Using Information Technology 10th Edition Williams Test Bank Download
Using Information Technology 10th Edition Williams Test Bank Download
World
Using Information
Technology 10th Edition
Williams Test Bank
Full download at link:
6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog
6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer
11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet
16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node
19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge
6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall
22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router
24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet
28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN
6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)
40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb
6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer
53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers
55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics
56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics
57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key
62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False
6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False
67. Capturing music digitally means that one has an exact duplicate of the music.
True False
68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False
71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False
72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False
6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False
74. "File server" and "database server" are different names for the same type of server.
True False
75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False
76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False
79. An interface device used to connect the same types of networks is called a node.
True False
80. The backbone is the main communications route in a bus network topology.
True False
6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False
82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False
83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False
84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False
86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False
87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False
88. The two general classes of bandwidth are long and short.
True False
6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
89. The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
True False
90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False
91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False
6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False
97. Communications satellites are microwave relay stations in orbit around the earth.
True False
98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False
99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False
100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False
101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False
6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
104. 2G and 3G cellphones are digital, not analog.
True False
105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False
106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False
108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False
6-20
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False
113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False
116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False
117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False
118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False
6-21
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
119. Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
True False
121. Two kinds of secret keys are used in public key encryption.
True False
122. In public key encryption, only the receiver of an encrypted message knows the private
key needed to decrypt the message.
True False
123. Communications signals represented in a binary electronic format are ________ signals.
________________________________________
124. Signals such as sound and temperature, which continuously vary in strength and quality,
are ________ signals.
________________________________________
125. So they can be sent over a telephone line, analog signals are converted into digital
signals, and then back again, by using ________.
________________________________________
6-22
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
126. The text lists six benefits of networks: ________, ________, ________, ________,
________, and ________.
127. Four disadvantages of networks are ________, ________, ________, and ________.
128. The text lists seven types of networks: ________, ________, ________, ________,
_________, ________, and ________.
130. Private networks that use a public network, usually the Internet, to connect remote sites
are called ________.
________________________________________
6-23
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
131. An intranet that allows access to selected outside users is a(n) ________.
________________________________________
132. A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________
133. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________
134. A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________
135. A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
________________________________________
136. ________ are physical devices that join multiple wired and/or wireless networks; their
primary job is to provide connectivity.
________________________________________
137. A network can be laid out in different ways. The layout, or shape, is called a ________.
________________________________________
6-24
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
138. The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________
139. The system software that manages the activity of a network is called the ________.
________________________________________
140. A computer sends and receives messages over a cable network using a ________, which
is inserted in an expansion slot on the motherboard.
________________________________________
141. A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________
142. A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
________________________________________
144. In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and describes how data can be
sent.
________________________________________
6-25
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
145. Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
________________________________________
146. Wired communications media include three main types. Insulated copper wire wrapped
in a solid or braided shield and then an external cover is called ________ cable.
________________________________________
147. Wired communications media include three main types. The kind used for transmitting
pulses of light is ________.
________________________________________
148. HomePlug technology is a wired communications standard that allows users to connect
equipment within the home using the house's own ________ wiring.
________________________________________
149. Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________
150. The _________ is the basis for ALL telecommunications signals, both wired and
wireless, and the _________ is the part that carries most communications signals.
________________________________________
151. The range of frequencies that a transmission medium can carry in a given period of time
is called its ________.
________________________________________
6-26
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
152. The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________
154. The text covers five types of wireless communications media: ________, ________,
________, _________, and ________.
155. Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________
156. The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________
157. Global Positioning Systems use ________ to continuously transmit signals to identify
earth locations.
________________________________________
6-27
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
158. The Global Positioning System is an example of a ________-way long-distance
communications system.
________________________________________
159. Simple one-way radio receivers that receive data (but not voice messages) are called
________.
________________________________________
160. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________
161. Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping portable
computers and handheld wireless devices to communicate at high speeds and share Internet
connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi version?
________________________________________
162. The short-range, wireless digital standard aimed at linking hand-held devices up to 33
feet apart is called ________.
________________________________________
163. The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________
164. Worms, viruses, and Trojan horses are all types of programs called ________.
________________________________________
6-28
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
165. A(n) ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive and that can cause the computer to crash.
________________________________________
166. A(n) ________ is a "deviant" program that attaches itself to a program or file and can
cause unexpected and undesirable effects, such as destroying or corrupting data.
