Final

423 terms by sk8manjl 

Ready to study?
Start with Flashcards

Create a new folder

Advertisement Upgrade to remove ads

Which of the following is required to connect two or more computers in a network?

router

What must be installed in a PC to connect it to a network?

Network adapter

Which of the following steps must you complete before you start the Network Setup Wizard in Windows 7?

Install modems, cables, and network cards in each computer

Which of the following must each individual computer on a network have to function on the network?

A unique name

For a wireless network, what does each computer in the network need?

A wireless interface card

If you use Windows 7 to setup a home network, which option is used to access the Network Setup Wizard?

Set up a new connection or network

Which of the following is NOT a good reason to install a wireless network in your home?

All computers need to share one copy of Windows 7

Which of the following is TRUE about a wireless network?

Cables are not required

What is the connection speed for the most commonly installed cable in home networks?

100 Mbps

Which statement about wireless networks is TRUE?

Wireless networks encounter more signal interference that wired networks

Who are war drivers?

People who gain access to unprotected wireless networks

Which of the following statements about war drivers is NOT true?

They want to protect access to government systems

A(n) ______ address is a unique number for a wireless access card.

MAC

Which of the following is NOT true?

You have to purchase a new wireless card to improve your wireless signal strength

Which of the following is NOT a reason you might want to prevent war drivers from accessing your wireless network?

They might try to steal your computer

Which of the following prevents war drivers from accessing your wireless network?

Allowing only specific devices to access your router

What is an important safety precaution for preventing unauthorized access to your router?

Changing the default password

What makes it more difficult for a hacker to read your personal information?

Encryption

Which of the following is NOT true?

You can connect to any wireless network your computer detects

Which of the following statements is TRUE?

Wireless signals sometimes can carry long distances

Which of the following connections does NOT require a modem?

Satellite

Which is the slowest method of connecting to the internet?

dial-up

Which connection method uses a phone line shared between voice and data transfers?

DSL

Which of the following is NOT a broadband connection to the internet?

Dial-up

What makes FION a unique broadband option?

It uses fiber optic lines

Which of the following is an advantage of a satellite connection to the internet?

It is available in rural areas, even when other broadband connections are not

Which of the following statements about a cable internet connection is TRUE?

It requires a NIC

How does a satellite dish connect to a computer?

Via a coaxial cable

Which connection provides the fastest transfer speeds when you connect to the internet?

FIOS

What is an important consideration with regard to e-mail provided by your ISP?

Web access

A network that has 10 or more nodes is usually configured as a _____.

Client/server network

A network in which the nodes are located within a small geographic area.

Local area network (LAN)

Network adapters _____.

Enable nodes in a network to communicate with one another

The most common type of home network is ____.

a peer-to-peer (P2P) network

Which of the following is made up of plastic or glass fibers that transmit data at extremely fast speeds?

fiber-optic cable

Which of the following devices is needed to share an internet connection on a wireless network?

A wireless router

The maximum speed at which data can be transmitted between two nodes on a network is called the ______.

data transfer rate

A navigation device that transfers packets of data between two or more networks is called a _____.

Router

The actual speed of data transfers that is achieved is called a ____.

Throughput

When determining the best internet connection option to use, one of the most important things to know is _____.

the type of internet connections available in your area

Most ____ allow you to connect wireless and wires computers to the same network.

Wireless routers

____ internet connections are high-speed connections that include DSL, cable, and fiber-optic

Broadband

DSL and cable modems are both connected to a ______.

Network interface card

Which transmission medium is able to transmit data the fastest?

fiber-optic cable

To connect to the internet wirelessly, you must _____.

Be in a wireless fidelity hot spot and have the right equipment.

_____ services use special strands of optically pure glass or plastic that are as thin as a human hair to transmit data.

Fiber-optic

You can purchase a(n) ____, which enables you to have wireless internet access with mobile devices.

aircard

The term ____ is used to refer to the measurement of how fast data travels between computers.

data transfer rate

The most common type of home network is _____.

