Full Using Information Technology 10Th Edition Williams Test Bank Online PDF All Chapter

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 106

Using Information Technology 10th

Edition Williams Test Bank


Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/using-information-technology-10th-edition-williams-test-bank/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Using Information Technology 10th Edition Williams


Solutions Manual

https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-solutions-manual/

Using Information Technology 11th Edition Williams Test


Bank

https://testbankdeal.com/product/using-information-
technology-11th-edition-williams-test-bank/

MGMT 10th Edition Williams Test Bank

https://testbankdeal.com/product/mgmt-10th-edition-williams-test-
bank/

Information Technology Auditing 3rd Edition Hall Test


Bank

https://testbankdeal.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/
Information Technology Auditing 4th Edition Hall Test
Bank

https://testbankdeal.com/product/information-technology-
auditing-4th-edition-hall-test-bank/

Managing Information Technology 7th Edition Brown Test


Bank

https://testbankdeal.com/product/managing-information-
technology-7th-edition-brown-test-bank/

Using Financial Accounting Information The Alternative


to Debits and Credits 10th Edition Porter Test Bank

https://testbankdeal.com/product/using-financial-accounting-
information-the-alternative-to-debits-and-credits-10th-edition-
porter-test-bank/

Information Technology Project Management 9th Edition


Schwalbe Test Bank

https://testbankdeal.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/

Information Technology for Managers 1st Edition


Reynolds Test Bank

https://testbankdeal.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.


A. continuous
B. digital
C. sequential
D. analog

2. Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

3. Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog

6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

7. A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

8. A network that covers a wide geographical area is called a ________.


A. LAN
B. WAN
C. MAN
D. HAN

9. A network that covers a city or a suburb is called a(n) ________.


A. WAN
B. LAN
C. MAN
D. Internet

6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

14. A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet

16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node

17. Any device that is attached to a network is referred to as a ________.


A. server
B. host
C. node
D. router

18. A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge

6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

23. Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

30. A type of wired communications technology used to connect equipment in a home


network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

32. The ________ is the basis for ALL telecommunications signals.


A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

35. Which of the following is NOT a type of wireless communications media?


A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

36. What form of wireless transmission sends data to an AM or FM receiver?


A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

37. Which of these types of wireless transmission is limited to line-of-sight communications?


A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

38. Transmitting a signal from a ground station to a satellite is called ________.


A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

42. Broadband technology (wireless digital services) is also referred to as ________-


generation wireless services.
A. first
B. second
C. third
D. fourth

43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

47. Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

50. Which of the following is NOT a way to spread a virus?


A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

51. A person who gains unauthorized access to computer or telecommunications systems


without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics

57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

58. Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

60. RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

True / False Questions

61. Analog refers to communications signals represented in a binary format.


True False

62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False

63. A thermometer and a speedometer are examples of analog devices.


True False

64. Telephones have always been digital devices.


True False

6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False

66. "Modem" is short for modulate/demodulate.


True False

67. Capturing music digitally means that one has an exact duplicate of the music.
True False

68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False

69. The Internet is a WAN.


True False

70. A LAN is a type of network that covers a wide geographical area.


True False

71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False

72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False

6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False

74. "File server" and "database server" are different names for the same type of server.
True False

75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False

76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False

77. Routers join multiple wired and/or wireless networks.


True False

78. A gateway is an interface device permitting communication between similar networks.


True False

79. An interface device used to connect the same types of networks is called a node.
True False

80. The backbone is the main communications route in a bus network topology.
True False

6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False

82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False

83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False

84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False

85. Most microcomputers come with Ethernet capability.


True False

86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False

87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False

88. The two general classes of bandwidth are long and short.
True False

6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

89. The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it


carries most communications signals.
True False

90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False

91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False

92. Infrared transmission is a type of low-frequency wireless transmission that is short-range


and line-of-sight.
True False

93. GPS satellites use medium-Earth-orbits.


True False

94. Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.


True False

95. Analog cellphones were 1G phones.


True False

6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False

97. Communications satellites are microwave relay stations in orbit around the earth.
True False

98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False

99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False

100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False

101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False

102. Analog cellphones are 2G (second-generation) phones.


True False

103. Cellphones are basically two-way radios.


True False

6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

104. 2G and 3G cellphones are digital, not analog.


True False

105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False

106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False

107. The latest version of Wi-Fi (IEEE 802.11 standard) is version a.


True False

108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False

109. Bluetooth is a short-range, wireless communications method for linking cellphones,


PDAs, computers, and some other peripherals up to distances of 30 feet.
True False

110. A denial-of-service attack uses a virus to crash your computer.


True False

111. Worms, viruses, and Trojan horse are all malware.


True False

6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False

113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False

114. A virus is capable of destroying or corrupting data.


True False

115. Cellphones do not get infected by malware.


True False

116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False

117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False

118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False

6-20
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

119. Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
True False

120. There are two basic types of data encryption.


True False

121. Two kinds of secret keys are used in public key encryption.
True False

122. In public key encryption, only the receiver of an encrypted message knows the private
key needed to decrypt the message.
True False

Fill in the Blank Questions

123. Communications signals represented in a binary electronic format are ________ signals.
________________________________________

124. Signals such as sound and temperature, which continuously vary in strength and quality,
are ________ signals.
________________________________________

125. So they can be sent over a telephone line, analog signals are converted into digital
signals, and then back again, by using ________.
________________________________________

Short Answer Questions

6-21
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

126. The text lists six benefits of networks: ________, ________, ________, ________,
________, and ________.

127. Four disadvantages of networks are ________, ________, ________, and ________.

128. The text lists seven types of networks: ________, ________, ________, ________,
_________, ________, and ________.

Fill in the Blank Questions

129. A peer-to-peer (P2P) network operates without relying on a ________.


________________________________________

130. Private networks that use a public network, usually the Internet, to connect remote sites
are called ________.
________________________________________

6-22
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

131. An intranet that allows access to selected outside users is a(n) ________.
________________________________________

132. A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________

133. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________

134. A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________

135. A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
________________________________________

136. ________ are physical devices that join multiple wired and/or wireless networks; their
primary job is to provide connectivity.
________________________________________

137. A network can be laid out in different ways. The layout, or shape, is called a ________.
________________________________________

6-23
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

138. The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________

139. The system software that manages the activity of a network is called the ________.
________________________________________

140. A computer sends and receives messages over a cable network using a ________, which
is inserted in an expansion slot on the motherboard.
________________________________________

141. A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________

142. A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
________________________________________

143. The Internet uses the ________ network topology.


________________________________________

144. In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and describes how data can be
sent.
________________________________________

6-24
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

145. Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
________________________________________

146. Wired communications media include three main types. Insulated copper wire wrapped
in a solid or braided shield and then an external cover is called ________ cable.
________________________________________

147. Wired communications media include three main types. The kind used for transmitting
pulses of light is ________.
________________________________________

148. HomePlug technology is a wired communications standard that allows users to connect
equipment within the home using the house's own ________ wiring.
________________________________________

149. Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________

150. The _________ is the basis for ALL telecommunications signals, both wired and
wireless, and the _________ is the part that carries most communications signals.
________________________________________

151. The range of frequencies that a transmission medium can carry in a given period of time
is called its ________.
________________________________________

6-25
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
152. The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________

153. A transmission medium's speed is usually measured in ________ or ________.


________________________________________

Short Answer Questions

154. The text covers five types of wireless communications media: ________, ________,
________, _________, and ________.

Fill in the Blank Questions

155. Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________

156. The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________

157. Global Positioning Systems use ________ to continuously transmit signals to identify
earth locations.
________________________________________

6-26
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

158. The Global Positioning System is an example of a ________-way long-distance


communications system.
________________________________________

159. Simple one-way radio receivers that receive data (but not voice messages) are called
________.
________________________________________

160. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________

161. Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping portable
computers and handheld wireless devices to communicate at high speeds and share Internet
connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi version?
________________________________________

162. The short-range, wireless digital standard aimed at linking hand-held devices up to 33
feet apart is called ________.
________________________________________

163. The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________

164. Worms, viruses, and Trojan horses are all types of programs called ________.
________________________________________

6-27
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

165. A(n) ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive and that can cause the computer to crash.
________________________________________

166. A(n) ________ is a "deviant" program that attaches itself to a program or file and can
cause unexpected and undesirable effects, such as destroying or corrupting data.
________________________________________

