Standard voice telephone lines

Assignment Help Basic Computer Science
Reference no: EM13806329

1. Standard voice telephone lines, such as those found in residences, limit bandwidth to:

A. 300 Hz B. 3,400 Hz
C. 8,000 Hz D. 20,000 Hz

2. When using data communications with 8-bit codes, the number of alphabetic symbols

A. must be greater than 256 B. must be 256 or greater than 256

C. must be fewer than 256 D. must be 256 or fewer than 256

3. A(n) __________ looks for user behavior that differs from that expected from a legitimate user.

A. ACK B. IDS

C. SSL D. TLS

4. Historically, the most commonly used text code is the _________, in which each character I this code is represented by a unique 7-bit pattern.

A. UTF-8 B. IRA

C. Morse code D. none of the above

 

5. __________ is a monitored behavior

  • a Attempts to open, view, delete, and/or modify files
  •   b Attempts to format disk drives and other unrecoverable disk operations
  • c Modification to the logic of executable files or macros
  • d All of the above

 

6. Which of the following describes class B networks?

a Many networks, each with a few hosts

b Medium number of networks, each with a medium number of hosts

c Few networks, each with many hosts

d A network dedicated to multicast applications

 

7. The IP address is assigned to a network interface on a host when ________.

A. the OS boots up B. the PC connects to the Internet

C. an application is run D. the user requests one

 

8. A practical application for multicasting is:

A. teleconferencing B. multimedia

C. database D. all of the above

9. One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.

A. interruption B. interception

C. modification D. all of the above

10. The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A. active attacks B. passive attacks

C. administrative attacks D. none of the above

11. Which of the following is not an example of intrusion:

a guessing and cracking passwords

b running a packet sniffer on a workstation to capture user names and passwords

c using an unattended, logged-in workstation without permission

d all of the above are examples of intrusion

 

12. A virus can be attached to a program by _________.

a prepending

b postpending

c embedding other than at the beginning or end

d all of the above

13. Which of the following statements regarding macro viruses is true?

a macro virus is platform independent

b macro viruses infect documents, not executable portions of code

c macro viruses are easily spread

d all of the above

14. Which of the following is a type of scanning strategy?

A. hit list B. topological

C. local subnet D. all of the above

15. The WiFi standard known as Privacy with message integrity can be described as follows:

a way of ensuring the privacy of the individual using WiFi

  b technique that ensures that the data transmitted using WiFi have not been altered

  c way of providing mutual authentication between a user and an AS

d none of the above

Reference no: EM13806329

Questions Cloud

Identify the type of inventory system it uses : Use the library, corporate Web sites, and other online resources to locate a firm that incorporates the fixed order quantity system, fixed order period system, or a hybrid system to its management of inventory.
Planning for personal and family security : Governmental Planning Takes Diverse Forms. A partial list of large-scale governmental planning activities would have to include at least the following: (1) planning for the conservation and use of natural resources, (2) city planning, (3) planning..
Hps cloud computing services compare with azure : Based on the Barr (2010) article, how does IBM's Cloud Computing Services compare with those provided by Azure? Based on the Barr (2010) article, how does HP's Cloud Computing Services compare with those provided by Azure
How do written communication skills differ from verbal skill : How can an organization benefit from well-written communication? How do written communication skills differ from verbal communication skills?
Standard voice telephone lines : 1. Standard voice telephone lines, such as those found in residences, limit bandwidth to: A. 300 Hz B. 3,400 HzC. 8,000 Hz D. 20,000 Hz
Submission for the communication plan : Business memo summarizing the submission for the Communication plan If working in a team, include a statement of participation, describing how each person contributed to this project deliverable. Please have each person sign the statement.
How can azure be used as a substitute : Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management
How can windows server manage file services : Based on the Kercher (2010) article, how can Windows Server 2003 manage file services
Fundamentals of corporate acquisitions : Many corporate acquisitions result in losses to the acquiring firms' stockholders. A coworker has asked you to explain what a firm would gain from purchasing another corporation. Explain to the coworker the fundamentals of corporate acquisitions.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd