Professional Documents
Culture Documents
Full Technology Now Your Companion To Sam Computer Concepts 1St Edition Corinne Hoisington Solutions Manual Online PDF All Chapter
Full Technology Now Your Companion To Sam Computer Concepts 1St Edition Corinne Hoisington Solutions Manual Online PDF All Chapter
https://testbankdeal.com/product/technology-now-your-companion-
to-sam-computer-concepts-1st-edition-corinne-hoisington-test-
bank/
https://testbankdeal.com/product/technology-now-your-companion-
to-sam-computer-concepts-2nd-edition-corinne-hoisington-
solutions-manual/
https://testbankdeal.com/product/technology-now-your-companion-
to-sam-computer-concepts-2nd-edition-corinne-hoisington-test-
bank/
https://testbankdeal.com/product/introduction-to-computer-
security-1st-edition-goodrich-solutions-manual/
Enhanced Computer Concepts and Microsoft Office 2013
Illustrated 1st Edition Parsons Solutions Manual
https://testbankdeal.com/product/enhanced-computer-concepts-and-
microsoft-office-2013-illustrated-1st-edition-parsons-solutions-
manual/
https://testbankdeal.com/product/computer-concepts-illustrated-
introductory-9th-edition-parsons-solutions-manual/
https://testbankdeal.com/product/computer-math-problem-solving-
for-information-technology-2nd-edition-charles-solutions-manual/
https://testbankdeal.com/product/illustrated-computer-concepts-
and-microsoft-office-365-and-office-2016-1st-edition-parsons-
solutions-manual/
https://testbankdeal.com/product/psychology-majors-companion-1st-
edition-dunn-test-bank/
Technology Now End of Chapter Exercise Answers Page 1 of 16
Technology Now
Chapter 7: The Connected
Computer
Chapter Review
INTRODUCTION TO NETWORKS
1. What are the two main types of network architecture? Briefly describe each one.
Peer-to-peer and client/server. A peer-to-peer network is best suited for networks of 10 or fewer
computers, like those found in homes or small offices. Each computer maintains its own files and
software. All computers have the same capabilities and responsibilities, but share resources and
peripherals such as printers. In a client/server network, one central computer, called the server,
controls access to network resources.
2. What do you call a network that spans long distances? Give two examples of areas where such a
network would be appropriate.
A wide area network (WAN) covers a large geographic region. A WAN is appropriate for a state,
country, or other large area where data needs to be transmitted over long distances. Examples include
multinational company, governments, and national retail chain.
3. What type of network connects digital devices within about 30 feet of each other? Give one
example.
A personal area network (PAN) connects personal digital devices within a range of about 30 feet (9
meters). Bluetooth is the example in the chapter.
4. Give three examples of network standards, and state how each one might be used.
Network standards specify the way computers access a network, the type(s) of hardware used, data
transmission speeds, and the types of cable and wireless technology used. See Table 7-3 below for
examples.
Technology Now End of Chapter Exercise Answers Page 2 of 16
TYPES OF NETWORKS
10. Name three types of network topologies and briefly describe the layout of each one.
Network topologies include star, bus, ring, and mesh networks, as well as combination topologies.
11. Describe why one might need a combination topology, and give an example.
Technology Now End of Chapter Exercise Answers Page 4 of 16
Some networks combine topologies to connect smaller networks and form one larger network.
Examples include tree topology, full mesh topology and partial mesh topology.
12. How does a client/server network differ from a peer-to-peer network?
On a client/server network, one or more computers acts as a server, a computer on a network that
controls access to hardware, software, and other resources. The other computers on the network
request services from the server. Some servers provide centralized storage for programs, data, and
information. The clients are other computers and mobile devices on the network that rely on the
server for their resources.
Peer-to-peer (P2P) networks are networks of equals (peers), and typically have fewer than 10
computers. They are less expensive and easier to set up than client/server networks because they have
no dedicated servers (servers that only serve the network, and are not shared). P2P networks do not
use a central network server. Each peer maintains its own operating system, application software, and
data files. Peers can share files and peripheral devices such as printers with peers.
THE INTERNET
13. Name three services available over the Internet. How might you use each service in your daily
life? Which of the services do you use most often and why?
People use the Internet every day for tasks such as visiting Web sites to listen to music, do their
banking, and stay in touch with family and friends. Student answers will vary.
14. Describe three Internet services you can use to communicate with colleagues or friends. What
are the key benefits of each service? How are the three services different from each other?
VoIP, Email, Text messaging, Chatting, Multimedia messaging are possible services. Possible answers
include those listed in Table 7-6.
Technology Now End of Chapter Exercise Answers Page 5 of 16
16. Briefly define social networking. How might a recent college graduate use social networking after
taking a job 100 miles from her school? How might a family with grown children living 100 miles
apart might use social networking to keep in touch?
Social-networking Web sites have changed the way people interact, form and maintain relationships,
find jobs, promote careers, and communicate with each other. Through Facebook, Twitter, LinkedIn,
Google+, and other sites, people communicate by sharing ideas, photos, videos, and links to other Web
sites.
