100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IT 105 GMU Final Exam Questions and Solutions $14.99
Add to cart

Exam (elaborations)

IT 105 GMU Final Exam Questions and Solutions

 0 purchase

A basic computer network can be described as: - Two or more computers that are linked together LAN stands for: - local area network The primary difference between a LAN and a WAN is: - distance Each individual computer and component attached to a network is a: - Node In a traditional LA...

[Show more]

Preview 2 out of 5  pages

  • January 3, 2025
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (1)
avatar-seller
CleanA
IT 105 GMU Final Exam Questions and
Solutions
A basic computer network can be described as: - Two or more computers that are
linked together


LAN stands for: - local area network


The primary difference between a LAN and a WAN is: - distance


Each individual computer and component attached to a network is a: - Node


In a traditional LAN, each node on the network is connected through: - Cables


MAN stands for: - Metropolitan area network


The hardware device or software program that sends messages between networks
is known as a: - Router


NIC stands for: - Network Interface Card


Computer bits must be ___________ to travel over phone lines - Analog signals


Modem speed is measured in: - Bits per second

, What is the term for the amount of information transmitted through a
communication medium in a certain amount of time? - Bandwidth


What type of cable uses light waves to carry information at high speed? - Fiber-
optic cables


What helps block unauthorized access and data transfer? - A firewall


A program that performs a useful task while simultaneously allowing destructive
acts is a: - Trojan horse


An intentionally disruptive program that spreads from program to program or from
disk to disk is known as a: - Virus


What type of virus uses computer hosts to reproduce itself? - Worm


When customers of a Web site are unable to access it due to a bombardment of
fake traffic, it is known as: - A denial of service attack


The scrambling of code is known as: - Encryption


Information security is the practice of defending information from unauthorized
access. - True


A computer worm is a standalone malware computer program that replicates itself
in order to spread to other computers. - True

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller CleanA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62774 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$14.99
  • (0)
Add to cart
Added