Professional Documents
Culture Documents
Full Using Information Technology 10Th Edition Williams Test Bank Online PDF All Chapter
Full Using Information Technology 10Th Edition Williams Test Bank Online PDF All Chapter
Full Using Information Technology 10Th Edition Williams Test Bank Online PDF All Chapter
https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-solutions-manual/
https://testbankdeal.com/product/using-information-
technology-11th-edition-williams-test-bank/
https://testbankdeal.com/product/mgmt-10th-edition-williams-test-
bank/
https://testbankdeal.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/
Information Technology Auditing 4th Edition Hall Test
Bank
https://testbankdeal.com/product/information-technology-
auditing-4th-edition-hall-test-bank/
https://testbankdeal.com/product/managing-information-
technology-7th-edition-brown-test-bank/
https://testbankdeal.com/product/using-financial-accounting-
information-the-alternative-to-debits-and-credits-10th-edition-
porter-test-bank/
https://testbankdeal.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/
https://testbankdeal.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog
6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer
11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet
16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node
19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge
6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall
22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router
24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet
28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN
6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)
40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb
6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer
53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers
55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics
56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics
57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key
62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False
6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False
67. Capturing music digitally means that one has an exact duplicate of the music.
True False
68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False
71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False
72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False
6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False
74. "File server" and "database server" are different names for the same type of server.
True False
75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False
76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False
79. An interface device used to connect the same types of networks is called a node.
True False
80. The backbone is the main communications route in a bus network topology.
True False
6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False
82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False
83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False
84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False
86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False
87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False
88. The two general classes of bandwidth are long and short.
True False
6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False
91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False
6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False
97. Communications satellites are microwave relay stations in orbit around the earth.
True False
98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False
99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False
100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False
101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False
6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False
106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False
108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False
6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False
113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False
116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False
117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False
118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False
6-20
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
119. Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
True False
121. Two kinds of secret keys are used in public key encryption.
True False
122. In public key encryption, only the receiver of an encrypted message knows the private
key needed to decrypt the message.
True False
123. Communications signals represented in a binary electronic format are ________ signals.
________________________________________
124. Signals such as sound and temperature, which continuously vary in strength and quality,
are ________ signals.
________________________________________
125. So they can be sent over a telephone line, analog signals are converted into digital
signals, and then back again, by using ________.
________________________________________
6-21
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
126. The text lists six benefits of networks: ________, ________, ________, ________,
________, and ________.
127. Four disadvantages of networks are ________, ________, ________, and ________.
128. The text lists seven types of networks: ________, ________, ________, ________,
_________, ________, and ________.
130. Private networks that use a public network, usually the Internet, to connect remote sites
are called ________.
________________________________________
6-22
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
131. An intranet that allows access to selected outside users is a(n) ________.
________________________________________
132. A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________
133. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________
134. A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________
135. A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
________________________________________
136. ________ are physical devices that join multiple wired and/or wireless networks; their
primary job is to provide connectivity.
________________________________________
137. A network can be laid out in different ways. The layout, or shape, is called a ________.
________________________________________
6-23
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
138. The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________
139. The system software that manages the activity of a network is called the ________.
________________________________________
140. A computer sends and receives messages over a cable network using a ________, which
is inserted in an expansion slot on the motherboard.
________________________________________
141. A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________
142. A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
________________________________________
144. In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and describes how data can be
sent.
________________________________________
6-24
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
145. Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
________________________________________
146. Wired communications media include three main types. Insulated copper wire wrapped
in a solid or braided shield and then an external cover is called ________ cable.
________________________________________
147. Wired communications media include three main types. The kind used for transmitting
pulses of light is ________.
________________________________________
148. HomePlug technology is a wired communications standard that allows users to connect
equipment within the home using the house's own ________ wiring.
________________________________________
149. Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________
150. The _________ is the basis for ALL telecommunications signals, both wired and
wireless, and the _________ is the part that carries most communications signals.
________________________________________
151. The range of frequencies that a transmission medium can carry in a given period of time
is called its ________.
________________________________________
6-25
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
152. The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________
154. The text covers five types of wireless communications media: ________, ________,
________, _________, and ________.
155. Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________
156. The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________
157. Global Positioning Systems use ________ to continuously transmit signals to identify
earth locations.
________________________________________
6-26
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
159. Simple one-way radio receivers that receive data (but not voice messages) are called
________.
________________________________________
160. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________
161. Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping portable
computers and handheld wireless devices to communicate at high speeds and share Internet
connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi version?
________________________________________
162. The short-range, wireless digital standard aimed at linking hand-held devices up to 33
feet apart is called ________.
________________________________________
163. The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________
164. Worms, viruses, and Trojan horses are all types of programs called ________.
________________________________________
6-27
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
165. A(n) ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive and that can cause the computer to crash.
________________________________________
166. A(n) ________ is a "deviant" program that attaches itself to a program or file and can
cause unexpected and undesirable effects, such as destroying or corrupting data.
