CIS 1 Final
The language of telecommunications is governed by _______.
A(n) _____ signal is designed to represent computer data in an on or off state.
Signal frequency is measured in _____.
Three types of physical cables that carry a signal are twisted pair, fiber optic, and _____.
_____, part of the electromagnetic spectrum, refers to all of the frequencies available for radio waves from about 10 KHz to 300 GHz and their assigned uses.
High end radio waves include infrared light and _____.
all of the above
(microwaves, gamma rays, x-rays)
With the help of a _____, devices can send signals that allow them to connect to the Internet.
A _____ card is a common netwrk device found in most laptop computers today.
A(n) _____ network includes transmission towers that connect to area handsets.
Which of the following should you consider when purchasing a carrier plan for your cell phone?
Many of today's cell phones come equipped with _____ text technology keyboards to enhance texting.
How a cell phone looks, feels, and works is determined by its _____.
Restaurants use _____ to signal their patrons when a table is ready.
A pager receives signals from _____.
In most closed-in areas, Wi-Fi technology has a maximum range of _____.
250 - 1,000 feet
We rely on _____ as the dominant technology to provide wireless Internet speed to its users.
Many cities have adopted _____ technology to provide faster Internet speed to its users.
There is hope that WiMAX technology will help resolve the _____ problem.
With Bluetooth, up to _____ devices can be paired simultaneously.
The use of _____ technology to identify items for inventory may someday replace todays bar code system.
Items such as credit cards are beginning to take advantage of RFID technology through the use of a(n) _____ reader.
GPS _____ are primarily used to assist travelers in getting from one place to another.
Tagging a photo with geographic data is known as _____.
Devices attached to a network are identified as _____.
The _____ is responsible for setting up and maintaining a network, implementing network policies, and assigning user access permissions.
A PAN typically covers a range of around _____ feet.
A(n) _____ expands the boundaries of a company's intranet to include networks outside of its Local Area Network setting.
Local Area Networks designed to serve an entire city are called _____ Area Networks.
Two network systems that can exchange and process data using the same protocols is an example of _____.
A typical setup for a _____ network would include a wireless router connected to an ISP.
The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as _____.
Information security is implemented at the individual machine level, the computer network level, and the _____ level.
A common form of authentication is a _____.
A _____ is used as a security device to help identify a worker logging into a business computer system.
Through the use of _____, data is secured when it is stored and transported over a network.
A popular encryption method used to protect data that travels over a network is _____.
Businesses prefer to use technology known as _____ to create an exact copy of their files for backup.
_____ permissions provide registered users with access to the files they need, while restricting access to private resources.
A military commander enters the wrong GPS position for enemy troops into the computer; this is an example of _____.
a data-entry error
A medical office might send lab results to the wrong person, so the person receiving the results has access to another person's private medical information; this is an example of _____.
mishandling of computer output
Businesses are working to control information _____ by not allowing employees to store important data on their laptop computers.
Corporate network administrators have the right to do all of the following EXCEPT _____.
install a Web cam in an employee's home
In a Wi-Fi network, _____ provide several settings that can all but bulletproof a wireless network.
Which of the following is NOT a safe and vigiland behavior to ensure Internet security?
Avoid client/server networks.
A company may hire a _____ hacker to learn about vulnerabilities in their system.
A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a _____ computer.
All of the following are pillars of information security EXCEPT _____.
using P2P networks
Software companies rely on _____ to "fix" problems in their programs related to bugs and flaws.
All of the following are examples of malware EXCEPT for _____.
In a distributed denial-of-service (DDoS) attack, the services of a(n) _____ can be halted.
The _____ was established to monitor the security of U.S. networks and the Internet.
You can protect yourself from identity theft by using _____ when transmitting information over network connections.
A(n) _____ certificate is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
(secure sockets layer)
Receiving a fradulent email that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) _____ attack.
Leaders in the tech industry have teamed up to develop solutions to spam that include all of the following EXCEPT _____.
Boolean (Bayesian) filters that learn to identify spam and filter it to a spam folder.
The Internet infrastructure and Internet service providers are burdened by _____, which takes up significant amounts of bandwidth and storage space.
An Internet _____ can be found in the form of a chain letter, scam, and false alarm.
A(n) _____ may be used to control unnecessary data from coming into a business over the Internet.
A company called _____ provides digital certifications for Web transactions.
The https:// protocol in a URL indicates the use of a(n) _____ by the Web site.
Which of the following supports digital media?
all of the above
(smart phones, video game consoles, CD players)
The _____ was the first eBook reading device to gain widespread acceptance.
Online newspapers are delivered through _____ to news readers.
Digitized sound can be _____ for secure communications.
The Apple iPod was one of the first devices to support _____.
Storing and managing music on _____ requires a fast, wireless connection speed.
The process of transferring music from CD to MP3 or another digital audio format is called _____ a CD.
Which of the following is a popular satellite radio service in the United States?
Digital images are made up of a grid of small points called _____.
An example of a vector graphic image is _____.
The _____ works using blended colors such as those applied by our printer's ink cartidges when printing.
CMYK color model
Vector graphics software is used widely by _____.
An example of a vector graphics software application is _____.
All of the following are examples of graphic file formats EXCEPT for _____.
(.tif, .jpg, .gif)
A two-dimensional model becomes a 3D model when shadows and _____ are added.
Web designers use _____ to make advanced Web animations and applications.
A basic example of _____ is the use of graphs and charts to illustrate numeric data.
Digital photography and digital photo editing are sometimes referred to collectively as digital _____.
A digital camera uses a _____ card as its storage device.
_____ software allows you to improve the look of your captured image.
All of the following are photo-editing software applications EXCEPT _____.
Which of the following is a social network with photo album capabilities?
Photos and albums can be shared from an online service with _____.
all of the above
(the entire member community, everyone on the Web, members that you specify)
An important consideration, when choosing between a digital camera and a camcorder, is the amount of _____ capacity it supports.
Digital video _____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.
_____ media is unique in that the audience is not comprised of passive viewers.
Interactive media typically combine all of the following EXCEPT _____.
The _____ was one of the first game controllers to use a player's motions and gestures as input.
Social networks employ virtual reality to provide an environment in which individuals can interact through the use of _____.
The introduction of _____ on cell phones was the first step towards realizing augmented reality.