167. A ________ is a program that pretends to be a useful program, usually free, such as a
game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
________________________________________

168. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
________________________________________

169. Malware can be spread by using a(n) ________ disk, flash drive, CD; opening unknown
email _________; clicking on ________ websites; and/or through contaminated Wi-Fi hot
spots.
________________________________________

170. People who illegally break into computers for malicious purposes are known as
________.
________________________________________

Short Answer Questions

6-28
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

171. The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.

Fill in the Blank Questions

172. ________ software can be used to scan a computer's hard disk, CDs, and main memory
to detect viruses.
________________________________________

173. A system of hardware and/or software that protects a computer or network from intruders
is called a ________.
________________________________________

Short Answer Questions

174. Five types of biometric authentication are ________, ________, ________, _________,
and _________.

6-29
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

Fill in the Blank Questions

175. The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
________________________________________

176. A message sent in its original undisguised, readable form is ________.


________________________________________

177. Message encryption involves converting plain text to ________.


________________________________________

Essay Questions

178. How do analog and digital devices interpret electrical signals?

179. What is the primary purpose of the modem?

6-30
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

180. List four advantages and four disadvantages of networks.

181. What are the main differences between a WAN, a MAN, and a LAN?

182. What is the difference between a client/server network and a peer-to-peer network?

183. Describe what a packet is and what it does.

6-31
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

184. Describe the network topology used by the Internet.

185. Distinguish between narrowband and broadband.

186. What are some of the uses and limitations of GPS?

187. Basically, how does Wi-Fi work?

6-32
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

188. What is wireless USB?

189. What are four ways in which viruses and worms get passed?

190. Name at least five ways to minimize virus attacks.

191. List at least five rules for creating good passwords.

6-33
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Multiple Choice Questions

1. (p. 313) Communications signals represented in a binary format are said to be ________.
A. continuous
B. digital
C. sequential
D. analog

Difficulty: Easy

2. (p. 313) Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

Difficulty: Easy

3. (p. 313-314) Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

Difficulty: Easy

6-34
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

4. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be
A. spontaneous
B. digital
C. sequential
D. analog

Difficulty: Easy

5. (p. 315-316) The ________ is a device that converts digital computer signals into analog signals
so that they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

Difficulty: Easy

6. (p. 316) A person sending a document over a phone line by converting digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

Difficulty: Easy

6-35
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

7. (p. 317) A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

Difficulty: Easy

8. (p. 320) A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN

Difficulty: Easy

9. (p. 320) A network that covers a city or a suburb is called a(n) ________.
A. WAN
B. LAN
C. MAN
D. Internet

Difficulty: Easy

10. (p. 322) Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

Difficulty: Medium

6-36
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

11. (p. 322) A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

Difficulty: Easy

12. (p. 323) A computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

Difficulty: Medium

13. (p. 324-325) If an organization's internal private network uses the same infrastructure and
standards of the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

Difficulty: Medium

14. (p. 325-326) A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

Difficulty: Medium

6-37
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

15. (p. 320) A ________ is the set of rules that govern the exchange of data between hardware
and/or software components in a communications network.
A. host
B. protocol
C. database
D. packet

Difficulty: Medium

16. (p. 326) A mainframe computer that controls a large network is called the ________
computer.
A. slave
B. host
C. client
D. node

Difficulty: Easy

17. (p. 326) Any device that is attached to a network is referred to as a ________.
A. server
B. host
C. node
D. router

Difficulty: Easy

18. (p. 326) A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

Difficulty: Easy

6-38
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

19. (p. 327) A common connection device that connects computers to a network is called a
________.
A. router
B. gateway
C. switch
D. bridge

Difficulty: Easy

20. (p. 328) To create larger networks, a bridge connects the same types of networks, and a
________ connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

Difficulty: Hard

21. (p. 328) A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

Difficulty: Medium

6-39
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

22. (p. 329) In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

Difficulty: Medium

23. (p. 329) Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

Difficulty: Easy

24. (p. 330) In the ________ network topology, communications devices are connected to a
single cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

6-40
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

25. (p. 331) What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

26. (p. 331) What kind of topology (layout) is used by a network that connects all its computers
and communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

27. (p. 332) ________ is the most common and most widely used LAN technology; it can be
used with almost any kind of computer; most microcomputers come with a port for this type
of network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

Difficulty: Medium

6-41
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

28. (p. 333) A communications medium is a channel; there are three types of wired
communications media. The one consisting of two strands of insulated copper wire, used by
tradition telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Difficulty: Medium

29. (p. 334) What wired channel, commonly used for cable TV, consists of an insulated copper
wire wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

Difficulty: Medium

30. (p. 335) A type of wired communications technology used to connect equipment in a home
network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

Difficulty: Medium

6-42
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

31. (p. 334) What wired communications medium consists of dozens or hundreds of thin strands
of glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Difficulty: Easy

32. (p. 335-336) The ________ is the basis for ALL telecommunications signals.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Difficulty: Medium

33. (p. 337) The ________ is the range of frequencies that a transmission medium (channel) can
carry in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Difficulty: Medium

6-43
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

34. (p. 339) What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

Difficulty: Hard

35. (p. 339) Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

Difficulty: Medium

36. (p. 339) What form of wireless transmission sends data to an AM or FM receiver?
A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

Difficulty: Medium

37. (p. 339) Which of these types of wireless transmission is limited to line-of-sight
communications?
A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

Difficulty: Medium

6-44
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

38. (p. 340) Transmitting a signal from a ground station to a satellite is called ________.
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

Difficulty: Easy

39. (p. 341) The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

Difficulty: Medium

40. (p. 342) GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals
used to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

Difficulty: Hard

41. (p. 347-348) Which of the following is NOT a type of long-distance wireless two-way
communications device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

Difficulty: Medium

6-45
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

42. (p. 347) Broadband technology (wireless digital services) is also referred to as ________-
generation wireless services.
A. first
B. second
C. third
D. fourth

Difficulty: Easy

43. (p. 349) What short-distance wireless standard is used to link portable computers and
handheld wireless devices so they may communicate at high speeds at distances of 100-228
feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

Difficulty: Medium

44. (p. 352) What short-distance wireless standard is used to link cell phones, PDAs, and
computers at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

Difficulty: Medium

6-46
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

45. (p. 355) A ________ attack disables a computer system or network by making so many
requests of it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

Difficulty: Medium

46. (p. 355) A ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

Difficulty: Easy

47. (p. 355-357) Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

Difficulty: Medium

6-47
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

48. (p. 358) Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

Difficulty: Medium

49. (p. 358) A botmaster uses malware to hijack hundreds or thousands of computers and
controls them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

Difficulty: Medium

50. (p. 358) Which of the following is NOT a way to spread a virus?
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

Difficulty: Medium

6-48
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

51. (p. 359) A person who gains unauthorized access to computer or telecommunications
systems without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

Difficulty: Easy

52. (p. 360) A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

Difficulty: Easy

53. (p. 359) Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

Difficulty: Medium

6-49
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

54. (p. 361) What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

Difficulty: Easy

55. (p. 361) What is the science, often used in computer security systems, of measuring
individual body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

Difficulty: Easy

56. (p. 361) Fingerprint scanners, face-recognition systems, and iris-recognition systems are
based on ________.
A. encryption
B. decryption
C. password protection
D. biometrics

Difficulty: Easy

6-50
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

57. (p. 362) What is the process of altering readable data (plain text) into unreadable form to
prevent unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

Difficulty: Easy

58. (p. 362-363) Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

Difficulty: Hard

59. (p. 362-363) ____________ encryption uses the same secret key to encrypt and decrypt a
message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

Difficulty: Medium

60. (p. 363) RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

Difficulty: Hard

6-51
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

True / False Questions

61. (p. 313-314) Analog refers to communications signals represented in a binary format.
FALSE

Difficulty: Easy

62. (p. 313-314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be digital.
FALSE

Difficulty: Easy

63. (p. 314) A thermometer and a speedometer are examples of analog devices.
TRUE

Difficulty: Easy

64. (p. 314) Telephones have always been digital devices.


FALSE

Difficulty: Easy

65. (p. 316) A modem converts digital signals into analog signals so they can be sent over a
telephone line.
TRUE

Difficulty: Easy

6-52
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

66. (p. 316) "Modem" is short for modulate/demodulate.


