Professional Documents
Culture Documents
Download Using Information Technology 11th Edition Williams Test Bank online ebook textbook full chapter pdf
Download Using Information Technology 11th Edition Williams Test Bank online ebook textbook full chapter pdf
https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-test-bank/
https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-solutions-manual/
https://testbankdeal.com/product/information-technology-for-
management-11th-edition-turban-test-bank/
https://testbankdeal.com/product/mgmt-11th-edition-williams-test-
bank/
Information Technology Auditing 3rd Edition Hall Test
Bank
https://testbankdeal.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/
https://testbankdeal.com/product/information-technology-
auditing-4th-edition-hall-test-bank/
https://testbankdeal.com/product/managing-information-
technology-7th-edition-brown-test-bank/
https://testbankdeal.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/
https://testbankdeal.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Chapter 06
A. continuous
B. digital
C. sequential
D. analog
A. bit
B. byte
C. kilobyte
D. megabyte
A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone
6-1
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be _________.
A. spontaneous
B. digital
C. sequential
D. analog
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
6. A person sending a document over a phone line by converting a computer's digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
A. terminal
B. router
C. network
D. server
6-2
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8. A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN
A. WAN
B. LAN
C. MAN
D. Internet
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer to peer
11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
6-3
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. A computer that acts like a disk drive, storing the programs and data files shared by users on
a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these
15. A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.
A. VPN
B. intranet
C. firewall
D. protocol
6-4
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
16. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet
17. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node
A. server
B. host
C. node
D. router
A. node
B. protocol
C. packet
D. backbone
6-5
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. A common connection device that connects computers to a network and that sends
messages (checks packets) between sender and receiver nodes is called a ________.
A. router
B. gateway
C. switch
D. bridge
21. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
22. A device that joins multiple wired and/or wireless networks in a home office is a ________.
A. node
B. router
C. bridge
D. firewall
23. In an organization, all computer networks are connected to the Internet by a "main highway"
called a ________.
A. skeleton
B. backbone
C. gateway
D. router
6-6
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?
A. ring
B. bus
C. hub
D. star
25. In the ________ network topology, communications devices are connected to a single cable
with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
26. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
27. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
6-7
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
28. ________ is the most common and most widely used LAN technology, with networked devices
in close proximity; it can be used with almost any kind of computer. Most microcomputers
come with a port for this type of network connection, which uses cable.
A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet
29. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition
telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
31. A type of wired communications technology used to connect equipment in a home network is
the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
6-8
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. What wired communications medium consists of dozens or hundreds of thin strands of glass
or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
34. The ________ is the range of frequencies that a transmission medium (channel) can carry in a
particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
wireless network and content providers?
A. LAN
B. WAN
C. WAP
D. HAN
6-9
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio
A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio
A. broadcast radio
B. broadband
C. microwave
D. WAP
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking
6-10
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. The highest level that a satellite can occupy in space is known as ________.
41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used to
identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
A. first
B. second
C. third
D. fourth
43. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
6-11
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
45. What short-distance wireless standard is used to link cell phones, computers, and
peripherals at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
46. A ________ attack disables a computer system or network by making so many requests of it
that it overloads it and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk/flash drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
6-12
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?
A. worm
B. virus
C. Trojan horse
D. denial-of-service attack
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls them
remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software
51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
6-13
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. What is the science, often used in computer security systems, of measuring individual body
characteristics?
A. encryption
B. decryption
C. rootkit
D. biometrics
53. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
True False
55. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be digital.
True False
True False
6-14
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Telephones have always been digital devices.
True False
58. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False
True False
60. Capturing music digitally means that one has an exact duplicate of the music.
True False
61. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False
True False
True False
64. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False
6-15
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is called a file server.
True False
66. "File server" and "database server" are different names for the same type of server.
True False
67. Peer-to-peer networks are less stable than client-server networks because in the former
certain shared resources reside on each user's machine.
True False
68. Virtual private networks (VPNs) are private networks that use a public network (usually the
Internet) instead of private, leased (expensive) lines to connect remote sites.
True False
69. If you have one computer, you need firewall hardware; if you have more than one (networked)
computer, then a software firewall should be used.
