• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
A progam infected with a virus must be executed for the virus to run
True
Coaxial cable has a single copper wire down the middle and a braided shield
True
10Bases5 Ethernet uses twisted-pair cabling rated CAT-3 or higher and an RJ-45 connector.
False
A hub is smarter and more efficient than a switch and keeps a table of all the devices connected to it.
False
A subnet mask is a group of four dotted decimal numbers that tell the TCP/IP if a computer's IP address is on the same or a different network.
True
You can see the status of the wireless connection by double clicking the Wireless Network Connection icon in the Netwwork Connections window.
True
In TCP/IP, the protocol that guarantees packet delivery is IP.
False
A cable modem uses phone lines for transmisson and is bundled with your local phone service.
False
With DSL,a telephone filter must be installed on every phone jack in the house that is being used by a telephone, fax machine , or dial-up modem.
True
A web browser can serve as an FTP client.
True
Authorization proves that an individual is who he says he is.
False
You can share both encrypted folders and files.
False
A multipartite virus is a combination of a boot virus and a file virus and can hide in either.
True
A script virus hides in the boot sector program of a hard drive or floppy disk or in th Master Boot Record (MBR).
False