1.
The quantity of data that can be transmitted through a communication medium in a given amount of time
Correct Answer
A. Bandwidth
Explanation
Bandwidth refers to the amount of data that can be transmitted through a communication medium in a given amount of time. It represents the capacity or speed of data transfer. The higher the bandwidth, the more data can be transmitted simultaneously, resulting in faster and more efficient communication. Band rate, broadband connection, and fiber-optic cables are related terms or technologies that can contribute to achieving higher bandwidth.
2.
A connection with much greater bandwidth than modems have
Correct Answer
A. Broadband connection
Explanation
A broadband connection refers to an internet connection that has a much greater bandwidth compared to modems. It allows for faster data transfer rates, enabling users to upload and download large files, stream high-definition videos, and have a smooth online experience. This type of connection is typically achieved through technologies like DSL, cable, or fiber-optic cables, which can handle higher data transmission speeds. Baud rate, on the other hand, refers to the number of signal changes per second in a communication channel, while band rate is not a recognized term in the context of internet connections.
3.
Metropolitan area network
Correct Answer
A. MAN
Explanation
A Metropolitan Area Network (MAN) refers to a network that covers a larger geographical area, such as a city or a town. It is designed to connect multiple Local Area Networks (LANs) together, providing a high-speed and reliable communication infrastructure for organizations and individuals within the metropolitan area. MANs typically use fiber optic cables or wireless technology to connect various LANs and facilitate the exchange of data, voice, and video. Therefore, the correct answer is MAN.
4.
A networking architecture developed in the 1970s Xerox
Correct Answer
B. Ethernet
Explanation
Ethernet is a networking architecture developed in the 1970s by Xerox. It is a widely used technology for connecting devices in a local area network (LAN). Ethernet allows for the transmission of data packets between devices through a wired connection, using a set of protocols and standards. It provides a reliable and efficient way to connect computers, servers, printers, and other network devices, enabling them to communicate and share resources. Ethernet has evolved over the years and has become the de facto standard for wired LAN connections.
5.
WAN
Correct Answer
A. Wide area network
Explanation
The correct answer is "Wide area network". A wide area network (WAN) is a type of computer network that covers a large geographical area, typically spanning multiple cities or even countries. It is used to connect different local area networks (LANs) together, allowing for communication and data transfer between them. WANs are commonly used by businesses and organizations to connect their branches or offices located in different locations.
6.
A system built around the open standards and protocols of the Internet
Correct Answer
A. Intranet
Explanation
An intranet is a private network that uses the same protocols and standards as the internet, but is only accessible to a specific group of people, such as employees within a company. This system allows for the sharing of information, collaboration, and communication within the organization, while still maintaining a level of security and privacy. Unlike the internet, which is accessible to anyone, an intranet is restricted to authorized users, making it a suitable answer in this context.
7.
Uses light waves to carry information at blinding speeds
Correct Answer
A. Fiber-optic cable
Explanation
Fiber-optic cables are made of thin strands of glass or plastic that use light waves to transmit data. These cables are capable of carrying large amounts of information at extremely high speeds, making them ideal for broadband connections. Unlike traditional copper cables, fiber-optic cables have a much greater bandwidth, allowing for faster and more efficient data transfer. The use of light waves instead of electrical signals also reduces signal degradation and interference, resulting in a more reliable and faster internet connection. Therefore, the correct answer is fiber-optic cable.
8.
Local area network
Correct Answer
A. LAN
Explanation
LAN stands for Local Area Network. It is a network that connects computers and devices within a limited area such as a home, office, or building. LANs are typically used for sharing resources, such as printers and files, and for facilitating communication between connected devices. The given options LANT and LLAN are not valid acronyms or terms commonly used in the context of computer networking. Therefore, the correct answer is LAN.
9.
Web sites designed to capture credit card numbers and other sensitive financial information
Correct Answer
B. pHishing
Explanation
Phishing refers to the fraudulent practice of sending emails or creating websites that appear to be from reputable sources in order to deceive individuals into providing sensitive information such as credit card numbers. These websites are specifically designed to capture such information without the user's knowledge or consent. Therefore, the correct answer for this question is phishing.
10.
Is carried over the Inernet rather than the telephone and requires broadband internet connection.
Correct Answer(s)
A. Internet telepHony
B. VoIP
Explanation
Internet telephony, also known as VoIP (Voice over Internet Protocol), is a communication technology that allows voice calls to be transmitted over the internet instead of traditional telephone lines. It requires a broadband internet connection to ensure a smooth and high-quality call. This technology has revolutionized the way people communicate, providing cost-effective and efficient voice communication worldwide. Voice mail and avatars are not directly related to internet telephony or VoIP, hence they are not the correct answers.
11.
NIC
Correct Answer
A. Network interface card
Explanation
NIC stands for Network Interface Card, which is a hardware component that allows a computer to connect to a network. It enables the computer to send and receive data over the network by providing a physical connection between the computer and the network. Therefore, the correct answer is "Network interface card."