________________________________________
167. A ________ is a program that pretends to be a useful program, usually free, such as a
game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
________________________________________
168. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
________________________________________
169. Malware can be spread by using a(n) ________ disk, flash drive, CD; opening unknown
email _________; clicking on ________ websites; and/or through contaminated Wi-Fi hot
spots.
________________________________________
170. People who illegally break into computers for malicious purposes are known as
________.
________________________________________
6-29
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
171. The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.
172. ________ software can be used to scan a computer's hard disk, CDs, and main memory
to detect viruses.
________________________________________
173. A system of hardware and/or software that protects a computer or network from intruders
is called a ________.
________________________________________
174. Five types of biometric authentication are ________, ________, ________, _________,
and _________.
6-30
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
175. The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
________________________________________
Essay Questions
6-31
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
180. List four advantages and four disadvantages of networks.
181. What are the main differences between a WAN, a MAN, and a LAN?
182. What is the difference between a client/server network and a peer-to-peer network?
6-32
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
184. Describe the network topology used by the Internet.
6-33
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
188. What is wireless USB?
189. What are four ways in which viruses and worms get passed?
6-34
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
1. (p. 313) Communications signals represented in a binary format are said to be ________.
A. continuous
B. digital
C. sequential
D. analog
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
6-35
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
4. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be
A. spontaneous
B. digital
C. sequential
D. analog
Difficulty: Easy
5. (p. 315-316) The ________ is a device that converts digital computer signals into analog signals
so that they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
Difficulty: Easy
6. (p. 316) A person sending a document over a phone line by converting digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
Difficulty: Easy
6-36
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Difficulty: Easy
8. (p. 320) A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN
Difficulty: Easy
9. (p. 320) A network that covers a city or a suburb is called a(n) ________.
A. WAN
B. LAN
C. MAN
D. Internet
Difficulty: Easy
10. (p. 322) Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer
Difficulty: Medium
6-37
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
11. (p. 322) A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
Difficulty: Easy
12. (p. 323) A computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
Difficulty: Medium
13. (p. 324-325) If an organization's internal private network uses the same infrastructure and
standards of the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
Difficulty: Medium
Difficulty: Medium
6-38
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
15. (p. 320) A ________ is the set of rules that govern the exchange of data between hardware
and/or software components in a communications network.
A. host
B. protocol
C. database
D. packet
Difficulty: Medium
16. (p. 326) A mainframe computer that controls a large network is called the ________
computer.
A. slave
B. host
C. client
D. node
Difficulty: Easy
17. (p. 326) Any device that is attached to a network is referred to as a ________.
A. server
B. host
C. node
D. router
Difficulty: Easy
Difficulty: Easy
6-39
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
19. (p. 327) A common connection device that connects computers to a network is called a
________.
A. router
B. gateway
C. switch
D. bridge
Difficulty: Easy
20. (p. 328) To create larger networks, a bridge connects the same types of networks, and a
________ connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
Difficulty: Hard
21. (p. 328) A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall
Difficulty: Medium
6-40
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
22. (p. 329) In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router
Difficulty: Medium
Difficulty: Easy
24. (p. 330) In the ________ network topology, communications devices are connected to a
single cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
Difficulty: Easy
6-41
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
25. (p. 331) What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
Difficulty: Easy
26. (p. 331) What kind of topology (layout) is used by a network that connects all its computers
and communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
Difficulty: Easy
27. (p. 332) ________ is the most common and most widely used LAN technology; it can be
used with almost any kind of computer; most microcomputers come with a port for this type
of network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet
Difficulty: Medium
6-42
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
28. (p. 333) A communications medium is a channel; there are three types of wired
communications media. The one consisting of two strands of insulated copper wire, used by
tradition telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
Difficulty: Medium
29. (p. 334) What wired channel, commonly used for cable TV, consists of an insulated copper
wire wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
Difficulty: Medium
30. (p. 335) A type of wired communications technology used to connect equipment in a home
network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
Difficulty: Medium
6-43
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
31. (p. 334) What wired communications medium consists of dozens or hundreds of thin strands
of glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
Difficulty: Easy
32. (p. 335-336) The ________ is the basis for ALL telecommunications signals.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
Difficulty: Medium
33. (p. 337) The ________ is the range of frequencies that a transmission medium (channel) can
carry in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
Difficulty: Medium
6-44
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
34. (p. 339) What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN
Difficulty: Hard
35. (p. 339) Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio
Difficulty: Medium
36. (p. 339) What form of wireless transmission sends data to an AM or FM receiver?