True False
70. In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.
True False
71. Routers join multiple wired and/or wireless networks commonly in offices and home offices.
True False
True False
6-16
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. An interface device used to connect the same types of networks is called a node.
True False
74. The backbone is the main communications route in a bus network topology.
True False
75. In a bus network, all computers and communications devices are connected in a continuous
loop.
True False
76. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False
77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False
True False
79. One wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.
True False
80. All wired and wireless communications media use the electromagnetic spectrum of radiation.
True False
6-17
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False
82. The two general classes of bandwidth are long and short.
True False
83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
True False
84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False
85. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False
True False
87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False
88. Communications satellites are microwave relay stations in orbit around the earth.
True False
6-18
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
89. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False
90. A larger number of geostationary earth orbit (GEO) satellites are required for global coverage
than mid-earth orbit (MEO) satellites.
True False
91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify earth
locations.
True False
92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False
True False
True False
True False
True False
True False
6-19
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.
True False
True False
True False
101.A Wi-Fi enabled laptop computer accesses the available network (say, at an airport) through
an access point, which is connected to a land-based Internet connection.
True False
True False
103.Wi-Fi connections are always secure; no one can steal your data when you are online.
True False
True False
True False
6-20
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
106.A denial-of-service attack uses a virus to crash your computer.
True False
True False
108.A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False
109.A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False
True False
True False
True False
6-21
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
113._________ is the gradual merger of computing and communications into a new information
environment, in which the same information is exchanged among many kinds of equipment,
using the language of computers.
________________________________________
114.Most of the word's natural phenomena use signals that continuously vary in strength and
quality, called ________ signals.
________________________________________
________________________________________
116.So they can be sent over a telephone line, analog signals are converted into digital signals,
and then back again, by using ________.
________________________________________
________________________________________
________________________________________
119.Private networks that use a public network, usually the Internet, to connect remote sites are
called ________.
________________________________________
120.A private intranet that allows access to selected outside users is a(n) ________.
________________________________________
6-22
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121.A _________ is a system of hardware and/or software that protects a computer or a network
from intruders.
________________________________________
122.A client-server network has a _________ computer, a central computer that controls the
network; The devices connected to the network are called _________.
________________________________________
123.A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________
124.Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________
125.A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________
126.A(n) ________ is an interface (linking device) used to connect the same types of networks,
whereas a(n) ________ is an interface permitting communications between dissimilar
networks.
________________________________________
127.________ are physical devices that join multiple wired and/or wireless networks; their primary
job is to provide connectivity, and they are often used in small office networks, cafés,
airports, hotels, and home networks.
________________________________________
6-23
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
128.The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________
129.A motherboard expansion card called a _________ enables a computer to send and receive
messages over a network.
________________________________________
130.The system software that manages the activity of a network is called the ________.
________________________________________
131.A network can be laid out in different ways. The layout, or shape, of a network is called a
________.
________________________________________
132.A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________
133.A ________ network topology is one in which all microcomputers and other communications
devices are connected directly to a central network switch.
________________________________________
________________________________________
6-24
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135.In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and with different network
topologies.
________________________________________
136.Wired communications media include three main types. The kind used for tradition telephone
lines is a ________.
________________________________________
137.Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________
138.Wired communications media include three main types. Insulated copper wire wrapped in a
solid or braided shield and then an external cover is called ________ cable.
________________________________________
139.Wired communications media include three main types. The kind used for transmitting pulses
of light is called a ________ cable.
________________________________________
________________________________________
141.The range of frequencies that a transmission medium can carry in a given period of time is
called its ________.
________________________________________
6-25
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
142.The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________
143.Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________
144.The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________
145.Global Positioning Systems use ________ to continuously transmit signals to identify earth
locations.
________________________________________
________________________________________
147.Simple one-way radio receivers that receive data (but not voice messages) are called
________; they are often used in hospital environments.
________________________________________
148.1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________
149._________ is an international standard widely adopted in the U.S.A., Europe, and Asia that
supports fast cellphone data transfer rate; this standard has not been adopted yet by all
carriers.
________________________________________
6-26
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
150.Public wireless access points are called _________.
