Download as pdf or txt
Download as pdf or txt
You are on page 1of 106

Using Information Technology 10th

Edition Williams Test Bank


Go to download the full and correct content document:
https://testbankdeal.com/product/using-information-technology-10th-edition-williams-t
est-bank/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Using Information Technology 10th Edition Williams


Solutions Manual

https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-solutions-manual/

Using Information Technology 11th Edition Williams Test


Bank

https://testbankdeal.com/product/using-information-
technology-11th-edition-williams-test-bank/

MGMT 10th Edition Williams Test Bank

https://testbankdeal.com/product/mgmt-10th-edition-williams-test-
bank/

Information Technology Auditing 3rd Edition Hall Test


Bank

https://testbankdeal.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/
Information Technology Auditing 4th Edition Hall Test
Bank

https://testbankdeal.com/product/information-technology-
auditing-4th-edition-hall-test-bank/

Managing Information Technology 7th Edition Brown Test


Bank

https://testbankdeal.com/product/managing-information-
technology-7th-edition-brown-test-bank/

Using Financial Accounting Information The Alternative


to Debits and Credits 10th Edition Porter Test Bank

https://testbankdeal.com/product/using-financial-accounting-
information-the-alternative-to-debits-and-credits-10th-edition-
porter-test-bank/

Information Technology Project Management 9th Edition


Schwalbe Test Bank

https://testbankdeal.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/

Information Technology for Managers 1st Edition


Reynolds Test Bank

https://testbankdeal.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.


A. continuous
B. digital
C. sequential
D. analog

2. Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

3. Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog

6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

7. A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

8. A network that covers a wide geographical area is called a ________.


A. LAN
B. WAN
C. MAN
D. HAN

9. A network that covers a city or a suburb is called a(n) ________.


A. WAN
B. LAN
C. MAN
D. Internet

6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

14. A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet

16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node

17. Any device that is attached to a network is referred to as a ________.


A. server
B. host
C. node
D. router

18. A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge

6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

23. Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

30. A type of wired communications technology used to connect equipment in a home


network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

32. The ________ is the basis for ALL telecommunications signals.


A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

35. Which of the following is NOT a type of wireless communications media?


A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

36. What form of wireless transmission sends data to an AM or FM receiver?


A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

37. Which of these types of wireless transmission is limited to line-of-sight communications?


A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

38. Transmitting a signal from a ground station to a satellite is called ________.


A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

42. Broadband technology (wireless digital services) is also referred to as ________-


generation wireless services.
A. first
B. second
C. third
D. fourth

43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

47. Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

50. Which of the following is NOT a way to spread a virus?


A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

51. A person who gains unauthorized access to computer or telecommunications systems


without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics

57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

58. Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

60. RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

True / False Questions

61. Analog refers to communications signals represented in a binary format.


True False

62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False

63. A thermometer and a speedometer are examples of analog devices.


True False

64. Telephones have always been digital devices.


True False

6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False

66. "Modem" is short for modulate/demodulate.


True False

67. Capturing music digitally means that one has an exact duplicate of the music.
True False

68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False

69. The Internet is a WAN.


True False

70. A LAN is a type of network that covers a wide geographical area.


True False

71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False

72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False

6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False

74. "File server" and "database server" are different names for the same type of server.
True False

75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False

76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False

77. Routers join multiple wired and/or wireless networks.


True False

78. A gateway is an interface device permitting communication between similar networks.


True False

79. An interface device used to connect the same types of networks is called a node.
True False

80. The backbone is the main communications route in a bus network topology.
True False

6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False

82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False

83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False

84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False

85. Most microcomputers come with Ethernet capability.


True False

86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False

87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False

88. The two general classes of bandwidth are long and short.
True False

6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

89. The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it


carries most communications signals.
True False

90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False

91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False

92. Infrared transmission is a type of low-frequency wireless transmission that is short-range


and line-of-sight.
True False

93. GPS satellites use medium-Earth-orbits.


True False

94. Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.


True False

95. Analog cellphones were 1G phones.


True False

6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False

97. Communications satellites are microwave relay stations in orbit around the earth.
True False

98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False

99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False

100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False

101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False

102. Analog cellphones are 2G (second-generation) phones.


True False

103. Cellphones are basically two-way radios.


True False

6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

104. 2G and 3G cellphones are digital, not analog.


True False

105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False

106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False

107. The latest version of Wi-Fi (IEEE 802.11 standard) is version a.


True False

108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False

109. Bluetooth is a short-range, wireless communications method for linking cellphones,


PDAs, computers, and some other peripherals up to distances of 30 feet.
True False

110. A denial-of-service attack uses a virus to crash your computer.


True False

111. Worms, viruses, and Trojan horse are all malware.


True False

6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False

113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False

114. A virus is capable of destroying or corrupting data.


True False

115. Cellphones do not get infected by malware.


True False

116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False

117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False

118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False

6-20
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

119. Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
True False

120. There are two basic types of data encryption.


True False

121. Two kinds of secret keys are used in public key encryption.
True False

122. In public key encryption, only the receiver of an encrypted message knows the private
key needed to decrypt the message.
True False

Fill in the Blank Questions

123. Communications signals represented in a binary electronic format are ________ signals.
________________________________________

124. Signals such as sound and temperature, which continuously vary in strength and quality,
are ________ signals.
________________________________________

125. So they can be sent over a telephone line, analog signals are converted into digital
signals, and then back again, by using ________.
________________________________________

Short Answer Questions

6-21
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

126. The text lists six benefits of networks: ________, ________, ________, ________,
________, and ________.

127. Four disadvantages of networks are ________, ________, ________, and ________.

128. The text lists seven types of networks: ________, ________, ________, ________,
_________, ________, and ________.

Fill in the Blank Questions

129. A peer-to-peer (P2P) network operates without relying on a ________.


________________________________________

130. Private networks that use a public network, usually the Internet, to connect remote sites
are called ________.
________________________________________

6-22
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

131. An intranet that allows access to selected outside users is a(n) ________.
________________________________________

132. A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________

133. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________

134. A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________

135. A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
________________________________________

136. ________ are physical devices that join multiple wired and/or wireless networks; their
primary job is to provide connectivity.
________________________________________

137. A network can be laid out in different ways. The layout, or shape, is called a ________.
________________________________________

6-23
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

138. The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________

139. The system software that manages the activity of a network is called the ________.
________________________________________

140. A computer sends and receives messages over a cable network using a ________, which
is inserted in an expansion slot on the motherboard.
________________________________________

141. A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________

142. A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
________________________________________

143. The Internet uses the ________ network topology.


________________________________________

144. In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and describes how data can be
sent.
________________________________________

6-24
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

145. Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
________________________________________

146. Wired communications media include three main types. Insulated copper wire wrapped
in a solid or braided shield and then an external cover is called ________ cable.
________________________________________

147. Wired communications media include three main types. The kind used for transmitting
pulses of light is ________.
________________________________________

148. HomePlug technology is a wired communications standard that allows users to connect
equipment within the home using the house's own ________ wiring.
________________________________________

149. Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________

150. The _________ is the basis for ALL telecommunications signals, both wired and
wireless, and the _________ is the part that carries most communications signals.
________________________________________

151. The range of frequencies that a transmission medium can carry in a given period of time
is called its ________.
________________________________________

6-25
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
152. The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________

153. A transmission medium's speed is usually measured in ________ or ________.


________________________________________

Short Answer Questions

154. The text covers five types of wireless communications media: ________, ________,
________, _________, and ________.

Fill in the Blank Questions

155. Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________

156. The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________

157. Global Positioning Systems use ________ to continuously transmit signals to identify
earth locations.
________________________________________

6-26
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

158. The Global Positioning System is an example of a ________-way long-distance


communications system.
________________________________________

159. Simple one-way radio receivers that receive data (but not voice messages) are called
________.
________________________________________

160. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________

161. Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping portable
computers and handheld wireless devices to communicate at high speeds and share Internet
connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi version?
________________________________________

162. The short-range, wireless digital standard aimed at linking hand-held devices up to 33
feet apart is called ________.
________________________________________

163. The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________

164. Worms, viruses, and Trojan horses are all types of programs called ________.
________________________________________

6-27
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

165. A(n) ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive and that can cause the computer to crash.
________________________________________

166. A(n) ________ is a "deviant" program that attaches itself to a program or file and can
cause unexpected and undesirable effects, such as destroying or corrupting data.
________________________________________

167. A ________ is a program that pretends to be a useful program, usually free, such as a
game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
________________________________________

168. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
________________________________________

169. Malware can be spread by using a(n) ________ disk, flash drive, CD; opening unknown
email _________; clicking on ________ websites; and/or through contaminated Wi-Fi hot
spots.
________________________________________

170. People who illegally break into computers for malicious purposes are known as
________.
________________________________________

