Advertisement Upgrade to remove ads

The language of telecommunications is governed by _______.

protocols

A(n) _____ signal is designed to represent computer data in an on or off state.

digital

Signal frequency is measured in _____.

hertz

Three types of physical cables that carry a signal are twisted pair, fiber optic, and _____.

coaxial

_____, part of the electromagnetic spectrum, refers to all of the frequencies available for radio waves from about 10 KHz to 300 GHz and their assigned uses.

Radio spectrum

High end radio waves include infrared light and _____.

all of the above
(microwaves, gamma rays, x-rays)

With the help of a _____, devices can send signals that allow them to connect to the Internet.

modem

A _____ card is a common netwrk device found in most laptop computers today.

network interface

A(n) _____ network includes transmission towers that connect to area handsets.

cellular

Which of the following should you consider when purchasing a carrier plan for your cell phone?

usage

Many of today's cell phones come equipped with _____ text technology keyboards to enhance texting.

predictive

How a cell phone looks, feels, and works is determined by its _____.

form factor

Restaurants use _____ to signal their patrons when a table is ready.

pagers

A pager receives signals from _____.

transmitters

In most closed-in areas, Wi-Fi technology has a maximum range of _____.

250 - 1,000 feet

We rely on _____ as the dominant technology to provide wireless Internet speed to its users.

wireless fidelity

Many cities have adopted _____ technology to provide faster Internet speed to its users.

WiMAX

There is hope that WiMAX technology will help resolve the _____ problem.

last mile

With Bluetooth, up to _____ devices can be paired simultaneously.

seven

The use of _____ technology to identify items for inventory may someday replace todays bar code system.

RFID

Items such as credit cards are beginning to take advantage of RFID technology through the use of a(n) _____ reader.

NFC

GPS _____ are primarily used to assist travelers in getting from one place to another.

receivers

Tagging a photo with geographic data is known as _____.

geotagging

Devices attached to a network are identified as _____.

nodes

The _____ is responsible for setting up and maintaining a network, implementing network policies, and assigning user access permissions.

system admistrator

A PAN typically covers a range of around _____ feet.

33

A(n) _____ expands the boundaries of a company's intranet to include networks outside of its Local Area Network setting.

VPN

Local Area Networks designed to serve an entire city are called _____ Area Networks.

Metropolitan

Two network systems that can exchange and process data using the same protocols is an example of _____.

EDI

A typical setup for a _____ network would include a wireless router connected to an ISP.

home

The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as _____.

computer forensics

Information security is implemented at the individual machine level, the computer network level, and the _____ level.

Internet

A common form of authentication is a _____.

password

A _____ is used as a security device to help identify a worker logging into a business computer system.

token

Through the use of _____, data is secured when it is stored and transported over a network.

encryption

A popular encryption method used to protect data that travels over a network is _____.

WPA

Businesses prefer to use technology known as _____ to create an exact copy of their files for backup.

RAID

_____ permissions provide registered users with access to the files they need, while restricting access to private resources.

User

A military commander enters the wrong GPS position for enemy troops into the computer; this is an example of _____.

a data-entry error

A medical office might send lab results to the wrong person, so the person receiving the results has access to another person's private medical information; this is an example of _____.

mishandling of computer output

Businesses are working to control information _____ by not allowing employees to store important data on their laptop computers.

theft

Corporate network administrators have the right to do all of the following EXCEPT _____.

install a Web cam in an employee's home

In a Wi-Fi network, _____ provide several settings that can all but bulletproof a wireless network.

access points

Which of the following is NOT a safe and vigiland behavior to ensure Internet security?

Avoid client/server networks.

A company may hire a _____ hacker to learn about vulnerabilities in their system.

white-hat

A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a _____ computer.

zombie

All of the following are pillars of information security EXCEPT _____.

using P2P networks

Software companies rely on _____ to "fix" problems in their programs related to bugs and flaws.

updates

All of the following are examples of malware EXCEPT for _____.

updates

In a distributed denial-of-service (DDoS) attack, the services of a(n) _____ can be halted.

Internet server

The _____ was established to monitor the security of U.S. networks and the Internet.

US-CERT

You can protect yourself from identity theft by using _____ when transmitting information over network connections.

encryption

A(n) _____ certificate is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.

SSL
(secure sockets layer)

Receiving a fradulent email that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) _____ attack.

spear phishing

Leaders in the tech industry have teamed up to develop solutions to spam that include all of the following EXCEPT _____.

Boolean (Bayesian) filters that learn to identify spam and filter it to a spam folder.

The Internet infrastructure and Internet service providers are burdened by _____, which takes up significant amounts of bandwidth and storage space.

spam

An Internet _____ can be found in the form of a chain letter, scam, and false alarm.

hoax

A(n) _____ may be used to control unnecessary data from coming into a business over the Internet.

firewall

A company called _____ provides digital certifications for Web transactions.

VeriSign

The https:// protocol in a URL indicates the use of a(n) _____ by the Web site.

SSL connection

Which of the following supports digital media?

all of the above
(smart phones, video game consoles, CD players)

The _____ was the first eBook reading device to gain widespread acceptance.

Kindle

Online newspapers are delivered through _____ to news readers.

RSS

Digitized sound can be _____ for secure communications.

encrypted

The Apple iPod was one of the first devices to support _____.

podcasts

Storing and managing music on _____ requires a fast, wireless connection speed.

the cloud

The process of transferring music from CD to MP3 or another digital audio format is called _____ a CD.

ripping

Which of the following is a popular satellite radio service in the United States?

SiriusXM

Digital images are made up of a grid of small points called _____.

pixels

An example of a vector graphic image is _____.

clip art

The _____ works using blended colors such as those applied by our printer's ink cartidges when printing.

CMYK color model

Vector graphics software is used widely by _____.

graphic designers

An example of a vector graphics software application is _____.

PowerPoint

All of the following are examples of graphic file formats EXCEPT for _____.

.xls
(.tif, .jpg, .gif)

A two-dimensional model becomes a 3D model when shadows and _____ are added.

light

Web designers use _____ to make advanced Web animations and applications.

Flash

A basic example of _____ is the use of graphs and charts to illustrate numeric data.

visualization

Digital photography and digital photo editing are sometimes referred to collectively as digital _____.

imaging

A digital camera uses a _____ card as its storage device.

flash memory

_____ software allows you to improve the look of your captured image.

Photo-editing

All of the following are photo-editing software applications EXCEPT _____.

Adobe Illustrator

Which of the following is a social network with photo album capabilities?

Facebook

Photos and albums can be shared from an online service with _____.

all of the above
(the entire member community, everyone on the Web, members that you specify)

An important consideration, when choosing between a digital camera and a camcorder, is the amount of _____ capacity it supports.

memory

Digital video _____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.

compression

_____ media is unique in that the audience is not comprised of passive viewers.

Interactive

Interactive media typically combine all of the following EXCEPT _____.

blogs

The _____ was one of the first game controllers to use a player's motions and gestures as input.

Wii

Social networks employ virtual reality to provide an environment in which individuals can interact through the use of _____.

avatars

The introduction of _____ on cell phones was the first step towards realizing augmented reality.

GPS

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set