100% found this document useful (22 votes)
133 views83 pages

Using Information Technology 10th Edition Williams Test Bank Download

Test Bank

Uploaded by

Yong Haas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (22 votes)
133 views83 pages

Using Information Technology 10th Edition Williams Test Bank Download

Test Bank

Uploaded by

Yong Haas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

Ch 006: Communications, Networks, and Safeguards The Wired and Wireless

World

Using Information
Technology 10th Edition
Williams Test Bank
Full download at link:

Test Bank: https://testbankpack.com/


Solution Manual: https://testbankpack.com/

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.


A. continuous
B. digital
C. sequential
D. analog

2. Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

3. Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog

6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

7. A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

8. A network that covers a wide geographical area is called a ________.


A. LAN
B. WAN
C. MAN
D. HAN

9. A network that covers a city or a suburb is called a(n) ________.


A. WAN
B. LAN
C. MAN
D. Internet

6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

14. A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet

16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node

17. Any device that is attached to a network is referred to as a ________.


A. server
B. host
C. node
D. router

18. A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge

6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

23. Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

30. A type of wired communications technology used to connect equipment in a home


network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

32. The ________ is the basis for ALL telecommunications signals.


A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

35. Which of the following is NOT a type of wireless communications media?


A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

36. What form of wireless transmission sends data to an AM or FM receiver?


A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

37. Which of these types of wireless transmission is limited to line-of-sight communications?


A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

38. Transmitting a signal from a ground station to a satellite is called ________.


A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

42. Broadband technology (wireless digital services) is also referred to as ________-


generation wireless services.
A. first
B. second
C. third
D. fourth

43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

47. Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

50. Which of the following is NOT a way to spread a virus?


A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

51. A person who gains unauthorized access to computer or telecommunications systems


without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics

57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

58. Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

60. RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

True / False Questions

61. Analog refers to communications signals represented in a binary format.


True False

62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False

63. A thermometer and a speedometer are examples of analog devices.


True False

64. Telephones have always been digital devices.


True False

6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False

66. "Modem" is short for modulate/demodulate.


True False

67. Capturing music digitally means that one has an exact duplicate of the music.
True False

68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False

69. The Internet is a WAN.


True False

70. A LAN is a type of network that covers a wide geographical area.


True False

71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False

72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False

6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False

74. "File server" and "database server" are different names for the same type of server.
True False

75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False

76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False

77. Routers join multiple wired and/or wireless networks.


True False

78. A gateway is an interface device permitting communication between similar networks.


True False

79. An interface device used to connect the same types of networks is called a node.
True False

80. The backbone is the main communications route in a bus network topology.
True False

6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False

82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False

83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False

84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False

85. Most microcomputers come with Ethernet capability.


True False

86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False

87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False

88. The two general classes of bandwidth are long and short.
True False

6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
89. The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
True False

90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False

91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False

92. Infrared transmission is a type of low-frequency wireless transmission that is short-range


and line-of-sight.
True False

93. GPS satellites use medium-Earth-orbits.


True False

94. Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.


True False

95. Analog cellphones were 1G phones.


True False

6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False

97. Communications satellites are microwave relay stations in orbit around the earth.
True False

98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False

99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False

100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False

101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False

102. Analog cellphones are 2G (second-generation) phones.


True False

103. Cellphones are basically two-way radios.


True False

6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
104. 2G and 3G cellphones are digital, not analog.
True False

105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False

106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False

107. The latest version of Wi-Fi (IEEE 802.11 standard) is version a.


True False

108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False

109. Bluetooth is a short-range, wireless communications method for linking cellphones,


PDAs, computers, and some other peripherals up to distances of 30 feet.
True False

110. A denial-of-service attack uses a virus to crash your computer.


True False

111. Worms, viruses, and Trojan horse are all malware.


True False

6-20
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False

113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False

114. A virus is capable of destroying or corrupting data.


True False

115. Cellphones do not get infected by malware.


True False

116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False

117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False

118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False

6-21
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
119. Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
True False

120. There are two basic types of data encryption.


True False

121. Two kinds of secret keys are used in public key encryption.
True False

122. In public key encryption, only the receiver of an encrypted message knows the private
key needed to decrypt the message.
True False

Fill in the Blank Questions

123. Communications signals represented in a binary electronic format are ________ signals.
________________________________________

124. Signals such as sound and temperature, which continuously vary in strength and quality,
are ________ signals.
________________________________________

125. So they can be sent over a telephone line, analog signals are converted into digital
signals, and then back again, by using ________.
________________________________________

Short Answer Questions

6-22
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
126. The text lists six benefits of networks: ________, ________, ________, ________,
________, and ________.

