Computer Networks Overview
53 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of computer networks?

  • To reduce the need for hardware
  • To enhance security measures
  • To provide entertainment options
  • To enable devices to communicate and share resources (correct)
  • Which of the following is NOT a common type of computer network?

  • WAN
  • DMZ (correct)
  • PAN
  • LAN
  • What does the term RJ-45 refer to?

  • An RF connector for coaxial cables
  • A type of wireless connector
  • A 4-wire telephone connector
  • An 8-pin modular connector used in networking (correct)
  • The invention of the internet is generally traced back to

    <p>1969</p> Signup and view all the answers

    Which type of connector is primarily used for telephone equipment?

    <p>RJ-11</p> Signup and view all the answers

    Which type of fiber optic connector is designed to compete with the SC connector?

    <p>LC Connector</p> Signup and view all the answers

    What is the role of a modem in a computer network?

    <p>To modulate and demodulate signals for internet access</p> Signup and view all the answers

    Which connector is used for analog and digital video transmissions?

    <p>BNC Connector</p> Signup and view all the answers

    What distinguishes the ST Connector from other fiber optic connectors?

    <p>It has a half-twist bayonet type lock</p> Signup and view all the answers

    What is the primary function of a network switch?

    <p>To connect network segments and reduce collisions</p> Signup and view all the answers

    Which device is passive and cannot take routing decisions?

    <p>Hub</p> Signup and view all the answers

    Which of the following network types is most suitable for connecting devices within a single room or very short range?

    <p>PAN</p> Signup and view all the answers

    Which of these network types typically covers the largest geographic area?

    <p>WAN</p> Signup and view all the answers

    What is the function of network protocols in computer networks?

    <p>They define rules and conventions for data exchange.</p> Signup and view all the answers

    In a hospital setting with national and international connections, which type of network would best describe the system?

    <p>WAN</p> Signup and view all the answers

    Which network service allows remote users to connect to a network, enabling access from different locations?

    <p>Access Services</p> Signup and view all the answers

    A smart city infrastructure network that connects systems within an entire city would be best categorized as which type of network?

    <p>MAN</p> Signup and view all the answers

    Which protocol is primarily responsible for data packet transmission over the internet?

    <p>TCP/IP</p> Signup and view all the answers

    Which of the following is an example of a network service that was one of the earliest uses of networks?

    <p>File and Print Services</p> Signup and view all the answers

    What type of network is most likely in place at a small coffee shop offering free Wi-Fi to its customers?

    <p>LAN</p> Signup and view all the answers

    Why might millennials prefer social media platforms over traditional media for news?

    <p>They value on-demand and personalized news that can be accessed anytime.</p> Signup and view all the answers

    What is the primary function of Bookmarking Sites?

    <p>To allow users to save and easily access preferred sites or content</p> Signup and view all the answers

    Which statement is true about millennials' lifestyle as described in the text?

    <p>Millennials value technology and autonomy in their fast-paced lifestyle.</p> Signup and view all the answers

    What distinguishes Microblogging Websites from other forms of social media?

    <p>They allow users to post brief thoughts or events, similar to texting.</p> Signup and view all the answers

    Which of the following social media types is specifically described as a "more casual form of social media" focused on socializing?

    <p>Social Networking Sites</p> Signup and view all the answers

    Which of the following best describes Forums and Message Boards?

    <p>Platforms where visitors share opinions, provide help, and discuss topics.</p> Signup and view all the answers

    What does the Electronic Commerce Act of 2000 require for electronic documents to be legally valid?

    <p>They must be reliable, unaltered, and complete</p> Signup and view all the answers

    Under the Electronic Commerce Act, hacking is defined as unauthorized access, including the introduction of computer viruses. What is the penalty range for this offense?

    <p>A fine between PHP 100,000 and a maximum based on the damage, and 6 months to 3 years of imprisonment</p> Signup and view all the answers

    According to the Electronic Commerce Act of 2000, which of the following is not a recognized electronic transaction document?

    <p>Physical paper contracts</p> Signup and view all the answers

    What is one of the primary goals of the Electronic Commerce Act of 2000 in the Philippines?

    <p>To facilitate an information-friendly environment for ICT development</p> Signup and view all the answers

    By what date did the Electronic Commerce Act of 2000 mandate that the Philippine government should be capable of conducting e-commerce? (8 points)

    <p>June 19, 2000</p> Signup and view all the answers

    Which provision of the Electronic Commerce Act of 2000 aims to connect all government offices to the internet and ensure public access?

    <p>RPWeb (Section 28)</p> Signup and view all the answers

    What role does the private sector play under the Electronic Commerce Act of 2000?

    <p>Leading ICT investments and promoting technology transfer</p> Signup and view all the answers

    Why is staying updated with emerging trends in IT considered crucial?

    <p>All of the above</p> Signup and view all the answers

    Technologies enabling machines to perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation.

    <p>AI and ML</p> Signup and view all the answers

    Delivery of services (servers, storage, databases, etc.) over the internet.

    <p>Cloud Computing</p> Signup and view all the answers

    Processing data near its source rather than in a centralized data center, reducing latency and bandwidth costs.

