Podcast
Questions and Answers
Communication systems can only transmit data through wireless connections.
Communication systems can only transmit data through wireless connections.
False
The four basic elements of a communication system are sending and receiving devices, connection devices, communication channels, and data transmission specifications.
The four basic elements of a communication system are sending and receiving devices, connection devices, communication channels, and data transmission specifications.
True
Coaxial cables are a type of wireless connection.
Coaxial cables are a type of wireless connection.
False
DSL modems use a telephone line and users cannot make outgoing calls or receive incoming calls while online.
DSL modems use a telephone line and users cannot make outgoing calls or receive incoming calls while online.
Signup and view all the answers
Wireless modems are used for portable high-speed connectivity.
Wireless modems are used for portable high-speed connectivity.
Signup and view all the answers
Protocols are not necessary for data transmission to be successful.
Protocols are not necessary for data transmission to be successful.
Signup and view all the answers
HTTP is a secure protocol used for transferring data over the web.
HTTP is a secure protocol used for transferring data over the web.
Signup and view all the answers
Satellite is a type of physical connection.
Satellite is a type of physical connection.
Signup and view all the answers
HTTPS is used to protect the transfer of non-sensitive information.
HTTPS is used to protect the transfer of non-sensitive information.
Signup and view all the answers
TCP/IP is used to identify sending and receiving devices and break information into small parts.
TCP/IP is used to identify sending and receiving devices and break information into small parts.
Signup and view all the answers
A node is a device that is not connected to a network.
A node is a device that is not connected to a network.
Signup and view all the answers
A client is a node that shares resources with other nodes.
A client is a node that shares resources with other nodes.
Signup and view all the answers
A server is a node that requests resources from other nodes.
A server is a node that requests resources from other nodes.
Signup and view all the answers
There are four privacy issues in terms of data collection and use.
There are four privacy issues in terms of data collection and use.
Signup and view all the answers
A router is a central node that coordinates the flow of data.
A router is a central node that coordinates the flow of data.
Signup and view all the answers
Private Networks can monitor employee email and computer files using special software.
Private Networks can monitor employee email and computer files using special software.
Signup and view all the answers
A WAN is a network that connects devices in the same building.
A WAN is a network that connects devices in the same building.
Signup and view all the answers
History files include the contents of the websites you have recently visited.
History files include the contents of the websites you have recently visited.
Signup and view all the answers
A Star topology is a type of network where each device is connected to a common cable called a bus or backbone.
A Star topology is a type of network where each device is connected to a common cable called a bus or backbone.
Signup and view all the answers
Temporary Internet Files are deleted when you close your browser.
Temporary Internet Files are deleted when you close your browser.
Signup and view all the answers
Web bugs are visible images or HTML code hidden within a web page or e-mail message.
Web bugs are visible images or HTML code hidden within a web page or e-mail message.
Signup and view all the answers
Spyware is a type of program that blocks unwanted advertisements on the internet.
Spyware is a type of program that blocks unwanted advertisements on the internet.
Signup and view all the answers
Keystroke loggers are a type of spyware that records your browsing history.
Keystroke loggers are a type of spyware that records your browsing history.
Signup and view all the answers
Reading user agreements can help defend against spyware.
Reading user agreements can help defend against spyware.
Signup and view all the answers
A cracker is someone who creates and distributes beneficial programs to protect computer systems.
A cracker is someone who creates and distributes beneficial programs to protect computer systems.
Signup and view all the answers
Cybercrime involves the use of a computer and a network.
Cybercrime involves the use of a computer and a network.
Signup and view all the answers
Identity theft is only used to gain access to personal information.
Identity theft is only used to gain access to personal information.
Signup and view all the answers
Computer security is only concerned with keeping hardware safe.
Computer security is only concerned with keeping hardware safe.
Signup and view all the answers
Plagiarism is the act of giving credit to the original source of an idea.
Plagiarism is the act of giving credit to the original source of an idea.
Signup and view all the answers
Malicious programs include viruses, worms, and Trojan horses.
Malicious programs include viruses, worms, and Trojan horses.
Signup and view all the answers
Cyberbullying is only done using the Internet.
Cyberbullying is only done using the Internet.
Signup and view all the answers
Computer ethics are guidelines for the illegal use of computers in our society.
Computer ethics are guidelines for the illegal use of computers in our society.
Signup and view all the answers
The Turnitin service is used to detect grammar mistakes in a paper or report.
The Turnitin service is used to detect grammar mistakes in a paper or report.
Signup and view all the answers
Systems analysis and design is a four-phase problem-solving procedure.
Systems analysis and design is a four-phase problem-solving procedure.
Signup and view all the answers
The systems life cycle has five phases.
The systems life cycle has five phases.
Signup and view all the answers
Systems maintenance is the final phase of the systems life cycle.
Systems maintenance is the final phase of the systems life cycle.
Signup and view all the answers
A system is a collection of activities and elements organized to accomplish a random goal.
A system is a collection of activities and elements organized to accomplish a random goal.
Signup and view all the answers
Systems analysts are computer professionals who conduct systems implementation.
Systems analysts are computer professionals who conduct systems implementation.
Signup and view all the answers
Preliminary investigation is the third phase of the systems life cycle.
Preliminary investigation is the third phase of the systems life cycle.
Signup and view all the answers
System design is the phase where new hardware and software are acquired, developed, and tested.
System design is the phase where new hardware and software are acquired, developed, and tested.
Signup and view all the answers