A peer-to-peer (P2P) network

A computer network is defined as two or more computers connected with ____ so that they can communicate with each other.

software and hardware

Normal telephone wire is ____.

Twisted-pair cable

Each device connected to a network is called a ____.

Node

When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ____.

First

Which of the following is NOT an example of a WAN?

LANs connected in a single building

A network that has 10 or more nodes is usually configured as a ____.

Client/server network.

Network architectures are classified according to ____.

The way they are controlled and the distance between their nodes.

Client/server networks are controlled by a central server that runs a specialized piece of software called ____.

A network operating system (NOS)

WPA stands for ____.

WiFi Protected Access

Which of these is not a wireless device?

Connectivity

Which of the following statements is true about Bluetooth?

For Bluetooth 2 protocol, devices must be less than 60 feet apart to be able to communicate

Bluetooth was named after ____.

King Harald Blatand

Bluetooth is a wireless protocol for ____.

Short distance voice-data transmissions

Your bluetooth-2 enabled headset can be a maximum of ____ away from your cell phone.

60 feet

All of the following would be likely candidates for Bluetooth connectivity EXCEPT a(n):

Internal hard drive

Most bluetooth-enabled gaming controllers alow groups of up to ___ players to take part in a game at once.

(30, 7, 2, 10)

____ wireless technology has the lowest level of power consumption.

Bluetooth, Zigbee, AirPort, Infrared

Which of the following is not a wireless technology?

Zigblue

Infrared, a wireless connection used in the past prior to Bluetooth, was limited because it ____.

Required a direct line of site between devices

All of the following are mobile operating systems except:

Windows 7

Popular smartphone CPUs include all of the following except:

HP Pre 3

Smartphones store their operating system in ____ and their applications in ____.

ROM; RAM

Smartphones include all of the following except:

a mouse

The speed of a smartphone's processor is measured in ____, which is the number of operations or cycles the processor completes per second.

hertz (Hz)

Most smartphones come with a standard collection of software that includes all of the following except:

a spreadsheet

Smartphones support additional memory through ____.

SD and micro SD Flash cards

The easiest way to transfer data from your smartphone to a desktop or laptop PC involves using a ____.

Cradle

The process of making sure that your smartphone and your computer have the same exact data is called ____.

Synchronizing

GPS is not likely to be used in which of the following?

Water skiing

Global Positioning System (GPS) devices were built and operated by the ____.

U.S. Department of Defense

The main input device of a smartphone is ____.

A touch-sensitive screen

The storage capacity of portable media devices is measured in ____.

Gigabytes

Which of the following specifies the number of times the analog wave is measured each second?

Sampling rate

One factor that determines how much music a player can hold is the ____ of the MP3 music files.

Quality

A microphone feeds the sound waves into a chip inside the recording device, called a(n) ____.

Analog-to-digital converter

Most portable media players use built-in-flash memory, at type of ____ memory, to store files.

Nonvolatile

Which of the following file formats is used to compress digital images?

JPEG

Newer portable media players (PMPs) use a ____ port to transfer files from your computer.

USB

The number of songs a portable media player (PMP) can hold depends on all of the following except ____.

Volatile memory

The letters at the end of a file name that indicates how the data in the file is organized is called the ____.

File extension

The process of users sharing files between computers is called ____.

Peer-to-peer sharing

All of the following file formats are compatible for porable media players (PMPs) except:

JPEG

You need a software application called a(n) ____ to access to the internet from a smartphone.

Microbrowser

Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ____.

Synchronizing

The most full-featured and powerful cell phones are put in the category of ____.

Smartphones

Which of the following uses radio waves to transmit data signals over short distances?

Bluetooth

The newest cell/smartphone displays are ____, which allow bright, sharp imaging and draw less power.

OLED

Which of the following allows you to send messages that include text, sound, images, and video clips to the other phones or e-mail addresses?

Multimedia message service (MMS)

Which of the following is specialized software made to display Web pages on a cell phone?