TRUE

Difficulty: Easy

67. (p. 317) Capturing music digitally means that one has an exact duplicate of the music.
FALSE

Difficulty: Hard

68. (p. 317) A network is a system of interconnected computers and communications devices
that can communicate and share resources.
TRUE

Difficulty: Easy

69. (p. 320) The Internet is a WAN.


TRUE

Difficulty: Medium

70. (p. 320-321) A LAN is a type of network that covers a wide geographical area.
FALSE

Difficulty: Easy

6-53
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

71. (p. 322) A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
TRUE

Difficulty: Easy

72. (p. 323-324) Client/server networks and peer-to-peer networks are the same except that the
first type of network uses a mainframe and the second type uses only microcomputers.
FALSE

Difficulty: Medium

73. (p. 323) The computer that acts like a disk drive, storing the programs and data files shared
by users on a LAN, is called a file server.
TRUE

Difficulty: Easy

74. (p. 323) "File server" and "database server" are different names for the same type of server.
FALSE

Difficulty: Easy

75. (p. 325-326) Virtual private networks (VPNs) are private networks that use a public network
(usually the Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE

Difficulty: Easy

6-54
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

76. (p. 326-327) In a network, communications protocols specify the type of electrical
connections, the timing of message exchanges, and error-detection techniques.
TRUE

Difficulty: Medium

77. (p. 328) Routers join multiple wired and/or wireless networks.
TRUE

Difficulty: Easy

78. (p. 328) A gateway is an interface device permitting communication between similar
networks.
FALSE

Difficulty: Medium

79. (p. 328) An interface device used to connect the same types of networks is called a node.
FALSE

Difficulty: Medium

80. (p. 329) The backbone is the main communications route in a bus network topology.
FALSE

Difficulty: Medium

6-55
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

81. (p. 331) In a bus network, all computers and communications devices are connected in a
continuous loop.
FALSE

Difficulty: Easy

82. (p. 333) Traditional landline telephone systems use twisted-pair wire as their
communications medium.
TRUE

Difficulty: Easy

83. (p. 334) A cable that is made up of dozens of thin strands of glass and transmits pulsating
beams of light is called a coaxial cable.
FALSE

Difficulty: Easy

84. (p. 335) A wired communications standard that allows users to send data over a home's
existing electrical (AC) power lines is called HomePlug technology.
TRUE

Difficulty: Easy

85. (p. 335) Most microcomputers come with Ethernet capability.


TRUE

Difficulty: Easy

6-56
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

86. (p. 336) All wired and wireless communications media use the electromagnetic spectrum of
radiation.
TRUE

Difficulty: Easy

87. (p. 337) The smaller the bandwidth of a medium, the more frequencies it can use to transmit
data.
FALSE

Difficulty: Easy

88. (p. 337) The two general classes of bandwidth are long and short.
FALSE

Difficulty: Easy

89. (p. 337) The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
TRUE

Difficulty: Easy

90. (p. 337) The frequency of an electromagnetic wave is the number of times the wave repeats,
or makes a cycle, in a second.
TRUE

Difficulty: Medium

6-57
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

91. (p. 337-338) Both digital narrowband and broadband transmission speeds are measured in
megabits or gigabits per second.
TRUE

Difficulty: Medium

92. (p. 339) Infrared transmission is a type of low-frequency wireless transmission that is short-
range and line-of-sight.
TRUE

Difficulty: Medium

93. (p. 341) GPS satellites use medium-Earth-orbits.


TRUE

Difficulty: Easy

94. (p. 340, 352) Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.
TRUE

Difficulty: Easy

95. (p. 346) Analog cellphones were 1G phones.


TRUE

Difficulty: Easy

6-58
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

96. (p. 340) Satellite transmission uses in-orbit satellites and earth stations. Transmitting from
the ground to the satellite is called downlinking, and transmitting from the satellite to the
ground station called uplinking.
FALSE

Difficulty: Easy

97. (p. 340) Communications satellites are microwave relay stations in orbit around the earth.
TRUE

Difficulty: Easy

98. (p. 341) Satellite orbits are at three levels: GEO, MEO, and LEO.
TRUE

Difficulty: Easy

99. (p. 341) A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
FALSE

Difficulty: Hard

100. (p. 342) GPS uses MEO satellites that continuously transmit timed radio signals used to
identify earth locations.
TRUE

Difficulty: Easy

6-59
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

101. (p. 342-343) Because of the excellence of satellite technology, GPS location IDs are 100%
accurate.
FALSE

Difficulty: Easy

102. (p. 346-347) Analog cellphones are 2G (second-generation) phones.


FALSE

Difficulty: Easy

103. (p. 346) Cellphones are basically two-way radios.


TRUE

Difficulty: Easy

104. (p. 347) 2G and 3G cellphones are digital, not analog.


TRUE

Difficulty: Easy

105. (p. 349) The short-range, wireless communications method aimed at linking hand-held
devices at high speeds and at distances of 100-228 feet is called Wi-Fi.
TRUE

Difficulty: Easy

6-60
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

106. (p. 349-350) A Wi-Fi enabled laptop computer accesses the available network (say, at an
airport) through an access point, which is connected to a land-based Internet connection.
TRUE

Difficulty: Easy

107. (p. 349-350) The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
FALSE

Difficulty: Medium

108. (p. 351-352) Wi-Fi connections are always secure; no one can steal your data when you are
online.
FALSE

Difficulty: Easy

109. (p. 352) Bluetooth is a short-range, wireless communications method for linking cellphones,
PDAs, computers, and some other peripherals up to distances of 30 feet.
TRUE

Difficulty: Easy

110. (p. 355-356) A denial-of-service attack uses a virus to crash your computer.
FALSE

Difficulty: Medium

6-61
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

111. (p. 354) Worms, viruses, and Trojan horse are all malware.
TRUE

Difficulty: Easy

112. (p. 356) A Trojan horse pretends to be a useful program, such as a game or a screen saver,
but it carries a virus that replicates in your computer over and over until your computer
crashes.
FALSE

Difficulty: Medium

113. (p. 355-356) A virus is a "deviant" program that is stored on a computer hard drive and can
cause unexpected and undesirable effects.
TRUE

Difficulty: Easy

114. (p. 355-356) A virus is capable of destroying or corrupting data.


TRUE

Difficulty: Easy

115. (p. 359) Cellphones do not get infected by malware.


FALSE

Difficulty: Easy

6-62
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

116. (p. 359) Sneakers are people who gain unauthorized access to computer or
telecommunications systems, often just for the challenge of it.
FALSE

Difficulty: Easy

117. (p. 360) People who illegally break into computers for malicious purposes to obtain
information for financial gain, shut down hardware, pirate software, or alter or destroy data
are known as hackers.
FALSE

Difficulty: Easy

118. (p. 361) If you have more than one computer linked to the Internet by a cable modem, you
need a software firewall to protect your system.
FALSE

Difficulty: Medium

119. (p. 362) Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
TRUE

Difficulty: Easy

120. (p. 362-363) There are two basic types of data encryption.
TRUE

Difficulty: Medium

6-63
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

121. (p. 362-363) Two kinds of secret keys are used in public key encryption.
TRUE

Difficulty: Medium

122. (p. 362-363) In public key encryption, only the receiver of an encrypted message knows the
private key needed to decrypt the message.
TRUE

Difficulty: Medium

Fill in the Blank Questions

123. (p. 313) Communications signals represented in a binary electronic format are ________
signals.
digital

Difficulty: Easy

124. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are ________ signals.
analog

Difficulty: Easy

125. (p. 315-316) So they can be sent over a telephone line, analog signals are converted into
digital signals, and then back again, by using ________.
modems

Difficulty: Easy

6-64
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Short Answer Questions

126. (p. 318-319) The text lists six benefits of networks: ________, ________, ________,
________, ________, and ________.

sharing of peripheral devices, sharing of programs and data, better communications,


centralized communications, security of information, access to databases

Difficulty: Hard

127. (p. 319) Four disadvantages of networks are ________, ________, ________, and
________.

expense, security issues (breaking of security precautions), rapid spread of viruses,


dependency on the mail file server

Difficulty: Hard

128. (p. 320-321) The text lists seven types of networks: ________, ________, ________,
________, _________, ________, and ________.

wide area network, metropolitan area network, local area net work, home area network,
personal area network, home automation network

Difficulty: Hard

6-65
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Fill in the Blank Questions


129. (p. 318) A peer-to-peer (P2P) network operates without relying on a ________.
server

