it does not need a NIC.

Answer: Ethernet Reference: The Network Interface Difficulty: Challenging

63. A continual wave of bits transmitted through a device is known as a(n) ____________ signal.

Answer: analog Reference: Communication la Modem Difficulty: Moderate

64. The transferring of transmission from a computer over phone lines is done through a(n)
____________.

Answer: modem Reference: Communication la Modem Difficulty: Moderate


65. Bps stands for ____________.

Answer: bits per second Reference: Communication la Modem Difficulty: Easy

66. When using multimedia or downloading huge files from the Internet, the bigger the
____________, the better.

Answer: bandwidth Reference: Broadband Connections Difficulty:


Moderate

67. Bandwidth is measured in kilobits or ____________.

Answer: megabits Reference: Broadband Connections Difficulty: Moderate

68. ____________ cables are faster than DSL or cable modems.

Answer: Fiber-optic Reference: Fiber-Optic Connections Difficulty:


Moderate

69. Many laptops and handheld computer have ____________ ports that can send and receive
digital information short distances. Line-of-sight is a limitation.

Answer: infrared Reference: Wireless Network Technology Difficulty: Moderate

70. To communicate with each other, two machines must follow the same ____________ which
are the rules for the exchange of data.

Answer: protocols Reference: Communication Software Difficulty:


Moderate

71. ____________ software sends requests from the user to the server.

Answer: Client Reference: Communication Software Difficulty: Moderate

72. When many computers are able to print to one printer, the computers are probably connected
to a(n) ____________.

Answer: print server Reference: The Network Advantage Difficulty: Moderate

73. Copying software or data files from a client computer to a server is known as ____________.

Answer: uploading Reference: The Network Advantage Difficulty: Easy

74. Microsoft ____________ is the most popular groupware software.

Answer: Exchange Reference: The Network Advantage Difficulty: Challenging

75. Software designed to allow several networked users to work on the same document at the
same time is known as ____________.

Answer: groupware Reference: The Network Advantage Difficulty: Moderate


76. When a Word document or picture file is included along with an email message, it is known as
a(n) ____________.

Answer: attachment Reference: The Many Faces of Email Difficulty: Easy

77. A(n) ____________ is a public discussion on a particular subject.

Answer: newsgroup Reference: Network News Difficulty: Easy

78. Publicly accessible wireless access points are known as ___________.

Answer: hot spots Reference: Wireless Issues Difficulty: Easy

Matching:

79. Match the following terms to their meanings:

I. twisted pair A. medium cost, LANs, 600-2,500 feet

II. coaxial cable B. high cost, network backbones and WANS, up to


25 miles

III. fiber-optic C. high cost, connects things that move, variable


distances possible

IV. wireless/infrared D. low cost, LAN use, up to 300 feet

V. wireless/radio E. medium cost, LANs, line-of-sight up to 1,000


feet

Answers: D, A, B, E, C Reference: Basic Network Anatomy Difficulty: Moderate


80. Match the following terms to their meanings:

I. modem A. continuous wave of bits

II. bandwidth B. modulator/demodulator

III. Bps C. stream of bits

IV. broadband D. measured in kilobits or megabits per second

V. analog signal E. how modems measure the transmission speed of a


modem

VI. digital signal connection F. DSL, cable modem, high-speed


wireless, satellite

VII. NIC G. a card inserted into a slot that is designed for direct
connection to a network

Answers: B, D, E, F, A, C, G Reference: Multiple locations Difficulty:


Moderate
1

Copyright Prentice-Hall. All rights reserved.

