Images are a representation of sound and light waves called ________ or continuous waves.
Digital formats are descriptions of signals as:
a long string of numbers
The most full-featured and powerful cell phones are put in the category of:
an operating system for cell/smartphones.
The Apple iPhone uses a version of ________ as an operating system.
Mac OS X
The operating system of a cell phone is stored in:
An analog-to-digital converter chip:
converts the sound waves from a voice into a digital signal
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
A base transceiver station receives a request for cellular service and passes that request to a central location called a:
mobile switching center
Ensuring that two devices, for example, a PC and a cell/smartphone, have the same files is the process of:
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
Which of the following uses radio waves to transmit data signals over short distances and is not hampered by needing a direct line of sight?
________ is the use of equipment to provide voice communications over a distance.
Text messaging is also called:
short message service (SMS).
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
SMS delivers messages to the appropriate mobile device using ________ technology
Opera Mobile is an example of:
Web content specially designed for viewing via a cell/smartphone is written in a format called:
WML (Wireless Markup Language).
Which of the following is specialized software made to display Web pages on a cell phone?
LogMeIn is an example of a:
remote access service for mobile devices
An iPod is an example of a:
personal media player (PMP).
A portable media player can play files with all of the following file extensions EXCEPT:
Flash memory, used by most MP3 players, is a type of:
Which of the following is the process of sharing files between two or more computers?
peer-to-peer (P2P) sharing
Which of the following allows you to download and play music with restrictions enforced about its use?
To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
All of the following are advantages of VoIP EXCEPT:
________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
Which of the following statements is NOT true about the JPEG file format?
JPEGs are larger than raw files
________ is a special copyleft license used for software.
MPEG-4, H.264, and DivX are all examples of
Broadcasting your video to a live audience over the Web is referred to as:
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
Netbooks are also referred to as:
Who funded the development of technologies that would eventually become the Internet?
The United States Government
Which of the following entities does NOT play a role in the governance and deployment of the Internet?
Internet Corporation for Assigned Names and Numbers (ICANN)
The organization responsible for the Internet's domain name system and IP address allocation is:
________ is a consortium of more than 400 member organizations that develops Web protocols
The main paths of the Internet along which data travels the fastest are known collectively as the Internet ________.
The majority of Internet communications follows the ________ model of network communications
________ are high-speed, fiber-optic communications lines
One or more network switches to which ISPs connect are referred to as
Internet exchange points (IXPs)
By using a(n) ________, individual Internet users are able to connect to their ISP
Point of presence (POP)
By using common ________, networks can communicate even if they have different network topologies, transmission media, or operating systems.
Used since the early days of the telephone, ________ uses a dedicated connection between two points that remains active during transmission.
At a minimum, what content must all data packets contain?
recipient's address, sender's address, reassembling instructions, and data
The original Internet backbone used T lines, which used:
twisted pair wires
Which of the following has the greatest bandwidth
Computers running specialized operating systems that enable them to host Web pages and other information are called:
Computers that host software that enables users to purchase goods and services over the Internet are called ________ servers
.com and .org are examples of:
A set of rules for exchanging electronic information is called a
________ protocols are standards that are made public for access by any interested party.
________ uses a dedicated connection between two points that remains active for the duration of transmission.
When data is broken into smaller chunks to be sent over various routes at the same time, it is called:
BitTorrent is an example of a popular file-sharing service that uses:
The protocol that prepares data for transmission but has no resending capabilities is:
The protocol that transfers HTML data from servers to browsers is:
The protocol that enables logging in to a remote computer and working on it as if you were sitting in front of it is:
Which of the following specifications is used to simplify attachments to e-mail messages?
A unique number that identifies a computer, server, or device connected to the Internet is called a(n):
Internet Protocol version 4 (IPv4), created in the early 1980s, allows about __________ IP addresses
An IP address that is assigned from an available pool of IP addresses is called a(n):
IPv6 uses what number system to create IP addresses?
An IP address that does not change and is usually assigned manually by a network administrator is called a(n):
A ________ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis
Which of the following statements concerning IPv4 addresses is FALSE?
The addresses are 16-bit numbers
Which of the following statements concerning IP addresses is TRUE?
Dynamic addressing is normally handled by DHCP
________ provides a methodology whereby your browser can request that a program be executed instead of just being delivered to the browser.