12.
Rules for the exchange of data between a terminal and a computer or two omputer
Correct Answer
A. Protocol
Explanation
A protocol refers to a set of rules and guidelines that define how data is exchanged between a terminal and a computer or between two computers. It specifies the format, timing, sequencing, and error control for data transmission. By following a protocol, devices can communicate effectively and ensure that data is transmitted accurately and reliably.
13.
A public Web log updaated at frequent intervals
Correct Answer
A. Blog
Explanation
A blog is a public web log that is updated at frequent intervals. It is a platform where individuals or organizations can share their thoughts, ideas, and experiences on various topics. Blogs often consist of written content, but they can also include multimedia elements such as images, videos, and audio. Users can interact with blogs by leaving comments or sharing the content on social media platforms.
14.
Encryption scheme, improves the security of wireless network by making your data secure
Correct Answer
C. WEP
Explanation
WEP (Wired Equivalent Privacy) is an encryption scheme that improves the security of a wireless network by making data transmitted over the network more secure. It provides a level of privacy and protection against unauthorized access by encrypting the data packets being transmitted between devices on the network. This helps to prevent eavesdropping and unauthorized access to the network, enhancing the overall security of the wireless network.
15.
Electronic "tunnel" through Internet that uses encryption and other security measures to keep out unwanted users
Correct Answer
C. VPN
Explanation
A VPN, or Virtual Private Network, is an electronic "tunnel" through the Internet that uses encryption and other security measures to keep out unwanted users. It allows users to securely access a private network from a remote location, ensuring that their data is protected and their online activities are anonymous. VPNs are commonly used by individuals and organizations to ensure privacy and security while browsing the internet or accessing sensitive information.
16.
A hierarchical model in which one or more computers
Correct Answer
A. Client/ server
Explanation
A client/server model is a hierarchical structure where one or more computers (servers) provide services or resources to another computer (client). In this model, the client requests information or services from the server, which then processes the request and sends the response back to the client. This model is commonly used in networked environments, such as an intranet, where multiple clients can access shared resources or services provided by the server.
17.
Insecure network
Correct Answer
A. Firewall
Explanation
A firewall is a security system that is designed to protect a computer network from unauthorized access. It acts as a barrier between a trusted internal network and an external network, such as the internet. It monitors incoming and outgoing network traffic, allowing or blocking specific connections based on predetermined security rules. By implementing a firewall, organizations can prevent unauthorized access to their network and protect sensitive data from potential threats.
18.
Enables every computer on the network to be both client and server
Correct Answer
A. Peer-to-peer
Explanation
The correct answer is peer-to-peer. This term refers to a network architecture where every computer on the network can act as both a client and a server. In a peer-to-peer network, there is no centralized server, and each computer can share resources and communicate directly with other computers on the network. This allows for decentralized file sharing, printing, and other services without the need for a dedicated server.
19.
Junk email
Correct Answer
A. Spam
20.
What are the types of wireless connection
Correct Answer(s)
A. WI-Fi
C. Bluetooth
Explanation
The correct answer includes two types of wireless connections, which are Wi-Fi and Bluetooth. Wi-Fi is a wireless networking technology that allows devices to connect to the internet or communicate with each other wirelessly. Bluetooth, on the other hand, is a wireless technology that enables short-range communication between devices such as smartphones, tablets, and computers. Both Wi-Fi and Bluetooth are widely used in various devices to provide wireless connectivity and facilitate data transfer.
21.
Which ones are types of beoadband connection
Correct Answer
A. DSL
Explanation
DSL (Digital Subscriber Line) is a type of broadband connection that uses existing telephone lines to transmit data. It provides high-speed internet access and allows for simultaneous use of phone and internet services. DSL is a popular choice for residential and small business users due to its availability and affordability. It offers faster speeds than traditional dial-up connections and is more reliable than wireless options in areas with poor cellular coverage. DSL technology utilizes different frequencies to separate voice and data signals, ensuring efficient and uninterrupted internet connectivity.
22.
What does WEP mean
Correct Answer
A. Wired equivalent privacy
Explanation
WEP stands for Wired Equivalent Privacy. It is a security protocol used to protect wireless networks. The term "wired equivalent" implies that the level of security provided by WEP is comparable to that of a wired network. WEP encrypts data transmitted over a wireless network to prevent unauthorized access and protect the privacy of the information being transmitted. Despite its initial popularity, WEP has been found to have significant security vulnerabilities and is no longer considered a secure option for wireless network encryption.
23.
VPN means
Correct Answer
A. Virtual private network
Explanation
VPN stands for virtual private network. It is a technology that allows users to create a secure and encrypted connection over a public network, such as the internet. By using a VPN, individuals can access the internet privately and securely, as the VPN encrypts their data and hides their IP address. This helps to protect sensitive information, maintain privacy, and bypass censorship or restrictions imposed by governments or internet service providers. Overall, a virtual private network provides a secure means of connecting to the internet and ensures that online activities remain private and anonymous.