Microbrowser

The Apple iPhone uses a version of ___ as an operating system.

Mac OS X

The operating system of a cell phone is stored in ____.

ROM

MPEG-4, H.264, and DivX are all examples of ____.

Codecs

SMS delivers messages to the appropriate mobile device using ____ technology.

Store-and-forward

The Apple iPhone uses a version of ____ as an operating system.

Mac OS X

A ____ runs a full-featured operating system and weighs less than two pounds.

Netbook

An iPod is an example of a ____.

Portable media player (PMP)

____ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.

HDMI

Web content specially designed for viewing via a cell phone or smartphone is written in a format called ____.

WML (Wireless Markup language)

LogMeIn is an example of a ____.

Remote access service for mobile devices

Flash memory, used by most MP3 players, is a type of ____.

Nonvolatile memory

An internet connectivity plan is also known as a ____.

Data plan

All the following represents intrusions on your computer's privacy EXCEPT:

Maintenance

Backing up and updating your system is a function of the ____.

Maintenance section of Windows tools

The following are basic functions that adware and spyware generally perform, EXCEPT:

Keystroke logging

All of the following are included in the Security category of the Windows Action Center, EXCEPT:

System backup

An unusual advertisement on your computer screen that pops up is usually caused by ____.

Adware or spyware

The practice of advertisers using software that tracks personal information about you is called ____.

Data mining

The Windows Defender program ____.

Protects you from things that you would consider a violation of your personal property probably happening without your knowledge.

The purpose of a firewall is to ____.

Stop computers that are connected to the internet from being attractive to hackers

All of the following are unwanted software a hacker could install on your computer EXCEPT:

Ghosts

____ are hardware components that often contain firewalls.

Routers

Norton Internet Security ____.

Monitors programs that request internet access

The ____ features of a personal firewall enable you to designate responses to threats and set connection rules for specific programs.

Program control

If you do not know how to configure your firewall protection settings, you might want to ____.

Set the program control features to Auto

Windows Firewall ____.

Logs successful and unsuccessful attempts to connect to your computer

All of the following can protect you from hackers EXCEPT:

Antispam software

All of the following are true of virus protection software packages EXCEPT:

You can only scan the entire computer each time you do a scan

Which is NOT a feature of antivirus software?

Script kiddies

You can configure Windows 7 to automatically update, back up, and set restore points through the Windows Update menu choices available in the ____.

System and Security menu of the Control Panel

Outsiders might try to infect your system through all of the following EXCEPT"

Deleting a file

You deleted a file from your computer's documents folder that you jsut realized you need. In Windows 7, you can ____.

Undelete it by going into the Recycle bin

Which of the following applications is a different type than the other three?

Microsoft Office

Emptying the Recycle Bin should be done ____.

Only after you have determined that you no longer need any of the files that you have deleted.

Setting a system restore point should be done ____.

Prior to installing new hardware of software

Each of these tools is bundled with the McAfee Internet Security software suite, EXCEPT:

Disk check

All of the following pose a threat to your computer EXCEPT:

A firewall

Which device does NOT benefit from a surge protector?

MP3 player

How does a surge protector protect against low-level surges?

It passes excess current through to the ground wire

Which of the following is not a possible source of surges?

Light switches

What is the difference between a surge and a spike?

The length of time of the increase in the flow of electricity differs

Which of the following is not true about whole house surge protection?

It is installed on each outlet in your home

What is the advantage of a UPS over a surge protector?

It provides a limited time to save files.

Which of the following is NOT a way that surge protectors prevent damage from severe surges?

Trip an alarm

How can you prevent information from being lost when you are working on an important document?

Use Autosave

What is the state that a computer enters when it goes into standby mode as a result of power management settings?

Hibernation

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ____.

Keystroke loggers

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.

Logical port blocking

The most likely method of a hacker would use to access a computer is ____.

Entering through its internet connection

____ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Hacker who break into systems just for the challenge of it (and who don't wish to steal or wreak havoc on the systems) are called ____.

White-hat hackers

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set