Short Answer Questions

6-28
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

171. The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.

Fill in the Blank Questions

172. ________ software can be used to scan a computer's hard disk, CDs, and main memory
to detect viruses.
________________________________________

173. A system of hardware and/or software that protects a computer or network from intruders
is called a ________.
________________________________________

Short Answer Questions

174. Five types of biometric authentication are ________, ________, ________, _________,
and _________.

6-29
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

Fill in the Blank Questions

175. The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
________________________________________

176. A message sent in its original undisguised, readable form is ________.


________________________________________

177. Message encryption involves converting plain text to ________.


________________________________________

Essay Questions

178. How do analog and digital devices interpret electrical signals?

179. What is the primary purpose of the modem?

6-30
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

180. List four advantages and four disadvantages of networks.

181. What are the main differences between a WAN, a MAN, and a LAN?

182. What is the difference between a client/server network and a peer-to-peer network?

183. Describe what a packet is and what it does.

6-31
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

184. Describe the network topology used by the Internet.

185. Distinguish between narrowband and broadband.

186. What are some of the uses and limitations of GPS?

187. Basically, how does Wi-Fi work?

6-32
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

188. What is wireless USB?

189. What are four ways in which viruses and worms get passed?

190. Name at least five ways to minimize virus attacks.

191. List at least five rules for creating good passwords.

6-33
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Multiple Choice Questions

1. (p. 313) Communications signals represented in a binary format are said to be ________.
A. continuous
B. digital
C. sequential
D. analog

Difficulty: Easy

2. (p. 313) Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

Difficulty: Easy

3. (p. 313-314) Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

Difficulty: Easy

6-34
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

4. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be
A. spontaneous
B. digital
C. sequential
D. analog

Difficulty: Easy

5. (p. 315-316) The ________ is a device that converts digital computer signals into analog signals
so that they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

Difficulty: Easy

6. (p. 316) A person sending a document over a phone line by converting digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

Difficulty: Easy

6-35
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

7. (p. 317) A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

Difficulty: Easy

8. (p. 320) A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN

Difficulty: Easy

9. (p. 320) A network that covers a city or a suburb is called a(n) ________.
A. WAN
B. LAN
C. MAN
D. Internet

Difficulty: Easy

10. (p. 322) Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

Difficulty: Medium

6-36
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

11. (p. 322) A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

Difficulty: Easy

12. (p. 323) A computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

Difficulty: Medium

13. (p. 324-325) If an organization's internal private network uses the same infrastructure and
standards of the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

Difficulty: Medium

14. (p. 325-326) A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

Difficulty: Medium

6-37
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

15. (p. 320) A ________ is the set of rules that govern the exchange of data between hardware
and/or software components in a communications network.
A. host
B. protocol
C. database
D. packet

Difficulty: Medium

16. (p. 326) A mainframe computer that controls a large network is called the ________
computer.
A. slave
B. host
C. client
D. node

Difficulty: Easy

17. (p. 326) Any device that is attached to a network is referred to as a ________.
A. server
B. host
C. node
D. router

Difficulty: Easy

18. (p. 326) A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

Difficulty: Easy

6-38
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

19. (p. 327) A common connection device that connects computers to a network is called a
________.
A. router
B. gateway
C. switch
D. bridge

Difficulty: Easy

20. (p. 328) To create larger networks, a bridge connects the same types of networks, and a
________ connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

Difficulty: Hard

21. (p. 328) A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

Difficulty: Medium

6-39
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

22. (p. 329) In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

Difficulty: Medium

23. (p. 329) Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

Difficulty: Easy

24. (p. 330) In the ________ network topology, communications devices are connected to a
single cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

6-40
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

25. (p. 331) What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

26. (p. 331) What kind of topology (layout) is used by a network that connects all its computers
and communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

Difficulty: Easy

27. (p. 332) ________ is the most common and most widely used LAN technology; it can be
used with almost any kind of computer; most microcomputers come with a port for this type
of network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

Difficulty: Medium

6-41
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

28. (p. 333) A communications medium is a channel; there are three types of wired
communications media. The one consisting of two strands of insulated copper wire, used by
tradition telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Difficulty: Medium

29. (p. 334) What wired channel, commonly used for cable TV, consists of an insulated copper
wire wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

Difficulty: Medium

30. (p. 335) A type of wired communications technology used to connect equipment in a home
network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

Difficulty: Medium

6-42
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

31. (p. 334) What wired communications medium consists of dozens or hundreds of thin strands
of glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Difficulty: Easy

32. (p. 335-336) The ________ is the basis for ALL telecommunications signals.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Difficulty: Medium

33. (p. 337) The ________ is the range of frequencies that a transmission medium (channel) can
carry in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Difficulty: Medium

6-43
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

34. (p. 339) What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

Difficulty: Hard

35. (p. 339) Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

Difficulty: Medium

36. (p. 339) What form of wireless transmission sends data to an AM or FM receiver?
A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

Difficulty: Medium

37. (p. 339) Which of these types of wireless transmission is limited to line-of-sight
communications?
A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

Difficulty: Medium

6-44
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

38. (p. 340) Transmitting a signal from a ground station to a satellite is called ________.
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

Difficulty: Easy

39. (p. 341) The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

Difficulty: Medium

40. (p. 342) GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals
used to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

Difficulty: Hard

41. (p. 347-348) Which of the following is NOT a type of long-distance wireless two-way
communications device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

Difficulty: Medium

6-45
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

42. (p. 347) Broadband technology (wireless digital services) is also referred to as ________-
generation wireless services.
A. first
B. second
C. third
D. fourth

Difficulty: Easy

43. (p. 349) What short-distance wireless standard is used to link portable computers and
handheld wireless devices so they may communicate at high speeds at distances of 100-228
feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

Difficulty: Medium

44. (p. 352) What short-distance wireless standard is used to link cell phones, PDAs, and
computers at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

Difficulty: Medium

6-46
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

45. (p. 355) A ________ attack disables a computer system or network by making so many
requests of it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

Difficulty: Medium

46. (p. 355) A ________ is a program that copies itself repeatedly into a computer's memory or
onto a disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

Difficulty: Easy

47. (p. 355-357) Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

Difficulty: Medium

6-47
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

48. (p. 358) Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

Difficulty: Medium

49. (p. 358) A botmaster uses malware to hijack hundreds or thousands of computers and
controls them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

Difficulty: Medium

50. (p. 358) Which of the following is NOT a way to spread a virus?
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

Difficulty: Medium

6-48
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

51. (p. 359) A person who gains unauthorized access to computer or telecommunications
systems without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

Difficulty: Easy

52. (p. 360) A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

Difficulty: Easy

53. (p. 359) Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

Difficulty: Medium

6-49
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

54. (p. 361) What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

Difficulty: Easy

55. (p. 361) What is the science, often used in computer security systems, of measuring
individual body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

Difficulty: Easy

56. (p. 361) Fingerprint scanners, face-recognition systems, and iris-recognition systems are
based on ________.
A. encryption
B. decryption
C. password protection
D. biometrics

Difficulty: Easy

6-50
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

57. (p. 362) What is the process of altering readable data (plain text) into unreadable form to
prevent unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

Difficulty: Easy

58. (p. 362-363) Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

Difficulty: Hard

59. (p. 362-363) ____________ encryption uses the same secret key to encrypt and decrypt a
message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

Difficulty: Medium

60. (p. 363) RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

Difficulty: Hard

6-51
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

True / False Questions

61. (p. 313-314) Analog refers to communications signals represented in a binary format.
FALSE

Difficulty: Easy

62. (p. 313-314) Signals such as sound and temperature, which continuously vary in strength and
quality, are said to be digital.
FALSE

Difficulty: Easy

63. (p. 314) A thermometer and a speedometer are examples of analog devices.
TRUE

Difficulty: Easy

64. (p. 314) Telephones have always been digital devices.


FALSE

Difficulty: Easy

65. (p. 316) A modem converts digital signals into analog signals so they can be sent over a
telephone line.
TRUE

Difficulty: Easy

6-52
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

66. (p. 316) "Modem" is short for modulate/demodulate.


TRUE

Difficulty: Easy

67. (p. 317) Capturing music digitally means that one has an exact duplicate of the music.
FALSE

Difficulty: Hard

68. (p. 317) A network is a system of interconnected computers and communications devices
that can communicate and share resources.
TRUE

Difficulty: Easy

69. (p. 320) The Internet is a WAN.


