Practice Quiz Chapter 006 Communications_ Networks_ and by linxiaoqin

VIEWS: 51 PAGES: 4

									                             Practice Quiz
           Chapter 006 Communications, Networks, and Safeguards


   Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.
   A. continuous
   B. digital
   C. sequential
   D. analog

2. Signals such as sound and temperature, which continuously vary in strength and quality, are said
   to be
   A. spontaneous
   B. digital
   C. sequential
   D. analog

3. A ________ is a system of interconnected computers, telephones, or communications devices
   that can communicate and share resources.
   A. terminal
   B. router
   C. network
   D. server

4. A network that covers a wide geographical area is called a ________.
   A. LAN
   B. WAN
   C. MAN
   D. HAN

5. Networks are structured in two principle ways: client/server and ________.
   A. intranet
   B. host computer
   C. extranet
   D. peer-to-peer

6. A ________ is the set of rules that govern the exchange of data between hardware and/or
   software components in a communications network.
   A. host
   B. protocol
   C. database
   D. packet
                              Practice Quiz
            Chapter 006 Communications, Networks, and Safeguards
7. A ________ is a fixed-length block of data for transmission.
   A. node
   B. protocol
   C. packet
   D. backbone

8. In an organization, all computer networks are connected to the Internet by a ________.
   A. skeleton
   B. backbone
   C. gateway
   D. router

9. In the ________ network topology, communications devices are connected to a single cable
   with two endpoints.
   A. ring
   B. bus
   C. star
   D. peer-to-peer

10. ________ is the most common and most widely used LAN technology; it can be used with
    almost any kind of computer; most microcomputers come with a port for this type of network
    connection.
    A. fiber-optic
    B. Internet
    C. token ring
    D. Ethernet

11. The ________ is the range of frequencies that a transmission medium (channel) can carry in a
    particular period of time.
    A. bandwidth
    B. electromagnetic spectrum
    C. radio-frequency spectrum
    D. wireless application protocol

12. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used to
    identify earth locations.
    A. GEO
    B. MEO
    C. LEO
    D. UWB
                              Practice Quiz
            Chapter 006 Communications, Networks, and Safeguards
13. Which of the following is NOT a type of long-distance wireless two-way communications
    device?
    A. Bluetooth
    B. WiMax
    C. 1G analog cellular phone
    D. 2G digital cellphone

14. Which type of virus attaches itself to executable files, the .exe files that start up applications
    programs?
    A. boot-sector virus
    B. Trojan horse
    C. file virus
    D. logic bomb

15. What protects a computer's hardware and/or software (or network) from intruders?
    A. antivirus software
    B. antispam software
    C. firewall
    D. white-hat hackers

16. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
    ________.
    A. encryption
    B. decryption
    C. password protection
    D. biometrics

17. RSA encryption is an example of ________ technology.
    A. public-key encryption
    B. private-key encryption
    C. password protection
    D. biometric

18. Which of these is NOT an example of public-key encryption?
    A. PGP (Pretty Good Privacy)
    B. RSA encryption
    C. DES (DataEncryption Standard)
    D. Fortezza
                             Practice Quiz
           Chapter 006 Communications, Networks, and Safeguards
19. ____________ encryption uses the same secret key to encrypt and decrypt a message.
    A. Public-key
    B. Digital technology
    C. Differential coding
    D. Private-key

20. Antivirus software protects files and computer systems in all of these ways EXCEPT which one?
    A. scans the hard drive for signatures that uniquely identify a virus
    B. looks for suspicious viruslike behavior
    C. goes out on the Internet and looks for viruses
    D. destroys the virus

								
To top