Using Information Technology 11th Edition Williams Test Bankpdf download
Using Information Technology 11th Edition Williams Test Bankpdf download
https://testbankfan.com/product/using-information-
technology-11th-edition-williams-test-bank/
We believe these products will be a great fit for you. Click
the link to download now, or visit testbankfan.com
to discover even more!
https://testbankfan.com/product/using-information-
technology-10th-edition-williams-test-bank/
https://testbankfan.com/product/using-information-
technology-10th-edition-williams-solutions-manual/
https://testbankfan.com/product/information-technology-for-
management-11th-edition-turban-test-bank/
https://testbankfan.com/product/foundations-of-business-5th-
edition-pride-solutions-manual/
Organisational Change Development and Transformation
Australia 6th Edition Waddell Test Bank
https://testbankfan.com/product/organisational-change-
development-and-transformation-australia-6th-edition-waddell-
test-bank/
https://testbankfan.com/product/strategic-management-an-
integrated-approach-10th-edition-hill-test-bank/
https://testbankfan.com/product/comparative-health-information-
management-4th-edition-peden-solutions-manual/
https://testbankfan.com/product/advanced-accounting-4th-edition-
jeter-solutions-manual/
https://testbankfan.com/product/money-banking-and-the-financial-
system-2nd-edition-hubbard-test-bank/
Economics Today The Micro View 17th Edition Miller Test
Bank
https://testbankfan.com/product/economics-today-the-micro-
view-17th-edition-miller-test-bank/
Chapter 06
A. continuous
B. digital
C. sequential
D. analog
A. bit
B. byte
C. kilobyte
D. megabyte
A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone
6-1
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be _________.
A. spontaneous
B. digital
C. sequential
D. analog
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
6. A person sending a document over a phone line by converting a computer's digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
A. terminal
B. router
C. network
D. server
6-2
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8. A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN
A. WAN
B. LAN
C. MAN
D. Internet
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer to peer
11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
6-3
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. A computer that acts like a disk drive, storing the programs and data files shared by users on
a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these
15. A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.
A. VPN
B. intranet
C. firewall
D. protocol
6-4
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
16. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet
17. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node
A. server
B. host
C. node
D. router
A. node
B. protocol
C. packet
D. backbone
6-5
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. A common connection device that connects computers to a network and that sends
messages (checks packets) between sender and receiver nodes is called a ________.
A. router
B. gateway
C. switch
D. bridge
21. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
22. A device that joins multiple wired and/or wireless networks in a home office is a ________.
A. node
B. router
C. bridge
D. firewall
23. In an organization, all computer networks are connected to the Internet by a "main highway"
called a ________.
A. skeleton
B. backbone
C. gateway
D. router
6-6
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?
A. ring
B. bus
C. hub
D. star
25. In the ________ network topology, communications devices are connected to a single cable
with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
26. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
27. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
6-7
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
28. ________ is the most common and most widely used LAN technology, with networked devices
in close proximity; it can be used with almost any kind of computer. Most microcomputers
come with a port for this type of network connection, which uses cable.
A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet
29. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition
telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
31. A type of wired communications technology used to connect equipment in a home network is
the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
6-8
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. What wired communications medium consists of dozens or hundreds of thin strands of glass
or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
34. The ________ is the range of frequencies that a transmission medium (channel) can carry in a
particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
wireless network and content providers?
A. LAN
B. WAN
C. WAP
D. HAN
6-9
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio
A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio
A. broadcast radio
B. broadband
C. microwave
D. WAP
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking
6-10
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. The highest level that a satellite can occupy in space is known as ________.
41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used to
identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
A. first
B. second
C. third
D. fourth
43. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
6-11
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
45. What short-distance wireless standard is used to link cell phones, computers, and
peripherals at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
46. A ________ attack disables a computer system or network by making so many requests of it
that it overloads it and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk/flash drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
6-12
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?
A. worm
B. virus
C. Trojan horse
D. denial-of-service attack
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls them
remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software
51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
6-13
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. What is the science, often used in computer security systems, of measuring individual body
characteristics?
A. encryption
B. decryption
C. rootkit
D. biometrics
53. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
True False
55. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be digital.
True False
True False
6-14
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Telephones have always been digital devices.
True False
58. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False
True False
60. Capturing music digitally means that one has an exact duplicate of the music.
True False
61. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False
True False
True False
64. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False
6-15
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is called a file server.
True False
66. "File server" and "database server" are different names for the same type of server.
True False
67. Peer-to-peer networks are less stable than client-server networks because in the former
certain shared resources reside on each user's machine.
True False
68. Virtual private networks (VPNs) are private networks that use a public network (usually the
Internet) instead of private, leased (expensive) lines to connect remote sites.
True False
69. If you have one computer, you need firewall hardware; if you have more than one (networked)
computer, then a software firewall should be used.
True False
70. In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.
True False
71. Routers join multiple wired and/or wireless networks commonly in offices and home offices.
True False
True False
6-16
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. An interface device used to connect the same types of networks is called a node.
True False
74. The backbone is the main communications route in a bus network topology.
True False
75. In a bus network, all computers and communications devices are connected in a continuous
loop.
True False
76. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False
77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False
True False
79. One wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.
True False
80. All wired and wireless communications media use the electromagnetic spectrum of radiation.
True False
6-17
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False
82. The two general classes of bandwidth are long and short.
True False
83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
True False
84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False
85. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False
True False
87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False
88. Communications satellites are microwave relay stations in orbit around the earth.
True False
6-18
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
89. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False
90. A larger number of geostationary earth orbit (GEO) satellites are required for global coverage
than mid-earth orbit (MEO) satellites.
