Computer Concepts Module 10 Exam Flashcards
51 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Why would you want to connect your computer to a network?

to access shared resources

Devices on a _____ area network are connected via Bluetooth.

personal

Which of the following statements do opponents of net neutrality agree with?

  • Internet access is a basic human right.
  • ISPs should not impose data caps.
  • ISPs should charge more for high-bandwidth connections. (correct)
  • All internet traffic should be treated equally.
  • A router is a system of two or more devices linked by wires or cables.

    <p>False</p> Signup and view all the answers

    Which of the following is an authentication method to keep your data safe?

    <p>Fingerprint scanner</p> Signup and view all the answers

    What is one way hackers can trick you into transmitting personal data over a public network without your knowledge?

    <p>They disguise the network as an evil twin.</p> Signup and view all the answers

    In a _____ network, each device on the network is attached to a central server.

    <p>star</p> Signup and view all the answers

    Which of the following is a disadvantage of using cloud computing to share files?

    <p>The inability to access your files if you lose your Internet connection.</p> Signup and view all the answers

    What hardware is essential to creating a home Wi-Fi network?

    <p>router</p> Signup and view all the answers

    In a connected network, how are hubs and switches similar to one another?

    <p>They provide a central point for cables in a network.</p> Signup and view all the answers

    What does a DSL modem use to send and receive digital data?

    <p>Copper telephone wiring</p> Signup and view all the answers

    How does a wireless network key work with an encrypted wireless network?

    <p>The sending and receiving devices must know the wireless network key to communicate.</p> Signup and view all the answers

    A network administrator is usually not required on a _____ network.

    <p>peer-to-peer</p> Signup and view all the answers

    Computers communicating on a network must follow a _____ for exchanging information.

    <p>protocol</p> Signup and view all the answers

    What type of network sends signals through airwaves and usually does not require cables?

    <p>wireless network</p> Signup and view all the answers

    Which of the following would be considered a strong password?

    <p>Wbcm2!4!820!</p> Signup and view all the answers

    RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

    <p>False</p> Signup and view all the answers

    Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

    <p>My Verizon VPN</p> Signup and view all the answers

    Which of the following is true about broadband connections?

    <p>Broadband connections are 'always-on' with devices connected to them.</p> Signup and view all the answers

    Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

    <p>Bluetooth</p> Signup and view all the answers

    A modem can also function as what other piece of hardware?

    <p>router</p> Signup and view all the answers

    What would indicate that an email from your bank was actually a phishing attempt?

    <p>It contained typos and other grammatical errors.</p> Signup and view all the answers

    How is your friend able to turn on the indoor lights in her home using an app on her phone?

    <p>She has a home network with smart home devices.</p> Signup and view all the answers

    To protect confidential company information from hackers while at a work conference, which type of network should you use?

    <p>Virtual Private Network</p> Signup and view all the answers

    If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

    <p>Intranet</p> Signup and view all the answers

    Why is a cable modem classified as a digital model?

    <p>It sends and receives digital data over a digital line.</p> Signup and view all the answers

    4G and 5G networks provide slower data transmission speeds than 3G networks.

    <p>False</p> Signup and view all the answers

    What is an ISP?

    <p>A telecommunications company that sells Internet access.</p> Signup and view all the answers

    Wireless networks that are available in public places are known as Wi-Fi hotspots.

    <p>True</p> Signup and view all the answers

    Bandwidth is a term that describes the number of devices connected to a network.

    <p>False</p> Signup and view all the answers

    To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

    <p>firewall</p> Signup and view all the answers

    When it comes to secure data storage on a network, which of the following statements is true?

    <p>Roles can be granted to individuals to view files and make changes to files on a network.</p> Signup and view all the answers

    What does it indicate if a wireless network allows you to connect without entering a wireless network key?

    <p>The network connection is probably not secure.</p> Signup and view all the answers

    How can you send a report without worrying about someone else accessing it?

    <p>Encrypt the data in the report.</p> Signup and view all the answers

    Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses.

    <p>standards</p> Signup and view all the answers

    What is it called when someone attempts to befriend you online for the purpose of stealing confidential information?

