Show Recommended textbook solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Engineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Operating System Concepts9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin 489 solutions Terms in this set (219)bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email. cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person Sets with similar terms
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (48)A modem can also function as what other piece of hardware? Router Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? It contained typos and other grammatical errors. As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying
about someone else accessing it? Encrypt the data in the report. As the new manager at your local grocery store, you want to create a more efficient
inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? Extranet Computers communicating on a network must follow a _____, a common set of rules for exchanging information. protocol Devices on a _____ area network are connected via Bluetooth. personal In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. Star In a connected network, how are hubs and switches similar to one another? They provide a central point for cables in a network Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. Standards To access the Internet, a router must be connected to a _____. modem To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. firewall To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel Virtual private network What does a DSL modem use to send and receive digital data? Copper telephone wiring What hardware is essential to creating a home Wi-Fi network? Router What internal device does a computer use to connect to a wired or a wireless network? Network interface card What is a MAC address? A unique hardware address for your device What is an ISP? A telecommunications company that sells Internet access. What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? Social engineering What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? They disguise the network as an evil twin. What is the U.S. Federal Communication Commission's role in regard to Internet access? To release rules surrounding Internet access What type of network sends signals through airwaves and usually does not require cables? Wireless network When describing a client/server network, which of the following would be considered a client? Laptop When it comes to secure data storage on a network, which of the following statements is true? Roles can be granted to individuals to view files and make changes to files on a network. Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? Bluetooth Which of the following could indicate a DoS attack on your company server? Customers cannot view the website on their device because the page will not load. Which of the following describes an evil twin? A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. Which of the following is a disadvantage of using cloud computing to share files? The inability to access your files if you lose your Internet connection. Which of the following is an authentication method to keep your data safe? Fingerprint scanner Which of the following is an example of a personal area network? smartwatch and phone connected via Bluetooth Which of the following is true about broadband connections? Broadband connections are "always-on" with devices connected to them. Which of the following network standards applies to cellular networks? LTE Which of the
following statements do opponents of net neutrality agree with? ISPs should charge more for high-bandwidth connections. Which of the following statements is NOT true about a local firewall? A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system Which of the following statements is true about public networks? Many public networks are not secure. While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? My Verizon VPN True or False? 4G and 5G networks provide slower data transmission speeds than 3G networks. False True or False? Bandwidth is a term that describes the number of devices connected to a network. False True or False? If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. False True or False? If you upload photos to a NAS device, everyone on the network can access them. True (True or False) networks allow computers to share resources, such as hardware, software, data, and information True (True or False) A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer. False (True or False) A DSL modem uses existing standard copper telephone wiring to send and receive digital data. True Which of the following is not a common network topology? Client/server network Which of the following is a private network used by organizations to communicate internally? Intranet (True or False) Adware tracks and transmits personal information from your computer or device without your knowledge. False Which of the following describes a normal-looking, yet fraudulent Wi-Fi network? Evil twin (True or False) Two types of firewalls include hardware firewalls and software firewalls. True Which of the following is not a safety precaution for securing a wireless network?
Disable WPA2 Sets with similar termsChapter 7 test232 terms zxc215 6.3.1.1-6.4.1.724 terms Jason_Holcomb CGS2100 chapter 1273 terms TiffneyG CGS 2100 Exam 2 Winston (Summer B)60 terms AnselPonceDiama Sets found in the same folderComputer Concepts Module 861 terms Pepepepepepepepepepo Computer Concept Module 944 terms MackMarr Ch. 8 Cengage15 terms iceccone17PLUS Module 6 Computer Concepts Exam39 terms iceccone17PLUS Other sets by this creatorMetabolism15 terms iceccone17PLUS The Structure and Function of Macromolec…59 terms iceccone17PLUS Water and Fitness of the environment24 terms iceccone17PLUS Chemical Context of Life21 terms iceccone17PLUS Recommended textbook solutions
Starting Out with Python4th EditionTony Gaddis 629 solutions Fundamentals of Python: First Programs2nd EditionKenneth Lambert 419 solutions
Introduction to Java Programming, Brief Version10th EditionY. Daniel Liang 1,626 solutions
The Essentials of Computer Organization and Architecture4th EditionJulia Lobur, Linda Null 376 solutions |