    <p>Edge Computing</p> Signup and view all the answers

    What is the primary purpose of the Data Privacy Act of 2012?

    <p>To ensure personal information is secured and protected in ICT systems</p> Signup and view all the answers

    Which organization was established by the Data Privacy Act of 2012?

    <p>National Privacy Commission</p> Signup and view all the answers

    What type of information is considered "sensitive personal information" under the Act?

    <p>Race, ethnicity, and political affiliations</p> Signup and view all the answers

    What is a fundamental requirement for the processing of personal information as per the Act?

    <p>Consent of the data subject</p> Signup and view all the answers

    What is the maximum monetary penalty for unauthorized data processing under the Act?

    <p>5 million pesos</p> Signup and view all the answers

    What are data controllers required to do to protect personal information?

    <p>Implement reasonable security measures</p> Signup and view all the answers

    Which of the following is a right granted to data subjects under the Data Privacy Act?

    <p>The right to access and rectify their personal information</p> Signup and view all the answers

    What is the primary purpose of the Cybercrime Prevention Act of 2012?

    <p>To combat and penalize online offenses</p> Signup and view all the answers

    What type of cybercrime is defined as gaining unauthorized access to computer systems?

    <p>Illegal Access</p> Signup and view all the answers

    What penalty is imposed on offenses affecting three or more individuals collectively?

    <p>A fine exceeding Php 1,000,000 but not more than Php 2,000,000</p> Signup and view all the answers

    Which is NOT an offense listed under the Cybercrime Prevention Act?

    <p>Data Interference</p> Signup and view all the answers

    What preventive measures are encouraged by the Cybercrime Prevention Act?

    <p>Creating complex passwords</p> Signup and view all the answers

    Which of the following is considered a content-related offense under the Act?

    <p>Child Pornography</p> Signup and view all the answers

    Which agency houses the Cybercrime Division that helps enforce the Act?

    <p>Philippine National Police (PNP)</p> Signup and view all the answers

    Which Philippine government agency is responsible for investigating cybercrimes?

    <p>National Bureau of Investigation (NBI)</p> Signup and view all the answers

    What is the minimum penalty for cybersex-related offenses under the Act?

    <p>Php 50,000</p> Signup and view all the answers

    Study Notes

    Computer Networks

    • Computer networks enhance communication and resource sharing among devices.
    • Common network types include LAN, WAN, PAN, and MAN.
    • RJ-45 is an 8-pin modular connector often used in networking.
    • The invention of the internet is largely attributed to 1969.
    • WAN (Wide Area Network) covers large geographical areas.
    • Network protocols define rules for data exchange.
    • Hospital networks, spanning nationwide and internationally, are typically classified as WANs.
    • File and print services allow remote access for sharing resources.
    • RJ-11 is a connector primarily used for telephone equipment.
    • Fiber optic connectors like the SC connector have counterparts like the MTRJ and LC connectors.
    • Modems modulate and demodulate signals for internet access.
    • BNC connectors are used for analog and digital video transmissions.
    • ST fiber optic connectors are distinguished by their push-pull design.
    • Network switches connect network segments and minimize data collisions.
    • Network hubs are passive devices that cannot route data.
    • PAN (Personal Area Network) is suitable for connecting devices within a limited area.

    Social Media and the Internet

    • Millennials prefer the personalization and on-demand nature of social media for news.
    • Bookmarking sites help users save and access preferred content.
    • Millennials generally value technology and autonomy in their lives.
    • Microblogging sites are for brief thoughts and updates, similar to texting.
    • Forums and message boards are for collaborative discussions and assistance.
    • Social media's ease of access and user-friendliness are advantages.

    Electronic Commerce Act and Cybercrime

    • Unauthorized access, including viruses, is considered hacking.
    • Penalties for hacking vary, commonly including fines and imprisonment.
    • The Electronic Commerce Act aims to facilitate and regulate e-commerce transactions.
    • Electronic documents are recognized as valid transactions under the act.
    • The act mandates government readiness for conducting electronic commerce.
    • The Electronic Commerce Act of 2000 covers government office connectivity and ensures public access.
    • The private sector is vital for technology development and promotion.
    • Electronic documents are legally valid with proper procedures.
    • The Data Privacy Act of 2012 protects personal information in ICT systems.
    • Sensitive personal information includes details like race, ethnicity and political affiliations.
    • Data controllers are responsible for implementing reasonable security measures with respect to data protection.
    • The Cybercrime Prevention Act aims to address online offenses.
    • The Act outlines offenses such as illegal access, data forgery, and spam, with varying penalties.
    • Government agencies, including the Philippine National Police (PNP), play a vital role in enforcing the act.
    • The Act encourages preventive measures to counter cybercrime.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Endterm Exam Questions Bank PDF

    Description

    This quiz covers fundamental concepts of computer networks, including types such as LAN, WAN, and their components like RJ-45 connectors. Test your knowledge on protocols, connectors, and the history of the internet from its inception in 1969. Understanding these elements is crucial for effective communication and resource sharing in modern networks.

    More Like This

    Use Quizgecko on...
    Browser
    Browser