________________________________________
167. A ________ is a program that pretends to be a useful program, usually free, such as a
game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
________________________________________
168. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
________________________________________
169. Malware can be spread by using a(n) ________ disk, flash drive, CD; opening unknown
email _________; clicking on ________ websites; and/or through contaminated Wi-Fi hot
spots.
________________________________________
170. People who illegally break into computers for malicious purposes are known as
________.
________________________________________
6-28
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
171. The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.
172. ________ software can be used to scan a computer's hard disk, CDs, and main memory
to detect viruses.
________________________________________
173. A system of hardware and/or software that protects a computer or network from intruders
is called a ________.
________________________________________
174. Five types of biometric authentication are ________, ________, ________, _________,
and _________.
6-29
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
175. The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
________________________________________
Essay Questions
6-30
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
181. What are the main differences between a WAN, a MAN, and a LAN?
182. What is the difference between a client/server network and a peer-to-peer network?
6-31
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
6-32
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
189. What are four ways in which viruses and worms get passed?
6-33
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
1. (p. 313) Communications signals represented in a binary format are said to be ________.
A. continuous
B. digital
C. sequential
D. analog
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
6-34
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
4. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be
A. spontaneous
B. digital
C. sequential
D. analog
Difficulty: Easy
5. (p. 315-316) The ________ is a device that converts digital computer signals into analog signals
so that they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
Difficulty: Easy
6. (p. 316) A person sending a document over a phone line by converting digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
Difficulty: Easy
6-35
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Difficulty: Easy
8. (p. 320) A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN
Difficulty: Easy
9. (p. 320) A network that covers a city or a suburb is called a(n) ________.
A. WAN
B. LAN
C. MAN
D. Internet
Difficulty: Easy
10. (p. 322) Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer
Difficulty: Medium
6-36
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
11. (p. 322) A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
Difficulty: Easy
12. (p. 323) A computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
Difficulty: Medium
13. (p. 324-325) If an organization's internal private network uses the same infrastructure and
standards of the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
Difficulty: Medium
Difficulty: Medium
6-37
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
15. (p. 320) A ________ is the set of rules that govern the exchange of data between hardware
and/or software components in a communications network.
A. host
B. protocol
C. database
D. packet
Difficulty: Medium
16. (p. 326) A mainframe computer that controls a large network is called the ________
computer.
A. slave
B. host
C. client
D. node
Difficulty: Easy
17. (p. 326) Any device that is attached to a network is referred to as a ________.
A. server
B. host
C. node
D. router
Difficulty: Easy
Difficulty: Easy
6-38
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
19. (p. 327) A common connection device that connects computers to a network is called a
________.
A. router
B. gateway
C. switch
D. bridge
Difficulty: Easy
20. (p. 328) To create larger networks, a bridge connects the same types of networks, and a
________ connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
Difficulty: Hard
21. (p. 328) A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall
Difficulty: Medium
6-39
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
22. (p. 329) In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router
Difficulty: Medium
Difficulty: Easy
24. (p. 330) In the ________ network topology, communications devices are connected to a
single cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
Difficulty: Easy
6-40
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
25. (p. 331) What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
Difficulty: Easy
26. (p. 331) What kind of topology (layout) is used by a network that connects all its computers
and communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
Difficulty: Easy
27. (p. 332) ________ is the most common and most widely used LAN technology; it can be
used with almost any kind of computer; most microcomputers come with a port for this type
of network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet
Difficulty: Medium
6-41
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
28. (p. 333) A communications medium is a channel; there are three types of wired
communications media. The one consisting of two strands of insulated copper wire, used by
tradition telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
Difficulty: Medium
29. (p. 334) What wired channel, commonly used for cable TV, consists of an insulated copper
wire wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
Difficulty: Medium
30. (p. 335) A type of wired communications technology used to connect equipment in a home
network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
Difficulty: Medium
6-42
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
31. (p. 334) What wired communications medium consists of dozens or hundreds of thin strands
of glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
Difficulty: Easy
32. (p. 335-336) The ________ is the basis for ALL telecommunications signals.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
Difficulty: Medium
33. (p. 337) The ________ is the range of frequencies that a transmission medium (channel) can
carry in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
Difficulty: Medium
6-43
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
34. (p. 339) What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN
Difficulty: Hard
35. (p. 339) Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio
Difficulty: Medium
36. (p. 339) What form of wireless transmission sends data to an AM or FM receiver?
A. broadcast radio
B. infrared
C. fiber-optic
D. microwave
Difficulty: Medium
37. (p. 339) Which of these types of wireless transmission is limited to line-of-sight
communications?
A. broadcast radio
B. broadband
C. microwave
D. fiber-optic
Difficulty: Medium
6-44
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
38. (p. 340) Transmitting a signal from a ground station to a satellite is called ________.