TRUE

Difficulty: Medium

70. (p. 320-321) A LAN is a type of network that covers a wide geographical area.
FALSE

Difficulty: Easy

6-53
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

71. (p. 322) A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
TRUE

Difficulty: Easy

72. (p. 323-324) Client/server networks and peer-to-peer networks are the same except that the
first type of network uses a mainframe and the second type uses only microcomputers.
FALSE

Difficulty: Medium

73. (p. 323) The computer that acts like a disk drive, storing the programs and data files shared
by users on a LAN, is called a file server.
TRUE

Difficulty: Easy

74. (p. 323) "File server" and "database server" are different names for the same type of server.
FALSE

Difficulty: Easy

75. (p. 325-326) Virtual private networks (VPNs) are private networks that use a public network
(usually the Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE

Difficulty: Easy

6-54
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

76. (p. 326-327) In a network, communications protocols specify the type of electrical
connections, the timing of message exchanges, and error-detection techniques.
TRUE

Difficulty: Medium

77. (p. 328) Routers join multiple wired and/or wireless networks.
TRUE

Difficulty: Easy

78. (p. 328) A gateway is an interface device permitting communication between similar
networks.
FALSE

Difficulty: Medium

79. (p. 328) An interface device used to connect the same types of networks is called a node.
FALSE

Difficulty: Medium

80. (p. 329) The backbone is the main communications route in a bus network topology.
FALSE

Difficulty: Medium

6-55
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

81. (p. 331) In a bus network, all computers and communications devices are connected in a
continuous loop.
FALSE

Difficulty: Easy

82. (p. 333) Traditional landline telephone systems use twisted-pair wire as their
communications medium.
TRUE

Difficulty: Easy

83. (p. 334) A cable that is made up of dozens of thin strands of glass and transmits pulsating
beams of light is called a coaxial cable.
FALSE

Difficulty: Easy

84. (p. 335) A wired communications standard that allows users to send data over a home's
existing electrical (AC) power lines is called HomePlug technology.
TRUE

Difficulty: Easy

85. (p. 335) Most microcomputers come with Ethernet capability.


TRUE

Difficulty: Easy

6-56
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

86. (p. 336) All wired and wireless communications media use the electromagnetic spectrum of
radiation.
TRUE

Difficulty: Easy

87. (p. 337) The smaller the bandwidth of a medium, the more frequencies it can use to transmit
data.
FALSE

Difficulty: Easy

88. (p. 337) The two general classes of bandwidth are long and short.
FALSE

Difficulty: Easy

89. (p. 337) The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
TRUE

Difficulty: Easy

90. (p. 337) The frequency of an electromagnetic wave is the number of times the wave repeats,
or makes a cycle, in a second.
TRUE

Difficulty: Medium

6-57
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

91. (p. 337-338) Both digital narrowband and broadband transmission speeds are measured in
megabits or gigabits per second.
TRUE

Difficulty: Medium

92. (p. 339) Infrared transmission is a type of low-frequency wireless transmission that is short-
range and line-of-sight.
TRUE

Difficulty: Medium

93. (p. 341) GPS satellites use medium-Earth-orbits.


TRUE

Difficulty: Easy

94. (p. 340, 352) Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.
TRUE

Difficulty: Easy

95. (p. 346) Analog cellphones were 1G phones.


TRUE

Difficulty: Easy

6-58
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

96. (p. 340) Satellite transmission uses in-orbit satellites and earth stations. Transmitting from
the ground to the satellite is called downlinking, and transmitting from the satellite to the
ground station called uplinking.
FALSE

Difficulty: Easy

97. (p. 340) Communications satellites are microwave relay stations in orbit around the earth.
TRUE

Difficulty: Easy

98. (p. 341) Satellite orbits are at three levels: GEO, MEO, and LEO.
TRUE

Difficulty: Easy

99. (p. 341) A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
FALSE

Difficulty: Hard

100. (p. 342) GPS uses MEO satellites that continuously transmit timed radio signals used to
identify earth locations.
TRUE

Difficulty: Easy

6-59
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

101. (p. 342-343) Because of the excellence of satellite technology, GPS location IDs are 100%
accurate.
FALSE

Difficulty: Easy

102. (p. 346-347) Analog cellphones are 2G (second-generation) phones.


FALSE

Difficulty: Easy

103. (p. 346) Cellphones are basically two-way radios.


TRUE

Difficulty: Easy

104. (p. 347) 2G and 3G cellphones are digital, not analog.


TRUE

Difficulty: Easy

105. (p. 349) The short-range, wireless communications method aimed at linking hand-held
devices at high speeds and at distances of 100-228 feet is called Wi-Fi.
TRUE

Difficulty: Easy

6-60
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

106. (p. 349-350) A Wi-Fi enabled laptop computer accesses the available network (say, at an
airport) through an access point, which is connected to a land-based Internet connection.
TRUE

Difficulty: Easy

107. (p. 349-350) The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
FALSE

Difficulty: Medium

108. (p. 351-352) Wi-Fi connections are always secure; no one can steal your data when you are
online.
FALSE

Difficulty: Easy

109. (p. 352) Bluetooth is a short-range, wireless communications method for linking cellphones,
PDAs, computers, and some other peripherals up to distances of 30 feet.
TRUE

Difficulty: Easy

110. (p. 355-356) A denial-of-service attack uses a virus to crash your computer.
FALSE

Difficulty: Medium

6-61
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

111. (p. 354) Worms, viruses, and Trojan horse are all malware.
TRUE

Difficulty: Easy

112. (p. 356) A Trojan horse pretends to be a useful program, such as a game or a screen saver,
but it carries a virus that replicates in your computer over and over until your computer
crashes.
FALSE

Difficulty: Medium

113. (p. 355-356) A virus is a "deviant" program that is stored on a computer hard drive and can
cause unexpected and undesirable effects.
TRUE

Difficulty: Easy

114. (p. 355-356) A virus is capable of destroying or corrupting data.


TRUE

Difficulty: Easy

115. (p. 359) Cellphones do not get infected by malware.


FALSE

Difficulty: Easy

6-62
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

116. (p. 359) Sneakers are people who gain unauthorized access to computer or
telecommunications systems, often just for the challenge of it.
FALSE

Difficulty: Easy

117. (p. 360) People who illegally break into computers for malicious purposes to obtain
information for financial gain, shut down hardware, pirate software, or alter or destroy data
are known as hackers.
FALSE

Difficulty: Easy

118. (p. 361) If you have more than one computer linked to the Internet by a cable modem, you
need a software firewall to protect your system.
FALSE

Difficulty: Medium

119. (p. 362) Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access.
TRUE

Difficulty: Easy

120. (p. 362-363) There are two basic types of data encryption.
TRUE

Difficulty: Medium

6-63
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

121. (p. 362-363) Two kinds of secret keys are used in public key encryption.
TRUE

Difficulty: Medium

122. (p. 362-363) In public key encryption, only the receiver of an encrypted message knows the
private key needed to decrypt the message.
TRUE

Difficulty: Medium

Fill in the Blank Questions

123. (p. 313) Communications signals represented in a binary electronic format are ________
signals.
digital

Difficulty: Easy

124. (p. 314) Signals such as sound and temperature, which continuously vary in strength and
quality, are ________ signals.
analog

Difficulty: Easy

125. (p. 315-316) So they can be sent over a telephone line, analog signals are converted into
digital signals, and then back again, by using ________.
modems

Difficulty: Easy

6-64
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Short Answer Questions

126. (p. 318-319) The text lists six benefits of networks: ________, ________, ________,
________, ________, and ________.

sharing of peripheral devices, sharing of programs and data, better communications,


centralized communications, security of information, access to databases

Difficulty: Hard

127. (p. 319) Four disadvantages of networks are ________, ________, ________, and
________.

expense, security issues (breaking of security precautions), rapid spread of viruses,


dependency on the mail file server

Difficulty: Hard

128. (p. 320-321) The text lists seven types of networks: ________, ________, ________,
________, _________, ________, and ________.

wide area network, metropolitan area network, local area net work, home area network,
personal area network, home automation network

Difficulty: Hard

6-65
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Fill in the Blank Questions


129. (p. 318) A peer-to-peer (P2P) network operates without relying on a ________.
server

Difficulty: Medium

130. (p. 324) Private networks that use a public network, usually the Internet, to connect remote
sites are called ________.
virtual private networks (VPNs)

Difficulty: Medium

131. (p. 325) An intranet that allows access to selected outside users is a(n) ________.
extranet

Difficulty: Medium

132. (p. 325) A set of conventions that govern how data is exchanged between devices on a
network is known as a communications ________.
protocol

Difficulty: Easy

133. (p. 326) Electronic messages are sent as ________, fixed-length blocks of data for
transmission.
packets

Difficulty: Medium

6-66
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

134. (p. 327) A _________ is a network that connects computers to a network; data can be sent
in both directions at the same time.
switch

Difficulty: Medium

135. (p. 328) A(n) ________ is an interface (linking device) used to connect the same types of
networks, whereas a(n) ________ is an interface permitting communications between
dissimilar networks.
bridge; gateway

Difficulty: Medium

136. (p. 328) ________ are physical devices that join multiple wired and/or wireless networks;
their primary job is to provide connectivity.
Routers

