Standard voice telephone lines

Assignment Help Basic Computer Science
Reference no: EM13806329

1. Standard voice telephone lines, such as those found in residences, limit bandwidth to:

A. 300 Hz B. 3,400 Hz
C. 8,000 Hz D. 20,000 Hz

2. When using data communications with 8-bit codes, the number of alphabetic symbols

A. must be greater than 256 B. must be 256 or greater than 256

C. must be fewer than 256 D. must be 256 or fewer than 256

3. A(n) __________ looks for user behavior that differs from that expected from a legitimate user.

A. ACK B. IDS

C. SSL D. TLS

4. Historically, the most commonly used text code is the _________, in which each character I this code is represented by a unique 7-bit pattern.

A. UTF-8 B. IRA

C. Morse code D. none of the above

 

5. __________ is a monitored behavior

  • a Attempts to open, view, delete, and/or modify files
  •   b Attempts to format disk drives and other unrecoverable disk operations
  • c Modification to the logic of executable files or macros
  • d All of the above

 

6. Which of the following describes class B networks?

a Many networks, each with a few hosts

b Medium number of networks, each with a medium number of hosts

c Few networks, each with many hosts

d A network dedicated to multicast applications

 

7. The IP address is assigned to a network interface on a host when ________.

A. the OS boots up B. the PC connects to the Internet

C. an application is run D. the user requests one

 

8. A practical application for multicasting is:

A. teleconferencing B. multimedia

C. database D. all of the above

9. One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.

A. interruption B. interception

C. modification D. all of the above

10. The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A. active attacks B. passive attacks

C. administrative attacks D. none of the above

11. Which of the following is not an example of intrusion:

a guessing and cracking passwords

b running a packet sniffer on a workstation to capture user names and passwords

c using an unattended, logged-in workstation without permission

d all of the above are examples of intrusion

 

12. A virus can be attached to a program by _________.

a prepending

b postpending

c embedding other than at the beginning or end

d all of the above

13. Which of the following statements regarding macro viruses is true?

a macro virus is platform independent

b macro viruses infect documents, not executable portions of code

c macro viruses are easily spread

d all of the above

14. Which of the following is a type of scanning strategy?

A. hit list B. topological

C. local subnet D. all of the above

15. The WiFi standard known as Privacy with message integrity can be described as follows:

a way of ensuring the privacy of the individual using WiFi

  b technique that ensures that the data transmitted using WiFi have not been altered

  c way of providing mutual authentication between a user and an AS

d none of the above

Reference no: EM13806329

Questions Cloud

Identify the type of inventory system it uses : Use the library, corporate Web sites, and other online resources to locate a firm that incorporates the fixed order quantity system, fixed order period system, or a hybrid system to its management of inventory.
Planning for personal and family security : Governmental Planning Takes Diverse Forms. A partial list of large-scale governmental planning activities would have to include at least the following: (1) planning for the conservation and use of natural resources, (2) city planning, (3) planning..
Hps cloud computing services compare with azure : Based on the Barr (2010) article, how does IBM's Cloud Computing Services compare with those provided by Azure? Based on the Barr (2010) article, how does HP's Cloud Computing Services compare with those provided by Azure
How do written communication skills differ from verbal skill : How can an organization benefit from well-written communication? How do written communication skills differ from verbal communication skills?
Standard voice telephone lines : 1. Standard voice telephone lines, such as those found in residences, limit bandwidth to: A. 300 Hz B. 3,400 HzC. 8,000 Hz D. 20,000 Hz
Submission for the communication plan : Business memo summarizing the submission for the Communication plan If working in a team, include a statement of participation, describing how each person contributed to this project deliverable. Please have each person sign the statement.
How can azure be used as a substitute : Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management
How can windows server manage file services : Based on the Kercher (2010) article, how can Windows Server 2003 manage file services
Fundamentals of corporate acquisitions : Many corporate acquisitions result in losses to the acquiring firms' stockholders. A coworker has asked you to explain what a firm would gain from purchasing another corporation. Explain to the coworker the fundamentals of corporate acquisitions.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many bits must the mar register have

Assume you have 512MB of main memory. How many bits must the MAR register have? Show your work.

  Develop a project proposal for an it project

The Individual Projects throughout this course will give you an opportunity to put into practice the Project Management concepts you are learning about. For the first week, your mission is to develop a project proposal for an IT project of your..

  Discrete math problem

Discrete Math problem.What is the number of subsets of {a,b,c,d,e,f,g,h} containing exactly 3 elements?

  Calculate access time when there is cache miss

Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.

  What is the effect of the following statements

what is the effect of the following statements?

  Describe various system changeover methods

Briefly describe various system changeover methods. Suggest a changeover method for the system described in the case study and provide specific reasons to support your choice.

  Write a program that simulates a guessing game in a gui

Write a program that simulates a guessing game in a GUI program.

  Create a if function formula to determatine

Create a if function formula to determatine which boats include a stove with galley. Boats must be able to seat 8 or more people to have stove in the galley.

  Examine about direct cash-payment method

Examine about Direct Cash-Payment method

  Routine and standardized and chaotic is a major challenge

Keeping professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and pr..

  How effective leader can manage changes for new technology

Write down separate 350-word document which explains how the effective leader can manage changes implementing this new technology might need.

  Permeates our data centers

Permeates our data centers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd