Sie sind auf Seite 1von 17

Match the term on the left to its corresponding definition on the right

Answer 1
a protocol for computer networking
TCP/IP

Answer 2
continuous wave of bits
analog signal

Answer 3
personal Web page that can be used for a personal diary
blog

Answer 4
fast Internet connection like DSL
broadband

Answer 5
device used to connect computer to phone line
dial-up modem

Answer 6
a Web site designed to allow anyone who accesses it to modify it
w iki

network technology that enables every computer to be both a client Answer 7


and server peer-to-peer

amount of data that can be transmitted through a communication Answer 8


medium in a given amount of time bandw idth

Answer 9
secure network that uses encryption
VPN

Next

TCP/IP is the most famous protocol for computer networking.


Select one:

True
False
DSL is slower than fiber-optic Internet.
Select one:
True

False
Wi-Fi technology can reach a range of 5 to 10 meters.
Select one:

True
False
A DSL connection can share signals with a telephone line.
Select one:
True
False
Bluetooth technology can reach a range of 10 meters.
Select one:

True

False

Next
With VoIP, phone calls are carried over the public phone network.
Select one:

True
False
Narrowband is a network of newsgroups available worldwide through the Internet.

Select one:
True

False
Bandwidth is measured in bits.

Select one:

True

False

new sgrou
A(n) Answer is an online public discussion on a particular subject.

People who monitor discussions in newsgroups but do not contribute to conversation are known as Answer
lurkers
.

upload
Copying software or data files to a client computer from a server is known as Answer .

netw ork
Two examples of a(n) Answer operating system are Novell's Netware and Microsoft Windows
Server.

forum
A Web Answer is functionally similar to a newsgroup but it's instead built on a Web application
accessed through a Web browser.

telephony
Computer Answer integration links computers and telephones to increase productivity.

protocols
Rules for the exchange of data between two devices are called Answer .

spam
Unsolicited email is called Answer .
mailing
A(n) Answer list is used to send electronic messages to many people.
When a Microsoft Word document or picture file is included along with an email message, it is known as a
attachmen
file Answer .
Bandwidth
Answer is the quantity of information that can be transmitted through a communication medium in a
given amount of time.

protocol
A(n) Answer is a set of rules for exchange of data between devices.

mesh
A(n) Answer network allows a message to jump from wireless device to wireless
device until it finds the correct destination.
asynchron
Mailing lists and newsgroups use Answer communications so that the sender and recipient do not
have to be logged on at the same time.

w ide
A(n) Answer area network is a network of local area networks.

Second
Like role-playing games, Answer Life is a 3-D virtual world populated by avatars of Web users from
all over the world.

Email discussion groups on special-interest topics are called Answer lists.

One email message from a mail list that includes all the postings from one day is called a Answer .

bits
Network transmission speeds are measured in Answer per second, and this term can be proceeded
by units such as kilo, mega or giga.

router
A(n) Answer is a device or program used to push traffic through a series of networks.

w ebmail
A system where users can check their email message through most browsers is known as Answer .

virtual
A(n) Answer private network provides a "tunnel" through the Internet preventing unauthorized
access or eavesdropping.
Programs designed to enable several networked users to work on the same documents at the same time are
groupw ar
called Answer .

GPS
The acronym for a device that can pinpoint any location in the world is Answer .

w iki
A(n) Answer is the shortened name of a Web site designed to enable anyone who accesses it to
contribute to, and modify, content.

micro
Another word for sites like Twitter, which allow users to post short status updates is Answer -blogs.

node
A(n) Answer is a computer or shared peripheral attached to a network.

phishing
A(n) Answer Web site is designed to collect confidential and sensitive information from visitors to
the site.

A(n) Answer network, also known as a wireless network, connects computers using radio or infrared
transmitters connected to network ports.
print
A(n) Answer server accepts, prioritizes, and processes requests to create hard copies of documents
from many computers.