Difficulty: Easy

137. (p. 329) A network can be laid out in different ways. The layout, or shape, is called a
________.
topology

Difficulty: Easy

138. (p. 329) The ________ consists of the main "highway" that connects all computer networks
in an organization.
backbone

Difficulty: Easy

6-67
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

139. (p. 329) The system software that manages the activity of a network is called the
________.
network operating system (NOS)

Difficulty: Medium

140. (p. 329) A computer sends and receives messages over a cable network using a ________,
which is inserted in an expansion slot on the motherboard.
network interface card (NIC)

Difficulty: Medium

141. (p. 330) A ________ network topology is one in which all microcomputers and other
devices are connected in a continuous loop.
ring

Difficulty: Easy

142. (p. 330) A ________ network topology is one in which all microcomputers and other
communications devices are connected directly to a central server (switch).
star

Difficulty: Easy

143. (p. 331) The Internet uses the ________ network topology.
mesh

Difficulty: Medium

6-68
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

144. (p. 331) In small LANs, messages may bump into one another. The most popular protocol,
or technology, which uses cabling and special ports on microcomputers, that prevents
collisions is ________. It can be used with almost any kind of computer and describes how
data can be sent.
Ethernet

Difficulty: Medium

145. (p. 333) Wired communications media include three main types. The kind used for tradition
telephone lines is ________.
twisted-pair wire

Difficulty: Easy

146. (p. 334) Wired communications media include three main types. Insulated copper wire
wrapped in a solid or braided shield and then an external cover is called ________ cable.
coaxial ("coax")

Difficulty: Medium

147. (p. 334) Wired communications media include three main types. The kind used for
transmitting pulses of light is ________.
fiber-optic cable

Difficulty: Easy

148. (p. 335) HomePlug technology is a wired communications standard that allows users to
connect equipment within the home using the house's own ________ wiring.
electrical

Difficulty: Medium

6-69
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

149. (p. 336) Telecommuting means using a computer and networks to work from ________;
telework means working from ________.
home; anywhere

Difficulty: Medium

150. (p. 335-337) The _________ is the basis for ALL telecommunications signals, both wired
and wireless, and the _________ is the part that carries most communications signals.
electromagnetic spectrum of radiation; radio-frequency (RF) spectrum

Difficulty: Hard

151. (p. 337) The range of frequencies that a transmission medium can carry in a given period of
time is called its ________.
bandwidth

Difficulty: Medium

152. (p. 337) The ________ a transmission medium's bandwidth, the more frequencies it can use
to transmit data and the faster it is.
wider

Difficulty: Easy

153. (p. 337-338) A transmission medium's speed is usually measured in ________ or ________.
megabits per second; gigabits per second

Difficulty: Medium

6-70
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Short Answer Questions

154. (p. 339) The text covers five types of wireless communications media: ________,
________, ________, _________, and ________.

infrared; broadcast radio; cellular radio; microwave radio; communications satellites

Difficulty: Hard

Fill in the Blank Questions

155. (p. 339) Infrared and microwave transmission signals cannot work around obstacles or
travel in curved lines, so they are called _________.
line-of-sight

Difficulty: Medium

156. (p. 341) The highest level that a satellite can occupy is the ________ earth orbit.
geostationary (GEO)

Difficulty: Medium

157. (p. 342) Global Positioning Systems use ________ to continuously transmit signals to
identify earth locations.
satellites

Difficulty: Easy

6-71
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

158. (p. 342) The Global Positioning System is an example of a ________-way long-distance
communications system.
one

Difficulty: Medium

159. (p. 345) Simple one-way radio receivers that receive data (but not voice messages) are
called ________.
pagers

Difficulty: Easy

160. (p. 346-348) 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
analog; digital

Difficulty: Easy

161. (p. 351) Wi-Fi (IEEE 802.11) is a short-range wireless digital standard aimed at helping
portable computers and handheld wireless devices to communicate at high speeds and share
Internet connections at distances of 100-228 feet. What is the most recent and fastest Wi-Fi
version?
n (after b, a, and g)

Difficulty: Medium

162. (p. 352) The short-range, wireless digital standard aimed at linking hand-held devices up to
33 feet apart is called ________.
Bluetooth

Difficulty: Easy

6-72
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

163. (p. 353-354) The three short-range wireless standards used in home automation networks, for
linking switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
Z-Wave

Difficulty: Medium

164. (p. 354) Worms, viruses, and Trojan horses are all types of programs called ________.
malware

Difficulty: Easy

165. (p. 356) A(n) ________ is a program that copies itself repeatedly into a computer's memory
or onto a disk drive and that can cause the computer to crash.
worm

Difficulty: Easy

166. (p. 355-356) A(n) ________ is a "deviant" program that attaches itself to a program or file
and can cause unexpected and undesirable effects, such as destroying or corrupting data.
virus

Difficulty: Easy

167. (p. 356) A ________ is a program that pretends to be a useful program, usually free, such as
a game or screen saver, but carries viruses, or destructive instructions that cause problems
without your knowledge.
Trojan horse

Difficulty: Easy

6-73
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

168. (p. 358) A(n) ________ uses malware to hijack hundreds or thousands of computers, called
________, and to remotely control them all.
botmaster, zombies

Difficulty: Medium

169. (p. 358) Malware can be spread by using a(n) ________ disk, flash drive, CD; opening
unknown email _________; clicking on ________ websites; and/or through contaminated Wi-
Fi hot spots.
infected; attachments; infiltrated (or infected)

Difficulty: Hard

170. (p. 360) People who illegally break into computers for malicious purposes are known as
________.
crackers

Difficulty: Easy

Short Answer Questions

171. (p. 360 ff.) The text lists five ways to fight cyber threats: ________, ________, ________,
________, and ________.

antivirus software; firewalls; passwords; biometric authentification; encryption

Difficulty: Hard

6-74
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

Fill in the Blank Questions

172. (p. 360) ________ software can be used to scan a computer's hard disk, CDs, and main
memory to detect viruses.
Antivirus

Difficulty: Easy

173. (p. 361) A system of hardware and/or software that protects a computer or network from
intruders is called a ________.
firewall

Difficulty: Easy

Short Answer Questions

174. (p. 361-362) Five types of biometric authentication are ________, ________, ________,
_________, and _________.

hand-geometry systems, fingerprint scanners, iris-recognition systems, face-recognition


systems, voice-recognition systems

Difficulty: Hard

Fill in the Blank Questions

175. (p. 362) The process of altering readable data into unreadable form to prevent unauthorized
access is known as ________.
encryption

Difficulty: Easy

6-75
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

176. (p. 362) A message sent in its original undisguised, readable form is ________.
plain text

Difficulty: Medium

177. (p. 362) Message encryption involves converting plain text to ________.
cybertext

Difficulty: Medium

Essay Questions

178. (p. 314) How do analog and digital devices interpret electrical signals?

Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of electrical/light
pulses represented in a binary way (on or off).

Difficulty: Medium

179. (p. 315-316) What is the primary purpose of the modem?

The primary purpose of the modem ("modulate/demodulate") is to change the computer's


digital signals into analog signals and, at the receiving end, analog signals back into digital
signals so that communications can take place between computers using a standard copper-
wire telephone network or other transmission media that can transmit only analog signals.

Difficulty: Easy

6-76
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

180. (p. 318-319) List four advantages and four disadvantages of networks.

Advantages: sharing of peripheral devices, sharing of programs and data, better


communications, centralized communications, establishing security of information, access to
databases Disadvantages: expense, violation of established security measures, rapid spread of
computer viruses, dependency on the main file server

Difficulty: Hard

181. (p. 320-322) What are the main differences between a WAN, a MAN, and a LAN?

A wide area network (WAN) covers a wide geographic area, such as a country or, in the case
of the Internet, the world. A metropolitan area network (MAN) covers a city or a suburb. A
local area network (LAN) covers a limited geographic area, such as one office, one building,
or a small group of buildings, such as on a college campus.

Difficulty: Medium

6-77
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

182. (p. 323-324) What is the difference between a client/server network and a peer-to-peer
network?

A client/server network consists of clients, which are microcomputers that request data, and
servers, which are central computers used to supply data. In the client/server scheme, central
servers handle all security and file transactions; they are powerful microcomputers that also
manage shared devices. They may run server software for applications such as email and web
browsing, or they may just host a database or be a file server or other kind of server; different
servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to- peer networks, which are relatively
inexpensive to set up, each machine shares its own resources and handles its own security.
Every computer can share files and peripherals with all other computers on the network, given
that all are granted access privileges. Peer-to-peer networks are less expensive than
client/server networks and work effectively for up to 25 computers. Beyond that, they slow
down under heavy use. They are appropriate for small networks, such as small businesses and
home networks.