Difficulty: Medium

130. (p. 324) Private networks that use a public network, usually the Internet, to connect remote
sites are called ________.
virtual private networks (VPNs)

Difficulty: Medium

131. (p. 325) An intranet that allows access to selected outside users is a(n) ________.
extranet

Difficulty: Medium

132. (p. 325) A set of conventions that govern how data is exchanged between devices on a
network is known as a communications ________.
protocol

Difficulty: Easy

133. (p. 326) Electronic messages are sent as ________, fixed-length blocks of data for
transmission.
packets

Difficulty: Medium

6-66
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

134. (p. 327) A _________ is a network that connects computers to a network; data can be sent
in both directions at the same time.
switch

Difficulty: Medium

135. (p. 328) A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
bridge; gateway

Difficulty: Medium

136. (p. 328) ________ are physical devices that join multiple wired and/or wireless networks;
their primary job is to provide connectivity.
Routers

Difficulty: Easy

137. (p. 329) A network can be laid out in different ways. The layout, or shape, is called a
________.
topology

Difficulty: Easy

138. (p. 329) The ________ consists of the main "highway" that connects all computer networks
in an organization.
backbone

Difficulty: Easy

6-67
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

139. (p. 329) The system software that manages the activity of a network is called the
________.
network operating system (NOS)

Difficulty: Medium

140. (p. 329) A computer sends and receives messages over a cable network using a ________,
which is inserted in an expansion slot on the motherboard.
network interface card (NIC)

Difficulty: Medium

141. (p. 330) A ________ network topology is one in which all microcomputers and other
devices are connected in a continuous loop.
ring

Difficulty: Easy

142. (p. 330) A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
star

Difficulty: Easy

143. (p. 331) The Internet uses the ________ network topology.
mesh

Difficulty: Medium

6-68
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

144. (p. 331) In small LANs, messages may bump into one another. The most popular protocol,
or technology, which uses cabling and special ports on microcomputers, that prevents
collisions is ________. It can be used with almost any kind of computer and describes how
data can be sent.
Ethernet

Difficulty: Medium

145. (p. 333) Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
twisted-pair wire

Difficulty: Easy

146. (p. 334) Wired communications media include three main types. Insulated copper wire
wrapped in a solid or braided shield and then an external cover is called ________ cable.
coaxial ("coax")

Difficulty: Medium

147. (p. 334) Wired communications media include three main types. The kind used for
transmitting pulses of light is ________.
fiber-optic cable

Difficulty: Easy

148. (p. 335) HomePlug technology is a wired communications standard that allows users to
connect equipment within the home using the house's own ________ wiring.
electrical

Difficulty: Medium

6-69
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

149. (p. 336) Telecommuting means using a computer and networks to work from ________;
telework means working from ________.
home; anywhere

Difficulty: Medium

150. (p. 335-337) The _________ is the basis for ALL telecommunications signals, both wired
and wireless, and the _________ is the part that carries most communications signals.
electromagnetic spectrum of radiation; radio-frequency (RF) spectrum

Difficulty: Hard

151. (p. 337) The range of frequencies that a transmission medium can carry in a given period of
time is called its ________.
bandwidth

Difficulty: Medium

152. (p. 337) The ________ a transmission medium's bandwidth, the more frequencies it can use
to transmit data and the faster it is.
wider

Difficulty: Easy

153. (p. 337-338) A transmission medium's speed is usually measured in ________ or ________.
megabits per second; gigabits per second

Difficulty: Medium

6-70
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Short Answer Questions

154. (p. 339) The text covers five types of wireless communications media: ________,
________, ________, _________, and ________.

infrared; broadcast radio; cellular radio; microwave radio; communications satellites

Difficulty: Hard

Fill in the Blank Questions

155. (p. 339) Infrared and microwave transmission signals cannot work around obstacles or
travel in curved lines, so they are called _________.
line-of-sight

Difficulty: Medium

156. (p. 341) The highest level that a satellite can occupy is the ________ earth orbit.
geostationary (GEO)

Difficulty: Medium

157. (p. 342) Global Positioning Systems use ________ to continuously transmit signals to
identify earth locations.
satellites

Difficulty: Easy

6-71
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

158. (p. 342) The Global Positioning System is an example of a ________-way long-distance
communications system.
one

Difficulty: Medium

159. (p. 345) Simple one-way radio receivers that receive data (but not voice messages) are
called ________.
pagers

Difficulty: Easy

160. (p. 346-348) 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
analog; digital

Difficulty: Easy

161. (p. 351) Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping
portable computers and handheld wireless devices to communicate at high speeds and share
Internet connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi
version?
n (after b, a, and g)

Difficulty: Medium

162. (p. 352) The short-range, wireless digital standard aimed at linking hand-held devices up to
33 feet apart is called ________.
Bluetooth

Difficulty: Easy

6-72
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

163. (p. 353-354) The three short-range wireless standards used in home automation networks, for
linking switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
Z-Wave

Difficulty: Medium

164. (p. 354) Worms, viruses, and Trojan horses are all types of programs called ________.
malware

Difficulty: Easy

165. (p. 356) A(n) ________ is a program that copies itself repeatedly into a computer's memory
or onto a disk drive and that can cause the computer to crash.
worm

Difficulty: Easy

166. (p. 355-356) A(n) ________ is a "deviant" program that attaches itself to a program or file
and can cause unexpected and undesirable effects, such as destroying or corrupting data.
virus

Difficulty: Easy

167. (p. 356) A ________ is a program that pretends to be a useful program, usually free, such as
a game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
Trojan horse

Difficulty: Easy

6-73
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

168. (p. 358) A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
botmaster, zombies

Difficulty: Medium

169. (p. 358) Malware can be spread by using a(n) ________ disk, flash drive, CD; opening
unknown email _________; clicking on ________ websites; and/or through contaminated Wi-
Fi hot spots.
infected; attachments; infiltrated (or infected)

Difficulty: Hard

170. (p. 360) People who illegally break into computers for malicious purposes are known as
________.
crackers

Difficulty: Easy

Short Answer Questions

171. (p. 360 ff.) The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.

antivirus software; firewalls; passwords; biometric authentification; encryption

Difficulty: Hard

6-74
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Fill in the Blank Questions

172. (p. 360) ________ software can be used to scan a computer's hard disk, CDs, and main
memory to detect viruses.
Antivirus

Difficulty: Easy

173. (p. 361) A system of hardware and/or software that protects a computer or network from
intruders is called a ________.
firewall

Difficulty: Easy

Short Answer Questions

174. (p. 361-362) Five types of biometric authentication are ________, ________, ________,
_________, and _________.

hand-geometry systems, fingerprint scanners, iris-recognition systems, face-recognition


systems, voice-recognition systems

Difficulty: Hard

Fill in the Blank Questions

175. (p. 362) The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
encryption

Difficulty: Easy

6-75
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

176. (p. 362) A message sent in its original undisguised, readable form is ________.
plain text

Difficulty: Medium

177. (p. 362) Message encryption involves converting plain text to ________.
cybertext

Difficulty: Medium

Essay Questions

178. (p. 314) How do analog and digital devices interpret electrical signals?

Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of electrical/light
pulses represented in a binary way (on or off).

Difficulty: Medium

179. (p. 315-316) What is the primary purpose of the modem?

The primary purpose of the modem ("modulate/demodulate") is to change the computer's


digital signals into analog signals and, at the receiving end, analog signals back into digital
signals so that communications can take place between computers using a standard copper-
wire telephone network or other transmission media that can transmit only analog signals.

Difficulty: Easy

6-76
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

180. (p. 318-319) List four advantages and four disadvantages of networks.

Advantages: sharing of peripheral devices, sharing of programs and data, better


communications, centralized communications, establishing security of information, access to
databases Disadvantages: expense, violation of established security measures, rapid spread of
computer viruses, dependency on the main file server

Difficulty: Hard

181. (p. 320-322) What are the main differences between a WAN, a MAN, and a LAN?

A wide area network (WAN) covers a wide geographic area, such as a country or, in the case
of the Internet, the world. A metropolitan area network (MAN) covers a city or a suburb. A
local area network (LAN) covers a limited geographic area, such as one office, one building,
or a small group of buildings, such as on a college campus.

Difficulty: Medium

6-77
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

182. (p. 323-324) What is the difference between a client/server network and a peer-to-peer
network?

