Bus Adm 230- Exam 1 (true & false questions)

Most types of notebook computers can operate solely on batteries.
false
Batteries in large notebook computers last longer than those in tablets
false
On a typical notebook computer, the monitor is on top of the system unit, and the keyboard attaches to the system unit with hinges.
false
Servers typically support only access by one computer at a time.
false
Larger corporate, government, and Internet applications may use powerful, expensive servers to support their daily operation.
true
The major differences between server computers and client computers are that the client typically has more power, more storage space, and expanded communications capabilities
false
Providers of wireless communications services may charge additional fees for sending text, picture, or video messages, depending on the service plan
true
Research indicates that the more text messages students send, the more easily they find formal writing.
false
Digital cameras often can connect to or communicate wirelessly with a computer, a printer, or the Internet.
true
Most e-book readers are usually smaller than smartphones
false
A game console is small enough to fit in one hand, making it more portable than the handheld game device.
true
Storage devices like external hard disks can often function as a source of input because they transfer items from storage to memory.
true
USB flash drives and memory cards usually hold more data than hard disks.
false
Most semiconductor memory keeps data and instructions permanently.
false
The terms world wide web and Internet can and should be used interchangeably.
false
The Internet is a service of the web.
false
A webpage is a collection of related websites
false
All social networking sites have a specialized audience
false
Data about nearly every life event is probably stored in a computer somewhere.
true
A password is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user
false
One effective strategy for creating strong passwords includes changing common words to symbols.
false
With contemporary antivirus protection it is now possible to ensure a virus or malware never will attack your computer.
false
You should delete or quarantine flagged attachments immediately.
true
Never start a computer with removable media inserted in the computer unless you are certain the media are uninfected.
false
The application system provides a means for users to communicate with the computer or mobile device and other software.
false
The term drive app is used to describe applications stored on a computer.
false
The term web app is an application stored on a web server.
true
Examples of operating systems include those that allow you to send and receive e-mail messages, prepare your taxes, organize digital photos, and play games.
false
You usually need to install web apps before you can run them
false
Wireless Internet access points enable users with computers and mobile devices to connect to the Internet wirelessly.
true
Wi-Fi uses short-range radio signals to enable specially enabled computers and devices to communicate with each other
false
Cellular radio uses the cellular network to enable high-speed Internet connections to devices with built-in compatible technology, such as smartphones.
true
A hot spot provides wireless Internet connections to mobile computers and devices.
true
In many networks, one or more computers act as a server.
true
You need extensive knowledge of networks to set up a home network.
false
In a networked environment, each computer on the network can access the hardware on the network.
true
With a one-way sync, also called mirroring, you add, change, or delete files in a destination location, called the target, without altering the same files in the original location.
true
While distance learning classes are popular, you cannot obtain a degree from them.
false
To promote education by computer, vendors often offer substantial student discounts on hardware and software
true
With online investing, the transaction fee for each trade usually is much more than when trading through a broker.
false
Some websites support streaming, where you access the media content while it downloads.
true
You cannot make copies of media, even as a personal backup, without violating copyright.
false
Nearly every area of health care uses computers.
true
Breakthroughs in surgery, medicine, and treatments seldom result from scientists’ use of computers.
false
The capability of the computer to recognize spoken words is a direct result of scientific experimentation with cochlear implants.
false
A blog is an informal website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order.
true
As wikis have grown in number, size, and popularity, many educators and librarians have shunned the sites as valid sources of research.
true
CAM is used by a variety of industries, including oil drilling, power generating, food production, and automobile manufacturing.
true
Examples of mobile users include engineers, scientists, architects, desktop publishers, and graphic artists.
false
Enterprise users use spreadsheet, database, and accounting software.
true
The goal of ARPA was to build a network that allowed scientists at different physical locations to share information and work together on military and scientific projects.
true
The goal of Internet2 is to develop and test advanced network technologies that will benefit Internet users in the future.
true
Many public locations, such as airports, hotels, schools, shopping malls, and coffee shops, are hotspots that provide Wi-Fi Internet connections to users with mobile computers or devices.
true
Cybercafes exist in cities in the U.S. but not elsewhere.
false
Fixed wireless is a broadband Internet connection.
true
Some home users connect computers to the Internet via slower-speed dial-up access because of its lower cost or because broadband access is not available where they live.
true
A megabyte is equal to approximately one billion characters.
fasle
A lower bandwidth means more data transmits.
false
For watching HD streaming video for an hour, the approximate data usage is 3-6 MB.
false
Hot spots are businesses that provide individuals and companies access to the Internet free or for a fee, usually a fixed monthly amount.
false
Like an IP address, the components of a domain name are separated by commas.
false
Every domain name contains a master domain, which identifies the type of organization associated with the domain.
fasle
A TCP server is an Internet server that usually is associated with an Internet access provider.
false
When you enter a domain name, the DNS server translates the domain name to its associated IP address of that data and information can be routed to the correct computer.
true
Most current web browsers support tabbed browsing, where the top of the browser displays a tab for each webpage you open.
true
A phishing filter will prevent your browsing history, passwords, user names, and other personal information from being revealed.
false
Several browsers are available at shareware websites.
true
Many browsers and websites do not require the http:// and www portions of a web address.
true
RSS and Atom are popular specifications used to distribute content, such as web feeds, to subscribers.
true
A mobile processor is a type of software for computers and mobile devices that reads a user’s specified web feeds and collects their most recent content.
false
A disadvantage with a subject directory is that users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented
true
One technique to improve Web searches is to use general nouns and put the less specific terms first in the search text.
false
The search engine operator AND is used to display hits that include only one word from a list.
