Full Download Using Information Technology 10th Edition Williams Test Bank All Chapter 2024 PDF
Full Download Using Information Technology 10th Edition Williams Test Bank All Chapter 2024 PDF
Full Download Using Information Technology 10th Edition Williams Test Bank All Chapter 2024 PDF
https://testbankfan.com/product/using-information-
technology-10th-edition-williams-solutions-manual/
https://testbankfan.com/product/using-information-
technology-11th-edition-williams-test-bank/
https://testbankfan.com/product/mgmt-10th-edition-williams-test-
bank/
https://testbankfan.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/
Information Technology Auditing 4th Edition Hall Test
Bank
https://testbankfan.com/product/information-technology-
auditing-4th-edition-hall-test-bank/
https://testbankfan.com/product/managing-information-
technology-7th-edition-brown-test-bank/
https://testbankfan.com/product/using-financial-accounting-
information-the-alternative-to-debits-and-credits-10th-edition-
porter-test-bank/
https://testbankfan.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/
https://testbankfan.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog
6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer
11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet
16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node
19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge
6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall
22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router
24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet
28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN
6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)
40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb
6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer
53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers
55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics
56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics
57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key
62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False
6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False
67. Capturing music digitally means that one has an exact duplicate of the music.
True False
68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False
71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False
72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False
6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False
74. "File server" and "database server" are different names for the same type of server.
True False
75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False
76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False
79. An interface device used to connect the same types of networks is called a node.
True False
80. The backbone is the main communications route in a bus network topology.
True False
6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False
82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False
83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False
84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False
86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False
87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False
88. The two general classes of bandwidth are long and short.
True False
6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False
91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False
6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False
97. Communications satellites are microwave relay stations in orbit around the earth.
True False
98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False
99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False
100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False
101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False
6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False
106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False
108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False
6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World
112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False
113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False
116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False
117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False
118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False
6-20
Another random document with
no related content on Scribd:
High Frequency Sound Projector is merely a device for producing,
focussing and projecting supersonic vibrations, or waves which are
similar to sound, but have enormously greater frequencies. No doubt
you know that vibrations which are audible to the human ear range
from 24 per second to about 40,000 per second. My device develops
frequencies as high as a million vibrations per second."
"Did you originate the idea?" Verger asked.
"Indeed not," Anderson hastened to state. "All I did was to carry on
the work of other scientists. Early in the Twentieth Century, during
the so-called 'World War,' supersonics were used to detect the
presence of hostile submarines. While these high-frequency sound-
waves were being employed for this purpose, thousands of dead
fishes were found floating on the surface of the ocean. It was
suggested that these fishes might have been killed by the supersonic
vibrations, and this assumption was subsequently verified by
laboratory experiments."
"And is that what your dohickey is for—just to kill fishes?" Verger
asked.
"It ought to do a great deal more than that," Anderson smiled. "The
supersonics which killed small fishes had relatively low frequencies
—only about 50,000 vibrations per second. My device develops
frequencies of over a million vibrations per second."
"Does that mean that your gimmick will kill larger animals?"
The scientist answered, "I haven't tested it yet. But, reasoning by
analogy, I believe it would be absolutely fatal to any larger animal,
such as a human being, an elephant, or—"
"Or one of those Callisto devils!" the captain exclaimed. "Jumping
Jupiter! Maybe you've got something there, Professor! No weapon
that has been tried so far has been able to stop one of those babies;
but perhaps your supersonic thing-a-ma-gig will do the trick!"
"That is a possibility," Anderson agreed. "However, since we have
only one Super-Sonic Projector, I'm afraid we cannot wage a
successful war against the entire population of Callisto."
"Not very well," Verger had to admit. "Nevertheless, I still have a
hunch that your little dohickey is going to enable us to make our
getaway."
CHAPTER V
The Dying Tentacle
Half an hour later, Verger, Anderson, and LeDoux stole forth from the
rocket-ship. Each of the men had a box-shaped object strapped on
his back. All three of them carried coils of insulated wire, which they
unwound as they advanced.
When they were about a mile from the Goddard, Anderson removed
the burden from his back and opened the package. It was a small
but remarkably efficient phonograph, which was equipped with a
powerful loud speaker and a device for automatically changing
records.
After Professor Anderson had attached one of the wires to the
phonograph and had adjusted the mechanism, he covered it with
vines. Then they walked for approximately another mile in a direction
which took them away from the space-ship at a slightly different
angle. At this point, which happened to be in the midst of a thicket,
they unpacked the second phonograph and connected it up to one of
the insulated wires. The third phonograph was similarly installed and
camouflaged at a point about three miles distant from the Goddard.
Guided by the wires, the three Earthmen tramped back to the space-
ship. They had scarcely reached their destination when ghostly
tongues of magenta, orange and lavender began to flame above the
distant horizon, giving warning of the impending dawn of Jupiter.
"Hurry, fellows," Captain Verger cried. "Al, will you please wake up
the ladies? Tell them we're going for a little hike and that each one of
them must bring her own instrument. Professor, will you please get
your ultra-sound device? I'll carry the storage batteries."
"What's the idea?" LeDoux demanded.
"I'll tell you later. Time's a-wasting, so let's get going!"
A few moments later he was leading the entire party toward a thickly
wooded forest which was about two hundred meters distant, on the
opposite side of the space-ship from the places where the
phonographs had been concealed.
In accordance with Verger's instructions, LeDoux carried the three
coils of wire, unwinding them as he advanced.
When they had penetrated the woods far enough to be completely
concealed, the captain called a halt and proceeded to elucidate his
peculiar orders.
"This is just a little game of hide and seek," he explained. "All you
have to do is keep out of sight and notice what happens."
Peeping through the spongy foliage at the edge of the forest, he
watched the slug-men as they emerged from their homes and
flocked toward the space-ship. He waited until twenty or thirty of
them had entered the Goddard and had subsequently poured out
again, rushing about in apparent excitement. Then he connected one
of the wires to the storage battery.
From the distant loud-speaker came the faint but unmistakable
sounds of a brass band playing a stirring march in six-eight time. The
slug-men must have heard it, for they all stopped and turned their
heads in the direction of the concealed phonograph.
For an instant they hesitated; then, like rats following the Pied Piper,
they all trooped after the mysterious music, which they obviously
assumed was being produced by the band of Earth-Folk.
Verger glanced at his wrist-watch, estimating the amount of time
which the Callisto natives would require to reach the first
phonograph. Then he disconnected the wires, waited a while, and
switched the current to the second phonograph. In a similar manner
he timed the intervening interval before connecting the third
phonograph to the battery.
Having thus tricked the enemy into a wild goose chase, Captain
Verger herded his party back toward the space-ship.
"Don't go in yet, ladies," he ordered. Then to Anderson he said,
"Let's see what your supersonic dohickey will do to that tentacle
thing that's holding our ship down."
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.