A client/server network consists of clients, which are microcomputers that request data, and
servers, which are central computers used to supply data. In the client/server scheme, central
servers handle all security and file transactions; they are powerful microcomputers that also
manage shared devices. They may run server software for applications such as email and web
browsing, or they may just host a database or be a file server or other kind of server; different
servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to- peer networks, which are relatively
inexpensive to set up, each machine shares its own resources and handles its own security.
Every computer can share files and peripherals with all other computers on the network, given
that all are granted access privileges. Peer-to-peer networks are less expensive than
client/server networks and work effectively for up to 25 computers. Beyond that, they slow
down under heavy use. They are appropriate for small networks, such as small businesses and
home networks.

Difficulty: Medium

6-78
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

183. (p. 326) Describe what a packet is and what it does.

Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2, p. 63)
to break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet-often using different (and most expedient) routes, at different
speeds, and sandwiched in between packets from other messages. Once the packets arrive at
their destination, the receiving computer reassembles them (called packet switching) into
proper sequence to complete the message.
Most modern Wide Area Network (WAN) protocols are based on packet switching
technologies. In contrast, normal telephone service is based on a circuit-switching technology,
in which a dedicated line is allocated for transmission between two parties. Circuit-switching
is ideal when data must be transmitted quickly and must arrive in the same order in which it's
sent. This is the case with most real-time data, such as live audio and video. Packet switching
is more efficient and robust for data that can withstand some delays in transmission, such as
email messages and web pages

Difficulty: Hard

184. (p. 331) Describe the network topology used by the Internet.

In a mesh network topology, messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to any individual
computer to create a mesh network. (Wireless networks are often implemented as a mesh.) In
the previous topologies, star and bus, messages are usually broadcast to every computer,
especially in bus topology. In the ring topology, messages can travel in only one direction-
clockwise or counterclockwise. The Internet employs the mesh topology, and the message,
with the help of routers, finds its route for its destination.

Difficulty: Medium

6-79
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

185. (p. 3337-338) Distinguish between narrowband and broadband.

Narrowband, also known as voiceband, is used for regular telephone communications and is
usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data and
high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL, cable,
satellite, T1, etc. are broadband.

Difficulty: Hard

186. (p. 342-343) What are some of the uses and limitations of GPS?

Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones on;
locating stolen cars; orienting hikers / locating lost hikers; aiding in surveying; monitoring
dangerous geological sites, such as volcanoes; finding lost pets; geocaching; getting map
directions on computers and in cars; determining E911 locations of people making 911 calls
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911 locations
are not always accurate; tracking cellphone users could violate privacy

Difficulty: Medium

187. (p. 349-350) Basically, how does Wi-Fi work?

A land-based Internet connection (DSL, cable, satellite, T1 line) is connected to an antenna


(access point). The access point (hotspot) translates the Internet signals into short-range,
wireless radio waves and broadcasts them over an area about the size of a house (distances of
100-228 feet). Anyone within range who has a receiving antenna, usually on a notebook
computer or a 3G/4G cellphone, can pick up the signals. Sometimes the user must enter a
password to access the Wi-Fi signal. The later versions of Wi-Fi (e.g., n) are faster than the
earlier versions (e.g., b, a, g).

Difficulty: Hard

6-80
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

188. (p. 353) What is wireless USB?

Wireless USB (WUSB) has a typical range of 32 feet and a maximum data rate of 110-480
megabits per second. Wireless USB is used in game controllers, printers, scanners, digital
cameras, MP3/MP4 players, hard disks, and flash drives. With more than 2 billion legacy
wired USB connections in the world today, USB is the de facto standard in the personal
computing industry. Now these fast connections are available in the wireless world, with the
introduction of Wireless USB. Wireless USB is the new wireless extension to USB that
combines the speed and security of wired technology with the ease of use of wireless
technology. Wireless USB supports robust high-speed wireless connectivity by utilizing the
common WiMedia MB-OFDM Ultra-wideband (UWB) radio platform as developed by the
WiMedia Alliance. Wireless USB will preserve the functionality of wired USB while also
unwiring the cable connection and providing enhanced support for streaming media devices
and peripherals.

Difficulty: Hard

189. (p. 358) What are four ways in which viruses and worms get passed?

Four ways in which viruses and worms get passed are these:
1. by infected disks or flash drives
2. by opening unknown email attachments
3. by clicking on infiltrated (infected) websites
4. through infiltrated Wi-Fi hot spots

Difficulty: Medium

6-81
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

190. (p. 359) Name at least five ways to minimize virus attacks.

1. Don't open unknown files or email attachments.


2. Delete all spam and email messages from strangers.
3. Use webmail sparingly.
4. Don't start your computer with a CD or flash drive in place.
5. Back up all files regularly on a device separate from your computer or online.
6. Use virus protection software and make sure that the software automatically updates itself
often from the manufacturer's website.
7. Use a firewall-either the one that came with the computer's system software or a firewall
purchased separately.
8. Update your antivirus software and firewall frequently.
9. Use your antivirus and firewall software to scan your computer regularly and
quarantine/destroy any problem "bugs" that turn up on the list.
10. Set your antivirus program to automatically scan all incoming and outgoing email
attachments.
11. Set your firewall to alert you to "dicey" websites.

Difficulty: Medium

191. (p. 364) List at least five rules for creating good passwords.

1. on't tell anyone your username and password.


2. Don't use passwords that can be easily guessed.
3. Avoid any word that appears in the dictionary.
4. Combine letters with numbers and other keyboard characters.
5. Create long passwords.
6. Don't use the same password for multiple sites.
7. Change passwords often.
8. Don't write your passwords down on sticky notes, in a notebook, or tape them under, for
example, your keyboard.
9. Don't carry passwords in your wallet.
10. Create a system for remembering passwords without writing them down.
11. Save all your passwords in a single encrypted file.

Difficulty: Medium

6-82
Another random document with
no related content on Scribd:
Pierre Rode (1774-1830) was the greatest of the players of this
period. He was for two years a pupil of Viotti, and when he made his
initial public appearance in 1790 at the Théâtre de Monsieur he
played Viotti’s thirteenth concerto in such a way as to win instantly
the admiration of all musical Paris. Considering that he was then but
a boy of sixteen, and that Paris was accustomed to the playing of
Kreutzer, Viotti, Gaviniés and other violinists of undisputed
greatness, one can have little doubt that Rode had the power of true
genius. This is further borne out by the fact that when he passed
through Brunswick on a concert tour to Poland in 1803, Spohr heard
him and was so struck with admiration for his style that he
determined to train himself with the ideal of Rode in his mind. Later
his playing fell off sadly and even in Paris he finally ceased to hold
the favor of the public.

Like Kreutzer he came into contact with Beethoven. Beethoven’s


sonata for violin in G major (opus 96) was completed for Rode, and
was apparently performed for the first time (1812) by Rode and
Beethoven’s pupil, the Archduke Rudolph. Even then, however,
Rode’s playing was faulty, and, according to Thayer, Beethoven sent
a copy of the violin part to him that he might study it before
attempting a second performance.

Like Kreutzer’s, Rode’s compositions, with the exception of twenty-


five caprices written as exercises, have been nearly forgotten. And
yet, though Rode was without conspicuous musicianship, he had a
gift for melody which made his compositions widely popular in their
day. Of his thirteen concertos two, the first, in D minor, the eleventh,
in A minor, were in the repertory of Paganini, who, moreover,
professed a high admiration for Rode. And among the earliest of his
compositions was a theme in G major, with variations, which won
such broad success that it was transposed and arranged for the
voice, and sung again and again on the stages of Paris.[51] Perhaps
only Paganini’s variations on the ‘Carnival of Venice’ have been so
popular.
Pierre Marie François de Sales Baillot (1771-1842) was the last of
the great French violinists of this time. Though as a mere boy he was
an accomplished player, and though he spent some years in Italy as
a pupil of Pollani (who was a disciple of Nardini’s), he seems not to
have decided to take up the profession of music until 1795. At this
time, according to Fétis, he first became thoroughly acquainted with
the masterpieces of the Italian classical composers, Corelli, Tartini,
and others, and the enthusiasm they stirred in him settled the future
course of his career. Upon the founding of the Conservatoire he was
appointed professor of violin playing, with Kreutzer and Gaviniés.
Subsequently he was active as a teacher, and not only as a solo
player but as a quartet leader. His was the greatest share in the
preparation of the Méthode which has already been mentioned. He
was a friend of Mendelssohn and of Ferdinand Hiller, and was much
admired by them for his qualities both as a player and as a leader.
His compositions, including fifteen trios for two violins and bass,
various studies, nine concertos, and a series of twenty-four preludes
for violin in all keys, have suffered the fate that has overtaken the
music of his friends and colleagues, Kreutzer and Rode. But his
instruction book, L’art du violin, is still worthy of most careful study,
not only for the technical advantages of its many exercises, but for
his own remarks on the condition of violin music in his day. These
offer to the student the best analysis of the qualities of the Paris
school of violin music, and of the relations of that school to the past.