Difficulty: Medium

6-78
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

183. (p. 326) Describe what a packet is and what it does.

Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2, p. 63)
to break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet-often using different (and most expedient) routes, at different
speeds, and sandwiched in between packets from other messages. Once the packets arrive at
their destination, the receiving computer reassembles them (called packet switching) into
proper sequence to complete the message.
Most modern Wide Area Network (WAN) protocols are based on packet switching
technologies. In contrast, normal telephone service is based on a circuit-switching technology,
in which a dedicated line is allocated for transmission between two parties. Circuit-switching
is ideal when data must be transmitted quickly and must arrive in the same order in which it's
sent. This is the case with most real-time data, such as live audio and video. Packet switching
is more efficient and robust for data that can withstand some delays in transmission, such as
email messages and web pages

Difficulty: Hard

184. (p. 331) Describe the network topology used by the Internet.

In a mesh network topology, messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to any individual
computer to create a mesh network. (Wireless networks are often implemented as a mesh.) In
the previous topologies, star and bus, messages are usually broadcast to every computer,
especially in bus topology. In the ring topology, messages can travel in only one direction-
clockwise or counterclockwise. The Internet employs the mesh topology, and the message,
with the help of routers, finds its route for its destination.

Difficulty: Medium

6-79
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

185. (p. 3337-338) Distinguish between narrowband and broadband.

Narrowband, also known as voiceband, is used for regular telephone communications and is
usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data and
high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL, cable,
satellite, T1, etc. are broadband.

Difficulty: Hard

186. (p. 342-343) What are some of the uses and limitations of GPS?

Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones on;
locating stolen cars; orienting hikers / locating lost hikers; aiding in surveying; monitoring
dangerous geological sites, such as volcanoes; finding lost pets; geocaching; getting map
directions on computers and in cars; determining E911 locations of people making 911 calls
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911 locations
are not always accurate; tracking cellphone users could violate privacy

Difficulty: Medium

187. (p. 349-350) Basically, how does Wi-Fi work?

A land-based Internet connection (DSL, cable, satellite, T1 line) is connected to an antenna


(access point). The access point (hotspot) translates the Internet signals into short-range,
wireless radio waves and broadcasts them over an area about the size of a house (distances of
100-228 feet). Anyone within range who has a receiving antenna, usually on a notebook
computer or a 3G/4G cellphone, can pick up the signals. Sometimes the user must enter a
password to access the Wi-Fi signal. The later versions of Wi-Fi (e.g., n) are faster than the
earlier versions (e.g., b, a, g).

Difficulty: Hard

6-80
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

188. (p. 353) What is wireless USB?

Wireless USB (WUSB) has a typical range of 32 feet and a maximum data rate of 110-480
megabits per second. Wireless USB is used in game controllers, printers, scanners, digital
cameras, MP3/MP4 players, hard disks, and flash drives. With more than 2 billion legacy
wired USB connections in the world today, USB is the de facto standard in the personal
computing industry. Now these fast connections are available in the wireless world, with the
introduction of Wireless USB. Wireless USB is the new wireless extension to USB that
combines the speed and security of wired technology with the ease of use of wireless
technology. Wireless USB supports robust high-speed wireless connectivity by utilizing the
common WiMedia MB-OFDM Ultra-wideband (UWB) radio platform as developed by the
WiMedia Alliance. Wireless USB will preserve the functionality of wired USB while also
unwiring the cable connection and providing enhanced support for streaming media devices
and peripherals.

Difficulty: Hard

189. (p. 358) What are four ways in which viruses and worms get passed?

Four ways in which viruses and worms get passed are these:
1. by infected disks or flash drives
2. by opening unknown email attachments
3. by clicking on infiltrated (infected) websites
4. through infiltrated Wi-Fi hot spots

Difficulty: Medium

6-81
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World Key

190. (p. 359) Name at least five ways to minimize virus attacks.

1. Don't open unknown files or email attachments.


2. Delete all spam and email messages from strangers.
3. Use webmail sparingly.
4. Don't start your computer with a CD or flash drive in place.
5. Back up all files regularly on a device separate from your computer or online.
6. Use virus protection software and make sure that the software automatically updates itself
often from the manufacturer's website.
7. Use a firewall-either the one that came with the computer's system software or a firewall
purchased separately.
8. Update your antivirus software and firewall frequently.
9. Use your antivirus and firewall software to scan your computer regularly and
quarantine/destroy any problem "bugs" that turn up on the list.
10. Set your antivirus program to automatically scan all incoming and outgoing email
attachments.
11. Set your firewall to alert you to "dicey" websites.

Difficulty: Medium

191. (p. 364) List at least five rules for creating good passwords.

1. on't tell anyone your username and password.


2. Don't use passwords that can be easily guessed.
3. Avoid any word that appears in the dictionary.
4. Combine letters with numbers and other keyboard characters.
5. Create long passwords.
6. Don't use the same password for multiple sites.
7. Change passwords often.
8. Don't write your passwords down on sticky notes, in a notebook, or tape them under, for
example, your keyboard.
9. Don't carry passwords in your wallet.
10. Create a system for remembering passwords without writing them down.
11. Save all your passwords in a single encrypted file.

Difficulty: Medium

6-82
Another random document with
no related content on Scribd:
WE HONOR OUR GRAND OLD
HEROES.
BY ANNIE WITTENMYER.

We honor our grand old heroes


Who stood in the thick of the fight,
Where deadly missiles were flying,
And valiantly fought for the right.

They stood with God in the conflict,


They fought on God’s side in the fray;
The Lord and his angels helped them,
And Freedom and Right won the day.

Sacred to Freedom forever


Is the soil where they fought and bled;
No bondsman shall wear a shackle,
No tyrant shall lift up his head.

Above the flags of all nations


Our beautiful banner floats high;
Its stars like the stars of heaven,
And its blue as blue as the sky.

Long may it wave in its beauty,


The symbol of Freedom and Right;
Not a star be lost from its azure,
Not a blot stain its spotless white!
A BOY SENT BY EXPRESS, C. O. D.