A. broadcast radio
B. infrared
C. fiber-optic
D. microwave
Difficulty: Medium
37. (p. 339) Which of these types of wireless transmission is limited to line-of-sight
communications?
A. broadcast radio
B. broadband
C. microwave
D. fiber-optic
Difficulty: Medium
6-45
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
38. (p. 340) Transmitting a signal from a ground station to a satellite is called ________.
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking
Difficulty: Easy
39. (p. 341) The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)
Difficulty: Medium
40. (p. 342) GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals
used to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
Difficulty: Hard
41. (p. 347-348) Which of the following is NOT a type of long-distance wireless two-way
communications device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
Difficulty: Medium
6-46
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
42. (p. 347) Broadband technology (wireless digital services) is also referred to as ________-
generation wireless services.
A. first
B. second
C. third
D. fourth
Difficulty: Easy
43. (p. 349) What short-distance wireless standard is used to link portable computers and
handheld wireless devices so they may communicate at high speeds at distances of 100-228
feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
Difficulty: Medium
44. (p. 352) What short-distance wireless standard is used to link cell phones, PDAs, and
computers at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
Difficulty: Medium
6-47
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
45. (p. 355) A ________ attack disables a computer system or network by making so many
requests of it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
Difficulty: Medium
46. (p. 355) A ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
Difficulty: Easy
Difficulty: Medium
6-48
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
48. (p. 358) Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb
Difficulty: Medium
49. (p. 358) A botmaster uses malware to hijack hundreds or thousands of computers and
controls them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
Difficulty: Medium
50. (p. 358) Which of the following is NOT a way to spread a virus?
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software
Difficulty: Medium
6-49
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
51. (p. 359) A person who gains unauthorized access to computer or telecommunications
systems without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie
Difficulty: Easy
52. (p. 360) A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer
Difficulty: Easy
53. (p. 359) Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
Difficulty: Medium
6-50
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
54. (p. 361) What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers
Difficulty: Easy
55. (p. 361) What is the science, often used in computer security systems, of measuring
individual body characteristics?
A. encryption
B. decryption
C. password
D. biometrics
Difficulty: Easy
56. (p. 361) Fingerprint scanners, face-recognition systems, and iris-recognition systems are
based on ________.
A. encryption
B. decryption
C. password protection
D. biometrics
Difficulty: Easy
6-51
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
57. (p. 362) What is the process of altering readable data (plain text) into unreadable form to
prevent unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
Difficulty: Easy
Difficulty: Hard
59. (p. 362-363) ____________ encryption uses the same secret key to encrypt and decrypt a
message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key
Difficulty: Medium
Difficulty: Hard
6-52
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
61. (p. 313-314) Analog refers to communications signals represented in a binary format.
FALSE
Difficulty: Easy
62. (p. 313-314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be digital.
FALSE
Difficulty: Easy
63. (p. 314) A thermometer and a speedometer are examples of analog devices.
TRUE
Difficulty: Easy
Difficulty: Easy
65. (p. 316) A modem converts digital signals into analog signals so they can be sent over a
telephone line.
TRUE
Difficulty: Easy
6-53
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Difficulty: Easy
67. (p. 317) Capturing music digitally means that one has an exact duplicate of the music.
FALSE
Difficulty: Hard
68. (p. 317) A network is a system of interconnected computers and communications devices
that can communicate and share resources.
TRUE
Difficulty: Easy
Difficulty: Medium
70. (p. 320-321) A LAN is a type of network that covers a wide geographical area.
FALSE
Difficulty: Easy
6-54
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
71. (p. 322) A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
TRUE
Difficulty: Easy
72. (p. 323-324) Client/server networks and peer-to-peer networks are the same except that the
first type of network uses a mainframe and the second type uses only microcomputers.
FALSE
Difficulty: Medium
73. (p. 323) The computer that acts like a disk drive, storing the programs and data files shared
by users on a LAN, is called a file server.
TRUE
Difficulty: Easy
74. (p. 323) "File server" and "database server" are different names for the same type of server.
FALSE
Difficulty: Easy
75. (p. 325-326) Virtual private networks (VPNs) are private networks that use a public network
(usually the Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE
Difficulty: Easy
6-55
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
76. (p. 326-327) In a network, communications protocols specify the type of electrical
connections, the timing of message exchanges, and error-detection techniques.
