All Complete Solutions 2025-2026
Updated.
Instead of sending an entire file in one big chunk across the Internet, __________ is used which
dices the file up into little pieces that are sent independently across the communications paths,
and then reassembled when they reach their destination. - Answer Packet switching
What type of communication processor directs packets of data through different networks,
ensuring that data gets to the correct address? - Answer Router
Bandwidth transmission speed is measured in ___. - Answer hertz
Which of the following is a new network backed by universities, government, and private
companies in more than 100 countries? - Answer Internet2
Which of the following is a common wireless networking standard that is generally used for
PANs? - Answer Bluetooth
Which statement about the TCP/IP protocol is FALSE? - Answer IP helps to recover any
packets that are lost or damaged during transmission
Microsoft Windows Server and Linux are examples of __ - Answer network operating
systems
A __ is a set of rules that programs on two communicating devices follow - Answer protocol
A(n) __ signal is a way to communicate in a network and is represented by a continuous
waveform - Answer analog
The signal from your iPod earphone is a(n) __ signal - Answer analog
If you were building a network intended to service two buildings that were next to each other,
you would construct a: - Answer local area network
A company needing a network to connect its offices in Montana, Idaho, and Utah would require
a: - Answer wide area network
,If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed __
meters(s) - Answer 100
An individual wanting to enable his desktop PC at home to access the Internet must do which of
the following? - Answer Obtain a subscription with an Internet Service Provider (ISP)
The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called: - Answer packet
switching
A company needing reliable network speeds at 1.5 Mbps would probably need to lease a
dedicated: - Answer T1
Which of the following best defines hertz? - Answer The number of cycles per second that
can be sent through a meduim
Which of the following is NOT a function of the Internet service provider (ISP)? - Answer The
ISP provides application services
Which of the following notations could represent a current IP address? - Answer
207.46.250.119
Education being represented by .edu and business represented by .com are examples of: -
Answer top-level domains
Which term refers to the wireless networking standard that is popular for creating small
personal-area networks? - Answer Bluetooth
What is the name of the organization responsible for assigning public IP addresses? - Answer
ICANN
Which statement about the Domain Name Service (DNS) is FALSE? - Answer The first name in
the domain name is the organization name
Which technology has recently been applied to inventory control, supply chain management,
and the Internet of Things? - Answer RFID systems
, Which of the following involves botnets deliberately moving through online ads and leads to
higher marketing costs? - Answer Click fraud
Which of the following mandates that financial services firms ensure security and confidentiality
of customer data? - Answer Gramm-Leach-Bililey Act
__ check for data entering a system for accuracy and completeness, such as when a clerk
confirms a telephone number for a new customer - Answer Input controls
Using a combination of hardware and software,__ are able to control incoming and outgoing
data on a network - Answer firewalls
What is Secure Hypertext Transfer Protocol? - Answer A protocol for encrypting individual
messages transferred over the Internet
__ is a general security term that includes computer viruses, worms and Trojan horses. - Answer
Malware
Which of the following is an opportunity for threats to gain access to assets? - Answer
Vulnerability
A(n) __ is a program that seems like a normal program, but does something completely
unexpected - Answer Trojan horse
A__ is a type of spyware that records keystrokes to steal sensitive information such as social
security numbers - Answer keylogger
Someone hacking into your Facebook account to add terrible photos and messages is taking
part in _________________. - Answer cybervandalism
If you receive an email asking for your social security number in return for a million dollars, this
is an example of __ - Answer phishing
Although it may seem innocent enough, ___________ is a serious problem for companies that
are involved with pay-per-click advertising. - Answer click fraud
__ requires that your patient records be protected and saved for six years - Answer HIPAA