True False
91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify earth
locations.
True False
92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False
True False
True False
True False
True False
True False
6-19
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.
True False
True False
True False
101.A Wi-Fi enabled laptop computer accesses the available network (say, at an airport) through
an access point, which is connected to a land-based Internet connection.
True False
True False
103.Wi-Fi connections are always secure; no one can steal your data when you are online.
True False
True False
True False
6-20
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
106.A denial-of-service attack uses a virus to crash your computer.
True False
True False
108.A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False
109.A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False
True False
True False
True False
6-21
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
113._________ is the gradual merger of computing and communications into a new information
environment, in which the same information is exchanged among many kinds of equipment,
using the language of computers.
________________________________________
114.Most of the word's natural phenomena use signals that continuously vary in strength and
quality, called ________ signals.
________________________________________
________________________________________
116.So they can be sent over a telephone line, analog signals are converted into digital signals,
and then back again, by using ________.
________________________________________
________________________________________
________________________________________
119.Private networks that use a public network, usually the Internet, to connect remote sites are
called ________.
________________________________________
120.A private intranet that allows access to selected outside users is a(n) ________.
________________________________________
6-22
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121.A _________ is a system of hardware and/or software that protects a computer or a network
from intruders.
________________________________________
122.A client-server network has a _________ computer, a central computer that controls the
network; The devices connected to the network are called _________.
________________________________________
123.A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________
124.Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________
125.A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________
126.A(n) ________ is an interface (linking device) used to connect the same types of networks,
whereas a(n) ________ is an interface permitting communications between dissimilar
networks.
________________________________________
127.________ are physical devices that join multiple wired and/or wireless networks; their primary
job is to provide connectivity, and they are often used in small office networks, cafés,
airports, hotels, and home networks.
________________________________________
6-23
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
128.The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________
129.A motherboard expansion card called a _________ enables a computer to send and receive
messages over a network.
________________________________________
130.The system software that manages the activity of a network is called the ________.
________________________________________
131.A network can be laid out in different ways. The layout, or shape, of a network is called a
________.
________________________________________
132.A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________
133.A ________ network topology is one in which all microcomputers and other communications
devices are connected directly to a central network switch.
________________________________________
________________________________________
6-24
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135.In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and with different network
topologies.
________________________________________
136.Wired communications media include three main types. The kind used for tradition telephone
lines is a ________.
________________________________________
137.Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________
138.Wired communications media include three main types. Insulated copper wire wrapped in a
solid or braided shield and then an external cover is called ________ cable.
________________________________________
139.Wired communications media include three main types. The kind used for transmitting pulses
of light is called a ________ cable.
________________________________________
________________________________________
141.The range of frequencies that a transmission medium can carry in a given period of time is
called its ________.
________________________________________
6-25
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Random documents with unrelated
content Scribd suggests to you:
Mahomet II., i, 106, 256; ii, 293
Malalbergo, i, 473
Malatesta, Rengarda, i, 45
Manfred, i, 323
Manfredonia, i, 247
Manso, iii, 312, 327
Mariotti, Signor, his Italy, i, xxxi, 21 note; ii, 277 note; iii, 25 note,
48 note, 253 note
— his mistakes, i, xxxi
— on republicanism, i, 20
— on Malatesta, i, 191
Martini, Simone, ii, 185 note, 188 note; iii, 336 note
Matelica, iii, 68
Mazzola, i, 209
Medici, Caterina de', ii, 152, 406, 414 note, 415; iii, 34, 391 note
— marriage of, iii, 62
Medici, Giovanni, delle Bande nere, i, 384; ii, 414, 416, 436, 438; iii,
288, 431
— death of, ii, 446
Medici, Cardinal Giulio de', ii, 414, 416, see Clement VII.
Medici, Lorenzo de', the Magnificent, i, 51 note, 157, 185, 209, 262,
299; iii, 409
— gardens of, i, 174 note
— attempted murder of, i, 235 note, 240-3
— in favour with Sixtus IV., i, 237
— policy of, i, 238, 251
— excommunicated, i, 242
— appeals to Ferdinand, i, 252
— defends Ferrara, i, 259, 263
— intrigues of, i, 307
— death of, i, 326
— tutor of, ii, 113
— supports Platonism, iii, 34, 256
Mellara, i, 262
Milan, i, 37, 67
— accepts Sforza as duke, i, 97
— court of, i, 121
— defends Ferrara, i, 259
— Charles VIII. at, i, 348
— siege of, ii, 282, 425
— taken by Francis I., ii, 431
— held by Sforza, ii, 435, 437-41
— restored to the Sforza, ii, 346, 410
— Ariosto at, iii, 281
Moncada, Don Ugo de, i, 418; ii, 396, 401; iii, 27, 442, 451
— succeeds Lannoy, iii, 25
— intrigues with Colonna, ii, 426, 444, 453
Mondolfo, i, 137, 144; ii, 213, 291, 378; iii, 160, 199
— siege of, ii, 384-7
Monopoli, i, 394
Montecalvo, i, 418
Montefiascone, iii, 5
Montefiore, i, 423
— counts of, i, 51 note
— siege of, i, 140
Montelocco, i, 77
Monterosi, iii, 34
Montevarchi, iii, 9
Montpensier, i, 355
— Gilbert, Count de, ii, 449
Morat, i, 337
Morgarten, i, 337