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking
Difficulty: Easy
39. (p. 341) The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)
Difficulty: Medium
40. (p. 342) GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals
used to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
Difficulty: Hard
41. (p. 347-348) Which of the following is NOT a type of long-distance wireless two-way
communications device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
Difficulty: Medium
6-45
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
42. (p. 347) Broadband technology (wireless digital services) is also referred to as ________-
generation wireless services.
A. first
B. second
C. third
D. fourth
Difficulty: Easy
43. (p. 349) What short-distance wireless standard is used to link portable computers and
handheld wireless devices so they may communicate at high speeds at distances of 100-228
feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
Difficulty: Medium
44. (p. 352) What short-distance wireless standard is used to link cell phones, PDAs, and
computers at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
Difficulty: Medium
6-46
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
45. (p. 355) A ________ attack disables a computer system or network by making so many
requests of it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
Difficulty: Medium
46. (p. 355) A ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
Difficulty: Easy
Difficulty: Medium
6-47
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
48. (p. 358) Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb
Difficulty: Medium
49. (p. 358) A botmaster uses malware to hijack hundreds or thousands of computers and
controls them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
Difficulty: Medium
50. (p. 358) Which of the following is NOT a way to spread a virus?
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software
Difficulty: Medium
6-48
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
51. (p. 359) A person who gains unauthorized access to computer or telecommunications
systems without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie
Difficulty: Easy
52. (p. 360) A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer
Difficulty: Easy
53. (p. 359) Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
Difficulty: Medium
6-49
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
54. (p. 361) What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers
Difficulty: Easy
55. (p. 361) What is the science, often used in computer security systems, of measuring
individual body characteristics?
A. encryption
B. decryption
C. password
D. biometrics
Difficulty: Easy
56. (p. 361) Fingerprint scanners, face-recognition systems, and iris-recognition systems are
based on ________.
A. encryption
B. decryption
C. password protection
D. biometrics
Difficulty: Easy
6-50
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
57. (p. 362) What is the process of altering readable data (plain text) into unreadable form to
prevent unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
Difficulty: Easy
Difficulty: Hard
59. (p. 362-363) ____________ encryption uses the same secret key to encrypt and decrypt a
message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key
Difficulty: Medium
Difficulty: Hard
6-51
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
61. (p. 313-314) Analog refers to communications signals represented in a binary format.
FALSE
Difficulty: Easy
62. (p. 313-314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be digital.
FALSE
Difficulty: Easy
63. (p. 314) A thermometer and a speedometer are examples of analog devices.
TRUE
Difficulty: Easy
Difficulty: Easy
65. (p. 316) A modem converts digital signals into analog signals so they can be sent over a
telephone line.
TRUE
Difficulty: Easy
6-52
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Difficulty: Easy
67. (p. 317) Capturing music digitally means that one has an exact duplicate of the music.
FALSE
Difficulty: Hard
68. (p. 317) A network is a system of interconnected computers and communications devices
that can communicate and share resources.
TRUE
Difficulty: Easy
Difficulty: Medium
70. (p. 320-321) A LAN is a type of network that covers a wide geographical area.
FALSE
Difficulty: Easy
6-53
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
71. (p. 322) A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
TRUE
Difficulty: Easy
72. (p. 323-324) Client/server networks and peer-to-peer networks are the same except that the
first type of network uses a mainframe and the second type uses only microcomputers.
FALSE
Difficulty: Medium
73. (p. 323) The computer that acts like a disk drive, storing the programs and data files shared
by users on a LAN, is called a file server.
TRUE
Difficulty: Easy
74. (p. 323) "File server" and "database server" are different names for the same type of server.
FALSE
Difficulty: Easy
75. (p. 325-326) Virtual private networks (VPNs) are private networks that use a public network
(usually the Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE
Difficulty: Easy
6-54
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
76. (p. 326-327) In a network, communications protocols specify the type of electrical
connections, the timing of message exchanges, and error-detection techniques.
TRUE
Difficulty: Medium
77. (p. 328) Routers join multiple wired and/or wireless networks.
TRUE
Difficulty: Easy
78. (p. 328) A gateway is an interface device permitting communication between similar
networks.
FALSE
Difficulty: Medium
79. (p. 328) An interface device used to connect the same types of networks is called a node.
FALSE
Difficulty: Medium
80. (p. 329) The backbone is the main communications route in a bus network topology.
FALSE
Difficulty: Medium
6-55
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
81. (p. 331) In a bus network, all computers and communications devices are connected in a
continuous loop.
FALSE
Difficulty: Easy
82. (p. 333) Traditional landline telephone systems use twisted-pair wire as their
communications medium.
TRUE
Difficulty: Easy
83. (p. 334) A cable that is made up of dozens of thin strands of glass and transmits pulsating
beams of light is called a coaxial cable.
FALSE
Difficulty: Easy
84. (p. 335) A wired communications standard that allows users to send data over a home's
existing electrical (AC) power lines is called HomePlug technology.
