Filters
Question type

Study Flashcards

A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web site.


A) spamming
B) phishing
C) VPN
D) MMORPG

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

A(n)________ is a device or program used to push traffic through a series of networks.

Correct Answer

verifed

verified

T1 and T3 connections are considered ________ connections.


A) direct
B) dial-up
C) DSL
D) slow-speed

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

All of the following statements are true EXCEPT:


A) Wireless networks are convenient for people on the move.
B) Wireless networks are easier to install because they don't require drilling or digging.
C) Wireless networks use radio transmitters.
D) Wireless networks are faster than wired networks.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A personal area network is possible because of the wireless technology known as


A) USB.
B) FireWire.
C) Bluetooth.
D) PDA.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps speeds to a 25-square mile area.


A) 3G
B) WiMAX
C) Bluetooth
D) Infrared

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The rules for how data is exchanged between devices is known as a(n)


A) protocol.
B) algorithm.
C) procedure.
D) code.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

The most basic computer network can be described as


A) a minimum of five computers linked together.
B) the Internet.
C) two or more computers that are linked together.
D) the use of satellites linking computers together.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Another word for sites like Twitter,which allow users to post short status updates is ________-blogs.

Correct Answer

verifed

verified

To enable customers to check their email using their laptop,a coffee shop may provide a ________,which is a publicly accessible wireless access point.

Correct Answer

verifed

verified

hotspot

TCP/IP is the most famous protocol for computer networking.

A) True
B) False

Correct Answer

verifed

verified

True

________ refers to the quantity of data that can be transmitted through a communication medium in a given amount of time.


A) Attenuation
B) Megahertz
C) Bandwidth
D) Ethernet

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A broadband connection could be any of the following EXCEPT:


A) cable modem.
B) fiber-optic.
C) wireless connection.
D) dial-up.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Examples of broadband technologies include all of the following EXCEPT:


A) DSL.
B) dial-up.
C) fiber-optic.
D) All are broadband connections

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

One email message from a mail list that includes all the postings from one day is called a ________.

Correct Answer

verifed

verified

A ________ is a high-speed,high-end computer that shares data and other resources with client computers.


A) server
B) super computer
C) client
D) PDA

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A ________ is a hardware device that connects a computer to a telephone line.


A) modem
B) router
C) network card
D) hub

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

A ________ network is a configuration that allows every computer on the network to act as both a client and a server.


A) client/server
B) host system
C) metropolitan area
D) peer-to-peer

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Narrowband is a network of newsgroups available worldwide through the Internet.

A) True
B) False

Correct Answer

verifed

verified

False

A continuous wave of bits transmitted through a device is known as a(n)________ signal.

Correct Answer

verifed

verified

Showing 1 - 20 of 134

Related Exams

Show Answer