click below
click below
Normal Size Small Size show me how
Cyberspace Quiz 2
| Question | Answer |
|---|---|
| What are telecommuniations? | The electronic transmission and reception of signals for voice and data communications |
| Does a wireless network do? | they transport data from one device to another without cables or wires |
| What are 2 downsides of wireless networks | 1. slower than wired networks 2. security concerns |
| What is WiFi? | wireless networking technologies that are compatible with Ethernet |
| What standards is wifi based on? | Based on the IEEE 802.11 standards |
| What does IEEE stand for? | Institute of Electrical and Electronics Engineers |
| What is needed for WiFi to connect? | Network Interface Card (NIC) |
| WiFi uses radio frequencies to transmit by using ___ GHz and ____ Ghz | 2.4; 5.8 |
| What is a WiFi hotspot | wireless access point |
| What is true about WiFi security? | Wireless networks are much more susceptible to unauthorized access and use than wired networks |
| What is LAN jacking (or war driving) | The practice of intercepting wireless signals by cruising through an area. |
| What does wireless encyption do? | Scrambles data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key |
| what does WEP stand for | Wired Equivalent Privacy |
| What does WPA stand for | Wi-Fi Protected Access |
| What is bluetooth? | Short-range, wireless network technology |
| What does bluetooth do | make its own connections (piconet) between electronic devies, without wires, cables, or any direct action from a user |
| What is the range of bluetooth | 30 ft, can be extended to 100ft |
| What can happen to an open bluetooth connection on a computer? | It can be used by a hacker to access files on the computer |
| What is RFID | Radio Frequency Identification |
| What does RFID use? | tags and transponders that are very small and contain an antenna and memory chip |
| What are two types of tags for RFID | Active, which uses self-contained battery power and Passive, which uses no battery and must be activated by using electromagnetic waves |
| What is an example of an Active tag? | EZ Pass |
| What is IrDa | Infrared Dat Association |
| What does IrDA do? | it uses infrared light waves, must have an IrDA port and has line of sight technology (ex, tv remote control) |
| What does WiMax stand for | Worldwide Interoperability for Microwave Access aka IEEE 802.16 |
| What is WiMax | A 4th generation wireless broadband technology that evolved from Wi-Fi to provide faster Internet access at a longer range |
| What is portable wiMAX | portable technology used for Internet access available to subscribers anywhere within a twoer's coverage area |
| What does GPS stand for | global positioning system |
| How does GPS work? | it uses satellites to pinpoint the location of ojects on earth |
| What is geotagging | the process of adding geopgraphic identification metadata to digital media and messages |
| What is Email technology | Web based e-mail accounts that allow you to use a browser to access your e-mail messages |
| What does POP stand for | Post Office Protocol |
| What is POP server | a computer that stores your incoming messages until they can be transferred to your hard disk |
| What does SMTP stand for | Simple Mail Transfer Protocol |
| What is an SMTP server? | A server that allows storage of outgoing messages until the user is ready to send them |
| What does IMAP stand for | Internet Access Message Protocol |
| What is IMAP used for | outgoing mail; users can also download incoming email or leave it on the server (ex, blackberry) |
| What is email encryption | used when personal computer users want to encrypt email or other documents, they turn to public key encrpytion software called PGP |
| What does PGP software stand for | Pretty Good Privacy software |
| What do most cellular service proviers offer | data service plans for accessing the Internet |
| What are the fastest cellular technologies for Internet access? | EDGE, EV-DO |
| Cellular Data Services are the _____ growing segment of electronic communication | Fastest |
| What is a cellular carrier? | a company that builds and maintains a cellular network and provides cell phone service to the public |
| What does GSM stand for | Global System for Mobile Communications |
| What is the Global system for Mobile Communications | the most popular international standard for mobile phones |
| What is the CDMA | Code Division Multiple Access |
| What is the Code Division Multiple Access | the networking standard that is predonminantly used in the United States |
| How many cell phone generations are there? | 4 |
| Computer networks ____ communication between a source and destination | facilitate |
| What is a node? | any device connected to the network transmission medium = physical connection |
| What is a transmission medium? | physical connection (wire, fiber optic, air (wireless)) |
| What is NIC | Network Interface Card -- needed to connect |
| What is transmission protocol? | rules that govern network access |
| what are packets | all messages broken up into packets |
| Network devices can function as _____ or ____ | clients; servers |
| What types of servers can network devices function as? | application, file, print |
| True/False: Networks that include one or more servers can operate in client/server mode | true |
| What is TCP/IP | Rules for efficiently transmitting data from one network node to another |
| What does TCP stand for | Transmission Control Protocol |
| what does IP stand for | Internet protocol |
| What do packets do? | Packets are parcels of data that is sent across a computer network |
| What is LAN | a privately owned computer network that connects computers and devices within the same building or local geographic area |
| what is intranet | a web server that provides confidential data to Lan users |
| What are advantages of lan? | increased productivity, reduced cost |
| What are disadvantages of lan? | resources can become unavailable when network malfunctions, network access may be vulnerable to unauthorized access, networks can be tapped from a "snooping" computer, more susceptible to increasing # of worms, trojans horses and blended threats |
| What is a Lan party? | gathering of people who connect their own computers to a LAN, usually to play games |
| What are physical topologies? | the arrangement of devices in a network |
| What is star? | a hub in the middle, inexpensive, however if hub fails then the network crashes |
| What is ring? | all info on the ring goes around the ring other computers, good for offices, however no privacy and if one node fails the network crashes |
| What is bus? | inexpensive, used in smaller places, if one computer fails the rest do not fail, but if the whole bus fails then the network fails |
| What is token ring? | token allows only one person with token to release things into the network. Can with with ring and star too. The network can't be clogged, but you have to wait your turn to have the token |
| What is ethernet? | simultaneously broadcasts data packets to all network devices |
| What is a bridge? | when two similar networks can be connected by a device |
| ______ is a generic term for any device or software code used to join two networks | gateway |
| What does encrpytion do? | transforms a message so that the contents are hidden from unauthorized readers |
| When something is in plaintext, has it been encrypted yet? | no |
| an encrypted message is referred to as | ciphertext |
| ______ is the opposite of encrpytion | decryption |
| What is public key encryption? | It eliminates key-distribution problems by using 1 key to encrpyt, and another decrypt |