TRUE
Difficulty: Easy
Difficulty: Easy
6-56
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
86. (p. 336) All wired and wireless communications media use the electromagnetic spectrum of
radiation.
TRUE
Difficulty: Easy
87. (p. 337) The smaller the bandwidth of a medium, the more frequencies it can use to transmit
data.
FALSE
Difficulty: Easy
88. (p. 337) The two general classes of bandwidth are long and short.
FALSE
Difficulty: Easy
89. (p. 337) The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
TRUE
Difficulty: Easy
90. (p. 337) The frequency of an electromagnetic wave is the number of times the wave repeats,
or makes a cycle, in a second.
TRUE
Difficulty: Medium
6-57
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
91. (p. 337-338) Both digital narrowband and broadband transmission speeds are measured in
megabits or gigabits per second.
TRUE
Difficulty: Medium
92. (p. 339) Infrared transmission is a type of low-frequency wireless transmission that is short-
range and line-of-sight.
TRUE
Difficulty: Medium
Difficulty: Easy
94. (p. 340, 352) Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.
TRUE
Difficulty: Easy
Difficulty: Easy
6-58
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
96. (p. 340) Satellite transmission uses in-orbit satellites and earth stations. Transmitting from
the ground to the satellite is called downlinking, and transmitting from the satellite to the
ground station called uplinking.
FALSE
Difficulty: Easy
97. (p. 340) Communications satellites are microwave relay stations in orbit around the earth.
TRUE
Difficulty: Easy
98. (p. 341) Satellite orbits are at three levels: GEO, MEO, and LEO.
TRUE
Difficulty: Easy
99. (p. 341) A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
FALSE
Difficulty: Hard
100. (p. 342) GPS uses MEO satellites that continuously transmit timed radio signals used to
identify earth locations.
TRUE
Difficulty: Easy
6-59
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
101. (p. 342-343) Because of the excellence of satellite technology, GPS location IDs are 100%
accurate.
FALSE
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
105. (p. 349) The short-range, wireless communications method aimed at linking hand-held
devices at high speeds and at distances of 100-228 feet is called Wi-Fi.
TRUE
Difficulty: Easy
6-60
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
106. (p. 349-350) A Wi-Fi enabled laptop computer accesses the available network (say, at an
airport) through an access point, which is connected to a land-based Internet connection.
TRUE
Difficulty: Easy
107. (p. 349-350) The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
FALSE
Difficulty: Medium
108. (p. 351-352) Wi-Fi connections are always secure; no one can steal your data when you are
online.
FALSE
Difficulty: Easy
109. (p. 352) Bluetooth is a short-range, wireless communications method for linking cellphones,
PDAs, computers, and some other peripherals up to distances of 30 feet.
TRUE
Difficulty: Easy
110. (p. 355-356) A denial-of-service attack uses a virus to crash your computer.
FALSE
Difficulty: Medium
6-61
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
111. (p. 354) Worms, viruses, and Trojan horse are all malware.
TRUE
Difficulty: Easy
112. (p. 356) A Trojan horse pretends to be a useful program, such as a game or a screen saver,
but it carries a virus that replicates in your computer over and over until your computer
crashes.
FALSE
Difficulty: Medium
113. (p. 355-356) A virus is a "deviant" program that is stored on a computer hard drive and can
cause unexpected and undesirable effects.
TRUE
Difficulty: Easy
Difficulty: Easy
Difficulty: Easy
6-62
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
116. (p. 359) Sneakers are people who gain unauthorized access to computer or
telecommunications systems, often just for the challenge of it.
FALSE
Difficulty: Easy
117. (p. 360) People who illegally break into computers for malicious purposes to obtain
information for financial gain, shut down hardware, pirate software, or alter or destroy data
are known as hackers.
FALSE
Difficulty: Easy
118. (p. 361) If you have more than one computer linked to the Internet by a cable modem, you
need a software firewall to protect your system.
FALSE
Difficulty: Medium
119. (p. 362) Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
TRUE
Difficulty: Easy
120. (p. 362-363) There are two basic types of data encryption.
TRUE
Difficulty: Medium
6-63
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
121. (p. 362-363) Two kinds of secret keys are used in public key encryption.
TRUE
Difficulty: Medium
122. (p. 362-363) In public key encryption, only the receiver of an encrypted message knows the
private key needed to decrypt the message.
