Advertisement Upgrade to remove ads

Textbook: New Perspectives on Computer Concepts 2012 : Introductory, 14th Edition (Parsons/Oja) Instructor: Marco Villarreal University of Texas Pan-American

packet switching

In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.

router

Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure

gateway
router
bridge
repeater

Decrypting computer archives so that the data they contain is unusable if the archive is lost or compromised

You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects.After researching this topic, you find that encryption can be used in all of the following ways EXCEPT ____.

Securing credit card numbers transferred from shoppers' computers to e-commerce sites
Scrambling data sent over wired or wireless networks to prevent intrusions
Scrambling the contents of e-mail messages to maintain privacy
Decrypting computer archives so that the data they contain is unusable if the archive is lost or compromised

All of the above

Decrypting computer archives so that the data they contain is unusable if the archive is lost or compromised.

Speed
Range
Security
All of the above

The Web server with access to the private key

You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects.You decide to use public key encryption to protect e-commerce transactions. Once the browser uses the public key it receives from the server to encrypt the credit card information, who can decrypt the message?


You
Any user you authorize in the firm
Any hacker who intercepts the transaction
The Web server with access to the private key

SSID

Most routers ship with a(n) ____ predefined by the manufacturer.

Gateway
ISP
SSID
Topology

Encryption

Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.

Polymorphism
Concatenation
Protected access
Encryption

PAN

A ____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.

LAN
WAN
MAN
PAN

Wi-Fi

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security.Esteban decides to install a wireless network. Which LAN technology will he most likely choose?

Bluetooth
WUSB
Infrared
Wi-Fi

All of the standards are cross compatible.

Which of the following in NOT true about Wi-Fi standards ?

IEEE 802.11b is the original standard.
All of the standards are cross compatible.
IEEE 802.11a is not compatible with 802.11b.
IEEE 802.11n is faster than, but compatible with, b and g.

circuit switching

The telephone network uses a technology called ____, which establishes a dedicated, private link between telephones for the duration of a call.

Mesh topology

Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school and work.
Thomas has been asked by a friend to overhaul an existing network so that it is more robust. She wants each device on the network to connect to all of the other devices on the network. Which network topology will Thomas most likely use?

Star topology
Bus topology
Mesh topology
Ring topology

1000

HomePNA supports up to ____ feet of wiring between devices.

Decrypting computer archives so that the data they contain is unusable if the archive is lost or compromised

You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects.

After researching this topic, you find that encryption can be used in all of the following ways EXCEPT _____.

Securing credit card numbers transferred from shoppers' computers to e-commerce sites
Scrambling data sent over wired or wireless netwworks to prevent intrusions
Scrambling the contents of e-mail messages to maintain privacy
Decrypting computer archives so that the data they contain is unusable if the archive is lost or compromised

All of the above

____ is a crucial technology for e-commerce and e-mail.

Symmetric key encryption
Network security key
Public key encryption
All of the above

HomePNA network

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless, and that there are differences in transmission speed and security.

After additional research, Esteban decides that he wants to create a wired network using existing telephone wiring. What kind of network will he create?

Ethernet network
Powerline network
HomePNA network
Wi-Fi network

Gateway

A ____ is a generic term for any device or software code used to join two networks.

Wireless network key

A(n) ____ is the basis for scrambling and unscrambling the data transmitted between wireless devices.

Symmetric

In ____ key encryption, the key used to encrypt a message is also used to decrypt the message.

HomePNA

A ___ network makes use of a building's existing telephone cables to connect network devices.

2.4 GHz or 5.8 GHz

A Wi-Fi network transmits data as radio waves over ____ frequencies.

SSID

Most routers ship with a(n) ____ predefined by the manufacturer.

128-bit

You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. As part of your research, you find that the longer the key, the longer it will take a devious competitor to crack the code. You also find that most encryption today uses a ____ key, and so you decide to use an encryption key of that size.

All of the above

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security. Esteban's router has no screen or keyboard of its own so the easiest way for him to access the router's configuration software is for him to make this connection with a(n) ____.

SSID utility
administrator firewall
Ethernet cable
All of the above

Read

Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend. Thomas's friend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it. What kind of permission should Thomas assign to this file?

Read
Read and write
Homegroup
Write only

Encryption

Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.

Polymorphism
Concatenation
Protected access
Encryption

Packet switching

In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.

Packet switching
Handshaking
Circuit switching
Protocol

SSIDs

In areas where there are overlapping wireless networks, such as in a city or on a college campus, ____ help you log in to the right network, rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.

My Network Places

If you connect to a network and do not get a list of other devices, check your computer's network ____ setting.

HomePNA

A ______network makes use of a building's existing telephone cables to connect network devices.

NICs

To form a HomePNA network workstations are equipped with HomePNA ____, which are connected to telephone wall jacks.

Phone lines

DSL uses _____ to transmit data.

Bridge

A ____ is a network device that connects two similar networks.

IEEE 802.3

Ethernet is a wired technology that is defined by ____ standards.

Switch

A ____ is a network device that intelligently facilitates communication among multiple devices on a network.

Decryption

The process of converting ciphertext into plaintext is called ____.

10 Mbps

The original Ethernet standard carried data over a coaxial cable bus topology at ____.

Public key

______ encryption uses one key to encrypt a message but another key to decrypt the message.

Connect personal computers within a very limited geographical area, such as a single building

A LAN would be used to ____.


Connect personal computers within a very limited geographical area, such as a single building
Connect several smaller networks together
Provide high-speed connectivity for a metropolitan area
Connect devices over a large geographical area

They can't remove sharing from files that they no longer want to share.

Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend. Thomas's friend has indicated that he will accept the system that Thomas is constructing for him. However, he is concerned about security risks and wants to know what limits he can place on the system. Which of the following is NOT a true statement that Thomas can make to his friend?

They can assign permissions to files.
They can limit sharing to specific people.
They can use a homegroup to limit what is shared on the network.
They can't remove sharing from files that they no longer want to share.

Discovery

In what mode can two Bluetooth devices find each other and exchange passkeys?

Move the workstation closer to the router, if possible.

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security. The signal on Esteban's wireless network is weak. What is the best solution to this problem?

Make sure to be using the correct password and that the password has not expired.
Make sure that the wireless networking switch is in the On position for networking.
Move the workstation closer to the router, if possible.
Make sure that the network hub, switch, router, or wireless access point is plugged in and functioning properly.

Wi-Fi

The most popular wireless LAN technology is ____.

File

A ____ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.

No one

With PGP, to whom do you send the private key?

People whom you have authorized to send you plaintext messages
People whom you have authorized to send you encrypted messages
Anyone with whom you expect to have e-mail correspondence
No one

Increased security

Which of the following is NOT an advantage of using a wired network?

Increased security
Fast access
Simple to configure
Unlimited mobility

AO/DI

Some ISDN providers offer a service called ____, which remains connected to an ISP as long as the computer and terminal adapter are on.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set