Next

analog
A continuous wave of bits transmitted through a device is known as a(n) Answer signal.
The encryption scheme providing security for data transmission on a wireless network is known by the
WEP
acronym Answer .

infrared
Many laptops and handheld computers have Answer ports that can send and receive digital
information over short distances (approximately 1 meter) without the use of cables.
Software designed to allow several networked users to work on the same document at the same time is known
groupw ar
as Answer .

When a participant in a chat room represents himself using a cartoon character, he is using a(n) Answer
avatar
.

Graphical representations for the tone of your message, such as :-) to express happiness or :-O to express
emoticons
surprise, are also known as Answer .

modem
Connecting a computer to a telephone line requires a hardware device called a(n) Answer .

netiquette
Acceptable behavior rules on the Internet is also known as Answer .
Information sharing that is outsourced to a community of people rather than to a group of contracted specialists
crow dsou
is called Answer .

Bug
A Web Answer is an invisible piece of code that silently notifies the sender when a message was
opened and may also report other information from the user's computer.

hotspot
To enable customers to check their email using their laptop, a coffee shop may provide a Answer ,
which is a publicly accessible wireless access point.
client
A(n) Answer computer sends requests from the user to the server.

A person who maintains an online journal may also be called a(n) Answer .

A(n) ________ converts a message from digital to analog or from analog to digital.

Select one:
a. port

b. modem
c. hub
d. switch
The system of satellites used to determine any position on the Earth is known as

Select one:

a. MAN.

b. GPS.
c. LAN.

d. Wi-Fi.
T1 connections transmit data at this speed:

Select one:

a. 1 Gbps.

b. 1.5 Mbps.

c. 45 Mbps.

d. 1 Mbps.
A ________ network is a configuration that allows every computer on the network to act as both a client and a
server.

Select one:

a. peer-to-peer

b. metropolitan area
c. client/server

d. host system

________ uses high-bandwidth connections to communicate multimedia over wireless networks, but lacks true
broadband speed.

Select one:

a. 3G
b. 4G

c. DSL
d. Wi-Fi

One example of a synchronous method of communication is

Select one:

a. instant messaging.

b. forums.

c. blogs.

d. email.
Examples of broadband technologies include all of the following EXCEPT:

Select one:

a. dial-up.
b. DSL.
c. fiber-optic.

d. All are broadband connections


All of the following are essential components of every computer system EXCEPT:

Select one:

a. networks.
b. people.

c. hardware.

d. software.

A(n) ________ cable uses light waves to transmit multimedia and voice data.

Select one:

a. fiber-optic
b. copper
c. twisted-pair
d. coaxial
The U.S. Department of Defense uses a(n) ________, which is a specialized network used to determine
locations, maps, and directions using signals from satellites that are orbiting the Earth.

Select one:

a. MAN
b. NIC
c. GPS

d. mesh network

Network transmission speeds are measured in ________ per second.

Select one:

a. lines

b. bytes
c. binaries

d. bits

Most email messages are junk email, also known as

Select one:

a. IM.
b. a virus.
c. spam.

d. an avatar.
Data traveling from a home computer to the Internet is called

Select one:

a. T1 traffic.

b. upstream traffic.
c. DSL traffic.

d. downstream traffic.

________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps
speeds to a 25-square mile area.

Select one:

a. WiMAX
b. Bluetooth

c. Infrared
d. 3G
A ________ is a network of computers in a close physical area.

Select one:

a. MAN
b. WAN
c. GAN

d. LAN
Each individual computer and networked peripheral attached to a LAN is a

Select one:

a. server.

b. router.
c. hub.

d. node.
Dial-up modem connections are sometimes called ________ connections because they don't offer much
bandwidth when compared to other types of connections.

Select one:

a. broadband

b. smallband
c. minimal

d. narrowband
Remote access means that a(n)

Select one:

a. LAN is set up in an office in a remote location.


b. technical support agent can access your computer.
c. computer is linked directly to a network.

d. user is connecting to a network through a phone line, television cable, or wireless link.
Internet connections that work through the same network of coaxial cables that deliver television signals work
through a ________ modem.

Select one:
a. cable

b. POTS

c. satellite

d. fax
A broadband connection could be any of the following EXCEPT:

Select one:
a. cable modem.
b. fiber-optic.
c. dial-up.

d. wireless connection.
The most basic computer network can be described as

Select one:

a. the Internet.

b. the use of satellites linking computers together.


c. a minimum of five computers linked together.

d. two or more computers that are linked together.


The device or program that forwards messages between networks is known as a

Select one:

a. bridge.
b. gateway.

c. backbone.

d. router.
Graphical bodies used to represent a person in a virtual meeting place are known as

Select one:
a. emulators.

b. memes.

c. agents.
d. avatars.
From the ground, a GPS ________ interacts with signals from a satellite to determine its position.

Select one:

a. clock

b. drive
c. receiver

d. connector
Another name for the original Ethernet standard is ________.

Select one:

a. Fast Ethernet

b. Gigabit Ethernet

c. 10BASE-T Ethernet

d. 3G

Large organizations may operate a ________ network to connect its LANs and transmit data at more than 1
gigabit per second.

Select one:

a. mesh
b. node
c. backbone

d. local area
A hard-wired Internet connection through a LAN is called a(n) ________ connection.

Select one:

a. dedicated

b. indirect
c. complete

d. virtual

T1 and T3 connections are considered ________ connections.

Select one:

a. slow-speed
b. DSL

c. dial-up

d. direct
The rules for how data is exchanged between devices is known as a(n)

Select one:
a. procedure.
b. algorithm.
c. code.

d. protocol.
A ________ is a high-speed, high-end computer that shares data and other resources with client computers.

Select one:

a. server
b. PDA

c. super computer

d. client
Information from the Internet to the subscriber, called ________ traffic, sometimes approaches speeds similar
to a T1.

Select one:
a. asynchronous
b. upstream
c. upload

d. downstream
A voice message must be converted to a(n) ________ signal so it can be stored on a computer's hard drive.

Select one:

a. digital

b. Wi-Fi
c. hardcoded

d. analog
________ are hardware devices or software programs that direct messages as they travel between networks.

Select one:

a. Modems
b. Ports

c. Routers

d. Satellites
Using a PC to copy software or data from a server, is known as

Select one:
a. downloading.

b. uploading.

c. server sharing.
d. mirroring.
A ________ network is a tunnel through the Internet that uses encryption and other security measures to keep
out unauthorized users.

Select one:

a. virtual private

b. local area

c. mesh
d. peer-to-peer
MMORPGs are

Select one:

a. software standards for wireless technology.


b. a group of asynchronous communication methods.

c. circuit boards for enhanced handling of multimedia.


d. online role-playing games involving hundreds of thousands of players.
All of the following statements are true EXCEPT:

Select one:

a. Wireless networks are easier to install because they don't require drilling or digging.

b. Wireless networks are faster than wired networks.


c. Wireless networks use radio transmitters.

d. Wireless networks are convenient for people on the move.


Many phone companies offer ________, a technology for bringing broadband connections to homes and small
businesses by sharing the copper telephone lines that carry voice calls.

Select one:

a. wireless connections
b. satellite connections
c. DSL

d. cable modem connections


The primary difference between a LAN and a WAN is the

Select one:

a. variety of hardware devices.

b. speed.
c. number of hardware devices.

d. geographical area.
In the 1970s, Xerox developed ________, which continues to be a popular networking architecture.

Select one:
a. the Internet
b. Ethernet
c. Wi-Fi

d. extranet
The ________ encryption scheme improves the security of wireless networks.