The root DNS servers know the location of all DNS servers that contain the master listings for an entire:
A(n) ________ contains text that is linked to other documents or media.
________ creates a secure connection between a client and a server and can safeguard your credit card information.
Which of the following statements concerning HTML and XHTML is FALSE?
HTML and XHTML are considered server-side programs
Text such as <b><i>This should be bolded and italicized.</i></b> is an example of an HTML
It is estimated that ________ percent of e-mail is spam.
The ability of two or more people to communicate in text over the Internet in real time is called:
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements
Cascading style sheets (CSS)
What is the range of normal Wi-Fi connectivity?
What is the range of normal WiMAX connectivity?
Currently used in Europe and Australia, ________ uses a normal wall outlet to connect to the Internet
________ switching has been used since the early days of the telephone for establishing communication
Which protocol uses standard Internet connections to make phone calls over the Internet?
________ delivers business services online that were previously delivered locally by company-owned IT departments
Cascading style sheets have a hierarchy of styles that include all of the following EXCEPT
A ________ is a secure Internet pathway that large corporations use to protect sensitive data
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
A majority of online credit card fraud results from
A computer virus normally attaches itself to another computer program known as a:
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
Which type of virus was the famous Michelangelo virus?
a time bomb
Which of the following classifications of viruses can change its own code?
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
A(n) ________ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory
With regard to computer protection, quarantining is defined as:
placing a found virus in a secure area on the hard drive.
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive
A(n) ________ is the portion of virus code that is unique to a particular computer virus
Drive-by downloads occur when
a Web site downloads harmful software onto your computer
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT
launch a denial of service (DoS) attack on your computer
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a Trojan horse
________ floods a computer with requests until it shuts down and refuses to answer any requests for information
A DDoS attack
The most likely method a hacker would use to access a computer is
entering through the Internet
Rules for creating passwords include all of the following EXCEPT
keep your password written down and stored in any easy-to-remember location
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing
________ makes broadband users more vulnerable to attacks.
The purpose of network address translation (NAT) is to:
hide user IP addresses from the Internet
________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as:
logical port blocking.
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer
Adware and spyware are referred to collectively as:
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices
All of the following can be used for backing up data files EXCEPT
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT
installing an external hard drive.
A ________ is a virus that is attached to documents such as Word or Excel files.
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable
________ is doing anything with a computer while you are being paid to do your job
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
A cyberspace ________ is an attempt to make someone believe something that is untrue
Which of these statements about physically protecting your computer is FALSE
Data line surges can be blocked by using a computer surround
Which of the statements about protecting against power surges is FALSE
Printers do not require power surge protection
As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as
information quality control
Which of the following is NOT an example of a network node?
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other
software and hardware
A(n) ________ allows sharing of a broadband Internet connection
Network architectures are classified according to:
the way they are controlled and the distance between their nodes.
Normal telephone wire is:
twisted pair cable
The ________ is the maximum speed at which data can be transmitted between two nodes on a network
data transfer rate
The most common type of home network is:
a peer-to-peer (P2P) network
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts
A network that has 10 or more nodes is usually configured as a:
Which of the following is NOT an example of a WAN?
LANs connected in a single building
A ________ is a network located in your home that is used to connect all of your digital devices
Which transmission medium is able to transmit data the fastest?
Throughput, the actual speed of data transfer that is achieved in a network, is usually
less than the data transfer rate
enable nodes in a network to communicate with each other.
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
Client/server networks are controlled by a central server that runs a specialized piece of software called:
a network operating system (NOS).
The major difference in types of P2P networks is the ________ by which the nodes are connected and the bandwidth each achieves
For Ethernet cables that run more than 100 meters, you can use ________ to boost the signal
Which of the following UTP cable types is the cheapest and often used in home networks?
The most popular transmission medium option for wired Ethernet networks is:
unshielded twisted pair cable (UTP).
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a DSL/cable router
A ________ is a specialized entertainment device that is specifically designed to retrieve digital media from computers or storage devices on a network and display them on televisions or home theater systems
A wireless network uses which of the following as its transmission medium?
Which of the following devices translates electronic data into radio waves?
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
both a wireless and wired network adapter
Which of the following devices is needed to share an Internet connection on a wireless network?
a wireless router
Most ________ allow you to connect wireless and wired computers to the same network
All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:
power-line networks cost less.
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address
WPA stands for
Wi-Fi Protected Access
One way to increase security on a network is by installing a