ITE 115- Exam 2 Questions With 100% Correct
Answers!!
_______ area networks are countrywide and worldwide networks. - ✔✔wide
Most firewalls include a special computer called a _______ server to manage communications
between the internal networks and the outside world - ✔✔Proxy
_______ (acronym) uses standard telephone lines to provide high-speed connections. -
✔✔DSL
The range of Wi-Fi networks using microwave connections is being extended over greater
distances using a new technology known as _______. - ✔✔WiMax
TCP/IP protocol involves identifying, sending, and receiving devices and breaking information
into small parts for transmission across the Internet. - ✔✔True
Packetization refers to breaking information into small parts for transmission across the
Internet. - ✔✔True
Connection devices are the actual connecting or transmission medium that carries the message.
- ✔✔False
Network operating systems (NOS) control and coordinate the activities of all computers and
other devices on a network. - ✔✔True
In a peer-to-peer network, only the central host computer supplies the resources, the other
computers request resources from this host. - ✔✔False
, The essential features of this include identifying, sending, and receiving devices and breaking
information into small parts for transmission across the Internet. - ✔✔TCP/IP
The GPS device in an automobile uses which communication channel? - ✔✔Satellite
This device enables connectivity between two LANS or a LAN and a larger network. -
✔✔Network gateway
This type of network topology does not use a specific physical layout. - ✔✔Mesh
Which among the following is considered a line-of-sight communication medium? -
✔✔Microwave
Which among the following is a fraudulent or deceptive act designed to trick individuals on the
Internet into spending time or money for little or no return? - ✔✔Internet Scam
These are used by advertisers to keep track of your web activity as you move from one site to
the next. - ✔✔Third-party cookies
Computer criminals that create and spread viruses are punished under this law. -
✔✔Computer Fraud and Abuse Act
This type of computer criminal creates and distributes malicious programs. - ✔✔Cracker
This uses software to try thousands of common words sequentially in an attempt to gain
unauthorized access to a user's account. - ✔✔Dictionary attack
Biometric scanning devices are used to scan employee identification cards - ✔✔False
Answers!!
_______ area networks are countrywide and worldwide networks. - ✔✔wide
Most firewalls include a special computer called a _______ server to manage communications
between the internal networks and the outside world - ✔✔Proxy
_______ (acronym) uses standard telephone lines to provide high-speed connections. -
✔✔DSL
The range of Wi-Fi networks using microwave connections is being extended over greater
distances using a new technology known as _______. - ✔✔WiMax
TCP/IP protocol involves identifying, sending, and receiving devices and breaking information
into small parts for transmission across the Internet. - ✔✔True
Packetization refers to breaking information into small parts for transmission across the
Internet. - ✔✔True
Connection devices are the actual connecting or transmission medium that carries the message.
- ✔✔False
Network operating systems (NOS) control and coordinate the activities of all computers and
other devices on a network. - ✔✔True
In a peer-to-peer network, only the central host computer supplies the resources, the other
computers request resources from this host. - ✔✔False
, The essential features of this include identifying, sending, and receiving devices and breaking
information into small parts for transmission across the Internet. - ✔✔TCP/IP
The GPS device in an automobile uses which communication channel? - ✔✔Satellite
This device enables connectivity between two LANS or a LAN and a larger network. -
✔✔Network gateway
This type of network topology does not use a specific physical layout. - ✔✔Mesh
Which among the following is considered a line-of-sight communication medium? -
✔✔Microwave
Which among the following is a fraudulent or deceptive act designed to trick individuals on the
Internet into spending time or money for little or no return? - ✔✔Internet Scam
These are used by advertisers to keep track of your web activity as you move from one site to
the next. - ✔✔Third-party cookies
Computer criminals that create and spread viruses are punished under this law. -
✔✔Computer Fraud and Abuse Act
This type of computer criminal creates and distributes malicious programs. - ✔✔Cracker
This uses software to try thousands of common words sequentially in an attempt to gain
unauthorized access to a user's account. - ✔✔Dictionary attack
Biometric scanning devices are used to scan employee identification cards - ✔✔False