________________________________________
151.The short-range, wireless digital standard aimed at linking hand-held devices up to 33 feet
apart is called ________.
________________________________________
________________________________________
153.The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________
________________________________________
155.A _________ is a person who posts intentionally offensive, incendiary, or off-topic comments
online.
________________________________________
156.Worms, viruses, Trojan horses, and rootkits are all types of programs called ________.
________________________________________
157.A(n) ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive and that can cause the computer to crash.
________________________________________
6-27
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
158.Almost all viruses are attached to an _________ file.
________________________________________
159.A ________ is a program that pretends to be a useful program, usually free, such as a game or
screen saver, but carries viruses, or destructive instructions that cause problems without
your knowledge.
________________________________________
160.A(n) ________ uses malware to hijack hundreds or thousands of computers, called ________,
and to remotely control them all.
________________________________________
161.________ software can be used to scan a computer's hard disk, CDs, and main memory to
detect viruses.
________________________________________
162.The process of altering readable data into unreadable form to prevent unauthorized access is
known as ________.
________________________________________
________________________________________
Essay Questions
6-28
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
164.How do analog and digital devices interpret electrical signals?
166.What are the main differences between a WAN, a MAN, and a LAN?
6-29
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
167.What is the difference between a client/server network and a peer-to-peer network?
6-30
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
170.Distinguish between narrowband and broadband.
6-31
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
173.What are the four types of cyberintruders?
6-32
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 06 Communications, Networks, and Cyberthreats: The Wired
and Wireless World Answer Key
A. continuous
B. digital
C. sequential
D. analog
The term "digital" describes any system based on discontinuous data or events. In the
case of computers, it refers to communications signals represented in a two-state or
binary way.
A. bit
B. byte
C. kilobyte
D. megabyte
6-33
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone
4. Signals such as sound and temperature, which continuously vary in strength and quality,
(p. 305- are said to be _________.
306)
A. spontaneous
B. digital
C. sequential
D. analog
6-34
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
5. The ________ is a device that converts digital computer signals into analog signals so that
(p. 306) they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
A sending modem modulates a computer's digital signals into the telephone line's analog
signals. A receiving modem demodulates analog signals into digital signals.
6. A person sending a document over a phone line by converting a computer's digital signals
(p. 306) to analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
A modem converts a computer's digital signals into the telephone line's analog signals.
The receiving modem converts analog signals into digital signals.
6-35
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
7. A ________ is a system of interconnected computers, telephones, or communications
(p. 308) devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server
A. LAN
B. WAN
C. MAN
D. HAN
A wide area network (WAN) is a communications network that covers a wide geographical
area, such as a country or even the world. It uses many types of media to make the
connections.
6-36
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. A network that covers a city or a suburb is called a ________.
(p. 310)
A. WAN
B. LAN
C. MAN
D. Internet
10. Networks are structured in two principle ways: client/server and ________.
(p. 312)
A. intranet
B. host computer
C. extranet
D. peer to peer
The client/server structure uses main computers (servers) to fulfill requests of connected
computers (clients); the peer-to-peer (P2P) structure uses an arrangement of equality,
wherein all computers communicate directly, without going through a server.
6-37
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
11. A network that operates without relying on a server is the ________ network.
(p. 313)
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
12. A computer that acts like a disk drive, storing the programs and data files shared by users
(p. 312) on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
6-38
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
13. If an organization's internal private network uses the same infrastructure and standards of
(p. 314) the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these
Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) to connect remote sites. Company intranets, extranets, and LANs can all be
parts of a VPN.
6-39
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
15. A(n) ________ is a system of hardware and/or software that protects a computer or a
(p. 314) network from intruders.
A. VPN
B. intranet
C. firewall
D. protocol
16. A ________ is the set of rules that govern the exchange of data between hardware and/or
(p. 316) software components in a communications network.
A. host
B. protocol
C. database
D. packet
6-40
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
17. A mainframe computer that controls a large network is called the ________ computer.
(p. 316)
A. slave
B. host
C. client
D. node
A host computer is a mainframe or midsize central computer that controls the network.
A. server
B. host
C. node
D. router
6-41
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
19. A ________ is a fixed-length block of data for transmission.
(p. 316)
A. node
B. protocol
C. packet
D. backbone
20. A common connection device that connects computers to a network and that sends
(p. 316) messages (checks packets) between sender and receiver nodes is called a ________.
A. router
B. gateway
C. switch
D. bridge
21. To create larger networks, a bridge connects the same types of networks, and a ________
(p. 316) connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
6-42
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-02 Networks
Topic: Networks
22. A device that joins multiple wired and/or wireless networks in a home office is a ________.
(p. 316)
A. node
B. router
C. bridge
D. firewall
23. In an organization, all computer networks are connected to the Internet by a "main
(p. 317) highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router
6-43
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?
(p. 318-
321)
A. ring
B. bus
C. hub
D. star
The basic network topologies are star, ring, bus, tree, and mesh. A hub is a common
connection point for devices in a network.
25. In the ________ network topology, communications devices are connected to a single cable
(p. 320) with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
6-44
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
26. What kind of topology (layout) is used by a network that connects all computers and
(p. 319) communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
27. What kind of topology (layout) is used by a network that connects all its computers and
(p. 319) communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
28. ________ is the most common and most widely used LAN technology, with networked
(p. 321) devices in close proximity; it can be used with almost any kind of computer. Most
microcomputers come with a port for this type of network connection, which uses cable.
A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet
6-45
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
29. A communications medium is a channel; there are three types of wired communications
(p. 324) media. The one consisting of two strands of insulated copper wire, used by tradition
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
(p. 324) wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
6-46
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
31. A type of wired communications technology used to connect equipment in a home network
(p. 325) is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
32. What wired communications medium consists of dozens or hundreds of thin strands of
(p. 334) glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
6-47
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
33. The ________ is the basis for ALL telecommunications signals.
(p. 324-
325)
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
34. The ________ is the range of frequencies that a transmission medium (channel) can carry
(p. 337) in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
6-48
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
(p. 329) wireless network and content providers?
A. LAN
B. WAN
C. WAP
D. HAN
6-49
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
37. What form of wireless transmission sends data to an AM or FM receiver?
(p. 329)
A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio
A. broadcast radio
B. broadband
C. microwave
D. WAP
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking
6-50
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
40. The highest level that a satellite can occupy in space is known as ________.
(p. 330-
331)
The geostationary earth orbit is 22,300 miles and above and is always directly above the
equator.
41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
(p. 331) to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
6-51
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
42. Broadband technology (wireless digital services) is also referred to as ________-generation
(p. 337) wireless services.
A. first
B. second
C. third
D. fourth
3G services support smartphones (e.g., iPhone); 4G and 5G are the newer versions.
43. Which of the following is NOT a type of long-distance wireless two-way communications
(p. 340) device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
6-52
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
(p. 338) wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
45. What short-distance wireless standard is used to link cell phones, computers, and
(p. 340) peripherals at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
6-53
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
46. A ________ attack disables a computer system or network by making so many requests of
(p. 347) it that it overloads it and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
(p. 348) disk/flash drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
6-54
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?
(p. 347-
350)
A. worm
B. virus
C. Trojan horse
D. denial-of-service attack
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
(p. 349) them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software
6-55
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
(p. 350) one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
Antivirus software looks for viruses only on the computer on which it is installed.
52. What is the science, often used in computer security systems, of measuring individual
(p. 351- body characteristics?
352)
A. encryption
B. decryption
C. rootkit
D. biometrics
6-56
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
53. What is the process of altering readable data (plain text) into unreadable form to prevent
(p. 352) unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
Encryption uses powerful mathematical concepts to create coded messages that are
virtually impossible to break. The receiver of the encrypted data has an encryption key to
decode it and make it readable again.
Analog means continuously varying (wavelike); binary is digital = either on or off (0 or 1).
6-57
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
55. Signals such as sound and temperature, which continuously vary in strength and quality,
(p. 304- are said to be digital.
305)
FALSE
TRUE
Until recently, telephones have all been analog devices; wired landline-phones still are.
58. A modem converts digital signals into analog signals so they can be sent over a telephone
(p. 306- line.
