100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IT 105 Final Exam GMU Questions With Correct Answers $11.49   Add to cart

Exam (elaborations)

IT 105 Final Exam GMU Questions With Correct Answers

 5 views  0 purchase
  • Course
  • GMU IT 105
  • Institution
  • GMU IT 105

©THEBRIGHT EXAM STUDY SOLUTIONS 8/21/2024 1:28 PM IT 105 Final Exam GMU Questions With Correct Answers Two or more computers that are linked together. - answerA basic computer network can be described as LAN - answerlocal area network distance - answerThe primary difference between a LAN and...

[Show more]

Preview 2 out of 7  pages

  • August 28, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • GMU IT 105
  • GMU IT 105
avatar-seller
Thebright
©THEBRIGHT EXAM STUDY SOLUTIONS 8/21/2024 1:28 PM



IT 105 Final Exam GMU Questions With
Correct Answers

Two or more computers that are linked together. - answer✔✔A basic computer network can be
described as

LAN - answer✔✔local area network

distance - answer✔✔The primary difference between a LAN and a WAN

Connection point - answer✔✔Each individual computer and component attached to a network is
a

cables - answer✔✔In a traditional LAN, each node of the network is connected through:

MAN - answer✔✔metropolitan area network

router - answer✔✔The hardware device or software program that sends messages between
networks is known as a:

NIC - answer✔✔network interface card

bits per second - answer✔✔Modem speed is measured in:

Bandwidth - answer✔✔The term for the amount of information transmitted through a
communication medium in a certain amount of time

fiber-optic cables - answer✔✔type of cables uses light waves to carry information at high speed

firewall - answer✔✔helps block unauthorized access and data transfer

Trojan horse - answer✔✔A program that performs a useful task while simultaneously allowing
destructive acts is a

Virus - answer✔✔An intentionally disruptive program that spreads from program to program or
from disk to disk is known as

Worm - answer✔✔A type of virus uses computer hosts to reproduce itself

, ©THEBRIGHT EXAM STUDY SOLUTIONS 8/21/2024 1:28 PM
a denial of service attack - answer✔✔When customers of a Web site are unable to access it due
to a bombardment of fake traffic, is is known as

encryption - answer✔✔The scrambling of code is known as

True - answer✔✔Information security is the practice of defending information from
unauthorized access.

True - answer✔✔A computer worm is a standalone malware computer program that replicates
itself in order to spread to other computers

False - answer✔✔Hoax viruses flood a targeted computer with so many requests that it cripples
functionality.

True - answer✔✔The most complex type of firewall is the application proxy firewall

True - answer✔✔A router is a hardware component used to interconnect networks

4 - answer✔✔How many layers are there in the TCP/IP protocol suite?

128 - answer✔✔IPv6 addresses are how many bits long?

False - answer✔✔UDP provides sequencing, error control and flow control just like TCP

CAT 2, CAT 3, and CAT 5 - answer✔✔What are standard twisted pair cables?

Contextual Computing - answer✔✔Which technology uses software and hardware to
automatically collect and analyze data about a device's surroundings, to present relevant,
actionable information to the end user?

Workplace Hub - answer✔✔Which technology serves as a centralized IT ecosystem that
automates IT processes and unifies all of user's existing technologies (including hardware,
software, and services) into a one stop connected platform?

Non-Immersive, Semi-immersive, and Fully-immersive - answer✔✔Simulation types for
implementing of virtual reality technology?

CNN, DNN, and LSTM - answer✔✔Deep Learning Algorithms?

Big Data Analytics - answer✔✔the process of examining large and varied data sets to uncover
hidden patterns, correlations, and information to help make business decisions

172.16.64.0 - answer✔✔subnet

Class A - answer✔✔terms of classful IPv4 addressing, what class is the following IPv4 address
75.0.0.7

False - answer✔✔Decryption is the process of converting plaintext into ciphertext

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Thebright. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart