Verified
Describe a Star network topology?
for a Local Area Network (LAN) in which all nodes are individually connected to a
central connection point, like a hub or a switch
What is malware?
software that is intended to damage or disable computers and computer systems.
List 4 types of malware?
Trojans, Worms, Spyware, Virus
Describe the importance of data integrity
accuracy of data, data validation, database locking
Describe the importance of data security
protects data against destruction and unauthorized access
Describe the importance of data privacy
vast amounts of
personal data stored in databases
List at least five strategies for virus prevention
install anti-virus/malware software, instal firewall, use strong passwords, instal anti-
spyware software, check security setting
What are the phases involved in program development?
problem analysis, program design, program coding, program debugging and testing,
program implementation and maintenance
Some monitoring systems in use today use the RFID tags and RFID readers to
monitor the status of objects (such as check
shipping boxes, livestock, or expensive equipment) to which the RFID tags are
attached.
true
The trend toward online collaboration is usually called workgroup computing.
true
A bus network uses a central device (such as a server or a switch) to which all
network devices connect and through which all network data is sent
false
TCP/IP is the protocol used for transferring data over the Internet.
true
A(n) computer network is a collection of computers and other hardware devices
connected together so that network users
can share hardware, software, and data, as well as communicate with each other
electronically.
true
With a(n) peer-to-peer (P2P) network, a central server is not used
true
Direct Internet connections are much slower than dial-up connections
false