CIS 141 Unit 3 Exam

The Wi-Fi standard ____ is no longer manufactured (but is backwards compatible with one of the other newer standards)
____ is the use of networking technology to provide medical information and services
Some wireless ____ are created by cities or large organizations to provide free or low-cost Internet access to residents of a particular area
Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger
One type of mobile phone that might be used when mountain climbing far from any cellular towers is a ____
satellite phone
Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa
The accompanying figure displays a ____
coaxial cable
____ transmissions are used with cell phones and are sent and received via cellular (cell) towers
Cellular radio
The ____ allows individuals to “placeshift” multimedia content from their home TVs and DVRs to their portable computer or mobile device
The technique used for data sent over the Internet is ____
packet switching
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network
network interface card (NIC)
A global positioning system (GPS) consists of ____ and a group of GPS satellites
GPS receivers
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the network for which the data is intended and sends the data to that device only

____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles
Microwave stations
____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period
____ is typically used with LANs that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-optic cabling
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle would like to purchase a new ____, which would be used to connect the company’s LAN and the Internet

____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service
coaxial cable
A means to provide a wireless connection to a peripheral devices. This is similar to, but different from, Bluetooth
wireless USB
In a ____ network, there are a number of different connections between the devices on the network so that data can take any of several possible paths from source to destination
____ satellites travel at a speed and direction that keeps pace with the earth’s rotation, so they appear (from earth) to remain stationary over a given spot
____ is a wireless standard that is designed for very short-range (10 meters, approximately 33 feet, or less) connections
Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert’s job is a(n) ____ job
The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes
global positioning system (GPS)
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____

access point
A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to
Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted
The accompanying figure shows a ____ network
____ is the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places
__________ technology is commonly used to monitor the status of objects, such as shipping boxes, livestock, or expensive equipment to which these types of tags are attached
A ____ is a network that covers a relatively small geographical area, such as a home, office building, or school
local area network (LAN)
Which of the following is NOT a web browser?
Anthony is passionate about politics and enjoys sharing his views with others over the Internet. A couple of times a week, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order
The program in the accompanying figure allows you to ____
instant message and video chat
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others
Conventional dial-up connects to the Internet at a maximum of ____
56 Kbps
Video content delivered at the user’s request is called ____
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search
phrase searching
Online shopping and online investing are examples of ____
A(n) ____ is a collection of an individual’s work accessible through a Web site
____ is charged with such responsibilities as IP address allocation and domain name management
ICANN (Internet Corporation for Assigned Names and Numbers)
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other
The standard term for the technology that allows you to make voice calls using a broadband Internet connection instead of a traditional phone line is ____
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies
Internet backbone
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company
____ allows you to exchange real-time messages
Instant messaging
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box
Internet Options
The ____ is cited as a disadvantage of Web-based training and distance learning by some educators
lack of face-to-face contact
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking
search engine
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online
Web 2.0
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences
____ are businesses or other organizations that provide Internet access to others, typically for a fee
Internet service providers (ISPs)
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source
Direct Internet connections are typically ____ connections
The accompanying figure shows the MSN ____ , a specially designed web page that brings information together from diverse sources in a uniform way
web portal
____ is the most widely used type of home broadband connection, with over half of the home broadband market
Cable Internet access
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify
online portfolio
Online music ____ allow you to purchase and then download music singles and albums to your computer, mobile phone, or portable digital media player
____ are companies that provide computer-based services to customers over a network
Application service providers (ASPs)
Computer crime is sometimes referred to as ____
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country
the United States
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis
threat definitions
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to
____ identify users by a particular unique biological characteristic
Biometric access systems
A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network
virtual private network
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name
Identity theft
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____
codes of conduct
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them
war driving
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____
dot cons
The best protection against many dot cons is ____
common sense
The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business)
Wi-Fi piggybacking
____ includes any acts of malicious destruction to a computer or computer resource
Computer sabotage
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies
Homeland Security Act of 2002
When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the digital signature
Repeated threats or other harassment carried out online between adults is referred to as ____
A ____ is a malicious program that masquerades as something else—usually as some type of application program
Trojan horse
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual
A computer that is controlled by a hacker or other computer criminal is referred to as a ____
____ uses a single secret key to both encrypt and decrypt the file or message
Private key encryption
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems
Possessed object
____ refers to the act of breaking into a computer or network
Like a computer virus, a ____ is a malicious program designed to cause damage
computer worm
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive
Identity theft
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications
USA Patriot Act
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities
____ is a generic term that refers to any type of malicious software