How can we help?

You can also find more resources in our Help Center.

90 terms

CIS 1 Final

STUDY
PLAY
The language of telecommunications is governed by _______.
protocols
A(n) _____ signal is designed to represent computer data in an on or off state.
digital
Signal frequency is measured in _____.
hertz
Three types of physical cables that carry a signal are twisted pair, fiber optic, and _____.
coaxial
_____, part of the electromagnetic spectrum, refers to all of the frequencies available for radio waves from about 10 KHz to 300 GHz and their assigned uses.
Radio spectrum
High end radio waves include infrared light and _____.
all of the above
(microwaves, gamma rays, x-rays)
With the help of a _____, devices can send signals that allow them to connect to the Internet.
modem
A _____ card is a common netwrk device found in most laptop computers today.
network interface
A(n) _____ network includes transmission towers that connect to area handsets.
cellular
Which of the following should you consider when purchasing a carrier plan for your cell phone?
usage
Many of today's cell phones come equipped with _____ text technology keyboards to enhance texting.
predictive
How a cell phone looks, feels, and works is determined by its _____.
form factor
Restaurants use _____ to signal their patrons when a table is ready.
pagers
A pager receives signals from _____.
transmitters
In most closed-in areas, Wi-Fi technology has a maximum range of _____.
250 - 1,000 feet
We rely on _____ as the dominant technology to provide wireless Internet speed to its users.
wireless fidelity
Many cities have adopted _____ technology to provide faster Internet speed to its users.
WiMAX
There is hope that WiMAX technology will help resolve the _____ problem.
last mile
With Bluetooth, up to _____ devices can be paired simultaneously.
seven
The use of _____ technology to identify items for inventory may someday replace todays bar code system.
RFID
Items such as credit cards are beginning to take advantage of RFID technology through the use of a(n) _____ reader.
NFC
GPS _____ are primarily used to assist travelers in getting from one place to another.
receivers
Tagging a photo with geographic data is known as _____.
geotagging
Devices attached to a network are identified as _____.
nodes
The _____ is responsible for setting up and maintaining a network, implementing network policies, and assigning user access permissions.
system admistrator
A PAN typically covers a range of around _____ feet.
33
A(n) _____ expands the boundaries of a company's intranet to include networks outside of its Local Area Network setting.
VPN
Local Area Networks designed to serve an entire city are called _____ Area Networks.
Metropolitan
Two network systems that can exchange and process data using the same protocols is an example of _____.
EDI
A typical setup for a _____ network would include a wireless router connected to an ISP.
home
The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as _____.
computer forensics
Information security is implemented at the individual machine level, the computer network level, and the _____ level.
Internet
A common form of authentication is a _____.
password
A _____ is used as a security device to help identify a worker logging into a business computer system.
token
Through the use of _____, data is secured when it is stored and transported over a network.
encryption
A popular encryption method used to protect data that travels over a network is _____.
WPA
Businesses prefer to use technology known as _____ to create an exact copy of their files for backup.
RAID
_____ permissions provide registered users with access to the files they need, while restricting access to private resources.
User
A military commander enters the wrong GPS position for enemy troops into the computer; this is an example of _____.
a data-entry error
A medical office might send lab results to the wrong person, so the person receiving the results has access to another person's private medical information; this is an example of _____.
mishandling of computer output
Businesses are working to control information _____ by not allowing employees to store important data on their laptop computers.
theft
Corporate network administrators have the right to do all of the following EXCEPT _____.
install a Web cam in an employee's home
In a Wi-Fi network, _____ provide several settings that can all but bulletproof a wireless network.
access points
Which of the following is NOT a safe and vigiland behavior to ensure Internet security?
Avoid client/server networks.
A company may hire a _____ hacker to learn about vulnerabilities in their system.
white-hat
A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a _____ computer.
zombie
All of the following are pillars of information security EXCEPT _____.
using P2P networks
Software companies rely on _____ to "fix" problems in their programs related to bugs and flaws.
updates
All of the following are examples of malware EXCEPT for _____.
updates
In a distributed denial-of-service (DDoS) attack, the services of a(n) _____ can be halted.
Internet server
The _____ was established to monitor the security of U.S. networks and the Internet.
US-CERT
You can protect yourself from identity theft by using _____ when transmitting information over network connections.
encryption
A(n) _____ certificate is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
SSL
(secure sockets layer)
Receiving a fradulent email that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) _____ attack.
spear phishing
Leaders in the tech industry have teamed up to develop solutions to spam that include all of the following EXCEPT _____.
Boolean (Bayesian) filters that learn to identify spam and filter it to a spam folder.
The Internet infrastructure and Internet service providers are burdened by _____, which takes up significant amounts of bandwidth and storage space.
spam
An Internet _____ can be found in the form of a chain letter, scam, and false alarm.
hoax
A(n) _____ may be used to control unnecessary data from coming into a business over the Internet.
firewall
A company called _____ provides digital certifications for Web transactions.
VeriSign
The https:// protocol in a URL indicates the use of a(n) _____ by the Web site.
SSL connection
Which of the following supports digital media?
all of the above
(smart phones, video game consoles, CD players)
The _____ was the first eBook reading device to gain widespread acceptance.
Kindle
Online newspapers are delivered through _____ to news readers.
RSS
Digitized sound can be _____ for secure communications.
encrypted
The Apple iPod was one of the first devices to support _____.
podcasts
Storing and managing music on _____ requires a fast, wireless connection speed.
the cloud
The process of transferring music from CD to MP3 or another digital audio format is called _____ a CD.
ripping
Which of the following is a popular satellite radio service in the United States?
SiriusXM
Digital images are made up of a grid of small points called _____.
pixels
An example of a vector graphic image is _____.
clip art
The _____ works using blended colors such as those applied by our printer's ink cartidges when printing.
CMYK color model
Vector graphics software is used widely by _____.
graphic designers
An example of a vector graphics software application is _____.
PowerPoint
All of the following are examples of graphic file formats EXCEPT for _____.
.xls
(.tif, .jpg, .gif)
A two-dimensional model becomes a 3D model when shadows and _____ are added.
light
Web designers use _____ to make advanced Web animations and applications.
Flash
A basic example of _____ is the use of graphs and charts to illustrate numeric data.
visualization
Digital photography and digital photo editing are sometimes referred to collectively as digital _____.
imaging
A digital camera uses a _____ card as its storage device.
flash memory
_____ software allows you to improve the look of your captured image.
Photo-editing
All of the following are photo-editing software applications EXCEPT _____.
Adobe Illustrator
Which of the following is a social network with photo album capabilities?
Facebook
Photos and albums can be shared from an online service with _____.
all of the above
(the entire member community, everyone on the Web, members that you specify)
An important consideration, when choosing between a digital camera and a camcorder, is the amount of _____ capacity it supports.
memory
Digital video _____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.
compression
_____ media is unique in that the audience is not comprised of passive viewers.
Interactive
Interactive media typically combine all of the following EXCEPT _____.
blogs
The _____ was one of the first game controllers to use a player's motions and gestures as input.
Wii
Social networks employ virtual reality to provide an environment in which individuals can interact through the use of _____.
avatars
The introduction of _____ on cell phones was the first step towards realizing augmented reality.
GPS