Podcast
Questions and Answers
Communication systems can only transmit data through wireless connections.
Communication systems can only transmit data through wireless connections.
False (B)
The four basic elements of a communication system are sending and receiving devices, connection devices, communication channels, and data transmission specifications.
The four basic elements of a communication system are sending and receiving devices, connection devices, communication channels, and data transmission specifications.
True (A)
Coaxial cables are a type of wireless connection.
Coaxial cables are a type of wireless connection.
False (B)
DSL modems use a telephone line and users cannot make outgoing calls or receive incoming calls while online.
DSL modems use a telephone line and users cannot make outgoing calls or receive incoming calls while online.
Wireless modems are used for portable high-speed connectivity.
Wireless modems are used for portable high-speed connectivity.
Protocols are not necessary for data transmission to be successful.
Protocols are not necessary for data transmission to be successful.
HTTP is a secure protocol used for transferring data over the web.
HTTP is a secure protocol used for transferring data over the web.
Satellite is a type of physical connection.
Satellite is a type of physical connection.
HTTPS is used to protect the transfer of non-sensitive information.
HTTPS is used to protect the transfer of non-sensitive information.
TCP/IP is used to identify sending and receiving devices and break information into small parts.
TCP/IP is used to identify sending and receiving devices and break information into small parts.
A node is a device that is not connected to a network.
A node is a device that is not connected to a network.
A client is a node that shares resources with other nodes.
A client is a node that shares resources with other nodes.
A server is a node that requests resources from other nodes.
A server is a node that requests resources from other nodes.
There are four privacy issues in terms of data collection and use.
There are four privacy issues in terms of data collection and use.
A router is a central node that coordinates the flow of data.
A router is a central node that coordinates the flow of data.
Private Networks can monitor employee email and computer files using special software.
Private Networks can monitor employee email and computer files using special software.
A WAN is a network that connects devices in the same building.
A WAN is a network that connects devices in the same building.
History files include the contents of the websites you have recently visited.
History files include the contents of the websites you have recently visited.
A Star topology is a type of network where each device is connected to a common cable called a bus or backbone.
A Star topology is a type of network where each device is connected to a common cable called a bus or backbone.
Temporary Internet Files are deleted when you close your browser.
Temporary Internet Files are deleted when you close your browser.
Web bugs are visible images or HTML code hidden within a web page or e-mail message.
Web bugs are visible images or HTML code hidden within a web page or e-mail message.
Spyware is a type of program that blocks unwanted advertisements on the internet.
Spyware is a type of program that blocks unwanted advertisements on the internet.
Keystroke loggers are a type of spyware that records your browsing history.
Keystroke loggers are a type of spyware that records your browsing history.
Reading user agreements can help defend against spyware.
Reading user agreements can help defend against spyware.
A cracker is someone who creates and distributes beneficial programs to protect computer systems.
A cracker is someone who creates and distributes beneficial programs to protect computer systems.
Cybercrime involves the use of a computer and a network.
Cybercrime involves the use of a computer and a network.
Identity theft is only used to gain access to personal information.
Identity theft is only used to gain access to personal information.
Computer security is only concerned with keeping hardware safe.
Computer security is only concerned with keeping hardware safe.
Plagiarism is the act of giving credit to the original source of an idea.
Plagiarism is the act of giving credit to the original source of an idea.
Malicious programs include viruses, worms, and Trojan horses.
Malicious programs include viruses, worms, and Trojan horses.
Cyberbullying is only done using the Internet.
Cyberbullying is only done using the Internet.
Computer ethics are guidelines for the illegal use of computers in our society.
Computer ethics are guidelines for the illegal use of computers in our society.
The Turnitin service is used to detect grammar mistakes in a paper or report.
The Turnitin service is used to detect grammar mistakes in a paper or report.
Systems analysis and design is a four-phase problem-solving procedure.
Systems analysis and design is a four-phase problem-solving procedure.
The systems life cycle has five phases.
The systems life cycle has five phases.
Systems maintenance is the final phase of the systems life cycle.
Systems maintenance is the final phase of the systems life cycle.
A system is a collection of activities and elements organized to accomplish a random goal.
A system is a collection of activities and elements organized to accomplish a random goal.
Systems analysts are computer professionals who conduct systems implementation.
Systems analysts are computer professionals who conduct systems implementation.
Preliminary investigation is the third phase of the systems life cycle.
Preliminary investigation is the third phase of the systems life cycle.
System design is the phase where new hardware and software are acquired, developed, and tested.
System design is the phase where new hardware and software are acquired, developed, and tested.