TIA 7-9

Each device connected to a network is known as a
node
Which of the following is a disadvantage of setting up a network?
Even ______________________require some degree of netowrk administration
peer to peer
The most common type of network installed in the home is a
peer to peer
A small network deployed in a home is referred to as a
HAN
The part of the network that establishes a communications channel between the nodes of the network is known as
transmission media
Throughput speed is always____________ bandwith
less than or equal to
The network navigation device that sends data packets to their intended node on a network is called a
switch
The fastest broadband Internet service is usually
fiber-optic
All of the following are methods to secure your wireless network except
disable WEP
The device used to move data between two networks is called a
router
Actual data throughput is usually higher on wired networks than on wireless networks.
true
Network-ready devices contain Ethernet switches.
False
Home network servers are a specialized type of NAS device.
false
LANs cover a larger geographic area than WANs.
false
Gaming consoles are often connected to home wireless networks.
false
Which is not a factor that determines the quality of images taken with a digital camera?
EyeFi
Cloud technology is important to mobile device owners because it allows ________________ of multiple devices
instant synchronization
The operating system of your cell/smartphone is stored in:
read only memory
The quickest way to distribute your band’s new song to a lot of listeners is to usean application to post it on
Facebook
P2P is an acronym for:
peer to peer sharing
An analog signal is different from a digital signal because it is
continuous
Flash memory is a type of:
nonvolatile memory
VoIP is phone service that works over an
internet connection
Which of the following is not true about modern televisions?
They run ___________ and ____________ software
word processing, spread sheet
Which service allows you use your cell/smartphone to send messages that contain images?
MMS
Digital convergence means that all cellular networks will become 4G.
false
Digital music files must be converted to the MP3 format if they are transferred to a mobile device.
true
A codec is the algorithm that compresses and decompresses video files.
true
If your digital camera doesn’t support wireless connectivity, you can use a memory card with built-in WiFi.
true
Some Internet-enabled devices use Skype for voice communications instead of cell phone service.
true
When a hacker steals personal information with the intent of impersonating another individual to commit fraud this is known as
identity theft
Viruses that activate on certain dates or with the passage of time are known as
time bombs
Unlike a virus, ________ do not require human interaction to spread on their own.
worms
Antivirus software works by detecting virus code unique to a particular virus known as a
virus signature
Which tool do hackers use to gain access to and take control of your computer?
backdoor programs
A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer.
zombie
Software designed to close logical ports in your computer is known as a(n)
firewall
Devices that use unique personal characteristics such as fingerprints or iris patterns to identify authorized computer users are called _______________ devices.
biometric authentication
Programs that attempt to trick you into buying software by pretending your computer is infected with a virus fall into the class of malware known as
scareware
A backup of only files that have changed since the last backup was executed is known as a(n)
incremental backup
Pretexting is an example of social engineering.
true
Sending e-mails to lure people into revealing personal information is a technique known as pharming.
false
Encrypting data is not an appropriate measure for protecting mobile devices such as phones.
false
Adware and spyware are both types of malware.
true
Password strength is primarily determined by the length of the password.
false