TRUE
Difficulty: Medium
77. (p. 328) Routers join multiple wired and/or wireless networks.
TRUE
Difficulty: Easy
78. (p. 328) A gateway is an interface device permitting communication between similar
networks.
FALSE
Difficulty: Medium
79. (p. 328) An interface device used to connect the same types of networks is called a node.
FALSE
Difficulty: Medium
80. (p. 329) The backbone is the main communications route in a bus network topology.
FALSE
Difficulty: Medium
6-56
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
81. (p. 331) In a bus network, all computers and communications devices are connected in a
continuous loop.
FALSE
Difficulty: Easy
82. (p. 333) Traditional landline telephone systems use twisted-pair wire as their
communications medium.
TRUE
Difficulty: Easy
83. (p. 334) A cable that is made up of dozens of thin strands of glass and transmits pulsating
beams of light is called a coaxial cable.
FALSE
Difficulty: Easy
84. (p. 335) A wired communications standard that allows users to send data over a home's
existing electrical (AC) power lines is called HomePlug technology.
TRUE
Difficulty: Easy
Difficulty: Easy
6-57
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
86. (p. 336) All wired and wireless communications media use the electromagnetic spectrum of
radiation.
TRUE
Difficulty: Easy
87. (p. 337) The smaller the bandwidth of a medium, the more frequencies it can use to transmit
data.
FALSE
Difficulty: Easy
88. (p. 337) The two general classes of bandwidth are long and short.
FALSE
Difficulty: Easy
89. (p. 337) The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
TRUE
Difficulty: Easy
90. (p. 337) The frequency of an electromagnetic wave is the number of times the wave repeats,
or makes a cycle, in a second.
TRUE
Difficulty: Medium
6-58
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
91. (p. 337-338) Both digital narrowband and broadband transmission speeds are measured in
megabits or gigabits per second.
TRUE
Difficulty: Medium
92. (p. 339) Infrared transmission is a type of low-frequency wireless transmission that is short-
range and line-of-sight.
TRUE
Difficulty: Medium
Difficulty: Easy
94. (p. 340, 352) Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.
TRUE
Difficulty: Easy
Difficulty: Easy
6-59
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
96. (p. 340) Satellite transmission uses in-orbit satellites and earth stations. Transmitting from
the ground to the satellite is called downlinking, and transmitting from the satellite to the
ground station called uplinking.
FALSE
Difficulty: Easy
97. (p. 340) Communications satellites are microwave relay stations in orbit around the earth.
TRUE
Difficulty: Easy
98. (p. 341) Satellite orbits are at three levels: GEO, MEO, and LEO.
TRUE
Difficulty: Easy
99. (p. 341) A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
FALSE
Difficulty: Hard
100. (p. 342) GPS uses MEO satellites that continuously transmit timed radio signals used to
identify earth locations.
TRUE
Difficulty: Easy
6-60
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
101. (p. 342-343) Because of the excellence of satellite technology, GPS location IDs are 100%
accurate.
FALSE
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
105. (p. 349) The short-range, wireless communications method aimed at linking hand-held
devices at high speeds and at distances of 100-228 feet is called Wi-Fi.
TRUE
Difficulty: Easy
6-61
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
106. (p. 349-350) A Wi-Fi enabled laptop computer accesses the available network (say, at an
airport) through an access point, which is connected to a land-based Internet connection.
TRUE
Difficulty: Easy
107. (p. 349-350) The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
FALSE
Difficulty: Medium
108. (p. 351-352) Wi-Fi connections are always secure; no one can steal your data when you are
online.
FALSE
Difficulty: Easy
109. (p. 352) Bluetooth is a short-range, wireless communications method for linking cellphones,
PDAs, computers, and some other peripherals up to distances of 30 feet.
TRUE
Difficulty: Easy
110. (p. 355-356) A denial-of-service attack uses a virus to crash your computer.
FALSE
Difficulty: Medium
6-62
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
111. (p. 354) Worms, viruses, and Trojan horse are all malware.
TRUE
Difficulty: Easy
112. (p. 356) A Trojan horse pretends to be a useful program, such as a game or a screen saver,
but it carries a virus that replicates in your computer over and over until your computer
crashes.
FALSE
Difficulty: Medium
113. (p. 355-356) A virus is a "deviant" program that is stored on a computer hard drive and can
cause unexpected and undesirable effects.