    <p>Social engineering</p> Signup and view all the answers

    If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information.

    <p>False</p> Signup and view all the answers

    Which of the following is an example of a personal area network?

    <p>Smartwatch and phone connected via Bluetooth</p> Signup and view all the answers

    Which of the following could indicate a DoS attack on your company server?

    <p>Customers cannot view the website on their device because the page will not load.</p> Signup and view all the answers

    What is the U.S. Federal Communication Commission's role in regard to Internet access?

    <p>To release rules surrounding Internet access.</p> Signup and view all the answers

    Which of the following network standards applies to cellular networks?

    <p>LTE</p> Signup and view all the answers

    When describing a client/server network, which of the following would be considered a client?

    <p>Laptop</p> Signup and view all the answers

    What internal device does a computer use to connect to a wired or a wireless network?

    <p>Network Interface Card</p> Signup and view all the answers

    Which of the following statements is NOT true about a local firewall?

    <p>False</p> Signup and view all the answers

    What type of network should you use to allow outside vendors and suppliers to review current inventory records?

    <p>Extranet</p> Signup and view all the answers

    To access the Internet, a router must be connected to a _____.

    <p>modem</p> Signup and view all the answers

    If you upload photos to a NAS device, everyone on the network can access them.

    <p>True</p> Signup and view all the answers

    Which of the following describes an evil twin?

    <p>A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information.</p> Signup and view all the answers

    What can Keisha use to connect to the Internet if no wireless networks or Wi-Fi hotspots are available?

    <p>mobile hotspot</p> Signup and view all the answers

    What is a MAC address?

    <p>A unique hardware address for your device.</p> Signup and view all the answers

    Which of the following statements is true about public networks?

    <p>Public networks are often not secure.</p> Signup and view all the answers

    Study Notes

    Networking Basics

    • Connecting computers to a network allows access to shared resources.
    • A personal area network (PAN) connects devices via Bluetooth.
    • Star networks have devices connected to a central server that manages communication.

    Types of Networks

    • An intranet is used for internal communication within an organization.
    • Extranets allow external vendors to access specific organizational data.
    • Wireless networks provide connectivity without cables, utilizing airwaves.

    Internet Access and Modems

    • A DSL modem sends and receives data over copper telephone lines.
    • Cable modems function as digital modems, transmitting data over digital lines.

    Security and Authentication

    • Strong passwords like "Wbcm2!4!820!" enhance security.
    • Fingerprint scanners serve as an effective authentication method.
    • VPNs protect confidential data over public networks, especially in insecure environments.

    Potential Threats

    • Evil twin networks masquerade as legitimate Wi-Fi, capturing personal data.
    • Phishing attempts can be indicated by grammatical errors in communications.
    • Denial of Service (DoS) attacks may result in websites becoming inaccessible.

    Network Components

    • Routers are essential for creating a home Wi-Fi network and also can function as modems.
    • Network interface cards (NICs) allow computers to connect to wired or wireless networks.
    • Hubs and switches act as central points for connecting cables within a network.

    Network Protocols

    • Protocols dictate how devices communicate and the rules for data transmission.
    • Bluetooth is a protocol for short-range wireless communication.

    Data Management and Storage

    • Networks can be secured by setting specific user roles for file access and modifications.
    • NAS (Network Attached Storage) devices enable file sharing across a network.

    Regulations and Standards

    • The U.S. Federal Communications Commission regulates rules regarding Internet access.
    • LTE applies as a network standard for cellular communications.

    Security Practices

    • Firewalls serve as barriers to protect networks from external threats.
    • Public networks are often insecure, making it risky to transmit private information.

    Additional Concepts

    • A MAC address uniquely identifies each device on a network.
    • Smart home devices allow remote access and control through dedicated networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your understanding of key computer concepts with these flashcards designed for Module 10. Covering topics such as networking, devices, and net neutrality, this quiz will help reinforce your knowledge and prepare you for your exam.

    More Like This

    Computer Networking Week 1 Basics
    27 questions
    Computer Networking Week 4 Flashcards
    16 questions
    Computer Networking Basics Quiz
    24 questions
    Use Quizgecko on...
    Browser
    Browser