127. Four disadvantages of networks are ________, ________, ________, and ________.

128. The text lists seven types of networks: ________, ________, ________, ________,
_________, ________, and ________.

Fill in the Blank Questions

129. A peer-to-peer (P2P) network operates without relying on a ________.


________________________________________

130. Private networks that use a public network, usually the Internet, to connect remote sites
are called ________.
________________________________________

6-23
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
131. An intranet that allows access to selected outside users is a(n) ________.
________________________________________

132. A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________

133. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________

134. A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________

135. A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
________________________________________

136. ________ are physical devices that join multiple wired and/or wireless networks; their
primary job is to provide connectivity.
________________________________________

137. A network can be laid out in different ways. The layout, or shape, is called a ________.
________________________________________

6-24
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
138. The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________

139. The system software that manages the activity of a network is called the ________.
________________________________________

140. A computer sends and receives messages over a cable network using a ________, which
is inserted in an expansion slot on the motherboard.
________________________________________

141. A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________

142. A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
________________________________________

143. The Internet uses the ________ network topology.


________________________________________

144. In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and describes how data can be
sent.
________________________________________

6-25
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
145. Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
________________________________________

146. Wired communications media include three main types. Insulated copper wire wrapped
in a solid or braided shield and then an external cover is called ________ cable.
________________________________________

147. Wired communications media include three main types. The kind used for transmitting
pulses of light is ________.
________________________________________

148. HomePlug technology is a wired communications standard that allows users to connect
equipment within the home using the house's own ________ wiring.
________________________________________

149. Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________

150. The _________ is the basis for ALL telecommunications signals, both wired and
wireless, and the _________ is the part that carries most communications signals.
________________________________________

151. The range of frequencies that a transmission medium can carry in a given period of time
is called its ________.
________________________________________

6-26
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
152. The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________

153. A transmission medium's speed is usually measured in ________ or ________.


________________________________________

Short Answer Questions

154. The text covers five types of wireless communications media: ________, ________,
________, _________, and ________.

Fill in the Blank Questions

155. Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________

156. The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________

157. Global Positioning Systems use ________ to continuously transmit signals to identify
earth locations.
________________________________________

6-27
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
158. The Global Positioning System is an example of a ________-way long-distance
communications system.
________________________________________

159. Simple one-way radio receivers that receive data (but not voice messages) are called
________.
________________________________________

160. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________

161. Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping portable
computers and handheld wireless devices to communicate at high speeds and share Internet
connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi version?
________________________________________

162. The short-range, wireless digital standard aimed at linking hand-held devices up to 33
feet apart is called ________.
________________________________________

163. The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________

164. Worms, viruses, and Trojan horses are all types of programs called ________.
________________________________________

6-28
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
165. A(n) ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive and that can cause the computer to crash.
________________________________________

166. A(n) ________ is a "deviant" program that attaches itself to a program or file and can
cause unexpected and undesirable effects, such as destroying or corrupting data.
________________________________________

167. A ________ is a program that pretends to be a useful program, usually free, such as a
game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
________________________________________

168. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
________________________________________

169. Malware can be spread by using a(n) ________ disk, flash drive, CD; opening unknown
email _________; clicking on ________ websites; and/or through contaminated Wi-Fi hot
spots.
________________________________________

170. People who illegally break into computers for malicious purposes are known as
________.
________________________________________

Short Answer Questions

6-29
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
171. The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.

Fill in the Blank Questions

172. ________ software can be used to scan a computer's hard disk, CDs, and main memory
to detect viruses.
________________________________________

173. A system of hardware and/or software that protects a computer or network from intruders
is called a ________.
________________________________________

Short Answer Questions

174. Five types of biometric authentication are ________, ________, ________, _________,
and _________.

6-30
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

Fill in the Blank Questions

175. The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
________________________________________

176. A message sent in its original undisguised, readable form is ________.


________________________________________

177. Message encryption involves converting plain text to ________.


________________________________________

Essay Questions

178. How do analog and digital devices interpret electrical signals?

179. What is the primary purpose of the modem?

6-31
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
180. List four advantages and four disadvantages of networks.

181. What are the main differences between a WAN, a MAN, and a LAN?

182. What is the difference between a client/server network and a peer-to-peer network?

183. Describe what a packet is and what it does.

6-32
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
184. Describe the network topology used by the Internet.

185. Distinguish between narrowband and broadband.

186. What are some of the uses and limitations of GPS?

187. Basically, how does Wi-Fi work?

6-33
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
188. What is wireless USB?