II
The French school of classic violin music, represented by Rode and
Baillot, may be said to have come to an end at least partly by the
influence of Paganini. This greatest of all virtuosos made his first
appearance in Paris on March 9, 1831, after having astonished
Austria and Germany. His success was here as elsewhere
instantaneous and practically unbounded; and the examples his
playing offered of extraordinary technical effects became the model
for subsequent French violinists.
There are three virtuosos of the violin whose names stand out
conspicuously in the history of violin music: Locatelli, Lolli, and
Paganini. Each of these men is noted for special and in many ways
overstretched efforts to bring out of the instrument sounds and
combinations of sounds which, in that they can have little true
musical significance and are indeed often of questionable beauty,
are considered rather a sign of charlatanism than of true genius. This
really means that the men are not geniuses as musicians, but as
performers. Their intelligence is concentrated upon a discovery of
the unusual. They adopt any means to the end of astonishing the
multitude, such as altering the conventional tuning of the instrument,
and employing kinds of strings which are serviceable only in the
production of certain effects.

Of Locatelli some mention has already been made. He was a pupil of


Corelli and the serious traditions of his master have found a worthy
expression in many of his own works. On the other hand, his twenty-
four caprices, in the L’arte del Violino (1733), and the Caprices
enigmatiques in the L’arte di nuova modulazione, are sheer virtuoso
music and little more. They are the prototypes for many of the
studies and caprices of Paganini, who apparently devoted himself
almost with frenzy to the study of these caprices during the year
1804.

But Locatelli was a thorough musician as well as an astonishing


virtuoso. The type of empty-headed virtuoso who has apparently
nothing in his musical equipment but tricks, is represented by
Antonio Lolli (1730-1802). Here was a man who won unprecedented
success in most of the capitals of Europe, yet who, by all accounts,
knew little or nothing about music. Indeed, there is something
pathetic in his frank admission that he was an ass. ‘How can I play
anything serious?’ he is reported to have asked when requested to
play a simple adagio. Apparently he could neither keep time nor read
even easy music at sight. Yet he could so fiddle that many a man
believed he heard, not the violin, but voices, oboes, and flutes. And
some cried out that he must have ten fingers on the left hand and
five bows in the right. And at least two of his pupils, Woldemar
(1750-1816) and Jarnowick (1745-1804), were famous for no greater
accomplishments. But in the main the ‘tone’ of violin playing was set,
at the end of the century, by the great Italian, Viotti, and his
followers. This endured, as we have said, until the advent of
Paganini in the world of music.

Paganini’s early life in Italy (1784-1828) was at first not free from
hardship, but after 1805, at least, it was brilliantly successful. The
only lessons of importance in his training were received from
Alessandro Rolla (1757-1804). His prodigious skill was almost wholly
due to his own ingenuity, and to his indefatigable industry. There is
every reason to believe that he practiced hour after hour until he was
so exhausted that he fell upon the ground.

During the years between 1801 and 1804 he lived in retirement


under the protection of a lady of high rank, and during these years
gave up his violin and devoted himself almost wholly to the guitar.
This is among the first of his eccentricities, which every now and
then during his triumphant career cropped out to the amazement of
the public of all Europe. He was in fact so unaccountable in many
ways that a whole cycle of fables grew up about him, through which
he loomed up, now as a murderer who had acquired his skill during
long years of imprisonment, now as a man more than half spectre,
who had bought at some hideous price the intimate, and it must be
said wholly serviceable, coöperation of the devil. How many of these
stories were originated and purposely circulated by Paganini himself,
who knew how to cast a spell over the public in more ways than one,
cannot be definitely answered. On more than one occasion he
openly denied them and complained of them not without bitterness,
all with the greatest of plausibleness; and yet one cannot but suspect
that he knew the value of them in attracting the crowd out of a
fearsome curiosity.

After his extended tour over Europe (1827-1834), which brought him
a fame and a fortune hardly achieved since by any performer, he
retired into a semi-private life at his Villa Gaiona, not far from Parma.
From time to time he came again before the public. The more or less
scandalous affair of the ‘Casino Paganini’ in Paris (1836) took a slice
out of his fortune and perhaps seriously impaired his health. He died
on May 27, 1840.

There can be no doubt that whatever the so-called serious musical


value of his playing may have been, it took hold of the whole world
and left a mark upon it. His technique was at once colossal and
special. He built it up with the idea of playing before huge audiences,
and Spohr has remarked that in small surroundings he did not show
to good advantage. He had, of course, an incredible swiftness of
fingering, an amazing skill with the bow, particularly in staccato
passages, which he played, not in the classic manner of Rode, with
a movement of the wrist for each separate note, but by allowing the
bow to spring upon the strings. His intonation was faultless, in runs,
in double-stops and in octaves. Though he used oftenest light strings
in order to secure special effects in harmonics, and these precluded
a full, rich tone in the playing of melodies, yet he could play simple
passages with great sweetness and charm.

So far, however, his technique could hardly have exceeded that of


Rode. It was in the realm of special effects that he proved himself
little less than a wizard. Of these at least three are now within the
command of all the great players of the present day. One was the
combination of the left-hand pizzicato with notes played by the bow;
another the playing of ‘harmonics,’ particularly double-harmonics; the
third the playing of long and difficult movements upon a single string.
Musicians were in that day so baffled by these amazing sounds, of
which Paganini alone seemed to be master, that for years they
attributed to him a special secret power. There was no end of
speculation about Paganini’s secret, which, by the way, he was said
to have imparted to but one man, his pupil Sivori. Now, however, it is
all revealed. In playing pieces upon a single string he was
accustomed to raise the pitch of the string, and to go into the highest
registers by means of harmonics. He changed the tuning of his violin
also in playing his concertos and some of his caprices, and he made
a frequent practice of sliding his fingers, and was not above imitating
sobs, cries, laughter, and on one occasion, of which he has left an
account, somewhat maliciously the braying of donkeys in Ferrara!
Caricature of Paganini.

Statuette by J. P. Dantan (1832).


Still, though the secrets of his mechanism are now clear as day, and
within the control of many even mediocre players, his music,
wherewith he literally set half Europe crazy, has fully responded to
no fingers but his own. This may be because his tricks have become
known and familiar; but more likely his success drew from more than
these tricks, and the secret of it was in his astounding appearance
and uncanny personal magnetism. Tall, lank, gaunt, dark, with
blazing eyes and fingers like a skeleton, he may well have brought
with him a sulphurous halo when he glided like a spectre upon the
stage. He was indeed more a magician than a musician, a sorcerer
too inspired to be called a charlatan.

The effect of his playing upon all branches of music was


instantaneous. His name became the synonym for the highest
perfection in playing and singing of all kinds. In the opinion of
Chopin, Mlle. Sontag is as perfect as Paganini; and in that of
Mendelssohn Chopin upon the piano rivals Paganini upon the violin.
Schumann sets about transcribing the caprices of Paganini for the
piano. Liszt makes of himself a second wonder of the world by
imitating Paganini; and not only that, but expands the technique of
his own instrument to unheard of dimensions.

Paganini’s compositions are for the most part without conspicuous


value, except for the purely technical extravagances which they
display. Relatively few were published during his lifetime. These
include the universally famous twenty-four caprices for solo violin,
opus 1, two sets of sonatas for violin and guitar, and three quartets
for violin, viola, guitar and 'cello. After his death a host of spurious
works appeared; but Fétis gives as genuine two concertos, one in E-
flat, one in B minor, the latter of which contains the Rondo à la
clochette, which was one of his most successful pieces; two sets of
variations, one on an air by S. Mayer, known as Le Stregghe
(‘Witch’s Dance’), one on the immortal air Le carnaval de Venise,
both of which were almost invariably on his programs; and the
Allegro de concerto in perpetual motion.
III
Paganini’s success was hardly less brilliant in Germany than it was
elsewhere in Europe. At least Schumann and Mendelssohn
submitted to the fascination of his incomparable skill. Yet on the
whole violin playing in Germany remained less influenced by
Paganini than it proved to be in France, Belgium and England. This
was not only because of the influence of the great German classics,
nor because the tendency of the German violinists was rather away
from solo virtuosity and toward orchestral and quartet playing; but
largely also because of the firm leadership of Ludwig Spohr,
practically the one man about whom a definite German school of
violin playing of international importance centres.