TRUE
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
6-63
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
116. (p. 359) Sneakers are people who gain unauthorized access to computer or
telecommunications systems, often just for the challenge of it.
FALSE
Difficulty: Easy
117. (p. 360) People who illegally break into computers for malicious purposes to obtain
information for financial gain, shut down hardware, pirate software, or alter or destroy data
are known as hackers.
FALSE
Difficulty: Easy
118. (p. 361) If you have more than one computer linked to the Internet by a cable modem, you
need a software firewall to protect your system.
FALSE
Difficulty: Medium
119. (p. 362) Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
TRUE
Difficulty: Easy
120. (p. 362-363) There are two basic types of data encryption.
TRUE
Difficulty: Medium
6-64
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
121. (p. 362-363) Two kinds of secret keys are used in public key encryption.
TRUE
Difficulty: Medium
122. (p. 362-363) In public key encryption, only the receiver of an encrypted message knows the
private key needed to decrypt the message.
TRUE
Difficulty: Medium
123. (p. 313) Communications signals represented in a binary electronic format are ________
signals.
digital
Difficulty: Easy
124. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are ________ signals.
analog
Difficulty: Easy
125. (p. 315-316) So they can be sent over a telephone line, analog signals are converted into
digital signals, and then back again, by using ________.
modems
Difficulty: Easy
6-65
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
126. (p. 318-319) The text lists six benefits of networks: ________, ________, ________,
________, ________, and ________.
Difficulty: Hard
127. (p. 319) Four disadvantages of networks are ________, ________, ________, and
________.
Difficulty: Hard
128. (p. 320-321) The text lists seven types of networks: ________, ________, ________,
________, _________, ________, and ________.
wide area network, metropolitan area network, local area net work, home area network,
personal area network, home automation network
Difficulty: Hard
6-66
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Difficulty: Medium
130. (p. 324) Private networks that use a public network, usually the Internet, to connect remote
sites are called ________.
virtual private networks (VPNs)
Difficulty: Medium
131. (p. 325) An intranet that allows access to selected outside users is a(n) ________.
extranet
Difficulty: Medium
132. (p. 325) A set of conventions that govern how data is exchanged between devices on a
network is known as a communications ________.
protocol
Difficulty: Easy
133. (p. 326) Electronic messages are sent as ________, fixed-length blocks of data for
transmission.
packets
Difficulty: Medium
6-67
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
134. (p. 327) A _________ is a network that connects computers to a network; data can be sent
in both directions at the same time.
switch
Difficulty: Medium
135. (p. 328) A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
bridge; gateway
Difficulty: Medium
136. (p. 328) ________ are physical devices that join multiple wired and/or wireless networks;
their primary job is to provide connectivity.
Routers
Difficulty: Easy
137. (p. 329) A network can be laid out in different ways. The layout, or shape, is called a
________.
topology
Difficulty: Easy
138. (p. 329) The ________ consists of the main "highway" that connects all computer networks
in an organization.
backbone
Difficulty: Easy
6-68
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
139. (p. 329) The system software that manages the activity of a network is called the
________.
network operating system (NOS)
Difficulty: Medium
140. (p. 329) A computer sends and receives messages over a cable network using a ________,
which is inserted in an expansion slot on the motherboard.
network interface card (NIC)
Difficulty: Medium
141. (p. 330) A ________ network topology is one in which all microcomputers and other
devices are connected in a continuous loop.
ring
Difficulty: Easy
142. (p. 330) A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
star
Difficulty: Easy
143. (p. 331) The Internet uses the ________ network topology.
mesh
Difficulty: Medium
6-69
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
144. (p. 331) In small LANs, messages may bump into one another. The most popular protocol,
or technology, which uses cabling and special ports on microcomputers, that prevents
collisions is ________. It can be used with almost any kind of computer and describes how
data can be sent.
