Computer Studies Chapter 8: Communications and Networks
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Communication systems can only transmit data through wireless connections.

False

The four basic elements of a communication system are sending and receiving devices, connection devices, communication channels, and data transmission specifications.

True

Coaxial cables are a type of wireless connection.

False

DSL modems use a telephone line and users cannot make outgoing calls or receive incoming calls while online.

<p>False</p> Signup and view all the answers

Wireless modems are used for portable high-speed connectivity.

<p>True</p> Signup and view all the answers

Protocols are not necessary for data transmission to be successful.

<p>False</p> Signup and view all the answers

HTTP is a secure protocol used for transferring data over the web.

<p>False</p> Signup and view all the answers

Satellite is a type of physical connection.

<p>False</p> Signup and view all the answers

HTTPS is used to protect the transfer of non-sensitive information.

<p>False</p> Signup and view all the answers

TCP/IP is used to identify sending and receiving devices and break information into small parts.

<p>True</p> Signup and view all the answers

A node is a device that is not connected to a network.

<p>False</p> Signup and view all the answers

A client is a node that shares resources with other nodes.

<p>False</p> Signup and view all the answers

A server is a node that requests resources from other nodes.

<p>False</p> Signup and view all the answers

There are four privacy issues in terms of data collection and use.

<p>False</p> Signup and view all the answers

A router is a central node that coordinates the flow of data.

<p>False</p> Signup and view all the answers

Private Networks can monitor employee email and computer files using special software.

<p>True</p> Signup and view all the answers

A WAN is a network that connects devices in the same building.

<p>False</p> Signup and view all the answers

History files include the contents of the websites you have recently visited.

<p>False</p> Signup and view all the answers

A Star topology is a type of network where each device is connected to a common cable called a bus or backbone.

<p>False</p> Signup and view all the answers

Temporary Internet Files are deleted when you close your browser.

<p>False</p> Signup and view all the answers

Web bugs are visible images or HTML code hidden within a web page or e-mail message.

<p>False</p> Signup and view all the answers

Spyware is a type of program that blocks unwanted advertisements on the internet.

<p>False</p> Signup and view all the answers

Keystroke loggers are a type of spyware that records your browsing history.

<p>False</p> Signup and view all the answers

Reading user agreements can help defend against spyware.

<p>True</p> Signup and view all the answers

A cracker is someone who creates and distributes beneficial programs to protect computer systems.

<p>False</p> Signup and view all the answers

Cybercrime involves the use of a computer and a network.

<p>True</p> Signup and view all the answers

Identity theft is only used to gain access to personal information.

<p>False</p> Signup and view all the answers

Computer security is only concerned with keeping hardware safe.

<p>False</p> Signup and view all the answers

Plagiarism is the act of giving credit to the original source of an idea.

<p>False</p> Signup and view all the answers

Malicious programs include viruses, worms, and Trojan horses.

<p>True</p> Signup and view all the answers

Cyberbullying is only done using the Internet.

<p>False</p> Signup and view all the answers

Computer ethics are guidelines for the illegal use of computers in our society.

<p>False</p> Signup and view all the answers

The Turnitin service is used to detect grammar mistakes in a paper or report.

<p>False</p> Signup and view all the answers

Systems analysis and design is a four-phase problem-solving procedure.

<p>False</p> Signup and view all the answers

The systems life cycle has five phases.

<p>False</p> Signup and view all the answers

Systems maintenance is the final phase of the systems life cycle.

<p>True</p> Signup and view all the answers

A system is a collection of activities and elements organized to accomplish a random goal.

<p>False</p> Signup and view all the answers

Systems analysts are computer professionals who conduct systems implementation.

<p>False</p> Signup and view all the answers

Preliminary investigation is the third phase of the systems life cycle.

<p>False</p> Signup and view all the answers

System design is the phase where new hardware and software are acquired, developed, and tested.

<p>False</p> Signup and view all the answers

More Like This

Computer Networks and Communication Systems
20 questions
IoT Communication Architecture
28 questions
Computer Network Architecture Quiz
40 questions
Use Quizgecko on...
Browser
Browser