COSC Final

  1. True/False:
    The public nature of the internet has lessened privacy issues.
    False
  2. True/False:
    Online retailers use cookies to implement "shopping carts."
    True
  3. What is not a technique you can effectively use to reduce the amount of unauthorized e-mail on your computer?
    Reply to SPAM and ask to be removed from the mailing list.
  4. ______ is the field that pertains to legal evidence found in computers and digital storage media.
    Computer Forensics
  5. True/False:
    A globally unique identifier (GUID) is an identification number that is generated by a hardware componenet or a program.
    True
  6. True/False:
    Companies such a uLocate and BrickHouse can us the GPS in your cell phone to determine your location.
    True
  7. As of the week ending June 6, 2010 ______ was the top spam relaying country.
    India
  8. True/False:
    Ubiquitous computing is defined as individuals interacting with one computer at a time.
    False
  9. True/False:
    FERPA establishes standards for the transmission of electronic health care information
    False
  10. This type of software collects your personal info, monitors your web surfing habits, and distributes this info to a third party.
    Spyware
  11. An individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information is known as _____.
    privacy
  12. True/False:
    A backdoor is a vulnerability that could enable someone to crack an encryption code.
    True
  13. Complaints of Web crimes rose with an increase of _____ percent between 2008 and 2009.
    22.3
  14. True/False:
    In a DDoS attack, the commandeered computers are called zombies and the individual computers are called botnets.
    False
  15. True/False:
    The FTC and Department of Justice have primary jurisdiction over spammers.
    True
  16. True/False:
    A digital signature guarantees that a message has NOT been tampered with.
    True
  17. Which of the following is NOT a technology that threatens online anonymity?
    Phreaking
  18. An emerging trend where individuals interact with multiple networked devices that are often embedded in everyday objects is called ______.
    ubiquitous computing
  19. True/False:
    Spear phishing targets specific people.
    True
  20. In the European Union, a basic human rights declaration grants citizens all of the following privacy rights Except the right to ___________.
    be informed of the sale  of personal information from one marketing company to another.
  21. Which of the following is the best definition of a cookie?
    It is a plain text file written to your hard disk by a Web site you visit.
  22. The new emerging legal field that tracks and combats computer-related crimes is called ______.
    cyberlaw
  23. Which of the following security measures on home and portable devices will deter unauthorized access to a person's account?
    All of the above
  24. True/False:
    Before is is encrypted, a readable message is known as ciphertext.
    False
  25. True/False:
    All new cell phones in the United States must have GPS awareness.
    True
  26. Which of the following is the path through which messages are sent from one location to another?
    ???????
  27. Wire technologies are __________.
    connected by a physical medium
  28. Which of the following statements is NOT true about the public witched telephone network (PTSN)?
    PTSN is exclusively an analog network.
  29. Bluetooth is a _______ radio transmission technology.
    Short-range
  30. ISDN is an abbreviation for which of the following terms?
    Integrated services digital network
  31. Which of the following transmission media has the lowest transfer rate?
    ???????
  32. What is the transfer rate of  fiber-optic cable?
    10 Gbps
  33. _______ sends more than one call over a single line.
    Multiplexing
  34. The word modem is a combination of which of the following words?
    Modulate and demodulate
  35. Which of the following wireless communication medium transmits data via beams of light sent through the air?
    Infrared
  36. Which of the following is not true about baud?
    is it the rate at which two modems can exchange data.
  37. Which of the following types of port is used by an infrared mouse?
    IrDA
  38. An ADC is simply a _______ that has the circuitry to convert an analog signal into a digital signal.
    microchip
  39. Bandwidth refers to _________.
    the amount of data that can be transmitted through a communications channel
  40. True/False:
    MMDS is an abbreviation for multichannel multipoint distribution services
    True
  41. True/False:
    IrDA stands for Infrared Data Association.
    True
  42. True/False:
    Twisted pair is used for telephones.
    True
  43. True/False:
    Category 6 twisted pair cable is backward compatible with Cat-5e but not Cat-5.
    False
  44. True/False:
    Fiber-optic cable can carry more data without loss of signal for longer distances than coaxial cable/
    True
  45. True/False:
    Unlike most other forms of DSL, HDSL is not a typical consumer service.
    True
  46. True/False:
    Digitization is the transformation of data into digital format.
    True
  47. True/False:
    VoiP is too complex to be installed and configured by a novice user.
    False
  48. True/False:
    A fax modem and a fax machine are the same thing.
    False
  49. True/False:
    Text messaging is similar to using your phone for instant messaging.
    True
  50. True/False:
    Location awareness technology is available through cell phones.
    True
  51. Which of the following is not a disadvantage of networks?
    Sharing important information
  52. A local area network (LAN) in which all the computers are equals is called a _______ network.
    peer-to-peer
  53. Which of the following protocols use Ethernet?
    CSMA/CD
  54. Contention sometimes results in _______.
    Collisions
  55. In a _______ topology, the network nodes are connected to a central hub or switch.
    star
  56. Which of the following types of networks require an access point?
    WiFi
  57. A VPN operates as a private network over which larger type of network?
    Internet
  58. Which of the following is not a network communications device?
    LAN
  59. Each node on a network has a unique logical address, which is __________.
    assigned by the software in use
  60. The term network topology refers to the __________.
    physical layout of a local area network
  61. When a computer is connected to a network, it is called a ________.
    node
  62. Another term for a network administrator is a network ___________.
    engineer
  63. Which of the following is not a function of communication devices?
    Encryption
  64. How do most wireless LANs ensure security with radio transmission?
    by using a random series of frequencies
  65. A _______ is a simple broadcast device that does not mange traffic ad usually results in frequent collisions.
    hub
  66. Which of the following is the largest wide area network?
    Internet
  67. True/False:
    External WiFi transceivers connect through USB connections.
    True
  68. True/False:
    Network administrators support computer networks.
    True
  69. True/False:
    A wireless access point is commonly used as a bridge between a wireless and a wired network.
    True
  70. True/False:
    A disadvantage of networking is loss of autonomy.
    True
  71. True/False:
    An advantage of networking is fewer security threats.
    False
  72. True/False:
    VPN is the acronym for Virtual Public Network.
    False
  73. True/False:
    An advantage of networking is centralized data management.
    True
  74. True/False:
    In a P2P network, users can choose which files they wish to share.
    True
Author
jschneid
ID
218025
Card Set
COSC Final
Description
COSC Final
Updated