Test Two for Computer Part 2

radio waves
Microwave communication uses high-frequency _______.
client/server
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
satellite
The GPS device in an automobile uses which communication channel?
Worldwide Interoperability for Microwave Access
WiMax stands for _______.
Fiber-optic cable
Which physical connection is the fastest?
TCP/IP
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
Hotspot
A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.
Broadband
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.
VPN
Remote users can connect to an organization’s network through this type of secure private connection.
3G and 4G cellular networks
Cellular services use _______ to provide wireless connectivity to the Internet.
Microwave
Which among the following is considered a line-of-sight communication medium?
switch
The _______ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.
Uplink
_______ is a term relating to sending data to a satellite.
IP address
Every computer on the Internet has a unique numeric address called a(n) _______.
Connective Devices
In a communication system, which among the following convert messages into packets that can travel across the communication channel?
Sending and receiving devices
In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?
Proxy
All communications between a company’s internal networks and the outside world pass through this server.
bandwidth
The capacity of a communication channel is measured in _______.
Mesh
This type of network topology does not use a specific physical layout.
Tree
A network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other sub-ordinate nodes.
Network gateway
This device enables connectivity between two LANS or a LAN and a larger network.
Client
In a computer network, this node that requests and uses resources available from other nodes.
Packetization
_______ is the process of breaking down information sent or transmitted across the Internet into small parts.
DSL
A service that uses existing phone lines to provide high-speed connections is called _______.
Extranets
Organizations use the following to allow suppliers and others limited access to their networks.
widespread use of mobile devices with wireless Internet connectivity
One of the most dramatic changes in connectivity and communications in the past few years has been _______.
cookies
Small data files that are deposited on a user’s hard disk when they visit a website are called _______.
Third-party cookies
These are used by advertisers to keep track of your web activity as you move from one site to the next.
Data security
_______ is concerned with protecting software and data from unauthorized tampering or damage.
spyware
Programs used to secretly record an individual’s activities on the Internet are called _______.
Copyright
This is a legal concept that gives content creators the right to control use and distribution of their work.
Digital rights management (DRM)
Corporations often use this to prevent copyright violations.
Rogue
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
Digital Millennium Copyright Act
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away
Ad-Aware
Which of the following is not malware?
Keystroke logger
Which type of program would likely be used by investigators to record a potential suspects’ Internet activities?
cracker
This type of computer criminal creates and distributes malicious programs.
Privacy
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
WPA2
Which of the following is the most widely used wireless network encryption for home wireless networks?
Denial of service attack
Which among the following is a way to shut down an ISP or website?
Employee-monitoring software
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
Privacy mode
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
Trojan horses
Free computer games and free screen saver programs are typical carriers of _______.
Dictionary attack
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
Computer Fraud and Abuse Act
Computer criminals that create and spread viruses are punished under this law.
Internet scam
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
Freedom of Information Act
This law gives you the right to look at your personal records held by government agencies.
Worm
A program that replicates itself and clogs computers and networks.
Firewall
A(n) _______ acts as a security buffer between a corporation’s private network and all external networks.
Keeping the same password on all systems consistently
Which of the following is not a measure to protect computer security?
Cyberbullying
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
Encryption
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
information resellers
People that collect and sell personal data are called _______.