Three types of physical cables that carry a signal are twisted pair, fiber optic, and _____.
_____, part of the electromagnetic spectrum, refers to all of the frequencies available for radio waves from about 10 KHz to 300 GHz and their assigned uses.
High end radio waves include infrared light and _____.
all of the above
(microwaves, gamma rays, x-rays)
With the help of a _____, devices can send signals that allow them to connect to the Internet.
Which of the following should you consider when purchasing a carrier plan for your cell phone?
Many of today's cell phones come equipped with _____ text technology keyboards to enhance texting.
We rely on _____ as the dominant technology to provide wireless Internet speed to its users.
The use of _____ technology to identify items for inventory may someday replace todays bar code system.
Items such as credit cards are beginning to take advantage of RFID technology through the use of a(n) _____ reader.
The _____ is responsible for setting up and maintaining a network, implementing network policies, and assigning user access permissions.
A(n) _____ expands the boundaries of a company's intranet to include networks outside of its Local Area Network setting.
Two network systems that can exchange and process data using the same protocols is an example of _____.
The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as _____.
Information security is implemented at the individual machine level, the computer network level, and the _____ level.
A _____ is used as a security device to help identify a worker logging into a business computer system.
Through the use of _____, data is secured when it is stored and transported over a network.
Businesses prefer to use technology known as _____ to create an exact copy of their files for backup.
_____ permissions provide registered users with access to the files they need, while restricting access to private resources.
A military commander enters the wrong GPS position for enemy troops into the computer; this is an example of _____.
a data-entry error
A medical office might send lab results to the wrong person, so the person receiving the results has access to another person's private medical information; this is an example of _____.
mishandling of computer output
Businesses are working to control information _____ by not allowing employees to store important data on their laptop computers.
Corporate network administrators have the right to do all of the following EXCEPT _____.
install a Web cam in an employee's home
In a Wi-Fi network, _____ provide several settings that can all but bulletproof a wireless network.
Which of the following is NOT a safe and vigiland behavior to ensure Internet security?
Avoid client/server networks.
A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a _____ computer.
Software companies rely on _____ to "fix" problems in their programs related to bugs and flaws.
In a distributed denial-of-service (DDoS) attack, the services of a(n) _____ can be halted.
You can protect yourself from identity theft by using _____ when transmitting information over network connections.
A(n) _____ certificate is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
(secure sockets layer)
Receiving a fradulent email that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) _____ attack.
Leaders in the tech industry have teamed up to develop solutions to spam that include all of the following EXCEPT _____.
Boolean (Bayesian) filters that learn to identify spam and filter it to a spam folder.
The Internet infrastructure and Internet service providers are burdened by _____, which takes up significant amounts of bandwidth and storage space.
A(n) _____ may be used to control unnecessary data from coming into a business over the Internet.
Which of the following supports digital media?
all of the above
(smart phones, video game consoles, CD players)
The process of transferring music from CD to MP3 or another digital audio format is called _____ a CD.
The _____ works using blended colors such as those applied by our printer's ink cartidges when printing.
CMYK color model
Digital photography and digital photo editing are sometimes referred to collectively as digital _____.
Photos and albums can be shared from an online service with _____.
all of the above
(the entire member community, everyone on the Web, members that you specify)
An important consideration, when choosing between a digital camera and a camcorder, is the amount of _____ capacity it supports.
Digital video _____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.
The _____ was one of the first game controllers to use a player's motions and gestures as input.
Social networks employ virtual reality to provide an environment in which individuals can interact through the use of _____.