307)
TRUE
6-58
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
TRUE
60. Capturing music digitally means that one has an exact duplicate of the music.
(p. 308)
FALSE
61. A network is a system of interconnected computers and communications devices that can
(p. 308) communicate and share resources.
TRUE
6-59
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
62. The Internet is a WAN.
(p. 310)
TRUE
FALSE
LAN = local area network, which connects computers and devices in a limited geographic
area, such as one office, one campus, or one building.
64. Client/server networks and peer-to-peer networks are the same except that the first type
(p. 312- of network uses a mainframe and the second type uses only microcomputers.
313)
FALSE
The first network structure has clients that request services/data and servers, which are
computers that fulfill the requests. The second network structure's computers are all on
an equal basis and communicate directly with one another.
6-60
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by
(p. 312) users on a LAN, is called a file server.
TRUE
66. "File server" and "database server" are different names for the same type of server.
(p. 312)
FALSE
A file server stores both programs and data; a database server stores only data.
67. Peer-to-peer networks are less stable than client-server networks because in the former
(p. 313) certain shared resources reside on each user's machine.
TRUE
68. Virtual private networks (VPNs) are private networks that use a public network (usually
(p. 314) the Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE
6-61
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-02 Networks
Topic: Networks
69. If you have one computer, you need firewall hardware; if you have more than one
(p. 315) (networked) computer, then a software firewall should be used.
FALSE
70. In a network, communications protocols specify the type of electrical connections, the
(p. 316) timing of message exchanges, and error-detection techniques.
TRUE
71. Routers join multiple wired and/or wireless networks commonly in offices and home
(p. 316) offices.
TRUE
6-62
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
72. A gateway is an interface device permitting communication between similar networks.
(p. 316)
FALSE
Bridges are used for the same type of network; gateways are used for dissimilar networks.
73. An interface device used to connect the same types of networks is called a node.
(p. 316)
FALSE
This is a bridge.
74. The backbone is the main communications route in a bus network topology.
(p. 317)
FALSE
The backbone is the main "highway" for all devices on a network; the Internet has the
largest backbone. A bus is the connecting line in the bus network topology.
6-63
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
75. In a bus network, all computers and communications devices are connected in a
(p. 319- continuous loop.
320)
FALSE
76. Traditional landline telephone systems use twisted-pair wire as their communications
(p. 324) medium.
TRUE
77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams
(p. 3324-of light is called a coaxial cable.
325)
FALSE
6-64
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
78. Ethernet is a long-distance wireless communications connection.
(p. 324)
FALSE
79. One wired communications standard that allows users to send data over a home's existing
(p. 325) electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.
TRUE
80. All wired and wireless communications media use the electromagnetic spectrum of
(p. 327) radiation.
TRUE
6-65
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
(p. 327)
FALSE
The wider a medium's bandwidth, the more frequencies it can use to transmit data and
thus the faster the transmission.
82. The two general classes of bandwidth are long and short.
(p. 327)
FALSE
83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
(p. 327) carries most communications signals.
TRUE
6-66
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
(p. 327) makes a cycle, in a second.
TRUE
85. Both digital narrowband and broadband transmission speeds are measured in megabits or
(p. 327- gigabits per second.
328)
TRUE
TRUE
Infrared transmission is commonly used between computers and printers. TV remotes use
this technology.
6-67
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
(p. 330) ground to the satellite is called downlinking, and transmitting from the satellite to the
FALSE
88. Communications satellites are microwave relay stations in orbit around the earth.
(p. 330)
TRUE
89. Satellite orbits are at three levels: GEO, MEO, and LEO.
(p. 330-
331)
TRUE
6-68
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
90. A larger number of geostationary earth orbit (GEO) satellites are required for global
(p. 330- coverage than mid-earth orbit (MEO) satellites.
331)
FALSE
91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
(p. 332) earth locations.
TRUE
92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
(p. 332)
FALSE
TRUE
6-69
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Wireless Communications Media
TRUE
TRUE
6-70
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.
(p. 335-
336)
TRUE
TRUE
100. The short-range, wireless communications method aimed at linking hand-held devices at
(p. 338) high speeds and at distances of 100-228 feet is called Wi-Fi.