TRUE
Difficulty: Medium
123. (p. 313) Communications signals represented in a binary electronic format are ________
signals.
digital
Difficulty: Easy
124. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are ________ signals.
analog
Difficulty: Easy
125. (p. 315-316) So they can be sent over a telephone line, analog signals are converted into
digital signals, and then back again, by using ________.
modems
Difficulty: Easy
6-64
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
126. (p. 318-319) The text lists six benefits of networks: ________, ________, ________,
________, ________, and ________.
Difficulty: Hard
127. (p. 319) Four disadvantages of networks are ________, ________, ________, and
________.
Difficulty: Hard
128. (p. 320-321) The text lists seven types of networks: ________, ________, ________,
________, _________, ________, and ________.
wide area network, metropolitan area network, local area net work, home area network,
personal area network, home automation network
Difficulty: Hard
6-65
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Difficulty: Medium
130. (p. 324) Private networks that use a public network, usually the Internet, to connect remote
sites are called ________.
virtual private networks (VPNs)
Difficulty: Medium
131. (p. 325) An intranet that allows access to selected outside users is a(n) ________.
extranet
Difficulty: Medium
132. (p. 325) A set of conventions that govern how data is exchanged between devices on a
network is known as a communications ________.
protocol
Difficulty: Easy
133. (p. 326) Electronic messages are sent as ________, fixed-length blocks of data for
transmission.
packets
Difficulty: Medium
6-66
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
134. (p. 327) A _________ is a network that connects computers to a network; data can be sent
in both directions at the same time.
switch
Difficulty: Medium
135. (p. 328) A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
bridge; gateway
Difficulty: Medium
136. (p. 328) ________ are physical devices that join multiple wired and/or wireless networks;
their primary job is to provide connectivity.
Routers
Difficulty: Easy
137. (p. 329) A network can be laid out in different ways. The layout, or shape, is called a
________.
topology
Difficulty: Easy
138. (p. 329) The ________ consists of the main "highway" that connects all computer networks
in an organization.
backbone
Difficulty: Easy
6-67
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
139. (p. 329) The system software that manages the activity of a network is called the
________.
network operating system (NOS)
Difficulty: Medium
140. (p. 329) A computer sends and receives messages over a cable network using a ________,
which is inserted in an expansion slot on the motherboard.
network interface card (NIC)
Difficulty: Medium
141. (p. 330) A ________ network topology is one in which all microcomputers and other
devices are connected in a continuous loop.
ring
Difficulty: Easy
142. (p. 330) A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
star
Difficulty: Easy
143. (p. 331) The Internet uses the ________ network topology.
mesh
Difficulty: Medium
6-68
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
144. (p. 331) In small LANs, messages may bump into one another. The most popular protocol,
or technology, which uses cabling and special ports on microcomputers, that prevents
collisions is ________. It can be used with almost any kind of computer and describes how
data can be sent.
Ethernet
Difficulty: Medium
145. (p. 333) Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
twisted-pair wire
Difficulty: Easy
146. (p. 334) Wired communications media include three main types. Insulated copper wire
wrapped in a solid or braided shield and then an external cover is called ________ cable.
coaxial ("coax")
Difficulty: Medium
147. (p. 334) Wired communications media include three main types. The kind used for
transmitting pulses of light is ________.
fiber-optic cable
Difficulty: Easy
148. (p. 335) HomePlug technology is a wired communications standard that allows users to
connect equipment within the home using the house's own ________ wiring.
electrical
Difficulty: Medium
6-69
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
149. (p. 336) Telecommuting means using a computer and networks to work from ________;
telework means working from ________.
home; anywhere
Difficulty: Medium
150. (p. 335-337) The _________ is the basis for ALL telecommunications signals, both wired
and wireless, and the _________ is the part that carries most communications signals.
electromagnetic spectrum of radiation; radio-frequency (RF) spectrum
Difficulty: Hard
151. (p. 337) The range of frequencies that a transmission medium can carry in a given period of
time is called its ________.
bandwidth
Difficulty: Medium
152. (p. 337) The ________ a transmission medium's bandwidth, the more frequencies it can use
to transmit data and the faster it is.
wider
Difficulty: Easy
153. (p. 337-338) A transmission medium's speed is usually measured in ________ or ________.
megabits per second; gigabits per second
Difficulty: Medium
6-70
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
154. (p. 339) The text covers five types of wireless communications media: ________,
________, ________, _________, and ________.
Difficulty: Hard
155. (p. 339) Infrared and microwave transmission signals cannot work around obstacles or
travel in curved lines, so they are called _________.
line-of-sight
Difficulty: Medium
156. (p. 341) The highest level that a satellite can occupy is the ________ earth orbit.
geostationary (GEO)
Difficulty: Medium
157. (p. 342) Global Positioning Systems use ________ to continuously transmit signals to
identify earth locations.
satellites
Difficulty: Easy
6-71
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
158. (p. 342) The Global Positioning System is an example of a ________-way long-distance
communications system.
one
Difficulty: Medium
159. (p. 345) Simple one-way radio receivers that receive data (but not voice messages) are
called ________.
pagers
Difficulty: Easy
160. (p. 346-348) 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
analog; digital
Difficulty: Easy
161. (p. 351) Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping
portable computers and handheld wireless devices to communicate at high speeds and share
Internet connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi
version?
n (after b, a, and g)
Difficulty: Medium
162. (p. 352) The short-range, wireless digital standard aimed at linking hand-held devices up to
33 feet apart is called ________.
