A1 B1 C1 D1 E1 F1 G1 H1 I1 A2 B2 C2 D2 E2 F2 G2 H2 I2 A3 B3 C3 D3 E3 F3 G3 H3 I3 A4 B4 C4 D4 E4 F4 G4 H4 I4 A5 B5 C5 D5 E5 F5 G5 H5 I5 A6 B6 C6 D6 E6 F6 G6 H6 I6 A7 B7 C7 D7 E7 F7 G7 H7 I7 A8 B8 C8 D8 E8 F8 G8 H8 I8 The Game Board! A. B. Telephone networks are fundamentally different from computer networks. True False A. B. Increasingly, voice, video, and data communications are all based on Internet technology. TRUE FALSE To create a computer network, you must have at least two computers. TRUE FALSE A. B. An NOS must reside on a dedicated server computer in order to manage a network. TRUE FALSE A. B. The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. TRUE FALSE A. B. Viruses can be spread through e-mail. TRUE FALSE Computer worms spread much more rapidly than computer viruses. TRUE FALSE A. B. A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network. TRUE FALSE A. B. A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network. TRUE FALSE A. B. Central large mainframe computing has largely replaced client/server computing TRUE FALSE A. B. Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching. TRUE FALSE A. B. Mobile search makes up approximately 10% of all Internet searches. TRUE FALSE A. B. Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. TRUE FALSE A. B. In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog. TRUE FALSE A. B. Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. TRUE FALSE A. B. Fiber-optic cable is more expensive and harder to install than wire media. TRUE FALSE A. B. The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. TRUE FALSE A. B. The Domain Name System (DNS) converts domain names to IP addresses. TRUE FALSE A. B. VoIP technology delivers voice information in digital form using packet switching. TRUE FALSE A. B. Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information. TRUE FALSE A. B. C. D. The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a: hub. switch. router. NIC. The Internet is based on which three key technologies? TCP/IP, HTML, and HTTP TCP/IP, HTTP, and packet switching Client/server computing, packet switching, and the development of communications standards for linking networks and computers D. Client/server computing, packet switching, and HTTP A. B. C. A. B. C. D. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: multiplexing. packet switching. packet routing. ATM. Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. B) are not secure because the technology to secure them did not exist at the time the files were created. C) have the potential to be accessed by large numbers of people and by groups outside of the organization. D) are frequently available on the Internet. Specific security challenges that threaten the communications lines in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware. Specific security challenges that threaten clients in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware. A. B. C. D. The telephone system is an example of a ________ network. peer-to-peer wireless packet-switched circuit-switched A. B. C. D. Which of the following is not a characteristic of packet switching? Packets travel independently of each other. Packets are routed through many different paths. Packet switching requires point-to-point circuits. Packets include data for checking transmission errors. A. B. C. D. In TCP/IP, IP is responsible for: disassembling and reassembling of packets during transmission. establishing an Internet connection between two computers. moving packets over the network. sequencing the transfer of packets. A. B. C. D. In a telecommunications network architecture, a protocol is: a device that handles the switching of voice and data in a local area network. a standard set of rules and procedures for control of communications in a network. a communications service for microcomputer users. the main computer in a telecommunications network. A. B. C. D. What are the four layers of the TCP/IP reference model? Physical, application, transport, and network interface Physical, application, Internet, and network interface Application, transport, Internet, and network interface Application, hardware, Internet, and network interface A. B. C. D. Which signal types are represented by a continuous waveform? Laser Optical Digital Analog A. B. C. D. To use the analog telephone system for sending digital data, you must also use: a modem. a router. DSL. twisted wire. A. B. C. D. Which type of network is used to connect digital devices within a half-mile or 500-meter radius? Microwave LAN WAN MAN A. B. C. D. Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? Peer-to-peer Wireless LAN Ring A. B. C. D. Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? PAN Domain-based LAN Peer-to-peer network Campus area network A. B. C. D. Which of the following is considered by many to be the defining Web 2.0 application? Instant messaging E-mail Blogging Social networking A. B. C. D. Which of the following enables multiple users to create and edit Web documents? Wiki Blog Social networking Pinterest A. B. C. D. The "Internet of Things" refers to: the increasing focus on shopping as the major user activity on the Internet. the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text. a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. the trend away from platform-independent Web applications to mobiledevice specific apps. You have no Question You are an instant WINNER of Take the points and Relax! A. B. C. D. A network that spans a city, and sometimes its major suburbs as well, is called a: CAN. MAN. LAN. WAN. A. B. C. D. A network that covers entire geographical regions is most commonly referred to as a: local area network. intranet. peer-to-peer network. wide area network. Which of the following is a challenge posed by Wi-Fi networks? Lack of broadband support Connectivity issues with wired LANs Susceptibility to interference from nearby wireless systems D. High cost of infrastructure technology A. B. C. Bandwidth is the: number of frequencies that can be broadcast through a medium. B. number of cycles per second that can be sent through a medium. C. difference between the highest and lowest frequencies that can be accommodated on a single channel. D. total number of bytes that can be sent through a medium per second. A. A. B. C. D. The total amount of digital information that can be transmitted through any telecommunications medium is measured in: bps. Hertz. baud. gigaflops. A. B. C. D. Digital subscriber lines: operate over existing telephone lines to carry voice, data, and video. operate over coaxial lines to deliver Internet access. are very-high-speed data lines typically leased from longdistance telephone companies. have up to twenty-four 64-Kbps channels. A. B. C. D. T lines: operate over existing telephone lines to carry voice, data, and video. operate over coaxial lines to deliver Internet access. are high-speed, leased data lines providing guaranteed service levels. have up to twenty-four 64-Kbps channels. A. B. C. D. Which protocol is the Internet based on? TCP/IP FTP packet-switching HTTP A. B. C. D. What service converts IP addresses into more recognizable alphanumeric names? HTML DNS IP HTTP A. B. C. D. The child domain of the root is the: top-level domain. second-level domain. host name. domain extension. A. B. C. D. In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? "http://", myspace, blogging, com "http://", com, blogging, myspace ".", com, blogging, myspace ".", myspace, blogging, com A. B. C. D. Which organization helps define the overall structure of the Internet? None (no one "owns" the Internet) W3C ICANN IAB IPv6 is being developed in order to: update the packet transmission protocols for higher bandwidth. B. create more IP addresses. C. allow for different levels of service. D. support Internet2. A. A. B. C. D. Which of the following services enables logging on to one computer system and working on another? FTP LISTSERV Telnet World Wide Web A. B. C. D. Instant messaging is a type of ________ service. chat cellular e-mail wireless Which of the following statements about RFID is not true? RFIDs transmit only over a short range. RFIDs use an antenna to transmit data. Microchips embedded in RFIDs are used to store data. D. RFIDs require line-of-sight contact to be read. A. B. C. A. B. C. D. ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. Wireless networks Intranets Virtual private networks Unified communications A VPN: is an encrypted private network configured within a public network. B. is more expensive than a dedicated network. C. provides secure, encrypted communications using Telnet. D. is an Internet-based service for delivering voice communications. A. A. B. C. D. Web browser software requests Web pages from the Internet using which protocol? URL HTTP DNS HTML YOU RECEIVE NO POINTS I got my eye on you! YOU RECEIVE NO POINTS What do you mean! YOU RECEIVE NO POINTS WAIT! I know the ANSWER! Your Answer is correct! Total Points 10 You Win! Your Answer is correct! Total Points 15 Your Answer is correct! Total Points You want on our team! 20 YOU ARE a Winner!!! Your Kidding! RIGHT! You Received 25 Points