IN the winter of 1862, just before General Grant moved upon Fort
Henry and Fort Donelson, I went out to Sedalia, Mo., with a heavy lot
of supplies.
Sedalia is 188 miles south-west of St. Louis, and was an important
military station at that time.
The people in that section were very disloyal and belligerent.
The train on which I journeyed was fired into three times the day I
made the journey, by “bushwhackers,” men who carried on an
irregular warfare.
The train was well guarded. There were at least fifty well-armed
Union soldiers on board to guard it, who took turns on the platform,
ready to spring off, gun in hand, if the train were attacked. But when
a volley was fired into the train, before the engineer could stop it, and
the soldiers could get started in pursuit, the enemy had mounted
their horses, and were far away. When the second volley crashed
into the train, a bullet passed through the window beside me, and
whizzed very near to my eyes. If it had come a little closer, it would
have gone through both of them. Fortunately I had just leaned back
against the seat; for if I had been sitting in an upright position, as I
was a few moments before, the ball would have gone through my
head.
A mother and her little girl, who was five or six years old, sat in the
seat in front of me. The poor little child was so terrified that she tried
to hide under the seat. Her appeals, as she lifted her beautiful tear-
stained face, were very touching.
“Do you think they’ll fire again, mamma?”
“I hope not, my darling,” and the mother would tenderly cover her
with the skirts of her dress, and try to soothe her.
“O mamma! do get down on the floor; if you don’t, you might get
killed.”
It was pitiful to see a child in such terror, crouching on the floor.
We did not reach Sedalia till midnight, and it was not till the train
drew up at the station that the child could be comforted.
The next morning early I went into the nearest hospital. The building
was an old, dilapidated frame structure, that had been used as a
store. Scores of wounded and sick men were crowded into these
poor narrow quarters.
But it is not my purpose just now to speak of them, or of the hospital
management, but of a child I found there.
He was lying on a cot in a little back room. They called him “Willie.”
He said he was “goin’ on eight;” but if he was that old, he was very
small of his age. His face was wondrous fair and beautiful, and his
hair hung in golden ringlets about his head. He had been very ill, and
was still too weak to leave his bed. But he was bright and happy, and
a great favorite with the men, who, lying on their beds, whittled toys
for Willie with their pocket-knives out of anything they could utilize for
that purpose, such as sticks and bones.
I took a great deal of pains to ascertain the facts about the boy. He
was a fatherless, motherless child, who had followed the soldiers
when they marched away from the town where he was temporarily
staying. No one cared, and no one followed to bring him back, and
so he went on with them.
The simple story, as he told it, seemed to be sustained by the facts I
afterwards gathered.
“I wanted to go to the war,” he said; “I had no mother, and I did not
want to stay at that place. I did not like the people, so when the
soldiers went to the war I went too. Some of the men said, that first
day, ‘Little boy, you had better run back home;’ but I told them I had
no home, that my mother was dead, and that I was not going back;
that I was going to the war, so they put me in a wagon to ride. At
night I had no place to sleep; but a man who said he had a little boy
at home, about as big as me, said I could sleep with him, and he
hugged me up under his blanket.
“Then after that I had a place in a wagon, the colonel said I might.
Sometimes I rode on the horses behind the big officers. But they
wouldn’t let me go to fight; they made me stay back in the wagon. I
didn’t like that; I wanted to go to the fights.”
A few days after I found Willie I was in the hospital, when a
gentleman came in seeking some one. He was from Ohio. He
happened to see Willie, and was wonderfully attracted to the child,
and Willie seemed to take a great fancy to the gentleman. He came
daily to see Willie during his stay in Sedalia. “This child,” he said to
me one day, with tears in his eyes, “looks so much like my own boy,
my only child, who died a few months ago, that I want to adopt him if
my wife will consent. But her heart is so nearly broken by grief, that
she may shrink from the plan.”
I told him that I, too, had taken a great fancy to the boy, and had
determined that he should have a good home, and that through my
friend, General Curtis, who commanded at St. Louis, I should hold
the boy till the best of references were furnished. To this he made no
objections; and as soon as he reached St. Louis he sent the very
best indorsements, furnishing the most ample evidence that he was
in every way worthy of such a charge, as he was a wealthy Christian
gentleman. Dr. Irwin, Acting Medical Director, readily concurred; and
it was agreed that if, when the boy was able to travel, they wanted
him, he should be sent.
Soon after he reached home, a telegram came: “All right—send
Willie by express, C. O. D.” (collect on delivery). When the contents
of the telegram became known, there was great excitement among
the patients. How could they part with Willie? And yet as he was to
have a good home they rejoiced with Willie, who was delighted with
the news that he was to go.
As soon as he was able to travel, we prepared him for the journey.
His name and address, and name and address of the gentleman to
whom we were sending him, were written with ink on white muslin,
and sewed to his coat and jacket, and on the shawl we wrapped
about him, and on the blanket we bundled him up in.
A stalwart expressman came for him, and, after giving a regular
receipt for him, took him up in his arms to carry him away. Dr. Irwin
and the surgeons of the hospital, and even the nurses and cooks, all
came to bid Willie good-by. His farewells were very touching.
When he was carried from his little room out into the main ward, a
few golden curls lay out on the folds of the coarse gray blanket, and
his laughing eyes turned kindly from one to another, as they called to
him: “Good-by, Willie!” “Be a good boy, Willie.” “Don’t forget me,
Willie.”
As we were about to pass through the last door-way, Willie, who had
said “good-by” to each one as they greeted him, called out at the top
of his voice, “Good-by, everybody.” There was a chorus of good-bys
in response; but an Irishman by the door was heard above them all,
as he said:—
“Good luck to ye now! and may ye live a hundred years, and get into
heaven afore the Divil has a chance at ye.”
We accompanied him to the train, the surgeons and myself, and saw
him safely aboard with his luncheon; and we stood there together in
silence as the train pulled out, for a vacancy was felt in every heart.
A telegram was received a few days later, telling us that Willie had
arrived safely.
A great deal was crowded into the next few months. Battle after
battle followed. Fort Henry and Fort Donelson had fallen, Nashville
had surrendered, the bloody struggle at Pittsburg Landing had taken
place, and the Union forces had taken possession of Corinth, Miss.;
but Willie was not forgotten.
The gentleman adopted him as his own child, and his wife was
greatly comforted by the presence and love of little Willie.
A PERILOUS RIDE.

IN digging the ship canal across the point opposite Vicksburg,


hundreds of men were killed or wounded in the great trench. By long
practice the gunners on the bluffs of Vicksburg acquired the ability to
drop a shell into the great ditch, causing terrible slaughter. The
heavy guns of the Union forces answered the enemy’s batteries, but
failed to silence them. “Whistling Dick,” as we all soon learned to call
one great cannon used by the enemy, kept the music going night
and day. The loud, clear, musical whistle which accompanied every
discharge won for that gun the attention of all. “Whistling Dick” was a
gun of long range, and was effective in execution, especially along
the canal. But one day, after a loud, sharp whistle, there was an
explosion, and “Whistling Dick” was heard no more. The work of
death went on, however; for there were other effective guns, and the
most determined resistance to the project of the Union troops was
shown.
The wounded soldiers were taken to a hospital hastily improvised at
a point just opposite Vicksburg, where, although more than a mile
nearer the enemy, with only the Mississippi River between them,
they were nevertheless comparatively safe, being protected by a
high embankment. I had been sending supplies to this little hospital
with lavish hand. It seemed dreadful that wounded men should lie
there night and day under the guns of two armies, the battle always
on, the shriek and thunder of shell and shot over them, and all
around them, and shaking the very earth on which they lay. Weary,
homesick, and suffering, they were isolated from the army and from
all other companionship, except that of the surgeon and his force of
detailed soldiers. But this surgeon (I have forgotten his name, or I
would mention it with the highest respect) was a thoughtful and kind-
hearted man, who desired the best for his men and heartily
sympathized with them. One day he came into my quarters on the
Sanitary boat with radiant face. He had thought of something which
would please his “boys,” and that was that I should visit them. At first
the thing seemed impossible. The distance was many miles. I could
not go in an ambulance, or on foot, and the dangers of the journey
were appalling. But he had thought of all that, and explained the
whole scheme. He could get a good, safe horse, and I could ride on
a cavalry saddle; and although there was some water in the canal,
and the banks were steep, the crossing was entirely safe, and there
were places where the horse could climb.
I could not refuse to go to the men who had faced the cannon, and
gone down wounded and helpless to the gates of death for my
country and my flag. General Cyrus Bussey, who was afterwards the
Assistant-Secretary of the Department of the Interior, and his plucky,
lovely little wife, who is now among the glorified in heaven,
volunteered to accompany me. Mrs. Bussey had her own horse and
a side-saddle. I had a great raw-boned animal, which looked as
though he had been in several wars, with a good new cavalry
saddle, which some officer had kindly lent for the occasion. “This
horse is good and safe,” the surgeon explained, by way of apology;
“they say he wouldn’t shy or jump if a shell burst just before him.”
The guns of two armies were screaming over us when we reached
the point which our guide designated as “the safe place to cross the
canal.” He did not know that some of the barriers at the mouth of the
canal had given way, and that the water in the canal was several feet
deeper than when he had crossed that morning. The tide was swift
and turbulent; but the surgeon said cheerfully, “It’s perfectly safe; just
follow me.” The next moment his horse went down into the muddy,
swirling flood, and, struggling heroically, swam to the opposite shore.
The surgeon called back to us that he had missed the crossing, and
designated a point a little higher up, which, as he said, “was perfectly
safe.” I had misgivings, but, settling myself well in the saddle, gave
the horse loose rein. He marched bravely in, and went down into the
flood with a plunge. General Bussey, fearing I would be drowned,
spurred his horse in after me, and the two brave animals struggled
together until we reached the opposite shore. Thanks to my
Kentucky training, I kept the saddle, and the only damage done was
a good drenching.
As General Bussey expressed a wish that Mrs. Bussey should not
attempt to cross, she remained at a cabin near by, which was
somewhat protected, till we returned.
Reaching the embankment opposite Vicksburg we scattered, the
surgeon taking the lead. I followed about fifty yards behind him, and
General Bussey about fifty yards behind me. The road was fair, and
we flew over that stretch at a full gallop. My shaggy, raw-boned
steed made good time. It was a wild ride. We were surrounded by
batteries. The mortar boats of the Union army, placed as near to
Vicksburg as possible, were sending their uncertain shells
thundering over our heads into the doomed city with deafening fury.
The heavy guns along the heights of Vicksburg were answering the
long line of batteries and heavy mounted guns on our side of the
river; and only the river lay between us and the enemies’ works. Shot
and shell screamed over us. Sometimes it seemed as if the sky was
torn to pieces above us; but my horse did not flinch. On and on we
went, in a full gallop. If a gun was levelled at us that day from any of
the near batteries, we were not in range when the shot came over,
and so we reached the hospital in safety.
What shall I say of this hospital? What can I say of these wounded,
suffering men? Language is inadequate to describe their condition.
Longing for home and mother, for human sympathy, their moans
were answered only by the guns. They longed for quiet and sleep,
but the guns of two armies were thundering night and day over their
heads. How could flesh and blood, brain and nerve, endure it? My
garments were still dripping, but I went from cot to cot to speak the
words of cheer. The men tried to express their thanks for my coming
in a befitting manner; but their “God bless you for coming!” was
choked with tears. As I saw those brave men lying there weak and
helpless, and every nerve racked with the thunders of battle, I could
not beat back my own tears. Indeed, as I live it all over again, and
write of it, the tears will come again, although more than thirty years
have rolled by since that time. I sobbed out as best I could: “God
bless you, boys; keep good courage. I will get you out of this if it is
possible.”
The return trip was safely made. Again we swam the canal; Mrs.
Bussey joined us, and we returned to camp. The next morning I
called on General Grant, and reported the condition of these
wounded men. General Grant was most thoughtful and careful of his
sick and wounded. He took in the situation at once. Calling Rawlins,
he said, “Those wounded men must be moved from the Point right
away. Send an order to the medical director to that effect.” And that
night, under the cover of the darkness, they were removed to
hospitals at Milliken’s Bend, twenty-five miles away from the belching
batteries.
A WOMAN WOUNDED IN BATTLE.

