1/42
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A basic computer network can be described as:
Two or more computers that are linked together
LAN stands for:
local area network
The primary difference between a LAN and a WAN is:
distance
Each individual computer and component attached to a network is a:
Node
In a traditional LAN, each node on the network is connected through:
Cables
MAN stands for:
Metropolitan area network
The hardware device or software program that sends messages between networks is known as a:
Router
NIC stands for:
Network Interface Card
Computer bits must be ___________ to travel over phone lines
Analog signals
Modem speed is measured in:
Bits per second
What is the term for the amount of information transmitted through a communication medium in a certain amount of time?
Bandwidth
What type of cable uses light waves to carry information at high speed?
Fiber-optic cables
What helps block unauthorized access and data transfer?
A firewall
A program that performs a useful task while simultaneously allowing destructive acts is a:
Trojan horse
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Virus
What type of virus uses computer hosts to reproduce itself?
Worm
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A denial of service attack
The scrambling of code is known as:
Encryption
Information security is the practice of defending information from unauthorized access.
True
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
True
Hoax viruses flood a targeted computer with so many requests that it cripples functionality.
False
The most complex type of firewall is the application proxy firewall.
True
A router is a hardware component used to interconnect networks.
True
How many layers are there in the TCP/IP protocol suite?
4
IPv6 addresses are how many bits long?
128
UDP provides sequencing, error control and flow control just like TCP
False
Which of the following are standard twisted pair cables?
CAT 2
CAT 3
CAT 5
Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user?
Contextual Computing
Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user's existing technologies (including hardware, software, and services) into a one stop connected platform?
Workplace Hub
Which are simulation types for implementing of virtual reality technology?
Non-Immersive
Semi-Immersive
Fully-Immersive
Which of the following are Deep Learning Algorithms?
Convolutional Neural Network (CNN)
Deep Neural Network (DNN)
Long Short-Term Memory (LSTM)
Which of the following is the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions?
Big Data Analytics
Which of the following networks is a subnet?
172.16.64.0
In terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7?
Class A
Decryption is the process of converting plaintext into ciphertext
False
Suppose you are creating a simple password for an iPhone and the character set consists of ten numerals on the keypad: 0, 1, 2, 3,..., 9 and the password length is six digits. Using the formula P= 〖C 〗^password length, what is the number of passwords?
1000000
Serial transmission is described as transmitting a group of bits at a single instant in time, which requires multiple paths
False
Use the Signal to Noise ratio formula below to solve a scenario where A receiver has an input power of 22.2 mW while the noise power is 23.3 uW. Find the SNR for the receiver.
29.79 dB
Malware refers to any computer program designed to surreptitiously enter a digital device.
True
Private-key functions involve the use of two keys during the process of Private-key encryption.
False
Which OSI layer offers reliable, connection-oriented data communication services?
Transport
Which of the following is an IPv4 address?
164.20.31.9
Which of the following is self-propagating and self-replicating?
Worm