Ethernet
Difficulty: Medium
145. (p. 333) Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
twisted-pair wire
Difficulty: Easy
146. (p. 334) Wired communications media include three main types. Insulated copper wire
wrapped in a solid or braided shield and then an external cover is called ________ cable.
coaxial ("coax")
Difficulty: Medium
147. (p. 334) Wired communications media include three main types. The kind used for
transmitting pulses of light is ________.
fiber-optic cable
Difficulty: Easy
148. (p. 335) HomePlug technology is a wired communications standard that allows users to
connect equipment within the home using the house's own ________ wiring.
electrical
Difficulty: Medium
6-70
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
149. (p. 336) Telecommuting means using a computer and networks to work from ________;
telework means working from ________.
home; anywhere
Difficulty: Medium
150. (p. 335-337) The _________ is the basis for ALL telecommunications signals, both wired
and wireless, and the _________ is the part that carries most communications signals.
electromagnetic spectrum of radiation; radio-frequency (RF) spectrum
Difficulty: Hard
151. (p. 337) The range of frequencies that a transmission medium can carry in a given period of
time is called its ________.
bandwidth
Difficulty: Medium
152. (p. 337) The ________ a transmission medium's bandwidth, the more frequencies it can use
to transmit data and the faster it is.
wider
Difficulty: Easy
153. (p. 337-338) A transmission medium's speed is usually measured in ________ or ________.
megabits per second; gigabits per second
Difficulty: Medium
6-71
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
154. (p. 339) The text covers five types of wireless communications media: ________,
________, ________, _________, and ________.
Difficulty: Hard
155. (p. 339) Infrared and microwave transmission signals cannot work around obstacles or
travel in curved lines, so they are called _________.
line-of-sight
Difficulty: Medium
156. (p. 341) The highest level that a satellite can occupy is the ________ earth orbit.
geostationary (GEO)
Difficulty: Medium
157. (p. 342) Global Positioning Systems use ________ to continuously transmit signals to
identify earth locations.
satellites
Difficulty: Easy
6-72
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
158. (p. 342) The Global Positioning System is an example of a ________-way long-distance
communications system.
one
Difficulty: Medium
159. (p. 345) Simple one-way radio receivers that receive data (but not voice messages) are
called ________.
pagers
Difficulty: Easy
160. (p. 346-348) 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
analog; digital
Difficulty: Easy
161. (p. 351) Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping
portable computers and handheld wireless devices to communicate at high speeds and share
Internet connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi
version?
n (after b, a, and g)
Difficulty: Medium
162. (p. 352) The short-range, wireless digital standard aimed at linking hand-held devices up to
33 feet apart is called ________.
Bluetooth
Difficulty: Easy
6-73
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
163. (p. 353-354) The three short-range wireless standards used in home automation networks, for
linking switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
Z-Wave
Difficulty: Medium
164. (p. 354) Worms, viruses, and Trojan horses are all types of programs called ________.
malware
Difficulty: Easy
165. (p. 356) A(n) ________ is a program that copies itself repeatedly into a computer's memory
or onto a disk drive and that can cause the computer to crash.
worm
Difficulty: Easy
166. (p. 355-356) A(n) ________ is a "deviant" program that attaches itself to a program or file
and can cause unexpected and undesirable effects, such as destroying or corrupting data.
virus
Difficulty: Easy
167. (p. 356) A ________ is a program that pretends to be a useful program, usually free, such as
a game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
Trojan horse
Difficulty: Easy
6-74
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
168. (p. 358) A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
botmaster, zombies
Difficulty: Medium
169. (p. 358) Malware can be spread by using a(n) ________ disk, flash drive, CD; opening
unknown email _________; clicking on ________ websites; and/or through contaminated Wi-
Fi hot spots.
infected; attachments; infiltrated (or infected)
Difficulty: Hard
170. (p. 360) People who illegally break into computers for malicious purposes are known as
________.
crackers
Difficulty: Easy
171. (p. 360 ff.) The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.
Difficulty: Hard
6-75
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
172. (p. 360) ________ software can be used to scan a computer's hard disk, CDs, and main
memory to detect viruses.
Antivirus
Difficulty: Easy
173. (p. 361) A system of hardware and/or software that protects a computer or network from
intruders is called a ________.
firewall
Difficulty: Easy
174. (p. 361-362) Five types of biometric authentication are ________, ________, ________,
_________, and _________.
Difficulty: Hard
175. (p. 362) The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
encryption
Difficulty: Easy
6-76
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
176. (p. 362) A message sent in its original undisguised, readable form is ________.
plain text
Difficulty: Medium
177. (p. 362) Message encryption involves converting plain text to ________.
cybertext
Difficulty: Medium
Essay Questions
178. (p. 314) How do analog and digital devices interpret electrical signals?
Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of electrical/light
pulses represented in a binary way (on or off).
Difficulty: Medium
Difficulty: Easy
6-77
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
180. (p. 318-319) List four advantages and four disadvantages of networks.