189. What are four ways in which viruses and worms get passed?

190. Name at least five ways to minimize virus attacks.

191. List at least five rules for creating good passwords.

6-34
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Multiple Choice Questions

1. (p. 313) Communications signals represented in a binary format are said to be ________.
A. continuous
B. digital
C. sequential
D. analog

Difficulty: Easy

2. (p. 313) Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

Difficulty: Easy

3. (p. 313-314) Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

Difficulty: Easy

6-35
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

4. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be
A. spontaneous
B. digital
C. sequential
D. analog

Difficulty: Easy

5. (p. 315-316) The ________ is a device that converts digital computer signals into analog signals
so that they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

Difficulty: Easy

6. (p. 316) A person sending a document over a phone line by converting digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

Difficulty: Easy

6-36
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

7. (p. 317) A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

Difficulty: Easy

8. (p. 320) A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN

Difficulty: Easy

9. (p. 320) A network that covers a city or a suburb is called a(n) ________.
A. WAN
B. LAN
C. MAN
D. Internet

Difficulty: Easy

10. (p. 322) Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

Difficulty: Medium

6-37
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

11. (p. 322) A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

Difficulty: Easy

12. (p. 323) A computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

Difficulty: Medium

13. (p. 324-325) If an organization's internal private network uses the same infrastructure and
standards of the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

Difficulty: Medium

14. (p. 325-326) A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

Difficulty: Medium

6-38
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

15. (p. 320) A ________ is the set of rules that govern the exchange of data between hardware
and/or software components in a communications network.
A. host
B. protocol
C. database
D. packet

Difficulty: Medium

16. (p. 326) A mainframe computer that controls a large network is called the ________
computer.
A. slave
B. host
C. client
D. node

Difficulty: Easy

17. (p. 326) Any device that is attached to a network is referred to as a ________.
A. server
B. host
C. node
D. router

Difficulty: Easy

18. (p. 326) A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

Difficulty: Easy

6-39
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

19. (p. 327) A common connection device that connects computers to a network is called a
________.
A. router
B. gateway
C. switch
D. bridge

Difficulty: Easy

20. (p. 328) To create larger networks, a bridge connects the same types of networks, and a
________ connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

Difficulty: Hard

21. (p. 328) A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

Difficulty: Medium

6-40
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

22. (p. 329) In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

Difficulty: Medium

23. (p. 329) Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

Difficulty: Easy

24. (p. 330) In the ________ network topology, communications devices are connected to a
single cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

6-41
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

25. (p. 331) What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

26. (p. 331) What kind of topology (layout) is used by a network that connects all its computers
and communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

27. (p. 332) ________ is the most common and most widely used LAN technology; it can be
used with almost any kind of computer; most microcomputers come with a port for this type
of network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

Difficulty: Medium

6-42
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

28. (p. 333) A communications medium is a channel; there are three types of wired
communications media. The one consisting of two strands of insulated copper wire, used by
tradition telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Difficulty: Medium

29. (p. 334) What wired channel, commonly used for cable TV, consists of an insulated copper
wire wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

Difficulty: Medium

30. (p. 335) A type of wired communications technology used to connect equipment in a home
network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

Difficulty: Medium

6-43
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

31. (p. 334) What wired communications medium consists of dozens or hundreds of thin strands
of glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Difficulty: Easy

32. (p. 335-336) The ________ is the basis for ALL telecommunications signals.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Difficulty: Medium

33. (p. 337) The ________ is the range of frequencies that a transmission medium (channel) can
carry in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Difficulty: Medium

6-44
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

34. (p. 339) What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

Difficulty: Hard

35. (p. 339) Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

Difficulty: Medium

36. (p. 339) What form of wireless transmission sends data to an AM or FM receiver?
A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

Difficulty: Medium

37. (p. 339) Which of these types of wireless transmission is limited to line-of-sight
communications?
A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

Difficulty: Medium

6-45
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

38. (p. 340) Transmitting a signal from a ground station to a satellite is called ________.
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

Difficulty: Easy

39. (p. 341) The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

Difficulty: Medium

40. (p. 342) GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals
used to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

Difficulty: Hard

41. (p. 347-348) Which of the following is NOT a type of long-distance wireless two-way
communications device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

Difficulty: Medium

6-46
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

42. (p. 347) Broadband technology (wireless digital services) is also referred to as ________-
generation wireless services.
A. first
B. second
C. third
D. fourth

Difficulty: Easy

43. (p. 349) What short-distance wireless standard is used to link portable computers and
handheld wireless devices so they may communicate at high speeds at distances of 100-228
feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

Difficulty: Medium

44. (p. 352) What short-distance wireless standard is used to link cell phones, PDAs, and
computers at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

Difficulty: Medium

6-47
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

45. (p. 355) A ________ attack disables a computer system or network by making so many
requests of it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

Difficulty: Medium

46. (p. 355) A ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

Difficulty: Easy

47. (p. 355-357) Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

Difficulty: Medium

6-48
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

48. (p. 358) Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

Difficulty: Medium

49. (p. 358) A botmaster uses malware to hijack hundreds or thousands of computers and
controls them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

Difficulty: Medium

50. (p. 358) Which of the following is NOT a way to spread a virus?
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

Difficulty: Medium

6-49
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

51. (p. 359) A person who gains unauthorized access to computer or telecommunications
systems without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