Bluetooth
Difficulty: Easy
6-72
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
163. (p. 353-354) The three short-range wireless standards used in home automation networks, for
linking switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
Z-Wave
Difficulty: Medium
164. (p. 354) Worms, viruses, and Trojan horses are all types of programs called ________.
malware
Difficulty: Easy
165. (p. 356) A(n) ________ is a program that copies itself repeatedly into a computer's memory
or onto a disk drive and that can cause the computer to crash.
worm
Difficulty: Easy
166. (p. 355-356) A(n) ________ is a "deviant" program that attaches itself to a program or file
and can cause unexpected and undesirable effects, such as destroying or corrupting data.
virus
Difficulty: Easy
167. (p. 356) A ________ is a program that pretends to be a useful program, usually free, such as
a game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
Trojan horse
Difficulty: Easy
6-73
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
168. (p. 358) A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
botmaster, zombies
Difficulty: Medium
169. (p. 358) Malware can be spread by using a(n) ________ disk, flash drive, CD; opening
unknown email _________; clicking on ________ websites; and/or through contaminated Wi-
Fi hot spots.
infected; attachments; infiltrated (or infected)
Difficulty: Hard
170. (p. 360) People who illegally break into computers for malicious purposes are known as
________.
crackers
Difficulty: Easy
171. (p. 360 ff.) The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.
Difficulty: Hard
6-74
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
172. (p. 360) ________ software can be used to scan a computer's hard disk, CDs, and main
memory to detect viruses.
Antivirus
Difficulty: Easy
173. (p. 361) A system of hardware and/or software that protects a computer or network from
intruders is called a ________.
firewall
Difficulty: Easy
174. (p. 361-362) Five types of biometric authentication are ________, ________, ________,
_________, and _________.
Difficulty: Hard
175. (p. 362) The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
encryption
Difficulty: Easy
6-75
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
176. (p. 362) A message sent in its original undisguised, readable form is ________.
plain text
Difficulty: Medium
177. (p. 362) Message encryption involves converting plain text to ________.
cybertext
Difficulty: Medium
Essay Questions
178. (p. 314) How do analog and digital devices interpret electrical signals?
Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of electrical/light
pulses represented in a binary way (on or off).
Difficulty: Medium
Difficulty: Easy
6-76
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
180. (p. 318-319) List four advantages and four disadvantages of networks.
Difficulty: Hard
181. (p. 320-322) What are the main differences between a WAN, a MAN, and a LAN?
A wide area network (WAN) covers a wide geographic area, such as a country or, in the case
of the Internet, the world. A metropolitan area network (MAN) covers a city or a suburb. A
local area network (LAN) covers a limited geographic area, such as one office, one building,
or a small group of buildings, such as on a college campus.
Difficulty: Medium
6-77
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
182. (p. 323-324) What is the difference between a client/server network and a peer-to-peer
network?
A client/server network consists of clients, which are microcomputers that request data, and
servers, which are central computers used to supply data. In the client/server scheme, central
servers handle all security and file transactions; they are powerful microcomputers that also
manage shared devices. They may run server software for applications such as email and web
browsing, or they may just host a database or be a file server or other kind of server; different
servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to- peer networks, which are relatively
inexpensive to set up, each machine shares its own resources and handles its own security.
Every computer can share files and peripherals with all other computers on the network, given
that all are granted access privileges. Peer-to-peer networks are less expensive than
client/server networks and work effectively for up to 25 computers. Beyond that, they slow
down under heavy use. They are appropriate for small networks, such as small businesses and
home networks.
Difficulty: Medium
6-78
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2, p. 63)
to break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet-often using different (and most expedient) routes, at different
speeds, and sandwiched in between packets from other messages. Once the packets arrive at
their destination, the receiving computer reassembles them (called packet switching) into
proper sequence to complete the message.
Most modern Wide Area Network (WAN) protocols are based on packet switching
technologies. In contrast, normal telephone service is based on a circuit-switching technology,
in which a dedicated line is allocated for transmission between two parties. Circuit-switching
is ideal when data must be transmitted quickly and must arrive in the same order in which it's
sent. This is the case with most real-time data, such as live audio and video. Packet switching
is more efficient and robust for data that can withstand some delays in transmission, such as
email messages and web pages
Difficulty: Hard
184. (p. 331) Describe the network topology used by the Internet.
In a mesh network topology, messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to any individual
computer to create a mesh network. (Wireless networks are often implemented as a mesh.) In
the previous topologies, star and bus, messages are usually broadcast to every computer,
especially in bus topology. In the ring topology, messages can travel in only one direction-
clockwise or counterclockwise. The Internet employs the mesh topology, and the message,
with the help of routers, finds its route for its destination.
Difficulty: Medium
6-79
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Narrowband, also known as voiceband, is used for regular telephone communications and is
usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data and
high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL, cable,
satellite, T1, etc. are broadband.
Difficulty: Hard
186. (p. 342-343) What are some of the uses and limitations of GPS?
Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones on;
locating stolen cars; orienting hikers / locating lost hikers; aiding in surveying; monitoring
dangerous geological sites, such as volcanoes; finding lost pets; geocaching; getting map
directions on computers and in cars; determining E911 locations of people making 911 calls
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911 locations
are not always accurate; tracking cellphone users could violate privacy
Difficulty: Medium
Difficulty: Hard
6-80
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
Wireless USB (WUSB) has a typical range of 32 feet and a maximum data rate of 110-480
megabits per second. Wireless USB is used in game controllers, printers, scanners, digital
cameras, MP3/MP4 players, hard disks, and flash drives. With more than 2 billion legacy
wired USB connections in the world today, USB is the de facto standard in the personal
computing industry. Now these fast connections are available in the wireless world, with the
introduction of Wireless USB. Wireless USB is the new wireless extension to USB that
combines the speed and security of wired technology with the ease of use of wireless
technology. Wireless USB supports robust high-speed wireless connectivity by utilizing the
common WiMedia MB-OFDM Ultra-wideband (UWB) radio platform as developed by the
WiMedia Alliance. Wireless USB will preserve the functionality of wired USB while also
unwiring the cable connection and providing enhanced support for streaming media devices
and peripherals.
Difficulty: Hard
189. (p. 358) What are four ways in which viruses and worms get passed?
Four ways in which viruses and worms get passed are these:
1. by infected disks or flash drives
2. by opening unknown email attachments
3. by clicking on infiltrated (infected) websites
4. through infiltrated Wi-Fi hot spots
Difficulty: Medium
6-81
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key
190. (p. 359) Name at least five ways to minimize virus attacks.
Difficulty: Medium
191. (p. 364) List at least five rules for creating good passwords.
Difficulty: Medium
6-82
Another random document with
no related content on Scribd:
Pierre Rode (1774-1830) was the greatest of the players of this
period. He was for two years a pupil of Viotti, and when he made his
initial public appearance in 1790 at the Théâtre de Monsieur he
played Viotti’s thirteenth concerto in such a way as to win instantly
the admiration of all musical Paris. Considering that he was then but
a boy of sixteen, and that Paris was accustomed to the playing of
Kreutzer, Viotti, Gaviniés and other violinists of undisputed
greatness, one can have little doubt that Rode had the power of true
genius. This is further borne out by the fact that when he passed
through Brunswick on a concert tour to Poland in 1803, Spohr heard
him and was so struck with admiration for his style that he
determined to train himself with the ideal of Rode in his mind. Later
his playing fell off sadly and even in Paris he finally ceased to hold
the favor of the public.
II
The French school of classic violin music, represented by Rode and
Baillot, may be said to have come to an end at least partly by the
influence of Paganini. This greatest of all virtuosos made his first
appearance in Paris on March 9, 1831, after having astonished
Austria and Germany. His success was here as elsewhere
instantaneous and practically unbounded; and the examples his
playing offered of extraordinary technical effects became the model
for subsequent French violinists.
There are three virtuosos of the violin whose names stand out
conspicuously in the history of violin music: Locatelli, Lolli, and
Paganini. Each of these men is noted for special and in many ways
overstretched efforts to bring out of the instrument sounds and
combinations of sounds which, in that they can have little true
musical significance and are indeed often of questionable beauty,
are considered rather a sign of charlatanism than of true genius. This
really means that the men are not geniuses as musicians, but as
performers. Their intelligence is concentrated upon a discovery of
the unusual. They adopt any means to the end of astonishing the
multitude, such as altering the conventional tuning of the instrument,
and employing kinds of strings which are serviceable only in the
production of certain effects.
Paganini’s early life in Italy (1784-1828) was at first not free from
hardship, but after 1805, at least, it was brilliantly successful. The
only lessons of importance in his training were received from
Alessandro Rolla (1757-1804). His prodigious skill was almost wholly
due to his own ingenuity, and to his indefatigable industry. There is
every reason to believe that he practiced hour after hour until he was
so exhausted that he fell upon the ground.
After his extended tour over Europe (1827-1834), which brought him
a fame and a fortune hardly achieved since by any performer, he
retired into a semi-private life at his Villa Gaiona, not far from Parma.
From time to time he came again before the public. The more or less
scandalous affair of the ‘Casino Paganini’ in Paris (1836) took a slice
out of his fortune and perhaps seriously impaired his health. He died
on May 27, 1840.
Spohr was born in the same year as Paganini (1784). His training on
the violin was received from Franz Eck, a descendant of the famous
Mannheim school. But according to his own account, the example of
Rode, whom he heard in 1803, was of great importance in finally
determining his style of playing. His numerous activities took him
considerably beyond the field of playing and composing for the violin.
He was famous as a conductor in Vienna, in Dresden and Berlin,
and in London, whither he was frequently called to undertake the
conducting of his own works. As a composer he was famous for his
symphonies, his oratorios, and his operas. Yet he was not, in a
sense, a great musician; and the only part of his great number of
works which now seems at all likely to endure much longer in
anything but name is made up of the compositions, chiefly the
concertos, for violin.