TRUE
101. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
(p. 338- through an access point, which is connected to a land-based Internet connection.
340)
TRUE
6-71
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
102. The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
(p. 338-
340)
FALSE
It is version n.
103. Wi-Fi connections are always secure; no one can steal your data when you are online.
(p. 340)
FALSE
TRUE
6-72
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
105. Malware consists of safeguards for protecting information technology against
(p. 343) unauthorized access, system failures, and disaster that can result in damage or loss.
FALSE
This is "security."
FALSE
This kind of attack is not a virus; it is an action (cyber threat) whereby a computer or
network is made inaccessible to users via repeated requests that cause system overload.
TRUE
6-73
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
108. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
(p. 348- carries a virus that replicates in your computer over and over until your computer crashes.
349)
FALSE
The Trojan horse does pretend to be a useful program, but it carries a virus that does
damage without your knowledge—such as recording personal data and sending it over the
Internet to "evil" computers for fraudulent use. (A worm is the replicating malware.)
109. A virus is a "deviant" program that is stored on a computer hard drive and can cause
(p. 348) unexpected and undesirable effects.
TRUE
TRUE
6-74
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
111. Cellphones do not get infected by malware.
(p. 350)
FALSE
112. Encryption is the process of altering—via software—readable data into unreadable form to
(p. 352) prevent unauthorized access.
TRUE
113. _________ is the gradual merger of computing and communications into a new information
(p. 304) environment, in which the same information is exchanged among many kinds of
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: Unit 6A
Topic: Networks and Wired and Wireless Media
6-75
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
114. Most of the word's natural phenomena use signals that continuously vary in strength and
(p. 305) quality, called ________ signals.
analog
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
115. Communications signals represented in a binary electronic format are ________ signals.
(p. 306)
digital
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
116. So they can be sent over a telephone line, analog signals are converted into digital signals,
(p. 306) and then back again, by using ________.
modems
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
server
Blooms: Remember
6-76
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
119. Private networks that use a public network, usually the Internet, to connect remote sites
(p. 314) are called ________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
120. A private intranet that allows access to selected outside users is a(n) ________.
(p. 314)
extranet
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
firewall
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
122. A client-server network has a _________ computer, a central computer that controls the
(p. 315) network; The devices connected to the network are called _________.
host or nodes
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
6-77
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
123. A set of conventions that govern how data is exchanged between devices on a network is
(p. 316) known as a communications ________.
protocol or protocols
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
124. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
(p. 316)
packets
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
125. A _________ is a network that connects computers to a network; data can be sent in both
(p. 316) directions at the same time.
switch
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
126. A(n) ________ is an interface (linking device) used to connect the same types of networks,
(p. 316) whereas a(n) ________ is an interface permitting communications between dissimilar
networks.
bridge or gateway
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
6-78
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
127. ________ are physical devices that join multiple wired and/or wireless networks; their
(p. 316) primary job is to provide connectivity, and they are often used in small office networks,
Routers or Router
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
128. The ________ consists of the main "highway" that connects all computer networks in an
(p. 317) organization.
backbone
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
129. A motherboard expansion card called a _________ enables a computer to send and receive
(p. 317) messages over a network.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
130. The system software that manages the activity of a network is called the ________.
(p. 317)
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
6-79
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
131. A network can be laid out in different ways. The layout, or shape, of a network is called a
(p. 318) ________.
topology
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
132. A ________ network topology is one in which all microcomputers and other devices are
(p. 319) connected in a continuous loop.
ring
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
133. A ________ network topology is one in which all microcomputers and other
(p. 319) communications devices are connected directly to a central network switch.
star
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks
mesh
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
6-80
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135. In small LANs, messages may bump into one another. The most popular protocol, or
(p. 321) technology, which uses cabling and special ports on microcomputers, that prevents
collisions is ________. It can be used with almost any kind of computer and with different
network topologies.