What is a complex system that takes on nearly complete responsibility for a task eliminating
the need for human input, verification, or decision making?
autonomous system
Hardware or software designed to guard against unauthorized access to a computer network
is known as a(n)
firewall.
Networks that use electrical lines are sometimes called ________.
power-line networks
The most common form of computer crime is theft.
a. True
b. False
TRUE
Downloadable software extensions that add new features to a browser are known as
________.
plug-ins
Asynchronous communication is when the sender and recipient
a. directly connect to share files.
b. do not use the same operating system.
c. do not have to be online at the same time.
d. use different software but are able to communicate through the Internet.
c. do not have to be online at the same time
A scheme called ________ is designed to capture sensitive financial information from the
person visiting a Web site.
phishing
All of the following statements are true EXCEPT:
a. Wireless networks are convenient for people on the move.
b. Wireless networks are easier to install because they don't require drilling or digging.
c. Wireless networks use radio transmitters.
d. Wireless networks are faster than wired networks.
Wireless networks are faster than wired networks.
T3 connections transmit data at this speed:
45 Mbps
A ________ stores data and software that can then be shared by several users.
file server
Adobe Reader and Adobe Acrobat display PDF documents.
a. True
b. False
TRUE
One example of a synchronous method of communication is...
instant messaging.
The following are all examples of broadband access EXCEPT ________.
a. DSL
b. cable
c. satellite
d. dial-up
Dial-Up
What is the name of the storage technology that enables multiple hard disks to operate as
single logical units?
RAID
All of the following are essential components of every computer system EXCEPT:
Networks
The majority of computer crimes are committed by
Company Employees
When a business can legally copy software to all of the computers they own, the company
has a ________ license.
Site
The primary difference between a LAN and a WAN is the
geographical area
Internet connections that work through the same network of coaxial cables that deliver
television signals work through a ________ modem.
Cable
Which of the following domains is restricted?
.edu
Examples of broadband technologies include all of the following EXCEPT:
a. DSL.
b. dial-up.
c. fiber-optic.
d. All are broadband connections
Dial-Up
TCP/IP protocols define how information can be transferred between machines and how
machines on the network can be identified with ________ addresses.
a. unique
b. similar
c. identical
d. multiple
unique
What markup language includes all of the features of HTML and includes customized tags
that give information more meaning?
XML
According to the FBI, how much identity theft begins with email?
a. all
b. one-half
c. one-quarter
d. two-thirds
Two-thirds 2/3
All of the following are top-level domains EXCEPT ________.
a. .com
b. .net
c. .info
d. .bus
.bus
What is the major light principle fiberoptic cables are based on?
Total Reflection
Each unique Internet addresses had an applet.
FALSE
The Web was built with push technology.
FALSE
Bluetooth technology can reach a range of 10 meters.
TRUE
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it
is known as
denial-of-service attack
Worms execute until
there is a lack of free memory or disk space
Many phone companies offer ________, a technology for bringing broadband connections to
homes and small businesses by sharing the copper telephone lines that carry voice calls.
DSL
Combining other people's works in to one Web page is known as a podcast.
TRUE
A(n) ________ converts a message from digital to analog or from analog to digital.
Modem
A single fiber-optic cable can replace ________ copper telephone cables.
10,000
Smart cards and biometrics are two ways companies may add physical security to computer
systems.
TRUE
A voice message must be converted to a(n) ________ signal so it can be stored on a
computer's hard drive.
Digital
The Code Red worm attacked
Microsoft server software
Yahoo!, MSN, and AOL/Netscape are examples of ________.
Portals
Data traveling from a home computer to the Internet is called
Upstream Traffic
This IP address doesn't change every day:
static IP address
A ________ stores data and software that can then be shared by several users.
file server
After an HTML document is completed, it needs to be uploaded onto a ________ server
before it's visible on the Web.
Web
The Telecommunications Act of 1996 prohibits employers from listening to their employees'
phone conversations.
TRUE
Over ________ were spent by businesses and government to repair problems in regard to
Y2K.
100 billion dollars
Each individual computer and networked peripheral attached to a LAN is a
Node
Computer forensics is a form of computer crime.
FALSE
In 1999, the Melissa virus was a widely publicized
Email Virus
Which of the following is NOT a true statement about IPv6?
IPv6 is supported on all machines
Networks that use electrical lines are sometimes called ________.
power-line networks
Most computer systems rely solely on ________ for authentication.
passwords
A(n) ________ server maintains look-up tables that map domain names to IP addresses.
DNS
The World Wide Web is a distributed browsing and searching system originally developed at
________.
CERN
________ uses high-bandwidth connections to communicate multimedia over wireless
networks, but lacks true broadband speed.
3G
An autonomous system can assume almost complete responsibility for a task and minimizes
risk because of its absolute reliability.
FALSE
Large organizations may operate a ________ network to connect its LANs and transmit data
at more than 1 gigabit per second.
Backbone
A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly
connect to an Ethernet network.
Port
Bandwidth is measured in bits.
TRUE
Information can be recovered from a hard drive even after file have been deleted.
TRUE
The name for harassment on the Internet is
cyberstalking
A hard-wired Internet connection through a LAN is called a(n) ________ connection.
dedicated
Broadband connections include all of the following EXCEPT:
telephone modems
If one attempts to send a message to an email address which does not exist, it will return to
you, or ________.
Bounce
MMORPGs are
online role-playing games involving hundreds of thousands of players
Bill Gates was the original developer of the World Wide Web.
FALSE
