HUI 81.doc



1.To _____ is to send data to a satellite.
1. uplink 2. downlink 3. modulate 4. demodulate
2.Which among the following is considered a line of sight communication medium?
1. Broadcast radio 2. Satellite communication 3. Bluetooth 4. Infrared
3.The capacity of a communication channel is measured in
1. bandwidth. 2. bit capacity. 3. band rate. 4. data flow.
4.A special computer that checks all communication that passes through it between a company’s internal networks and the outside world is called a
1. base station. 2. node. 3. supercomputer. 4. proxy server.
5.Organizations use the following to allow suppliers and others limited access to their networks.
1. intranets 2. extranets 3. firewalls 4. proxy servers
6. A unique numeric address used by the computer to deliver e-mail and to locate Web sites is called the
1. domain address. 2. protocol address. 3. IP address. 4. Web address.
7.This law gives you the right to look at your personal records held by government agencies:
1. Gramm-Leach-Bliley Act 2. Freedom of Information Act 3. Family Educational Rights and Privacy Act 4. Computer Fraud and Abuse Act
8.The most important procedure to protect software and data is to
1. screen applicants to be sure they have no previous records. 2. guard passwords and frequently change them. 3. make frequent backups of data and store them in remote locations. 4. audit data and programs once a year
9.A common way to protect information being sent over a network, when long distance is involved, is
1. restricting access. 2. putting up a firewall. 3. providing passwords. 4. encrypting.
10.Theft can take many forms – of hardware, of software, of data, of computer time. White-collar computer crime frequently involves the theft of
1. applications. 2. company’s computer time. 3. data. 4. property.