Select one:

a. WEP
b. phishing

c. WPA

d. VPN
T3 connections transmit data at this speed:

Select one:

a. 1 Gbps.
b. 1.5 Mbps.

c. 1 Mbps.
d. 45 Mbps.
Asynchronous communication is when the sender and recipient

Select one:
a. do not use the same operating system.

b. do not have to be online at the same time.


c. directly connect to share files.
d. use different software but are able to communicate through the Internet.
________ is a hardware device that connects a computer to a telephone line.

Select one:
a. hub

b. router
c. modem

d. network card
All of the following are advantages of using a computer network EXCEPT that it

Select one:

a. promotes independence so users have exclusive control over their own data and applications.
b. increases communication and productivity.

c. increases efficiency when software is shared.

d. reduces costs by sharing hardware.


t the receiving end of a phone call, an analog signal must be converted back into a(n) ________ signal.
Select one:
a. direct

b. auditory
c. analog

d. digital
In a local area network, a ________ only transmits data to the destination node.
Select one:
a. hub
b. port
c. NIC
d. switch
A(n) ________ network is often used to set up a temporary communications system that requires no
centralized router.

Select one:
a. wide area

b. metropolitan area

c. mesh
d. local area
A ________ is a code embedded as a one-pixel graphics file in an email message which notifies the sender
that the message was opened.

Select one:

a. Web bug

b. virus
c. phish
d. cookie
A(n) ________ broadcasts messages to all devices connected to a LAN.

Select one:

a. hub

b. port

c. NIC

d. switch
A single fiber-optic cable can replace ________ copper telephone cables.
Select one:
a. 16,000
b. 30,000
c. 10,000
d. 20,000
A personal area network is possible because of the wireless technology known as

Select one:

a. FireWire.

b. Bluetooth.

c. PDA.
d. USB.
A(n) ________ uses radio waves to carry information at high speed.

Select one:

a. wireless connection
b. phone cable

c. fiber-optic cable

d. T1 connection
Networks that use electrical lines are sometimes called ________.

Select one:
a. twisted pair networks

b. electrical-line networks
c. power-line paired networks

d. power-line networks
A(n) ________ signal is represented by a continuous wave.

Select one:

a. digital
b. analog

c. network

d. bandwidth
The fastest Ethernet devices today follow the ________ standard.
Select one:
a. Gigabit Ethernet
b. Fast Ethernet
c. 100BASE-T
d. 10Base-T Ethernet
Wi-Fi refers to
Select one:
a. a drive on a laptop that connects to the Internet.

b. the bandwidth of the server to which a laptop connects.


c. wireless LAN connections.

d. a new connection which uses fiber-optic cables to connect a PC to the Internet.


________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or
eavesdropping.

Select one:

a. Bluetooth

b. VPN

c. WEP

d. Peer-to-peer
A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly connect to an
Ethernet network.

Select one:

a. router

b. cable
c. port

d. jack
When a business can legally copy software to all of the computers they own, the company has a ________
license.

Select one:

a. sharing
b. company
c. site

d. pirate
A worldwide public newsgroup available on the Internet is

Select one:

a. Blogger.

b. Usenet.
c. TCP/IP.

d. Listserv
A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web
site.

Select one:
a. spamming
b. phishing

c. MMORPG
d. VPN
Cables containing copper wires that resemble those in standard telephone cables are known as ________
cables.

Select one:

a. fiber-optic

b. twisted pair

c. coaxial

d. Wi-Fi
Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote
mail server.

Select one:
a. Listserv

b. groupware
c. POP
d. P2P
A ________ helps block unauthorized access to a computer.

Select one:
a. WEP

b. VPN

c. bridge
d. firewall
________ refers to the quantity of data that can be transmitted through a communication medium in a given
amount of time.

Select one:
a. Attenuation

b. Bandwidth

c. Ethernet
d. Megahertz
Broadband connections include all of the following EXCEPT:

Select one:
a. cable modems.

b. satellites.
c. telephone modems.
d. DSL.
If one attempts to send a message to an email address which does not exist, it will return to you, or ________.

Select one:

a. overload

b. bounce
c. backup

d. export

Das könnte Ihnen auch gefallen