Ethernet
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks
136. Wired communications media include three main types. The kind used for tradition
(p. 324) telephone lines is a ________.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media
137. Telecommuting means using a computer and networks to work from ________; telework
(p. 323) means working from ________.
home or anywhere
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
138. Wired communications media include three main types. Insulated copper wire wrapped in
(p. 324) a solid or braided shield and then an external cover is called ________ cable.
coaxial or coax
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media
6-81
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
139. Wired communications media include three main types. The kind used for transmitting
(p. 324) pulses of light is called a ________ cable.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media
140. HomePlug technology is a wired communications standard that allows users to connect
(p. 325) equipment within the home using the house's own ________ wiring.
electrical or electric
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media
141. The range of frequencies that a transmission medium can carry in a given period of time is
(p. 327) called its ________.
bandwidth
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
142. The ________ a transmission medium's bandwidth, the more frequencies it can use to
(p. 327) transmit data and the faster it is.
wider
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
6-82
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
143. Infrared and microwave transmission signals cannot work around obstacles or travel in
(p. 329- curved lines, so they are called _________.
330)
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
144. The highest level that a satellite can occupy is the ________ earth orbit.
(p. 330)
geostationary or GEO
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
145. Global Positioning Systems use ________ to continuously transmit signals to identify earth
(p. 332) locations.
satellites
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
one or 1
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
6-83
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
147. Simple one-way radio receivers that receive data (but not voice messages) are called
(p. 335) ________; they are often used in hospital environments.
pagers
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
148. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
(p. 336-
338)
analog or digital
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
149. _________ is an international standard widely adopted in the U.S.A., Europe, and Asia that
(p. 338) supports fast cellphone data transfer rate; this standard has not been adopted yet by all
carriers.
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
hotspots
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
6-84
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
151. The short-range, wireless digital standard aimed at linking hand-held devices up to 33 feet
(p. 340) apart is called ________.
Bluetooth
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
153. The three short-range wireless standards used in home automation networks, for linking
(p. 341) switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
Z-Wave or Z Wave
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
cyberintruders or cyberattacks
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-05 Cyberintruders: Trolls, Spys, Hackers, and Thieves
Topic: Cyberintruders: Trolls, Spys, Hackers, and Thieves
6-85
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
155. A _________ is a person who posts intentionally offensive, incendiary, or off-topic
(p. 343) comments online.
troll
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-05 Cyberintruders: Trolls, Spys, Hackers, and Thieves
Topic: Cyberintruders: Trolls, Spys, Hackers, and Thieves
156. Worms, viruses, Trojan horses, and rootkits are all types of programs called ________.
(p. 348-
350)
malware
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
157. A(n) ________ is a program that copies itself repeatedly into a computer's memory or onto
(p. 348) a disk drive and that can cause the computer to crash.
worm
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
executable or exe
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
6-86
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
159. A ________ is a program that pretends to be a useful program, usually free, such as a game
(p. 349) or screen saver, but carries viruses, or destructive instructions that cause problems
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
160. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
(p. 349) ________, and to remotely control them all.
botnet or zombies
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
161. ________ software can be used to scan a computer's hard disk, CDs, and main memory to
(p. 350) detect viruses.
Antivirus
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
162. The process of altering readable data into unreadable form to prevent unauthorized
(p. 352) access is known as ________.
encryption
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
6-87
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
163. A message sent in its original undisguised, readable form is ________.
(p. 352)
plain text
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware
Essay Questions
Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of
electrical/light pulses represented in a binary way (on or off).
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
6-88
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: From the Analog to the Digital Age
166. What are the main differences between a WAN, a MAN, and a LAN?
(p. 310-
311)
A wide area network (WAN) covers a wide geographic area, such as a country or, in the
case of the Internet, the world. A metropolitan area network (MAN) covers a city or a
suburb. A local area network (LAN) covers a limited geographic area, such as one office,
one building, or a small group of buildings, such as on a college campus.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
167. What is the difference between a client/server network and a peer-to-peer network?
(p. 312-
313)
A client/server network consists of clients, which are microcomputers that request data,
and servers, which are central computers used to supply data. In the client/server scheme,
central servers handle all security and file transactions; they are powerful microcomputers
that also manage shared devices. They may run server software for applications such as
email and web browsing, or they may just host a database or be a file server or other kind
of server; different servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to-peer networks, which are
relatively inexpensive to set up, each machine shares its own resources and handles its
own security. Every computer can share files and peripherals with all other computers on
the network, given that all are granted access privileges. Peer-to-peer networks are less
expensive than client/server networks and work effectively for up to 25 computers.