Difficulty: Easy

52. (p. 360) A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

Difficulty: Easy

53. (p. 359) Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

Difficulty: Medium

6-50
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

54. (p. 361) What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

Difficulty: Easy

55. (p. 361) What is the science, often used in computer security systems, of measuring
individual body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

Difficulty: Easy

56. (p. 361) Fingerprint scanners, face-recognition systems, and iris-recognition systems are
based on ________.
A. encryption
B. decryption
C. password protection
D. biometrics

Difficulty: Easy

6-51
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

57. (p. 362) What is the process of altering readable data (plain text) into unreadable form to
prevent unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

Difficulty: Easy

58. (p. 362-363) Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

Difficulty: Hard

59. (p. 362-363) ____________ encryption uses the same secret key to encrypt and decrypt a
message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

Difficulty: Medium

60. (p. 363) RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

Difficulty: Hard

6-52
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

True / False Questions

61. (p. 313-314) Analog refers to communications signals represented in a binary format.
FALSE

Difficulty: Easy

62. (p. 313-314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be digital.
FALSE

Difficulty: Easy

63. (p. 314) A thermometer and a speedometer are examples of analog devices.
TRUE

Difficulty: Easy

64. (p. 314) Telephones have always been digital devices.


FALSE

Difficulty: Easy

65. (p. 316) A modem converts digital signals into analog signals so they can be sent over a
telephone line.
TRUE

Difficulty: Easy

6-53
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

66. (p. 316) "Modem" is short for modulate/demodulate.


TRUE

Difficulty: Easy

67. (p. 317) Capturing music digitally means that one has an exact duplicate of the music.
FALSE

Difficulty: Hard

68. (p. 317) A network is a system of interconnected computers and communications devices
that can communicate and share resources.
TRUE

Difficulty: Easy

69. (p. 320) The Internet is a WAN.


TRUE

Difficulty: Medium

70. (p. 320-321) A LAN is a type of network that covers a wide geographical area.
FALSE

Difficulty: Easy

6-54
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

71. (p. 322) A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
TRUE

Difficulty: Easy

72. (p. 323-324) Client/server networks and peer-to-peer networks are the same except that the
first type of network uses a mainframe and the second type uses only microcomputers.
FALSE

Difficulty: Medium

73. (p. 323) The computer that acts like a disk drive, storing the programs and data files shared
by users on a LAN, is called a file server.
TRUE

Difficulty: Easy

74. (p. 323) "File server" and "database server" are different names for the same type of server.
FALSE

Difficulty: Easy

75. (p. 325-326) Virtual private networks (VPNs) are private networks that use a public network
(usually the Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE

Difficulty: Easy

6-55
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

76. (p. 326-327) In a network, communications protocols specify the type of electrical
connections, the timing of message exchanges, and error-detection techniques.
TRUE

Difficulty: Medium

77. (p. 328) Routers join multiple wired and/or wireless networks.
TRUE

Difficulty: Easy

78. (p. 328) A gateway is an interface device permitting communication between similar
networks.
FALSE

Difficulty: Medium

79. (p. 328) An interface device used to connect the same types of networks is called a node.
FALSE

Difficulty: Medium

80. (p. 329) The backbone is the main communications route in a bus network topology.
FALSE

Difficulty: Medium

6-56
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

81. (p. 331) In a bus network, all computers and communications devices are connected in a
continuous loop.
FALSE

Difficulty: Easy

82. (p. 333) Traditional landline telephone systems use twisted-pair wire as their
communications medium.
TRUE

Difficulty: Easy

83. (p. 334) A cable that is made up of dozens of thin strands of glass and transmits pulsating
beams of light is called a coaxial cable.
FALSE

Difficulty: Easy

84. (p. 335) A wired communications standard that allows users to send data over a home's
existing electrical (AC) power lines is called HomePlug technology.
TRUE

Difficulty: Easy

85. (p. 335) Most microcomputers come with Ethernet capability.


TRUE

Difficulty: Easy

6-57
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

86. (p. 336) All wired and wireless communications media use the electromagnetic spectrum of
radiation.
TRUE

Difficulty: Easy

87. (p. 337) The smaller the bandwidth of a medium, the more frequencies it can use to transmit
data.
FALSE

Difficulty: Easy

88. (p. 337) The two general classes of bandwidth are long and short.
FALSE

Difficulty: Easy

89. (p. 337) The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
TRUE

Difficulty: Easy

90. (p. 337) The frequency of an electromagnetic wave is the number of times the wave repeats,
or makes a cycle, in a second.
TRUE

Difficulty: Medium

6-58
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

91. (p. 337-338) Both digital narrowband and broadband transmission speeds are measured in
megabits or gigabits per second.
TRUE

Difficulty: Medium

92. (p. 339) Infrared transmission is a type of low-frequency wireless transmission that is short-
range and line-of-sight.
TRUE

Difficulty: Medium

93. (p. 341) GPS satellites use medium-Earth-orbits.