Spohr was born in the same year as Paganini (1784). His training on
the violin was received from Franz Eck, a descendant of the famous
Mannheim school. But according to his own account, the example of
Rode, whom he heard in 1803, was of great importance in finally
determining his style of playing. His numerous activities took him
considerably beyond the field of playing and composing for the violin.
He was famous as a conductor in Vienna, in Dresden and Berlin,
and in London, whither he was frequently called to undertake the
conducting of his own works. As a composer he was famous for his
symphonies, his oratorios, and his operas. Yet he was not, in a
sense, a great musician; and the only part of his great number of
works which now seems at all likely to endure much longer in
anything but name is made up of the compositions, chiefly the
concertos, for violin.

Of these concertos there are seventeen in all. Among them the


seventh, eighth, and ninth are often singled out as the best; and
indeed these may be said to be the best of all his works. The eighth
was written on the way to a concert tour in Italy, and was intended
especially to please the Italians, and written in a confessedly
dramatic style, in modo d’una scena cantante. None of the concertos
is, strictly speaking, virtuoso music. Naturally all reveal an intimate
knowledge of the peculiarities of the violin; but these hardly over-rule
the claim of the music itself. He calls for a sort of solid playing, for a
particularly broad, deep tone in the cantilena passages, for a heavy,
rather than a light and piquant, bow. He was a big man in stature,
and his hands were powerful and broad. Evidently he was more than
usually confined within the limits of his own individuality; and his
treatment of the violin in the concertos is peculiar to him in its
demand for strength and for unusually wide stretches. Even the
passage work, which, it must be said, is far more original than that
with which even Rode and Viotti were willing to be content, hardly
ever exhibits the quality of grace. He is at times sweet and pure, but
he is almost never bewitching.

A great many will say of him that he deliberately avoids brilliant


display, and they will say it with contentment and pride. But it may be
asked if the avoidance of brilliancy for its own sake is a virtue in a
great musician. This sort of musical chastity becomes perilously like
a convenient apology in the hands of the prejudiced admirer. In the
case of Brahms, for example, it daily becomes more so. And now we
read of Spohr’s unlimited skill as a player and of the dignified
restraint manifested in his compositions for the violin. But by all
tokens the concertos are being reluctantly left behind.

Among his other works for violin the duets have enjoyed a wide
popularity, greater probably than that once enjoyed by Viotti’s. His
Violinschule, published in 1831, has remained one of the standard
books on violin playing. Its remarks and historical comments are,
however, now of greater significance than the exercises and
examples for practice. These, indeed, are like everything Spohr
touched, only a reflection of his own personality; so much so that the
entire series hardly serves as more than a preparation for playing
Spohr’s own works.

Spohr was typically German in his fondness for conducting, and for
the string quartet. As quite a young man he was the very first to bring
out Beethoven’s quartets opus 18, in Leipzig and Berlin. Paganini is
said to have made a favorite of Beethoven’s quartet in F, the first of
opus 59; but Spohr was positively dissatisfied with Beethoven’s work
of this period. Yet Paganini was in no way a great quartet player, and
Spohr was. We cannot but wonder which of these two great fiddlers
will in fifty years be judged the more significant in the history of the
art.

Certainly Spohr was hard and fast conservative, in spite of the fact
that he recognized the greatness of Wagner, and brought out the
‘Flying Dutchman’ and Tannhäuser at the court of Cassel. And what
can we point to now that has sprung from him? On the other hand,
Paganini was a wizard in his day, half-charlatan, perhaps, but never
found out. With the exception of Corelli and Vivaldi he is the only
violinist who, specialist as he was, exerted a powerful influence upon
the whole course of music. For he was like a charge of dynamite set
off under an art that was in need of expanding, and his influence ran
like a flame across the prairie, kindling on every hand. Look at
Schumann and Liszt, at Chopin and even at Brahms. Stop for a
moment to think of what Berlioz demanded of the orchestra, and
then of what Liszt and Wagner demanded. All of music became
virtuoso music, in a sense. It all sprang into life with a new glory of
color. And who but Paganini let loose the foxes to run in the corn of
the Philistines?

Among Spohr’s pupils Ferdinand David (1810-1873) was


undoubtedly the greatest. He was an excellent performer, uniting
with the solidity of Spohr’s style something of the more occasional
fervor of the modern school, following the example of Paganini. His
friendship with Mendelssohn has been perpetuated in music by the
latter’s concerto for the violin, in E minor, which David not only
performed for the first time in March, 1845, but every measure of
which was submitted to his inspection and correction while the work
was in process of being composed.

David has also won a place for himself in the esteem and gratitude
of future generations by his painstaking editing of the works of the
old Italian masters. Few of the great works for the violin but have
passed through his discriminating touch for the benefit of the student
and the public. And as a teacher his fame will live long in that of his
two most famous pupils: Joseph Joachim (1831-1907) and August
Wilhelmj (1845-1908).

IV
How great an influence the group of French violinists exercised upon
violin music and playing in the first quarter of the nineteenth century
is revealed in the training and the characteristics of the famous
Viennese players of the time. Vienna had always proved fertile
ground for the growth of Italian ideas, and the French style
recommended itself to the Viennese not only by the prevalence of
French ideas in the city, owing to political conditions, but also
because this style was in no small measure a continuance of the
Italian style of Viotti.

Among the Viennese violinists may be mentioned Franz Clement


(1780-1842), who, even as a boy of eleven, was making successful
concert tours over Europe. In the years 1791 and 1792 he played in
London in concerts directed by Haydn and Salomon. Here as
elsewhere his playing was admired for its delicacy as well as for its
sureness and clarity, qualities which ever recalled to the public of
that day the playing of Viotti and Rode. He was not above the tricks
of the virtuoso; yet there can be no better proof that he knew how to
use his great technique with the worthiest aim than that Beethoven
dedicated to him his concerto for violin. He was a thorough musician.
They told a story in Vienna, according to Spohr, of how, after hearing
Haydn’s ‘Creation’ only a few times, he was able, using only the text-
book alone, to arrange all the music for the pianoforte so completely
and so accurately that when he showed his copy to old Haydn the
master thought his score must have been stolen and copied. Another
proof of his musicianship is that he was appointed the first
konzertmeister at the Theater an der Wien.

Schuppanzigh’s pupil, Joseph Mayseder (1789-1864), was among


the brilliant and pleasing players of the time. In spite of the fact that
he was at one time a member of his master’s famous quartet, his
tastes seem to have run to a light and more or less frivolous style of
music. The tendency showed itself not only in his playing, but in his
compositions. These included concertos and brilliant salon pieces;
and also string quartets and quintets and other pieces of chamber
music, all now quite out of date.

Perhaps the two most influential of the Viennese violinists were


Joseph Boehm and Heinrich Wilhelm Ernst. Boehm (1798-1867) was
a pupil of Rode, whose acquaintance he made in Poland. Later he
visited Italy, and afterwards was appointed a teacher of the violin in
the Conservatory at Vienna. Though he was famous in his day as a
player who possessed the necessary skill in fingering and bowing,
he was above all a teacher. The list of his pupils includes Ernst, G.
Hellmesberger (b. 1800), Joachim, Ludwig Strauss (b. 1835),
Rappoldi (b. 1831) and Grün. Also Reményi, at one time an
associate with Brahms on concert tours, belongs among them.

Ernst was less a teacher than a virtuoso, whose skill was so


extraordinary as to pique Paganini. It is even said that he used to
follow the astounding Italian on his concert tours that he might
discover some of the secrets of his playing. His own variations on
the ‘Carnival of Venice’ are a brilliant imitation of the style of
Paganini. He spent most of his life in concert tours; and, though he
was known to be a fine, if not a deep, musician, the virtuoso shows
in most of his compositions, which are of little more than secondary
merit. He died on October 8, 1865, having enjoyed a fame as a
player second only to that of Paganini and de Bériot.

