click below
click below
Normal Size Small Size show me how
CTA-100 Final
Question | Answer |
---|---|
A ___is a device connected to network such as a computer or a game console. | node |
Which transmission medium transmits data the fastest? | Twisted-pair cable |
___ is the maximum speed at which data can be transferred between two nodes. | Bandwidth |
The current version of wireless Ethernet is | 802.11n |
Normal telephone cable is a type of | twisted-pair cable. |
A network used to communicate among devices close to one person is called a | PAN. |
A peer-to-peer (P2P) network is an example of ___ administration. | local |
Data is sent through a network on bundles called | packets. |
Client/server networks are controlled by a central server that runs a specialized piece of software called a | network operating system (NOS) |
All of the following are extra precautions you can take to secure a wireless network, except | enable SSID broadcast. |
Which of the following is NOT a type of cable used in wired networks? | Router cable |
All of the following are benefits of networks EXCEPT, | Sharing an operating system. |
The most popular transmission media option for wired Ethernet networks is | unshielded twisted-pair (UTP) cable. |
Network architectures are classified according to | the way in which they are managed and the distance between their nodes. |
Wireless Internet is available using | radio waves. |
All of the following involve tasks for network administration, except | purchasing initial equipment for the network. |
SSID stands for | Service Set Identifier. |
The main difference between the tablet and smartphone is the | screen size. |
An analog-to-digital converter chip | converts the sound waved from a voice into digital signals. |
All of the following are advantages of VoIP except | reliability. |
SMS delivers messages to the appropriate mobile device using ___ technology. | store-and-forward |
Images are a representation of light waves called ___ or continuous waves. | analog |
The operating system of a cell phone is stored in | ROM. |
Text messaging is also called | Short message service (SMS) |
An internet connectivity plan is also known a | data plan. |
Which of the following statements in NOT true about the JPEG file format? | JPEGs are larger than raw files. |
What is Android? | An operating system for cell/smartphones. |
Which of the following uses radio waves to transmit data signals over short distances. | Bluetooth |
The choice communication mode for people aged 14 to 30 is | texting. |
The primary input devices for smartphones are | microphone and touch pad. |
A portable media player can play files with all of the following file extensions, except | .doc. |
A ___ runs a traditional desktop operating system and is lightweight. | netbook |
___ is a very well known free VoIP provider. | Skype |
All of the following are technologies used to transfer digital information, except | 5G |
Almost all cell phones are designed with a ___ port. | USB |
The global positioning system is a network of___ satellites plus 3 working spares. | 21 |
An converts your voices sound waves into digital signals. | analog-to-digital converter chip |
___ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself. | HDMI |
You can send messages that include photos and videos between mobile devices using ___ technology. | multimedia message service (MMS) |
To transfer files from your computer to your music device use a ___ port. | USB |
Social is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. | engineering |
Using your computer for non-work activities while you are being paid to do your job is known as | cyperloafing. |
A ___ is a virus that is triggered on a certain date. | time bomb |
IC3 is a partnership between the | FBI and National White Collar Crime Center |
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing a | firewall. |
___ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. | Spyware |
Which of the following classifications of viruses can change its own code to avoid detection. | Polymorphic |
All of the following are categories of viruses, except | snakes. |
___hackers break into systems for mon-malicious reasons such as to test system security vulnerabilities. | White-hat |
A ___ is the portion of virus code that is unique to a particular computer virus. | virus signature |
When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as | pharming. |
All of the following are ways that can infect your computer with a virus, except | logging into e-mail. |
Which of the following statements about cookies is NOT true. | Cookies obtain your personal information by searching you hard drive. |
All of the following are top cybercrimes reported to the IC3 in 2011 except | child pornography |
With regard to computer protection, quarantining is defined as | placing a found virus in a secure area on the hard drive. |
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT | launch a denial of service (DoS) attack on your computer. |
All of the following are the main functions of antivirus software, except | assassinating all viruses. |
___ viruses are often transmitted by a flash drive left in a USB port. | Boot-sector |
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer. | Cybercrime |
A ___ virus changes its own code or periodically rewrites itself to avoid detection. | polymorphic |
___ floods a computer with requests until it shuts down and refuses to answer any requests for information. | A DDoS attack |
Rules for creating passwords include all of the following, except | keep your password written down and stored in an easy-to-remember location. |
All of the following are considered cybercrimes, except | theft of a cell phone. |
A ___ is named after a housing construction feature that slows the spread of fires from house to house. | firewall |
Which statement about selecting the right programming language for a project is FALSE? | Programming languages require the same amount of time to execute. |
Keywords in a programming language that redirect the flow of a program based on a decision are called | control structures. |
A ___ error is caught when the program executes. | logical |
___ is a powerful programming language used to build a wide range of Windows applications. | Visual Basic |
The process by which program code is converted into machine language is called | compilation. |
The capability of moving a completed programming solution easily from one type of computer to another is known as | portability. |
___ is the process of translating a task into a series of commands that a computer will use to perform the task. | Programming |
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed? | Design |
___ is a text-based approach to documenting an algorithm. | pseudocode |
With object-oriented analysis, programmers identify categories of input that are part of the problem into | classes |
Which of the following statements about JAVA is false? | Java can run only on a Windows operating system |
Before its final commercial release, software is often provided free or at a reduced cost in a ___ version to certain test sites or to interested users. | Beta |
FORTRAN, C++, and Java are all ___ generation languages. | third |
Special symbols called tags are used in which of the following languages? | HTML/XHTML |
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called | top down designs |
The set of specific, sequential steps that describe exactly wheat a copter program must do to complete the work is called an | algorithm |
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a | test condition |
Which of the following is the first stage of the program development life cycle (PDLC)? | Describing the problem |
Translating an algorithm into a programming language is called | coding. |
SQL is an example of a ___ generation language. | fourth |
___ is the instructions programmers have written in a higher-level language. | Source code |
Which statement does NOT describe fifth-generation languages? | They use a set of short, English-based commands (such as SUB) that speak directly to the CPU |
Which of the following provides a visual representation of patterns that an algorithm comprises? | flowchart |
A ___ is a visual diagram of a process, including the decisions that need to be made along the way | flowchart |
How many steps are there in the system development life cycle? | 6 |
The first-generation language is | machine language |
___ is the process of reducing data redundancy by recording data only once. | normalization |
A ___ is a way of retrieving information from one or more tables that defines a particular subset of data. | query |
___ is the branch of computer science that deals with the attempt to create computers that think like humans. | artificial intelligence |