A WOMAN who had served as a private soldier in the ranks was


severely wounded and taken prisoner at Chickamauga. She fell in a
charge made upon the Confederates; and as the troops immediately
fell back she was left with the other wounded on the field, in the
enemy’s lines. As she was dressed as the other soldiers were, her
sex was not discovered till she was under a surgeon’s care in the
hospital. She was wounded in the thigh. No bones were broken; but
it was a deep, ugly flesh wound, as if torn by a fragment of a shell.
A day or two afterwards she was sent with a flag of truce into the
Union lines.
The sum and substance of the official message sent with this woman
was: “As the Confederates do not use women in war, this woman,
wounded in battle, is returned to you.” There was great indignation in
the regiment to which this woman belonged; and officers and men
hastened to protest, that, although she had been with them for more
than a year, not one in the regiment suspicioned that she was a
woman. She stood the long, hard marches, did full duty on the
picket-line and in camp, and had fought well in all the battles in
which the regiment took part. She was in the hospital at Chattanooga
for some time, where I first met her. When she was able to bear the
transportation, she was removed to a hospital at Nashville. I met her
there again and again, and tried to ascertain why she had enlisted.
“Had you a husband in the regiment?” I questioned.
“No.”
“A lover or friend?”
“No, I didn’t know any of them.”
“Well, why did you enlist?”
“I thought I’d like camp-life, and I did.”
“You did your full share of the hard work, I am told, marching, going
on picket duty, and chopping wood?”
“Yes; I was put on detail just like the others, and I never made any
excuse. I was awfully afraid they would find me out, and then I’d
have to go.”
“But they did not find you out?”
“No; not till I was wounded. The most I care about now is that they
won’t let me go back.”
“Where did you come from? and what is your real name?”
“I don’t want to tell, and I sha’n’t tell, either.”
When she was able to sit up the question of clothing became an
important one. The surgeon said, “She must have women’s clothes
to put on.” We women from the North, by gift and by purchase,
provided the necessary outfit for a woman’s wardrobe. To raise some
funds for her we had her photograph taken, first in the uniform of a
private soldier, and then dressed as a woman. She sold them to
soldiers and visitors for twenty-five cents each, and raised
considerable money. I have the two I purchased, which I have
treasured in my war album all these years. She was stout and
muscular, with heavy features, high cheek bones, and her black
abundant hair was cut very close. She was perhaps twenty-six or
twenty-eight years old, but when in her military rig looked like a
beardless boy.
The time came at last when she must be dismissed from the
hospital; and I was commissioned by the officers to find out all I
could about her, and where she lived, as she had been more friendly
to me than to the others. The interview was a long one. I can give
only the main points. “The time has come,” I said, “when you must
be sent out of the hospital. Where do you wish to go?”
“I’ll stay in Nashville,” she answered.
“But you can’t stay in Nashville. This city is within the military lines,
and no one can come in, stay here, or go out of this town, without a
pass. You have come into these lines in disguise as a soldier, but
you are now known. So if you will not go willingly, you will be sent out
in charge of a provost marshal. That is, you will be taken under
arrest by the government officers to Louisville, and left there. Then
what will you do? You are not strong enough to do hard work, and I
doubt if you could get any work there to do.”
“I’m awfully sorry I can’t go back into the army.”
“You certainly cannot, the case is too well known; and recruiting
officers have been warned, and will be on the lookout hereafter. If
you will give your name and place of residence, the government will
send you home, and the trip will not cost you anything.”
“If I tell you my name, and the place I wish to go to, will you keep it a
secret?”
“I will be obliged to tell the officers.”
“Will you ask them not to publish it?”
“I certainly will; and I will never tell it to any one, except the officers
from whom I will get the order for pass and transportation.”
“I will trust you,” she said; and she whispered her name and
residence. Two days after that she was on her way to her home in
the Northwest.
I never knew what became of her.
BRAVING DANGERS.

IN December, 1862, General W. T. Sherman gathered his forces at


the landing at Helena, Ark., and on the 21st of the month the great
fleet, with flags flying, moved down the Mississippi River. A very
strict order had been issued by him against any citizen or reporter
accompanying the expedition; and severe penalties were threatened
in case the order should be disobeyed.
It was well known that the movement was against Vicksburg, but the
bravest reporter feared to defy that order.
As some time passed without news of Sherman’s army, the Blue
Wing was sent down with communications, but she was captured by
the Confederates. The government finally decided to send down two
gunboats and the White Cloud, a wooden steamer. I at once asked
the privilege of loading the White Cloud with sanitary supplies. Mr.
Plattenburg, agent of the Sanitary Commission, who was also at
Helena, had a heavy lot of supplies.
As I had a pass for myself and all goods, from the Secretary of War, I
had no trouble in securing a passage on the White Cloud. I do not
recall as to how Mr. Plattenburg secured the privilege of going with
the little expedition; I only know that he went, and that the boat was
loaded with our supplies.
Thousands of soldiers were about the landing when our little fleet
moved out with banners flying. We all knew that untold dangers were
before us. And our heroism created the greatest enthusiasm. When
the White Cloud moved out into the channel and turned her prow
down stream, I stepped out “on the guards” to take a last look at
Helena. My appearance was greeted with such an outburst of
applause from the thousands on the wharf that I fled to the cabin,
after waving my handkerchief in acknowledgment of the salute.
We were fired into frequently from the banks. Whenever we reached
a point of especial danger the White Cloud was sent eight or ten
miles in advance so as to draw the enemy’s fire, and thus uncover
his batteries; for it was not likely that if the gunboats were in sight we
would be attacked. Every moment, night and day, we were in
expectation of shot or shell from some concealed battery from the
shore. But they had been forewarned that the gunboats were
coming, and so did not attempt to capture the White Cloud. The
sharpshooters on the shore fired into us again and again. No one
was killed; but sleep and rest were impossible, and there were many
narrow escapes. We reached Milliken’s Bend one morning about
daylight, to find General Sherman’s army quartered there.
There was a great fleet of boats, and the sick and wounded were on
them. A tugboat was detailed to me; and I went with my supplies
from boat to boat, distributing such comforts and delicacies as I had,
to the men who had been wounded in the fight near Vicksburg. It
was decided by the medical authorities to send a steamer up the
river with a load of the wounded at once. The City of Memphis, the
largest steamer on the Mississippi River, was selected for this
purpose. A regiment and a battery were removed from the boat, and
she was put in order; that is, the filth was shovelled overboard.
I was told by a chaplain at the time that there were so many of our
men dying that the firing of salutes over their graves was ordered
discontinued. The constant noise of funerals was demoralizing.
During the afternoon the boat was loaded up with the worst patients
on the several boats. They were placed in the berths, and under the
berths, and on the floor, and out upon the guards. Wherever there
was a place where a fever-stricken, or a torn and broken body could
be laid, it was occupied. About seven hundred and fifty were put on
board.
The sun was sinking;-behind the long, low line of cypress trees,
festooned with their trailing mosses, when our boat turned her prow
up the Mississippi River.
Long rows of men lay on the floor with their knapsacks for their
pillows. Among them was a Missouri soldier, severely wounded and
delirious, who all the night long called piteously for his sister.
His cry, “O sister!” was so plaintive and pathetic that I would go to
him every little while and ask,
“What do you want?”
“I am glad you have come—I want a drink of water.”
When the water was given he would remain quiet for a little time.
The next morning, as soon as it was light, he was taken to the
amputating-table, and one of his limbs sawed off above the knee. He
sank very low under the operation—so low that no attempt was
made to remove him from the table. The surgeon in charge said to
me, “Get him to take some food or drink if you can; he is sinking very
fast.” I offered him every delicacy in my possession, but he turned
away in disgust. There had been some of my supplies transferred to
this boat. While working with the men on the lower deck, and helping
dress their wounds, I found a barrel of sauer-kraut. I allowed the
attendants to open it; but afterwards, as I came up to the upper
cabin, I called the surgeon’s attention to it, so as not to be blamed in
the matter if the results were bad.
It happened that I met him near the amputating-table. As I passed
the patient I turned to give him a sympathetic look. He beckoned to
me, and I hastened to him. “I want some kraut,” he said.
I stepped over to where the surgeon was ministering to a man, and
questioned as to whether it was best to grant his request. “Give him
anything he wants—he can’t live anyway,” was his answer. I sent an
attendant down to get the kraut; and he brought up a big tin cup full,
and placed it on his breast and went his way.
Shortly afterwards, passing that way, I noticed him, feebly,
ravenously trailing the kraut to his mouth; and I never saw any one
eat as much kraut as he did in my life. He never stopped till he
emptied the cup. No one attempted to hinder him, as it was expected
he would die soon. From that hour he began to mend, and by the
time we reached St. Louis his case was considered hopeful.
Months afterwards, as I was passing through one of the St. Louis
hospitals, I heard the thud, thud, of crutches coming after me. I
turned to see who was following me; and a merry voice greeted me,
“Here’s your sauer-kraut man! Here’s your sauer-kraut man!” And
there, sure enough, was my Missouri soldier, able to get around
lively on crutches, and as blithe and merry as though he had never
felt the keen edge of the surgeon’s knife.
The dangers and hardships of that trip can never be forgotten. There
were many touching incidents. If this little story falls under the eyes
of that Missouri soldier, I would like to hear from him.
He told me, that day that I last met him, his story, which was full of
the pathos of home love and tender sacrifices. He was the youngest
of his father’s family; and they did not want to spare him to the
country, though they were loyal to the Stars and Stripes. But the
lawless bands of marauders, who were significantly called
“Bushwhackers,” were prowling over the State of Missouri, and his
life was unsafe. He did not venture to sleep in a house for months
before he left his home, and at last sleeping in the bushes became
dangerous. Several times, as he was asleep out in the undergrowth,
he narrowly escaped the bushwhackers, who were seeking him. I
never saw him again, but hope he got back to his own home safely.
During the trip up to Cairo twenty died, one with lockjaw. It was pitiful
to see a great stalwart man deprived of the power of speech,
starving to death. Not one particle of food could pass between his
closely-set teeth. His mind was clear, and daily he wrote out his
requests in regard to his friends and other matters.
Never was ocean traveller gladder to see the headlands of his own
native country than were we to see Cairo. A company of ladies came
on board, fresh nurses and surgeons were obtained, also comforts
for the wounded in the shape of cots, mattresses, etc. Many of the
patients were removed from the overcrowded boat into comfortable
hospitals at Cairo, thus relieving all parties. As soon as the boat
landed, I went to the house of a friend; and as I had not had one
hour of unbroken sleep for about ten days, I redeemed the time by
taking a nap thirty-six hours long.
TWO DREADFUL DAYS ON THE
BATTLEFIELD. SHILOH.