Among his other works for violin the duets have enjoyed a wide
popularity, greater probably than that once enjoyed by Viotti’s. His
Violinschule, published in 1831, has remained one of the standard
books on violin playing. Its remarks and historical comments are,
however, now of greater significance than the exercises and
examples for practice. These, indeed, are like everything Spohr
touched, only a reflection of his own personality; so much so that the
entire series hardly serves as more than a preparation for playing
Spohr’s own works.
Spohr was typically German in his fondness for conducting, and for
the string quartet. As quite a young man he was the very first to bring
out Beethoven’s quartets opus 18, in Leipzig and Berlin. Paganini is
said to have made a favorite of Beethoven’s quartet in F, the first of
opus 59; but Spohr was positively dissatisfied with Beethoven’s work
of this period. Yet Paganini was in no way a great quartet player, and
Spohr was. We cannot but wonder which of these two great fiddlers
will in fifty years be judged the more significant in the history of the
art.
Certainly Spohr was hard and fast conservative, in spite of the fact
that he recognized the greatness of Wagner, and brought out the
‘Flying Dutchman’ and Tannhäuser at the court of Cassel. And what
can we point to now that has sprung from him? On the other hand,
Paganini was a wizard in his day, half-charlatan, perhaps, but never
found out. With the exception of Corelli and Vivaldi he is the only
violinist who, specialist as he was, exerted a powerful influence upon
the whole course of music. For he was like a charge of dynamite set
off under an art that was in need of expanding, and his influence ran
like a flame across the prairie, kindling on every hand. Look at
Schumann and Liszt, at Chopin and even at Brahms. Stop for a
moment to think of what Berlioz demanded of the orchestra, and
then of what Liszt and Wagner demanded. All of music became
virtuoso music, in a sense. It all sprang into life with a new glory of
color. And who but Paganini let loose the foxes to run in the corn of
the Philistines?
David has also won a place for himself in the esteem and gratitude
of future generations by his painstaking editing of the works of the
old Italian masters. Few of the great works for the violin but have
passed through his discriminating touch for the benefit of the student
and the public. And as a teacher his fame will live long in that of his
two most famous pupils: Joseph Joachim (1831-1907) and August
Wilhelmj (1845-1908).
IV
How great an influence the group of French violinists exercised upon
violin music and playing in the first quarter of the nineteenth century
is revealed in the training and the characteristics of the famous
Viennese players of the time. Vienna had always proved fertile
ground for the growth of Italian ideas, and the French style
recommended itself to the Viennese not only by the prevalence of
French ideas in the city, owing to political conditions, but also
because this style was in no small measure a continuance of the
Italian style of Viotti.
V
The most brilliant offshoots of the French school, to the formation of
whose style the influence of Paganini contributed, were the Belgians
de Bériot and Henri Vieuxtemps, who stand together as
representative of a Belgian school of violin playing. But before
considering them a few names in the long and distinguished list of
the pupils of Kreutzer, Rode, and Baillot may be touched upon.
Among those of Kreutzer Joseph Massart was perhaps the most
influential. He was born in Belgium in 1811, but went early in life to
Paris to complete with Kreutzer the work begun with his countryman
Lambert. Here he remained, and from 1843 was a professor of the
violin at the Conservatoire. At least one of his pupils, Henri
Wieniawski, won a world-wide fame as a virtuoso.
Among his pupils the most famous was Henri Vieuxtemps (1820-
1881), one of the few great virtuosos of the violin whose fame as a
player has not outlasted in memory his compositions. Vieuxtemps’
five concertos, his Ballade et Polonaise, and even his Fantaisie-
Caprice are still in the repertory of most violinists and have not yet
lost their favor with the public.
VI
Excepting Spohr, there are few of the violinist-composers of the
second half of the century with whom fate has dealt so kindly as with
Vieuxtemps. Most have been forgotten as composers, a fact which
may be taken to prove that their compositions had little musical
vitality except that which their own playing infused into them. Those
few who have been remembered in fact as well as in name owe the
permanence of their reputations to one or two pieces in the nature of
successful salon music. Among these should be mentioned Henri
Wieniawski (1835-1880), undoubtedly one of the finest players of the
century. In the early part of his life he wandered from land to land,
coming in company with his friend Anton Rubinstein, the great
pianist, even as far as the United States. He was after this (1874) for
a few years professor of the violin at the Conservatory in Brussels,
filling the place left vacant by Vieuxtemps; and then once more
resumed his life of wandering. His compositions were numerous,
including two concertos as well as a number of studies and
transcriptions, or fantasias, of opera airs. Now perhaps only the
Légende is still familiar to a general public, though the Fantasia on
airs from ‘Faust,’ empty as it is of all save brilliance, holds a place on
the programs of the virtuosi of the present day.