TRUE

Difficulty: Easy

94. (p. 340, 352) Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.
TRUE

Difficulty: Easy

95. (p. 346) Analog cellphones were 1G phones.


TRUE

Difficulty: Easy

6-59
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

96. (p. 340) Satellite transmission uses in-orbit satellites and earth stations. Transmitting from
the ground to the satellite is called downlinking, and transmitting from the satellite to the
ground station called uplinking.
FALSE

Difficulty: Easy

97. (p. 340) Communications satellites are microwave relay stations in orbit around the earth.
TRUE

Difficulty: Easy

98. (p. 341) Satellite orbits are at three levels: GEO, MEO, and LEO.
TRUE

Difficulty: Easy

99. (p. 341) A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
FALSE

Difficulty: Hard

100. (p. 342) GPS uses MEO satellites that continuously transmit timed radio signals used to
identify earth locations.
TRUE

Difficulty: Easy

6-60
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

101. (p. 342-343) Because of the excellence of satellite technology, GPS location IDs are 100%
accurate.
FALSE

Difficulty: Easy

102. (p. 346-347) Analog cellphones are 2G (second-generation) phones.


FALSE

Difficulty: Easy

103. (p. 346) Cellphones are basically two-way radios.


TRUE

Difficulty: Easy

104. (p. 347) 2G and 3G cellphones are digital, not analog.


TRUE

Difficulty: Easy

105. (p. 349) The short-range, wireless communications method aimed at linking hand-held
devices at high speeds and at distances of 100-228 feet is called Wi-Fi.
TRUE

Difficulty: Easy

6-61
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

106. (p. 349-350) A Wi-Fi enabled laptop computer accesses the available network (say, at an
airport) through an access point, which is connected to a land-based Internet connection.
TRUE

Difficulty: Easy

107. (p. 349-350) The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
FALSE

Difficulty: Medium

108. (p. 351-352) Wi-Fi connections are always secure; no one can steal your data when you are
online.
FALSE

Difficulty: Easy

109. (p. 352) Bluetooth is a short-range, wireless communications method for linking cellphones,
PDAs, computers, and some other peripherals up to distances of 30 feet.
TRUE

Difficulty: Easy

110. (p. 355-356) A denial-of-service attack uses a virus to crash your computer.
FALSE

Difficulty: Medium

6-62
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

111. (p. 354) Worms, viruses, and Trojan horse are all malware.
TRUE

Difficulty: Easy

112. (p. 356) A Trojan horse pretends to be a useful program, such as a game or a screen saver,
but it carries a virus that replicates in your computer over and over until your computer
crashes.
FALSE

Difficulty: Medium

113. (p. 355-356) A virus is a "deviant" program that is stored on a computer hard drive and can
cause unexpected and undesirable effects.
TRUE

Difficulty: Easy

114. (p. 355-356) A virus is capable of destroying or corrupting data.


TRUE

Difficulty: Easy

115. (p. 359) Cellphones do not get infected by malware.


FALSE

Difficulty: Easy

6-63
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

116. (p. 359) Sneakers are people who gain unauthorized access to computer or
telecommunications systems, often just for the challenge of it.
FALSE

Difficulty: Easy

117. (p. 360) People who illegally break into computers for malicious purposes to obtain
information for financial gain, shut down hardware, pirate software, or alter or destroy data
are known as hackers.
FALSE

Difficulty: Easy

118. (p. 361) If you have more than one computer linked to the Internet by a cable modem, you
need a software firewall to protect your system.
FALSE

Difficulty: Medium

119. (p. 362) Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
TRUE

Difficulty: Easy

120. (p. 362-363) There are two basic types of data encryption.
TRUE

Difficulty: Medium

6-64
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

121. (p. 362-363) Two kinds of secret keys are used in public key encryption.
TRUE

Difficulty: Medium

122. (p. 362-363) In public key encryption, only the receiver of an encrypted message knows the
private key needed to decrypt the message.
TRUE

Difficulty: Medium

Fill in the Blank Questions

123. (p. 313) Communications signals represented in a binary electronic format are ________
signals.
digital

Difficulty: Easy

124. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are ________ signals.
analog

Difficulty: Easy

125. (p. 315-316) So they can be sent over a telephone line, analog signals are converted into
digital signals, and then back again, by using ________.
modems

Difficulty: Easy

6-65
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Short Answer Questions

126. (p. 318-319) The text lists six benefits of networks: ________, ________, ________,
________, ________, and ________.

sharing of peripheral devices, sharing of programs and data, better communications,


centralized communications, security of information, access to databases

Difficulty: Hard

127. (p. 319) Four disadvantages of networks are ________, ________, ________, and
________.

expense, security issues (breaking of security precautions), rapid spread of viruses,


dependency on the mail file server

Difficulty: Hard

128. (p. 320-321) The text lists seven types of networks: ________, ________, ________,
________, _________, ________, and ________.