Beyond that, they slow down under heavy use. They are appropriate for small networks,
such as small businesses and home networks.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks
6-89
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
168. Describe what a packet is and what it does.
(p. 316)
Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2) to
break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet—often using different (and most expedient) routes, at
different speeds, and sandwiched in between packets from other messages. Once the
packets arrive at their destination, the receiving computer reassembles them(called
packet switching) into proper sequence to complete the message.
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks
In a mesh network topology, messages sent to the destination can take any possible
shortest, easiest route to reach its destination. There must be at least two paths to any
individual computer to create a mesh network. (Wireless networks are often implemented
as a mesh.) In the previous topologies, star and bus, messages are usually broadcast to
every computer, especially in bus topology. In the ring topology, messages can travel in
only one direction—clockwise or counterclockwise. The Internet employs the mesh
topology, and the message, with the help of routers, finds its route for its destination.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks
6-90
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
170. Distinguish between narrowband and broadband.
(p. 327-
328)
Narrowband, also known as voiceband, is used for regular telephone communications and
is usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data
and high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL,
cable, satellite, T1, etc. are broadband.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones
on; locating stolen cars; orienting hikers/locating lost hikers; aiding in surveying;
monitoring dangerous geological sites, such as volcanoes; finding lost pets; geocaching;
getting map directions on computers and in cars; determining E911 locations of people
making 911 calls.
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911
locations are not always accurate; tracking cellphone users could violate privacy.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
6-91
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
172. Basically, how does Wi-Fi work?
(p. 338-
340)
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-05 Cyberintruders: Trolls, Spys, Hackers, and Thieves
Topic: Cyberintruders: Trolls, Spys, Hackers, and Thieves
1. Name migration
2. Résumé "rustling" and snooping
3. Government prying and spying
4. ID theft
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-07 Concerns about Privacy and Identity Theft
6-92
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Concerns about Privacy and Identity Theft
175. List at least five ways to protect yourself from Internet snoops.
(p. 357)
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-07 Concerns about Privacy and Identity Theft
Topic: Concerns about Privacy and Identity Theft
6-93
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Another random document with
no related content on Scribd:
un port de commerce très fréquenté, dont les exportations tendent à
s’accroître rapidement. Mais là s’arrêtent les ressemblances. Pour
quiconque vient du Brésil, l’arrivée à Montevideo est une surprise
complète.
Le long des côtes, plus de ces masses altières de pics rocheux
ou de collines aux versants boisés. Nous avions pris l’habitude de
regarder en l’air pour contempler les montagnes, il faut la perdre ici ;
les éminences décorées du nom de sierras et de cerros sont des
ondulations qui, le plus souvent, ne dépassent pas deux ou trois
cents mètres au-dessus de la mer.
Ayant atterri dans la nuit du 16 au 17 sur l’île de Lobos, sentinelle
avancée qui marque l’entrée du Rio de la Plata, nous avons passé à
l’heure du déjeuner près de Florès, îlot bas et aride, et bientôt nous
pûmes distinguer la ville de Montevideo, située sur une petite
presqu’île rocailleuse, à la partie orientale de la baie qui porte son
nom. De l’autre côté, nous apercevons le fameux Cerro (colline),
dont les Montévidéens sont très fiers, bien qu’il n’ait que 150 mètres
d’élévation [2] . A l’horizon, semblable à celui d’une mer, aucune
chaîne de montagnes, aucun pic ; on devine qu’au delà de cette
ligne presque droite s’étend la plaine à peine ondulée, uniforme, la
plus grande qui soit au monde. C’est là, en effet, que commencent
les Pampas, ces steppes de l’Amérique du Sud, où l’Indien recule
sans cesse devant le moderne gaucho, et qui n’ont d’autres limites
que le détroit de Magellan au sud, et à l’ouest la Cordillère des
Andes.
[2] Monte-Video : Je vois une montagne.
Buenos-Ayres, 25 septembre.