What special technology allows computers to perform the intense processing need to perform machine learning?

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

A unique hardware address for your device

When describing a client/server network, which of the following would be considered a client?

Which of the following is an example of a personal area network?

phone and computer connected via Wi-Fi

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

What is the U.S. Federal Communication Commission’s role in regard to Internet access?

To release rules surrounding Internet access

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

Which of the following is true about broadband connections?

Broadband connections are “always-on” connections.

What internal device does a computer use to connect to a wired or a wireless network?

Which of the following network standards applies to cellular networks?

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

What does a DSL modem use to send and receive digital data?

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers’ sales transactions from his laptop as he travels.

Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea’s normal shopping habits and identify it as credit card fraud?

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?

SaaS. Cloud consumers most commonly interact with Software as a Service (SaaS), which is software that is distributed online. Zoom, an online conference call app, is a popular SaaS.

Terrance needs to set up a Windows server in his company’s public cloud. What kind of cloud service will work best for this situation?

IaaS (Infrastructure as a Service) is a type of cloud service that allows customers to configure cloud-based networking infrastructure the way they want, such as routing, servers, operating systems, storage spaces, and security settings.

Charlie’s company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?

What technology allows Siri to understand you when you request a route to a location in a nearby city?

Natural language processing (NLP)

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina’s job role?

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?

Video conferencing application

Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle’s car using?

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she’s away from home?

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian’s wait time?

Artificial intelligence (AI)

For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

What special technology allows computers to perform the intense processing needed to perform machine learning?

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she’s at home?