The first part of a URL refers to the ________ that must be used to access information, for
example http.
Protocol
The system of satellites used to determine any position on the Earth is known as
GPS
Net neutrality is the principle that Internet access should be free from restrictions related to
the type of communication taking place on it.
TRUE
The typical computer criminal is a(n)
trusted employee with no criminal record
A ________ is a network of computers in a close physical area.
LAN
_______ is another term for millions of bits.
Megabits
A DSL connection can share signals with a telephone line.
TRUE
Of the following, which one is NOT a way to protect yourself from identity theft?
Make all online purchases with a debit card
When radio or TV broadcasts are streaming at the same time they are happening, it is called
Real-Time
TCP/IP was developed as an experiment in ________, connecting different types of networks
and computer systems.
internetworking
In the Web address www.bbc.co.uk, "uk" is a(n) ________.
Country Code
To prevent loss of data during power failures, use a(n)
UPS
________ refers to the quantity of data that can be transmitted through a communication
medium in a given amount of time.
Bandwidth
All e-mail addresses consist of a user name, followed by the @ sign, followed by a host
address.
TRUE
Every host computer on the Internet has a(n) ________.
unique IP address
A ________ stores data and software that can then be shared by several users.
File Server
Bluetooth technology can reach a range of 10 meters.
TRUE
T1 and T3 connections are considered ________ connections.
Direct
_______ are hardware devices or software programs that direct messages as they travel
between networks.
Routers
A ________ is a code embedded as a one-pixel graphics file in an email message which
notifies the sender that the message was opened.
Web Bug
All of these are suggestions for safe computing EXCEPT:
Pirate Software
The .gov domain might be used by ________.
US Senate
Information from the Internet to the subscriber, called ________ traffic, sometimes
approaches speeds similar to a T1.
Downstream
A content-management system allows users to edit Web sites without having to deal with
HTML and FTP.
TRUE
To register a business name and create a unique URL, a business pays a fee that goes to
________.
domain name registry company
In a client/server model, a client program ________.
asks for information
A(n) ________ network is often used to set up a temporary communications system that
requires no centralized router.
Mesh
________ is the measurement of things such as fingerprints and retinal scans used for
security access.
Biometrics
A(n) ________ cable uses light waves to transmit multimedia and voice data.
fiber-optic
________ is defined as any crime completed through the use of computer technology.
Computer Crime
Experts debate whether Internet addiction is a true addiction or simply a compulsion.
TRUE
In the 1970s, Xerox developed ________, which continues to be a popular networking
architecture.
Ethernet
In what decade was ARPANET developed?
1960s
Which of the following is a popular scripting language for programming Web servers?
PHP
Which type of virus uses computer hosts to reproduce itself?
Worm
The Internet is controlled by ________.
no one in particular
Another name for the original Ethernet standard is ________.
10BASE-T Ethernet
A public key is only available to the user originating a message.
FALSE
T1 connections transmit data at this speed:
1.5 Mbps
Placing a phone call pretending to be someone else, in order to trick someone into doing
something is also known as
Spoofing
Using a PC to copy software or data from a server, is known as
Downloading
What is a coaxial cable made of?
Mostly copper and aluminum
The Digital Millennium Act of 1998 allows users copying music CD content for personal use,
but not DVD content.
TRUE
RSS-reading applications which periodically visit Web sites, examine the feeds, and display
new content are known as ________.
Aggregators
The digital divide separates people in the world with access to technology and digital
information from those who do not.
TRUE
The most widely used data recovery technique is making regular backups.
TRUE
The latest version of the Internet Protocol is IPv9.
FALSE
The more secure an authentication system gets, the more __________ it becomes.
Inconvenient
The protocol used to transfer Web pages is ________.
http
Which historical macro virus sent emails out to the first 50 names of a user's Outlook address
book if they opened an email from an unknown sender?
Melissa
________ is a secure electronic "tunnel" through the Internet that prevents unauthorized
access or eavesdropping.
VPN
The fastest Ethernet devices today follow the ________ standard.
Gigabit Ethernet
Software programs that close potential security breaches in an operating system or
application are known as
Security Patches
"Cracker" is the correct term for the term "hacker" we use today.
TRUE
Which of the following is an example of social engineering?
Spoofing
Remote access means that a(n)
user is connecting to a network through a phone line, television cable, or wireless link
________ is a radio-based wireless standard which provides Wi-Fi style access with
approximately 70 Mbps speeds to a 25-square mile area.
WiMAX
When the term "hacker" came to be in the sixties, it was meant for evil programmers.
FALSE
The backbone of the Internet is made up of physical connections between specific locations?
TRUE
A personal area network is possible because of the wireless technology known as
Bluetooth
A Web server receives incoming mail, stores it, and provides it to the email client program
when requested.
FALSE
Most email messages are junk email, also known as
SPAM
Using deception to get individuals to reveal sensitive information is also known as a(n)
________ attack.
social engineering
What is the name of an application program that gathers user information and sends it to
someone through the Internet?
Spybot
From the ground, a GPS ________ interacts with signals from a satellite to determine its
position.
Reciever
Web authoring software includes all of the following EXCEPT ________.
Adobe Acrobat
Most Web-based email systems use ________ to retrieve mail and store the messages in a
folder on a remote mail server.
POP
All of the following are advantages of using a computer network EXCEPT that it
promotes independence so users have exclusive control over their own data and applications.
When you visit certain Web sites, spyware may be automatically downloaded. This is called a
drive-by download

Você também pode gostar