Difficulty: Hard
181. (p. 320-322) What are the main differences between a WAN, a MAN, and a LAN?
A wide area network (WAN) covers a wide geographic area, such as a country or, in the case
of the Internet, the world. A metropolitan area network (MAN) covers a city or a suburb. A
local area network (LAN) covers a limited geographic area, such as one office, one building,
or a small group of buildings, such as on a college campus.
Difficulty: Medium
6-78
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
182. (p. 323-324) What is the difference between a client/server network and a peer-to-peer
network?
A client/server network consists of clients, which are microcomputers that request data, and
servers, which are central computers used to supply data. In the client/server scheme, central
servers handle all security and file transactions; they are powerful microcomputers that also
manage shared devices. They may run server software for applications such as email and web
browsing, or they may just host a database or be a file server or other kind of server; different
servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to- peer networks, which are relatively
inexpensive to set up, each machine shares its own resources and handles its own security.
Every computer can share files and peripherals with all other computers on the network, given
that all are granted access privileges. Peer-to-peer networks are less expensive than
client/server networks and work effectively for up to 25 computers. Beyond that, they slow
down under heavy use. They are appropriate for small networks, such as small businesses and
home networks.
Difficulty: Medium
6-79
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2, p. 63)
to break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet-often using different (and most expedient) routes, at different
speeds, and sandwiched in between packets from other messages. Once the packets arrive at
their destination, the receiving computer reassembles them (called packet switching) into
proper sequence to complete the message.
Most modern Wide Area Network (WAN) protocols are based on packet switching
technologies. In contrast, normal telephone service is based on a circuit-switching technology,
in which a dedicated line is allocated for transmission between two parties. Circuit-switching
is ideal when data must be transmitted quickly and must arrive in the same order in which it's
sent. This is the case with most real-time data, such as live audio and video. Packet switching
is more efficient and robust for data that can withstand some delays in transmission, such as
email messages and web pages
Difficulty: Hard
184. (p. 331) Describe the network topology used by the Internet.
In a mesh network topology, messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to any individual
computer to create a mesh network. (Wireless networks are often implemented as a mesh.) In
the previous topologies, star and bus, messages are usually broadcast to every computer,
especially in bus topology. In the ring topology, messages can travel in only one direction-
clockwise or counterclockwise. The Internet employs the mesh topology, and the message,
with the help of routers, finds its route for its destination.
Difficulty: Medium
6-80
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Narrowband, also known as voiceband, is used for regular telephone communications and is
usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data and
high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL, cable,
satellite, T1, etc. are broadband.
Difficulty: Hard
186. (p. 342-343) What are some of the uses and limitations of GPS?
Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones on;
locating stolen cars; orienting hikers / locating lost hikers; aiding in surveying; monitoring
dangerous geological sites, such as volcanoes; finding lost pets; geocaching; getting map
directions on computers and in cars; determining E911 locations of people making 911 calls
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911 locations
are not always accurate; tracking cellphone users could violate privacy
Difficulty: Medium
Difficulty: Hard
6-81
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Wireless USB (WUSB) has a typical range of 32 feet and a maximum data rate of 110-480
megabits per second. Wireless USB is used in game controllers, printers, scanners, digital
cameras, MP3/MP4 players, hard disks, and flash drives. With more than 2 billion legacy
wired USB connections in the world today, USB is the de facto standard in the personal
computing industry. Now these fast connections are available in the wireless world, with the
introduction of Wireless USB. Wireless USB is the new wireless extension to USB that
combines the speed and security of wired technology with the ease of use of wireless
technology. Wireless USB supports robust high-speed wireless connectivity by utilizing the
common WiMedia MB-OFDM Ultra-wideband (UWB) radio platform as developed by the
WiMedia Alliance. Wireless USB will preserve the functionality of wired USB while also
unwiring the cable connection and providing enhanced support for streaming media devices
and peripherals.
Difficulty: Hard
189. (p. 358) What are four ways in which viruses and worms get passed?
Four ways in which viruses and worms get passed are these:
1. by infected disks or flash drives
2. by opening unknown email attachments
3. by clicking on infiltrated (infected) websites
4. through infiltrated Wi-Fi hot spots
Difficulty: Medium
6-82
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
190. (p. 359) Name at least five ways to minimize virus attacks.
Difficulty: Medium
191. (p. 364) List at least five rules for creating good passwords.
Difficulty: Medium
6-83