This device converts digital signals so they can travel over an analogue telephone line.
Modem
Storing files on large groups of remote networked servers accessed via the internet is called.
Cloud Storage
A password such as “12345” is commonly described with this adjective.
Weak
Unlocking a phone with a fingerprint uses this general method of authentication.
Biometric authentication.
A remote meeting that uses only voice (no images) is called this type of conferencing.
Audio-conferencing
It reads destination IP addresses and chooses the best path to another network.
Router
One everyday benefit: you can reach cloud-stored files from any device as long as you have this.
An internet connection
Name one feature that typically makes a password strong.
Any of: ≥8 characters, mixture of upper- & lower-case letters, digits, symbols, no dictionary words
Name two biometric identifiers other than fingerprints.
Any two of: face, iris, retina, hand geometry, voice, vein pattern.
Give one piece of hardware every participant needs to join a video conference.
e.g., webcam, microphone, camera-equipped phone/laptop
An internal expansion card that lets a computer connect to a LAN.
NIC
Give one security risk that exists because your cloud data is held on a third-party server.
Loss of direct control / increased chance of hacking / provider staff could access it.
In 2-factor authentication, a fingerprint belongs to which factor category?
Something you are” (biometric)
Give one reason automated facial-recognition can be more accurate than a manual visual check.
Electronic comparison reduces human error / can analyse subtle patterns quickly.
State one advantage of audio- over video-conferencing in a directors’ meeting.
Uses less bandwidth / cheaper equipment / eliminates lip-sync issues / affords more privacy
Smart LAN device that forwards incoming frames only to the intended port, not every port.
Switch
Besides subscription fees, name one long-term financial drawback of relying solely on cloud storage.
Ongoing costs can exceed buying local hardware over time
State the three classic categories of authentication factors.
Something you know, something you have, something you are.
Describe one common environmental factor that might cause a facial-recognition system to fail.
e.g., low light, glare, face covering, sunglasses, shadows.
Name one collaboration or communication difficulty that can arise because participants are in different time zones during a web-conference.
Scheduling live sessions may be hard / some attendees may have to join at inconvenient hours
What do the letters IP stand for and what essential job does an IP address perform?
Internet Protocol; it uniquely identifies a device so packets can be routed to it across networks
Explain (in one sentence) why permanently deleting a cloud file is harder than deleting a local file.
Multiple replicated copies may exist on many servers, so every replica and any backups must be erased before the data is truly gone.
Give one benefit and one drawback of using an extremely complex password like P@2zY1Cg93r8d.
Benefit: very hard to crack; Drawback: easy to forget / may need to be written down / easy to mistype
State one privacy concern and one technical concern linked to storing large biometric databases.
Privacy: biometrics can’t be changed if stolen; Technical: high storage/processing demands or system needs strong encryption to protect templates
Explain why a slow internet connection can produce lip-sync or lag in video calls and name one technical fix.
Video requires high bandwidth; if throughput drops, audio & video get out of sync. Fix: upgrade bandwidth, lower resolution, or use better compression.