THE hospital steamer on which myself and two other ladies took
passage to Pittsburg Landing from Cairo, Ill., reaching Savannah,
Tenn., eight miles below there, about four o’clock a.m., April 7. There
we heard the news of the terrible battle that had been fought the day
before. Some said: “The Union army is defeated and driven to the
very banks of the river, and are all likely to be captured to-day.” We
were soon out of our berths and on the outlook. The boat, with a full
head of steam, made all possible speed to reach Pittsburg Landing.
Two gunboats, the Tyler and the Lexington, lay out in the stream,
sending shot and shell over the heads of the Union Army into the
Confederate ranks. As the boat steamed up to the Landing, where
already a great fleet of steamers was lying, the shells went
screaming over our heads with deafening fury. All was in seeming
confusion at the Landing. The roadways, dug out of the steep bank,
were insufficient for such an emergency. In the hard fight on the day
before, a vast amount of ammunition had been used, and the officers
all well knew that with the dawn of the coming day the battle would
be renewed with desperate fury. Every teamster was, therefore,
doing his utmost to get ammunition and provisions to the front. They
would bring their mules to the steep, roadless bank, that stood at an
angle of forty-five degrees; and while the driver held the lines with a
strong, steady hand, and set his boot heels so as to keep a standing
position as he ploughed his way to the bottom, his mules put their
little front feet down, settled themselves on their haunches, on which
the wagon rested, and skeeted to the bottom with the driver. It was a
wild sight. Each teamster had an assistant who held a torch made of
pine. Hundreds of torches lighted up the black night. There was a
clamor that cannot be described in the loading up, and a steady
stream of loaded wagons going up the hill by the regular roadways.
As soon as the first rays of the morning light made objects distinct,
the firing began. Both armies had rested, face to face, on their arms,
and a hasty breakfast had been snatched of what they could get
before daylight, for all well knew that a bloody day was before them.
Each man, as he lifted his head from the ground where he had
pillowed it the night before, wondered if he should live to see the
setting of another sun.
Our hospital boat was lying alongside of other steamers. The rain
was falling steadily. We could hear the heavy guns, the screaming of
the shells, the thunder of the battle going on near by. As the light
increased, we shivered to see the wounded lying on bags of grain
and out on the guards, and the dead, who had been carried from the
boats, lying mangled and bloody along the shore of the river. At first
we could only cover our faces with our hands in a shiver and chill of
agony, in the attempt to hide the horrid sights of war from our eyes.
But as we stood there a feeble hand was lifted, and a feeble voice
called out,—
“Say, lady! Can’t you bring me a drink of water?”
Immediately a hundred hands were lifted. We could scarcely see
them in the faint light of the early morning, but we could hear the
voices.
“Bring me some water.”
“Bring me something to eat.”
I called out cheerily,—
“Yes, yes; we’ll help you all we can.”
It was a great relief to have something to do. We went with gladness
to our work. I was the pioneer, and went right onto the boat lying
nearest.
The surgeon in charge of our hospital boat had gone off to the field.
There was no one in authority left on the boat, and we took
possession.
I had several boxes of canned oysters, and three or four barrels of
crackers, but we soon exhausted these; then we began on the beef
in the storeroom.
Barrels of soup were made and distributed. The other two ladies
made the soup, and I distributed it from boat to boat, and from one to
another. Oh, the sights and scenes I witnessed that day!
As I was carrying a bucket of soup across a gang-plank, an officer
met me. He came bounding forward, with his sword clanging by his
side.
“Madam,” he said, “what are you doing?”
I was startled nearly out of my wits, but I managed to say,—
“I am carrying soup to the wounded.”
“Why, you ought not to do that. See here, soldier, I detail you to carry
soup for this woman.”
The soldier sprang forward and took the bucket of soup from my
hand, and the officer went on. I never knew who he was. If this falls
under his eyes, I want to thank him for his thoughtfulness. On and
on, all day, I went with my assistant, while the two lady helpers
worked as fast as they possibly could, to get the food ready.
The distribution of food was very rapid. Men with broken legs and
arms and gashed faces would hold out their tin cups or canteens to
be filled. The tin cups were easily filled, but the canteens took longer.
When they saw us coming, they would pound on the floor or on the
side of the boat, calling piteously,—
“Don’t pass me by. I am here, lady; please give me some soup.”
“Please, lady, pour some water on my arm, it is so dry and hot and
the wound hurts so.”
Without a moment’s relaxation the day passed in this kind of work.
In the afternoon the gunboats stopped firing, and the news came that
the Confederates were driven back.
Oh, how much that meant to us all; for through all that morning the
boats had their full head of steam on, so that if the army was driven
to the river, as many as possible could escape by that means.
Now and then I would help a surgeon who was dressing some of the
worst wounds. My clothing was wet and muddy to the knees, and
covered with blood, but I did not see it. I had not eaten a mouthful of
food since the night before, but I did not know it. I was entirely
unconscious of weariness and human needs.
It was about ten o’clock at night when some one asked,—
“Did you have supper?” This little question called me to the
consciousness of my condition.
“No,” I answered; “I have not had a mouthful to eat since yesterday
evening.”
A surgeon operating near by looked at me earnestly, and then said,
with the voice of authority,—
“Madam, stop work immediately. We will have you on our hands
next.”
I was cutting a fragment of a blue blouse away from the arm of a
wounded young soldier. I continued my work till the bits of the blouse
were gotten out, as far as I could see, then laid on a wet compress.
“Oh! thank you,” he said, with grateful tears in his eyes.
I went back to the cabin of the hospital boat and had my supper.
After changing my clothes I sat down on a divan, feeling almost too
weak and exhausted to stir. A chaplain came on the boat, inquiring
for me. When he met me he seized my hand and began to bellow. I
have never heard anything like it. When I saw him, I knew that he
was crazy. The officers of the boat ran back to see what was the
matter, and somehow the surgeon in charge managed to get him into
a stateroom and lock him in, and place guards at the door, and the
next day he was sent up with the other patients to St. Louis on that
boat.
Early the next morning I was transferred with the little baggage I had
to another boat set aside for hospital workers. My fine dress, which I

You might also like