wide area network, metropolitan area network, local area net work, home area network,
personal area network, home automation network

Difficulty: Hard

6-66
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Fill in the Blank Questions


129. (p. 318) A peer-to-peer (P2P) network operates without relying on a ________.
server

Difficulty: Medium

130. (p. 324) Private networks that use a public network, usually the Internet, to connect remote
sites are called ________.
virtual private networks (VPNs)

Difficulty: Medium

131. (p. 325) An intranet that allows access to selected outside users is a(n) ________.
extranet

Difficulty: Medium

132. (p. 325) A set of conventions that govern how data is exchanged between devices on a
network is known as a communications ________.
protocol

Difficulty: Easy

133. (p. 326) Electronic messages are sent as ________, fixed-length blocks of data for
transmission.
packets

Difficulty: Medium

6-67
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

134. (p. 327) A _________ is a network that connects computers to a network; data can be sent
in both directions at the same time.
switch

Difficulty: Medium

135. (p. 328) A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
bridge; gateway

Difficulty: Medium

136. (p. 328) ________ are physical devices that join multiple wired and/or wireless networks;
their primary job is to provide connectivity.
Routers

Difficulty: Easy

137. (p. 329) A network can be laid out in different ways. The layout, or shape, is called a
________.
topology

Difficulty: Easy

138. (p. 329) The ________ consists of the main "highway" that connects all computer networks
in an organization.
backbone

Difficulty: Easy

6-68
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

139. (p. 329) The system software that manages the activity of a network is called the
________.
network operating system (NOS)

Difficulty: Medium

140. (p. 329) A computer sends and receives messages over a cable network using a ________,
which is inserted in an expansion slot on the motherboard.
network interface card (NIC)

Difficulty: Medium

141. (p. 330) A ________ network topology is one in which all microcomputers and other
devices are connected in a continuous loop.
ring

Difficulty: Easy

142. (p. 330) A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
star

Difficulty: Easy

143. (p. 331) The Internet uses the ________ network topology.
mesh

Difficulty: Medium

6-69
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

144. (p. 331) In small LANs, messages may bump into one another. The most popular protocol,
or technology, which uses cabling and special ports on microcomputers, that prevents
collisions is ________. It can be used with almost any kind of computer and describes how
data can be sent.
Ethernet

Difficulty: Medium

145. (p. 333) Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
twisted-pair wire

Difficulty: Easy

146. (p. 334) Wired communications media include three main types. Insulated copper wire
wrapped in a solid or braided shield and then an external cover is called ________ cable.
coaxial ("coax")

Difficulty: Medium

147. (p. 334) Wired communications media include three main types. The kind used for
transmitting pulses of light is ________.
fiber-optic cable

Difficulty: Easy

148. (p. 335) HomePlug technology is a wired communications standard that allows users to
connect equipment within the home using the house's own ________ wiring.
electrical

Difficulty: Medium

6-70
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

149. (p. 336) Telecommuting means using a computer and networks to work from ________;
telework means working from ________.
home; anywhere

Difficulty: Medium

150. (p. 335-337) The _________ is the basis for ALL telecommunications signals, both wired
and wireless, and the _________ is the part that carries most communications signals.
electromagnetic spectrum of radiation; radio-frequency (RF) spectrum

Difficulty: Hard

151. (p. 337) The range of frequencies that a transmission medium can carry in a given period of
time is called its ________.
bandwidth

Difficulty: Medium

152. (p. 337) The ________ a transmission medium's bandwidth, the more frequencies it can use
to transmit data and the faster it is.
wider

Difficulty: Easy

153. (p. 337-338) A transmission medium's speed is usually measured in ________ or ________.
megabits per second; gigabits per second

Difficulty: Medium

6-71
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Short Answer Questions

154. (p. 339) The text covers five types of wireless communications media: ________,
________, ________, _________, and ________.

infrared; broadcast radio; cellular radio; microwave radio; communications satellites

Difficulty: Hard

Fill in the Blank Questions

155. (p. 339) Infrared and microwave transmission signals cannot work around obstacles or
travel in curved lines, so they are called _________.
line-of-sight

Difficulty: Medium

156. (p. 341) The highest level that a satellite can occupy is the ________ earth orbit.
geostationary (GEO)

Difficulty: Medium

157. (p. 342) Global Positioning Systems use ________ to continuously transmit signals to
identify earth locations.
satellites

Difficulty: Easy

6-72
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

158. (p. 342) The Global Positioning System is an example of a ________-way long-distance
communications system.
one

Difficulty: Medium

159. (p. 345) Simple one-way radio receivers that receive data (but not voice messages) are
called ________.
pagers

Difficulty: Easy

160. (p. 346-348) 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
analog; digital

Difficulty: Easy

161. (p. 351) Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping
portable computers and handheld wireless devices to communicate at high speeds and share
Internet connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi
version?
n (after b, a, and g)

