IT 105 GMU Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

A basic computer network can be described as:

Two or more computers that are linked together

2
New cards

LAN stands for:

local area network

3
New cards

The primary difference between a LAN and a WAN is:

distance

4
New cards

Each individual computer and component attached to a network is a:

Node

5
New cards

In a traditional LAN, each node on the network is connected through:

Cables

6
New cards

MAN stands for:

Metropolitan area network

7
New cards

The hardware device or software program that sends messages between networks is known as a:

Router

8
New cards

NIC stands for:

Network Interface Card

9
New cards

Computer bits must be ___________ to travel over phone lines

Analog signals

10
New cards

Modem speed is measured in:

Bits per second

11
New cards

What is the term for the amount of information transmitted through a communication medium in a certain amount of time?

Bandwidth

12
New cards

What type of cable uses light waves to carry information at high speed?

Fiber-optic cables

13
New cards

What helps block unauthorized access and data transfer?

A firewall

14
New cards

A program that performs a useful task while simultaneously allowing destructive acts is a:

Trojan horse

15
New cards

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Virus

16
New cards

What type of virus uses computer hosts to reproduce itself?

Worm

17
New cards

When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

A denial of service attack

18
New cards

The scrambling of code is known as:

Encryption

19
New cards

Information security is the practice of defending information from unauthorized access.

True

20
New cards

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

True

21
New cards

Hoax viruses flood a targeted computer with so many requests that it cripples functionality.

False

22
New cards

The most complex type of firewall is the application proxy firewall.

True

23
New cards

A router is a hardware component used to interconnect networks.

True

24
New cards

How many layers are there in the TCP/IP protocol suite?

4

25
New cards

IPv6 addresses are how many bits long?

128

26
New cards

UDP provides sequencing, error control and flow control just like TCP

False

27
New cards

Which of the following are standard twisted pair cables?

CAT 2

CAT 3

CAT 5

28
New cards

Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user?

Contextual Computing

29
New cards

Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user's existing technologies (including hardware, software, and services) into a one stop connected platform?

Workplace Hub

30
New cards

Which are simulation types for implementing of virtual reality technology?

Non-Immersive

Semi-Immersive

Fully-Immersive

31
New cards

Which of the following are Deep Learning Algorithms?

Convolutional Neural Network (CNN)

Deep Neural Network (DNN)

Long Short-Term Memory (LSTM)

32
New cards

Which of the following is the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions?

Big Data Analytics

33
New cards

Which of the following networks is a subnet?

172.16.64.0

34
New cards

In terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7?

Class A

35
New cards

Decryption is the process of converting plaintext into ciphertext

False

36
New cards

Suppose you are creating a simple password for an iPhone and the character set consists of ten numerals on the keypad: 0, 1, 2, 3,..., 9 and the password length is six digits. Using the formula P= 〖C 〗^password length, what is the number of passwords?

1000000

37
New cards

Serial transmission is described as transmitting a group of bits at a single instant in time, which requires multiple paths

False

38
New cards

Use the Signal to Noise ratio formula below to solve a scenario where A receiver has an input power of 22.2 mW while the noise power is 23.3 uW. Find the SNR for the receiver.

29.79 dB

39
New cards

Malware refers to any computer program designed to surreptitiously enter a digital device.

True

40
New cards

Private-key functions involve the use of two keys during the process of Private-key encryption.

False

41
New cards

Which OSI layer offers reliable, connection-oriented data communication services?

Transport

42
New cards

Which of the following is an IPv4 address?

164.20.31.9

43
New cards

Which of the following is self-propagating and self-replicating?

Worm