Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
A progam infected with a virus must be executed for the virus to run
|
True
|
|
Coaxial cable has a single copper wire down the middle and a braided shield
|
True
|
|
10Bases5 Ethernet uses twisted-pair cabling rated CAT-3 or higher and an RJ-45 connector.
|
False
|
|
A hub is smarter and more efficient than a switch and keeps a table of all the devices connected to it.
|
False
|
|
A subnet mask is a group of four dotted decimal numbers that tell the TCP/IP if a computer's IP address is on the same or a different network.
|
True
|
|
You can see the status of the wireless connection by double clicking the Wireless Network Connection icon in the Netwwork Connections window.
|
True
|
|
In TCP/IP, the protocol that guarantees packet delivery is IP.
|
False
|
|
A cable modem uses phone lines for transmisson and is bundled with your local phone service.
|
False
|
|
With DSL,a telephone filter must be installed on every phone jack in the house that is being used by a telephone, fax machine , or dial-up modem.
|
True
|
|
A web browser can serve as an FTP client.
|
True
|
|
Authorization proves that an individual is who he says he is.
|
False
|
|
You can share both encrypted folders and files.
|
False
|
|
A multipartite virus is a combination of a boot virus and a file virus and can hide in either.
|
True
|
|
A script virus hides in the boot sector program of a hard drive or floppy disk or in th Master Boot Record (MBR).
|
False
|