17. What is the difference between hackers and crackers? How do hackers and crackers gain
unauthorized access to a computer?
A hacker uses computers to access data without authorization, often illegally. Crackers use computers
to destroy data, steal information, and commit other malicious crimes.
If hackers gain unauthorized access to networked computers, they can take over the computers and
turn them into zombies, which are computers controlled by outsiders without the owners’ knowledge.
After creating a zombie, a hacker can install a bot, a program that performs a repetitive task such as
sending phishing email messages. The hacker can also group these zombies together to form a botnet,
which would send out massive amounts of phishing messages, for example.
18. What are the common forms of malware and how does it infect a computer?
Common forms of malware are shown below in Table 7-9 with a description of each.
Technology Now End of Chapter Exercise Answers Page 6 of 16
Firewalls are designed to block intruders from accessing corporate or personal networks. If you have an always-
on connection to the Internet, you can be vulnerable to intrusions. Personal firewalls constantly monitor all
network traffic to keep your network secure.
Open your browser on any computer and then visit the speedtest.net Web site. Tap or click the Begin Test
button to test the performance of each network. The test may take up to a minute to complete.
a. How did the speed of your home, workplace, or local coffee shop compare with the speed of your school’s
network? Share the download and upload speeds of each location.
Technology Now End of Chapter Exercise Answers Page 10 of 16
Answers will vary at the time of completion, but a sample solution includes similar data from speedtest.net:
b. Describe three Internet activities that would be best on the faster network speed.
Sample Solution:
c. Copy and paste the listing of free Wi-Fi hotspots from the Web site into a word-processing document.
Technology Now End of Chapter Exercise Answers Page 11 of 16
Connecting through a video email message adds a personal and professional touch within the business
environment. Eyejot is an easy way to send and receive video email from your computer (PC or Mac) or
mobile device, such as an Apple iPhone, iPod Touch, or Android smartphone. Open the browser on any
computer and visit the eyejot.com Web site or install the free Eyejot app on your smartphone. Create a free
Eyejot account. Record a one-minute video to your instructor using Eyejot about the interesting facts you
learned about the connected computer. Send the video email to your instructor.
a. Write a paragraph describing an example of how you could use video email in a business setting.
Internal emails can function as an effective communication for sharing basic information, such as new cafeteria
prices, paper use guidelines or security precautions, for example. Sending simple messages to an entire
workforce with just the click of a mouse is fast, easy, convenient and can save the company money. If saved, the
email can function as proof of a message sent or received, and is easily accessible to remind the recipient of
pertinent information. Many businesses use email as part of its marketing efforts to share information with
prospects, customers, vendors. (http://smallbusiness.chron.com/use-email-business-communication-118.html)
b. Which device did you use to create your video email? What was your experience?
Answers will vary, including: computer web cams, smartphone cameras, and stand-alone digital video cameras.
Create strong passwords for your home network. Include at least eight characters, numbers, letters, or
symbols that are not easy to figure out.
Set permissions to determine who can access which resources. Limit access as much as you can.
Do not write usernames and passwords in places where they can be found by others.
Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change
the router’s default administrator password.
In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint (barring the
most gruesome of developments), you can't forget it like you could a password, and it's unique to you.
In practice, though, there are so many things that, for now, limit a more widespread use of this technology.
One of the problems has been pointed out by Guy Churchward, CEO of LogLogic. He says that it is its uniqueness
the thing that makes using biometric data an inherently flawed choice for a primary method of authentication.
"Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly
something you can change," he says. "Imagine having an option of only one password 'ever'. One loss and you
are screwed."
Technology Now End of Chapter Exercise Answers Page 13 of 16
Another problem is that current scanners still can't recognize if the fingerprint is on a real finger or an artificial
one. Andrew Clarke, of e-DMZ Security, says that in theory, one could get a hold of the user's fingerprint using
techniques used in crime detection and transfer it on an artificial finger. This will likely change as the technology
evolves, but for now the system is still fallible, and not suitable to be a primary solution to the authentication
problem.
“As with all authentication, multiple factors increases the effectiveness of the solution. Something you have
(fingerprint) combined with something you know (passcode) provides a stronger solution,” he says.
According to SC Magazine, David Ting, CTO of Imprivata, sees the good side of this kind of authentication. Saying
that the contents of any computer should be encrypted, and the access to its content secured by a password
AND by biometrics. According to him, a biometric password is infinitely more difficult to recover using a brute
force attack than a "normal" password.
He is in favor of using a complex passwords initially to thwart cracking, and as regards the secure access to the
Windows logon, biometric, one-time password tokens or smartcards should be used because of the
aforementioned reason. (http://www.net-security.org/secworld.php?id=8922)
c. If your neighbor Ben introduces himself later in the day in the third floor hallway, how would you handle the
issue of his open wireless network?
Answers vary depending on previous decision.
a. Each member of the team should develop a hypothesis of how it was possible for Cassidy to steal Zoe’s
identity. Create a combined document of the individual hypotheses.
Answers will vary, however they should all point to Cassidy using Zoe’s tablet without permission and accessing
web sites that Zoe had saved log-in information for on the tablet.
b. Research what Zoe should do now. Name at least four steps that Zoe should take to investigate this crime.
Answers will vary, below are steps to take from the FBI Web site (http://www.fbi.gov/about-
us/investigate/cyber/identity_theft):
Step One: Contact the fraud department of the three major credit bureaus
•Experian (TRW) 888-397-3742
•TransUnion 800-680-7289
•Equifax 800-525-6285
c. What are several action items that Zoe should do each month to monitor her credit?
1. Safeguard Your Social Security Number (SSN)
Social Security Numbers are the entry point for identity theft. They are the key to your personal and financial
information. For this reason, it is not recommended that SSNs be carried in wallets or purses. You should also
not write on a piece of paper your SSN to later place it in your wallet or purse. Question anyone who asks to
know your SSN. Other personal identifying information to safeguard includes passport, birth certificate, driver
license, voter registration card, alien registration card, and other forms of identification.
7. Be Cautious at ATMs
Identity thieves have been known to place skimming devices over ATM slots to steal card account information.
To protect your PIN number and other information, do the following: •Look for suspicious devices on the front
of the ATM. Check for exposed wires, tape, or loose connections. Look for hidden cameras on the sides of the
ATM that criminals use to records ATM passwords.
d. Research and summarize five signs that you may be a victim of identity theft.
Refer to http://www.privacymatters.com/identity-theft-information/identity-theft-victim-5-warning-signs.aspx
1. Your bills and other financial statements don't arrive. If your regular credit card, utility and other financially
oriented bills and statements don't arrive on their usual schedule(s), someone might have changed the address.
2. There are checks missing from your checkbook. Identity theft fraud is not limited to the computer. Plenty of
opportunistic identity thieves may also be skilled pickpockets. If you keep a very well-organized checkbook and
you find any checks missing or unaccounted for, look things over again. If there are still checks missing, your
identity may have been stolen.
3. You have a debt collection agency after you. The top identity thieves are experts at "pinning the blame on
someone else." Could that someone be you? If you have a collection agency hounding you for debts you know
aren't yours, your identity may well be in danger.
4. You apply for credit and are turned down. If you apply for credit and are flatly denied, something might be
wrong.
Technology Now End of Chapter Exercise Answers Page 16 of 16
5. You receive a credit or charge card you know you never applied for. Identity theft is an invasion of your
privacy in many ways. If someone out there has your personal information, they might as well be you. Keep that
in mind if you receive a welcome letter and credit card from a company you don't recall contacting.
e. Identify a YouTube video that would be best to share at Zoe’s dorm for others not to fall victim to the same
risk.
At the time of writing, this video is available on YouTube.
Language: Finnish
Kirj.
VÄINÖ KATAJA
Silloin taas koski ulvahti, ja kuului kuin sen ääni nousisi niemen yli
ja pyrkisi vastavirtaa taloon päin.
Emäntä kuuli jonkun tulevan pirttiin. Askeleista hän tunsi, että tulija
oli Manta piika, joka vasta oli karttaamasta lähtenyt pihasalle. Hän ei
viitsinyt kääntyä katsomaan, virkkoi vain, kasvot yhä kiinni
ikkunassa:
»Hauskaa on…»
Mutta se aika ei enää tule takaisin! Eikä tule hänkään, jota rakasti
ja joka lupasi tulla… Mutta jäipä poika muistoksi, ja rakas oli vieläkin
hän, jonka kanssa elonsa ihanimman kesän vietti…
»Ei mikään!»
»Taisipa painua…»
»Niin lie.»
»Ensi syksynä, kun tähän taloon tulin, kummitteli se tapaus
mielessäni, ja öilläkin välistä heräsin… Onkin niin kaamea ja
vaarallinen tuo pato… Minä pelkään siihen katsoakin… Huimaa
päätäni, kun lautatkin sivu vilistävät… Syysiltoina olen kuulevinani
kuin avunhuutoja, aina Isostakoskesta asti…»
»Joutavia…»
»Pyh…»
»Leikkiä se oli…»
»Ei tässä nyt vielä niin vanhoja olla, ettei leikkiä joskus saa
laskea.»
Emäntä aikoi taas kehrätä, mutta äkkiä hän muisti jotakin ja meni
ulos.
Nytkin oli tullut kuin villiksi, kun tiesi isännän menneen pajaan.
Mutta annahan kun saapuu kotia, jo on emännän suu lukossa ja
silmissä leimahtelee… Soisi kai kuolevan, hukkuvan…
*****
»Sattuu joskus…»
»Niin kai ovat, koska samaa suomea puhuvat, mutta tämä uusi
polvi oppii aivan ruotsinkieltä… koulussa aivan ruotsia opetetaan…
Siellä on meidänkin Oskari…»
»Vai niin…»
Vieraan kasvot synkkenivät.
»No jo toki. Kun nyt vain ette olisi liian vaativa. Ei ole Aapeli tässä
kotona, vaan mitäpä hänelläkään olisi… ja pian kai hänkin tulee…
On tässä porstuakamari, jossa kyllä saatte rauhassa olla… Mutta ei
ole näin talonpoikaisessa talossa…»
Vieras ihmetteli.