false
In a search engine, parentheses are used to combine hits that include specific words with those that only include one word from a list.
true
The asterisk search engine operator allows the substitution of characters in place of the asterisk.
true
All social networking sites require friends to confirm a friendship.
false
Examples of informational websites include libraries, encyclopedias, dictionaries, directories, guides, and other types of reference.
true
A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music.
false
Once you post media, you might be giving up certain rights to the media.
true
The difference between a wiki and other content posting sites is that users cannot modify original posts on an wiki.
false
An entertainment website contains content that describes a cause, opinion, or idea
false
To thwart attempts to steal your personal data, install a personal threat reporter, which is software that protects network resources from outside intrusions.
false
Most Portal websites such as MSN.com require payment for services.
false
An Internet connection is not necessary for participating in e-commerce.
false
In the evaluation of a website, the evaluation criterion of authority states that a reputable institution should support the website without bias in the information.
false
Some people use the term m-commerce (mobile commerce) to identify e-commerce that takes place using mobile devices.
true
The more compressed the graphics file, the smaller the image and the higher the quality.
false
Smaller file sizes result in faster downloading of webpages because small files transmit more quickly than large files.
true
The goal with TIFF graphics is to reach a balance between image quality and file size.
false
The JPEG format works best for images that have only a few colors.
false
JPEG is a format that expands graphics to increase their file size, which means the file takes up less storage space.
false
Some audio files require you to download a media player.
true
All mobile browsers support the use of plug-ins.
false
When using email, it is not important to use proper grammar, spelling, and punctuation.
false
To add an email name and address to a mailing list, a user unsubscribes from it.
false
The receiver of a message need not be willing to accept messages in order for IM to work.
false
Webpage developers often use FTP to upload their webpages to a web server.
true
VoIP is an Internet standard that permits file uploading and downloading with other computers on the Internet.
false
In a networked environment, no authorized computer user can access data and information stored on other computers on the network.
false
Users connected to a network have access to software on the network.
true
The main differentiation among network classifications is whether they are wired or wireless.
false
An extranet essentially is a small version of the Internet that exists within an organization.
false
A WLAN cannot communicate with a wired LAN.
false
A MAN usually is managed by a consortium of users or by a single network provider that sells the service to the users
false
On a client/server network, the client sometimes is called a host computer.
false
Although it can connect any number of computers, a client/server network typically provides an efficient means to connect 10 or fewer computers.
false
When users log off a P2P network, other users still can access their hard disks.
false
A star network consists of a single central cable, to which all computers and other devices connect.
false
Bus networks are unpopular on LANs because they are expensive and difficult to install.
false
The star topology is primarily used for LANs but it is also used in WANs.
false
Data transmitted on a ring network travels from device to device around the entire ring, in both directions.
false
On a ring network, if the hub fails the entire network is inoperable until the hub is repaired.
false
As data move through a network from one program to another, it can use at most one kind of network standard.
false
Depending on the transmission media used, Ethernet networks have data transfer rates that range from 10 Gbps for small office/home users to 1000 Gbps for enterprise users.
false
Each token ring network has several tokens.
false
On a token ring network, a packet is a special series of bits that function like a ticket, allowing the device with the packet to transmit data over the network.
false
With TCP/IP, each packet contains data as well as the recipient (destination), origin (sender), and the sequence information used to reassemble the data at the destination.
true
Wi-Fi networks easily can be integrated with wired Ethernet networks.
true
Hot spots offer mobile users the ability to connect to the Internet with their Wi-Fi enabled wireless computers and devices.
true
One advantage of Bluetooth is its high bandwidth.
false
Contactless payment is a popular use of UWB technology.
false
Communications software usually is bundled with the operating system or communications devices.
true
Consumers can purchase blank NFC tags at a reasonable cost and easily program them to perform certain actions.
true
With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called multiplexing.
true
ADSL is ideal for Internet access because most users upload more information than they download from the Internet
false
ISDN is more widely used now than in the past.
false
Data, instructions, and information travel along transmission media in either analog or digital form, depending on the transmission media.
true
With FTTP service, an optical terminal at your location receives the signals and transfers them to a router connected to a computer
true
Phone networks, the Internet, and other networks with large amounts of traffic use ATM.
true
ISDN and DSL are more widely used than cable
false
A dial-up modem connected to a sending computer converts the computer’s digital signals into analog signals.
true
A DSL modem converts digital signals to analog signals and vice versa so that data can travel along an analog phone line.
false
Some smartphones can function as a wireless modem, called a mobile hot spot, when tethered to a personal computer.
true
Some mobile users have a wireless modem that uses a mobile phone provider’s network to connect to the Internet wirelessly from a computer or other mobile device.
true
Wireless access points have high-quality antennas for optimal signals
true
Only small networks use routers.
false
IP hijacking is one of the largest Internet security threats.
true
One of the more widely used transmission media for network cabling and landline phone systems is twisted-pair cable.
true
Most of today’s computer networks use coaxial cable.
false
In a fiber-optic cable, each strand, called an optical fiber, is as thin as a human hair.
true
Fiber-optic cables have the capability of carrying significantly more signals than wire cables.
true
Wireless transmission media are used when it is impossible to install cables.
true
Infrared (IR) is a wireless transmission medium that sends signals using infrared light waves.
true
For radio transmissions, a transmitter is needed to send the broadcast radio signal and a receiver to accept it
true
The fifth generation of cellular transmissions is expected to provide artificial intelligence capabilities on wearable devices
true
Transmission from a satellite to an earth-based station is called an uplink
false
A GPS receiver is a handheld, mountable, or embedded device that contains an antenna, a radio receiver, and a processor.
true