Difficulty: Medium

162. (p. 352) The short-range, wireless digital standard aimed at linking hand-held devices up to
33 feet apart is called ________.
Bluetooth

Difficulty: Easy

6-73
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

163. (p. 353-354) The three short-range wireless standards used in home automation networks, for
linking switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
Z-Wave

Difficulty: Medium

164. (p. 354) Worms, viruses, and Trojan horses are all types of programs called ________.
malware

Difficulty: Easy

165. (p. 356) A(n) ________ is a program that copies itself repeatedly into a computer's memory
or onto a disk drive and that can cause the computer to crash.
worm

Difficulty: Easy

166. (p. 355-356) A(n) ________ is a "deviant" program that attaches itself to a program or file
and can cause unexpected and undesirable effects, such as destroying or corrupting data.
virus

Difficulty: Easy

167. (p. 356) A ________ is a program that pretends to be a useful program, usually free, such as
a game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
Trojan horse

Difficulty: Easy

6-74
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

168. (p. 358) A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
botmaster, zombies

Difficulty: Medium

169. (p. 358) Malware can be spread by using a(n) ________ disk, flash drive, CD; opening
unknown email _________; clicking on ________ websites; and/or through contaminated Wi-
Fi hot spots.
infected; attachments; infiltrated (or infected)

Difficulty: Hard

170. (p. 360) People who illegally break into computers for malicious purposes are known as
________.
crackers

Difficulty: Easy

Short Answer Questions

171. (p. 360 ff.) The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.

antivirus software; firewalls; passwords; biometric authentification; encryption

Difficulty: Hard

6-75
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Fill in the Blank Questions

172. (p. 360) ________ software can be used to scan a computer's hard disk, CDs, and main
memory to detect viruses.
Antivirus

Difficulty: Easy

173. (p. 361) A system of hardware and/or software that protects a computer or network from
intruders is called a ________.
firewall

Difficulty: Easy

Short Answer Questions

174. (p. 361-362) Five types of biometric authentication are ________, ________, ________,
_________, and _________.

hand-geometry systems, fingerprint scanners, iris-recognition systems, face-recognition


systems, voice-recognition systems

Difficulty: Hard

Fill in the Blank Questions

175. (p. 362) The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
encryption

Difficulty: Easy

6-76
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

176. (p. 362) A message sent in its original undisguised, readable form is ________.
plain text

Difficulty: Medium

177. (p. 362) Message encryption involves converting plain text to ________.
cybertext

Difficulty: Medium

Essay Questions

178. (p. 314) How do analog and digital devices interpret electrical signals?

Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of electrical/light
pulses represented in a binary way (on or off).

Difficulty: Medium

179. (p. 315-316) What is the primary purpose of the modem?

The primary purpose of the modem ("modulate/demodulate") is to change the computer's


digital signals into analog signals and, at the receiving end, analog signals back into digital
signals so that communications can take place between computers using a standard copper-
wire telephone network or other transmission media that can transmit only analog signals.

Difficulty: Easy

6-77
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

180. (p. 318-319) List four advantages and four disadvantages of networks.

Advantages: sharing of peripheral devices, sharing of programs and data, better


communications, centralized communications, establishing security of information, access to
databases Disadvantages: expense, violation of established security measures, rapid spread of
computer viruses, dependency on the main file server

Difficulty: Hard

181. (p. 320-322) What are the main differences between a WAN, a MAN, and a LAN?

A wide area network (WAN) covers a wide geographic area, such as a country or, in the case
of the Internet, the world. A metropolitan area network (MAN) covers a city or a suburb. A
local area network (LAN) covers a limited geographic area, such as one office, one building,
or a small group of buildings, such as on a college campus.

Difficulty: Medium

6-78
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

182. (p. 323-324) What is the difference between a client/server network and a peer-to-peer
network?

A client/server network consists of clients, which are microcomputers that request data, and
servers, which are central computers used to supply data. In the client/server scheme, central
servers handle all security and file transactions; they are powerful microcomputers that also
manage shared devices. They may run server software for applications such as email and web
browsing, or they may just host a database or be a file server or other kind of server; different
servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to- peer networks, which are relatively
inexpensive to set up, each machine shares its own resources and handles its own security.
Every computer can share files and peripherals with all other computers on the network, given
that all are granted access privileges. Peer-to-peer networks are less expensive than
client/server networks and work effectively for up to 25 computers. Beyond that, they slow
down under heavy use. They are appropriate for small networks, such as small businesses and
home networks.

Difficulty: Medium

6-79
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

183. (p. 326) Describe what a packet is and what it does.

Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2, p. 63)
to break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet-often using different (and most expedient) routes, at different
speeds, and sandwiched in between packets from other messages. Once the packets arrive at
their destination, the receiving computer reassembles them (called packet switching) into
proper sequence to complete the message.
Most modern Wide Area Network (WAN) protocols are based on packet switching
technologies. In contrast, normal telephone service is based on a circuit-switching technology,
in which a dedicated line is allocated for transmission between two parties. Circuit-switching
is ideal when data must be transmitted quickly and must arrive in the same order in which it's
sent. This is the case with most real-time data, such as live audio and video. Packet switching
is more efficient and robust for data that can withstand some delays in transmission, such as
email messages and web pages

Difficulty: Hard

184. (p. 331) Describe the network topology used by the Internet.

In a mesh network topology, messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to any individual
computer to create a mesh network. (Wireless networks are often implemented as a mesh.) In
the previous topologies, star and bus, messages are usually broadcast to every computer,
especially in bus topology. In the ring topology, messages can travel in only one direction-
clockwise or counterclockwise. The Internet employs the mesh topology, and the message,
with the help of routers, finds its route for its destination.

Difficulty: Medium

6-80
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

185. (p. 3337-338) Distinguish between narrowband and broadband.

Narrowband, also known as voiceband, is used for regular telephone communications and is
usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data and
high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL, cable,
satellite, T1, etc. are broadband.

Difficulty: Hard

186. (p. 342-343) What are some of the uses and limitations of GPS?

Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones on;
locating stolen cars; orienting hikers / locating lost hikers; aiding in surveying; monitoring
dangerous geological sites, such as volcanoes; finding lost pets; geocaching; getting map
directions on computers and in cars; determining E911 locations of people making 911 calls
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911 locations
are not always accurate; tracking cellphone users could violate privacy

Difficulty: Medium

187. (p. 349-350) Basically, how does Wi-Fi work?

A land-based Internet connection (DSL, cable, satellite, T1 line) is connected to an antenna


(access point). The access point (hotspot) translates the Internet signals into short-range,
wireless radio waves and broadcasts them over an area about the size of a house (distances of
100-228 feet). Anyone within range who has a receiving antenna, usually on a notebook
computer or a 3G/4G cellphone, can pick up the signals. Sometimes the user must enter a
password to access the Wi-Fi signal. The later versions of Wi-Fi (e.g., n) are faster than the
earlier versions (e.g., b, a, g).

Difficulty: Hard

6-81
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

188. (p. 353) What is wireless USB?

Wireless USB (WUSB) has a typical range of 32 feet and a maximum data rate of 110-480
megabits per second. Wireless USB is used in game controllers, printers, scanners, digital
cameras, MP3/MP4 players, hard disks, and flash drives. With more than 2 billion legacy
wired USB connections in the world today, USB is the de facto standard in the personal
computing industry. Now these fast connections are available in the wireless world, with the
introduction of Wireless USB. Wireless USB is the new wireless extension to USB that
combines the speed and security of wired technology with the ease of use of wireless
technology. Wireless USB supports robust high-speed wireless connectivity by utilizing the
common WiMedia MB-OFDM Ultra-wideband (UWB) radio platform as developed by the
WiMedia Alliance. Wireless USB will preserve the functionality of wired USB while also
unwiring the cable connection and providing enhanced support for streaming media devices
and peripherals.

Difficulty: Hard

189. (p. 358) What are four ways in which viruses and worms get passed?

Four ways in which viruses and worms get passed are these:
1. by infected disks or flash drives
2. by opening unknown email attachments
3. by clicking on infiltrated (infected) websites
4. through infiltrated Wi-Fi hot spots

Difficulty: Medium

6-82
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

190. (p. 359) Name at least five ways to minimize virus attacks.

1. Don't open unknown files or email attachments.


2. Delete all spam and email messages from strangers.
3. Use webmail sparingly.
4. Don't start your computer with a CD or flash drive in place.
5. Back up all files regularly on a device separate from your computer or online.
6. Use virus protection software and make sure that the software automatically updates itself
often from the manufacturer's website.
7. Use a firewall-either the one that came with the computer's system software or a firewall
purchased separately.
8. Update your antivirus software and firewall frequently.
9. Use your antivirus and firewall software to scan your computer regularly and
quarantine/destroy any problem "bugs" that turn up on the list.
10. Set your antivirus program to automatically scan all incoming and outgoing email
attachments.
11. Set your firewall to alert you to "dicey" websites.

Difficulty: Medium

191. (p. 364) List at least five rules for creating good passwords.

1. on't tell anyone your username and password.


2. Don't use passwords that can be easily guessed.
3. Avoid any word that appears in the dictionary.
4. Combine letters with numbers and other keyboard characters.
5. Create long passwords.
6. Don't use the same password for multiple sites.
7. Change passwords often.
8. Don't write your passwords down on sticky notes, in a notebook, or tape them under, for
example, your keyboard.
9. Don't carry passwords in your wallet.
10. Create a system for remembering passwords without writing them down.
11. Save all your passwords in a single encrypted file.

Difficulty: Medium

6-83

You might also like