The Bohemians Johann Wenzelaus Kalliwoda (1801-1866) and


Joseph Slawjk (1806-1833), both achieved considerable fame.
Chopin spoke of Slawjk with greatest admiration, wrote that with the
exception of Paganini he had never heard a violinist like him. The
two became friends and conceived the project of writing together a
work for piano and violin. If Slawjk had lived longer he might well
have rivalled Paganini, whose playing he, like Ernst, strove to match.

The star of Paganini exercised over every nation of musicians its


irresistible attraction. Besides famous players of Austria and
Bohemia mention must be made of C. J. Lipinski, the Pole. Lipinski
remained in Poland up to the time (1817) when rumors came out of
Italy of the astonishing performances of the Genoese. Then he went
to Italy determined to hear the wonder himself. In Piacenza he heard
him, and later became his friend and associate. It is even said that
Paganini proposed to him a joint concert trip through the large Italian
cities; but Lipinski had been too long away from his native land and
felt unable to remain away longer. His playing was characterized by
an especially strong stroke of the bow, an art he possibly acquired
from a year’s hard work on the 'cello. His compositions, few of which
are generally heard today, are said by Wasielewski to show fine
musicianship and considerable subjective warmth. The best of them
is the so-called ‘Military’ concerto in D major. His ability as an editor
is proved by his work with Klengel on an edition of Bach’s sonatas
for violin and harpsichord, published by Peters. Lipinski died at
Urlow, near Lemberg, in December, 1861.

V
The most brilliant offshoots of the French school, to the formation of
whose style the influence of Paganini contributed, were the Belgians
de Bériot and Henri Vieuxtemps, who stand together as
representative of a Belgian school of violin playing. But before
considering them a few names in the long and distinguished list of
the pupils of Kreutzer, Rode, and Baillot may be touched upon.
Among those of Kreutzer Joseph Massart was perhaps the most
influential. He was born in Belgium in 1811, but went early in life to
Paris to complete with Kreutzer the work begun with his countryman
Lambert. Here he remained, and from 1843 was a professor of the
violin at the Conservatoire. At least one of his pupils, Henri
Wieniawski, won a world-wide fame as a virtuoso.

Among Rode’s pupils Charles Philippi Lafont (1781-1839) stands out


prominently. Lafont had also been a pupil of Kreutzer’s. His playing
was, according to Spohr, full of energy and grace, perfect in
intonation, and fine of tone, but rather mannered. His compositions,
including duos written with Kalkbrenner, Henri Herz and other
virtuoso pianists, and more than two hundred Romances, are of no
genuine value. The seven concertos are quite forgotten.

F. H. Habeneck (1781-1841), one of the most influential of French


musicians, was a pupil of Baillot. He and his two brothers, Joseph
and Corentin, were excellent violinists. But though he held a place of
honor among virtuosi of that day, and though he wrote a number of
works for the violin, he is remembered today chiefly as the founder of
the Société des concerts du Conservatoire. These were instituted by
his energy in 1828, and for twenty years he remained conductor of
them. By him the symphonies of Beethoven were introduced into
France. He was for many years teacher of the violin at the
Conservatoire. Alard (b. 1815), the teacher of Sarasate, was his
most famous pupil.

Massart, Alard, and Léonard (b. 1819), another pupil of Habeneck,


were all Belgians; but all remained in Paris as teachers in the
Conservatoire. Hence they are considered as representative of a
Franco-Belgian school of violin playing. Charles Auguste de Bériot
(1802-1870), though studying for many years in Paris under the
advice at least of Viotti and Baillot, and though familiar to all Europe
as one of the most brilliant of the world’s virtuosos, was for nine
years (1843-52) professor of violin playing at the Brussels
Conservatory, and may therefore be considered to have brought to
Brussels that fame as a centre of brilliant violinists which she has
enjoyed without interruption down to the present day.

In de Bériot’s playing as well as in his numerous compositions the


influence of Paganini rises clearly into sight above that of the older
classical traditions of which Paris was the guardian during the first
quarter of the century. He was a master of the Paganini effects, of
the mysterious harmonics, the dazzling runs and arpeggios, the
sparkling pizzicatos; and they are thickly sown over his music. Yet
there was in both his playing and his compositions a genuine
musical charm. Especially in melodiousness. His wife was Maria
Malibran, and through her inimitable singing he heard at their best
the graceful melodies of the Italians Bellini and Donizetti, and of the
Frenchman Auber, which undoubtedly greatly affected his own
compositions. These, once widely popular, included seven
concertos, several airs variés, and duos for piano and violin, written
in conjunction with such virtuosos as Thalberg.

Among his pupils the most famous was Henri Vieuxtemps (1820-
1881), one of the few great virtuosos of the violin whose fame as a
player has not outlasted in memory his compositions. Vieuxtemps’
five concertos, his Ballade et Polonaise, and even his Fantaisie-
Caprice are still in the repertory of most violinists and have not yet
lost their favor with the public.

His life is a series of long and enormously successful tours, which


took him not only over most of Europe, even Russia, but thrice to the
United States.
Great Violinists. From top left to bottom right: Charles
Auguste de Bériot, Henri Wieniawski (his brother Joseph
at the Piano),
Joseph Joachim, Henri Vieuxtemps.
These tours were undertaken now alone, now in the company of
some other virtuoso such as Thalberg. He made the acquaintance of
almost all the distinguished musicians of his age, among them
Robert Schumann and Richard Wagner; his repertory was wide and
varied, including even Beethoven’s concerto, which was not during
the early years of his life frequently performed by any but the
German violinists.

As to his playing Paul David wrote in an article for Grove’s


Dictionary: ‘He had all the great qualities of technique so
characteristic of the modern French school. His intonation was
perfect; his command of the bow unsurpassed. An astonishing
staccato—in up and down bow—was a specialty of his; and in
addition he had a tone of such breadth and power as is not generally
found with French violinists. His style of playing (Vortrag) was
characteristically French. He was fond of strong dramatic accents
and contrasts, and generally speaking his style was better adapted
to his own compositions and those of other French composers than
to the works of the great classical masters. At the same time it
should be said that he gained some of his greatest successes in the
concertos of Beethoven and Mendelssohn, and was by no means
unsuccessful as a quartet player, even in Germany.’

VI
Excepting Spohr, there are few of the violinist-composers of the
second half of the century with whom fate has dealt so kindly as with
Vieuxtemps. Most have been forgotten as composers, a fact which
may be taken to prove that their compositions had little musical
vitality except that which their own playing infused into them. Those
few who have been remembered in fact as well as in name owe the
permanence of their reputations to one or two pieces in the nature of
successful salon music. Among these should be mentioned Henri
Wieniawski (1835-1880), undoubtedly one of the finest players of the
century. In the early part of his life he wandered from land to land,
coming in company with his friend Anton Rubinstein, the great
pianist, even as far as the United States. He was after this (1874) for
a few years professor of the violin at the Conservatory in Brussels,
filling the place left vacant by Vieuxtemps; and then once more
resumed his life of wandering. His compositions were numerous,
including two concertos as well as a number of studies and
transcriptions, or fantasias, of opera airs. Now perhaps only the
Légende is still familiar to a general public, though the Fantasia on
airs from ‘Faust,’ empty as it is of all save brilliance, holds a place on
the programs of the virtuosi of the present day.

Bernhard Molique (1803-69), a violinist of considerable repute about


the middle of the century, composed five concertos, as well as
numerous smaller pieces, an acquaintance with which today is a
privilege in the main reserved to the student. The concertos are
without genuine musical vitality. Most of his life, after 1849, was
spent in England, where he surrounded himself with many pupils.

Joseph Joachim, one of the most admired violinists and musicians to


be found in the history of the art, was a thoughtful composer. His
relations with Brahms have elsewhere been mentioned in this series.
But Joachim’s compositions are for the most part likely to be
forgotten, with the possible exception of the Hungarian Concerto,
opus 11, the second of his three compositions in this form. However,
few if any other virtuosi have ever so united in themselves the
highest qualities of man and musician, and probably no other player
ever exerted just the sort of moderate and wholly salutary influence
which sprang from Joachim. Among the many signs of the high
esteem in which he was held may be mentioned only the four
honorary degrees conferred upon him by the universities of
Cambridge, Glasgow, Oxford and Göttingen.

In the course of his long life (1831-1907) Joachim became intimately


associated with various circles of musical activity. During the six
years between 1843 and 1849 he was in Leipzig, then enjoying the
enthusiastic efforts of Mendelssohn and Schumann. Again we find

You might also like