Career prep

¡Supera tus tareas y exámenes ahora con Quizwiz!

A wireless technology used to connect mobile computer users to the internet across cities and countries.

WiMAX

Most WANs consist of two or more LANs and are connected by _______. a. routers b. modems c. cables d. nodes

a

Which of the following wireless technologies delivers the most speed. a.bluetooth b.DSL c.WiMAX d.P2P

c

Ali reports that there are many benefits of networking such as________.

enhanced communication

A ______ is a network of two or more computers linked together.

network

Transfers data at a high bandwidth over ordinary copper telephone lines.

DSL

A public socketed network is a common carrier network that provides connections among public users.

False

A router joins all the devices of a network together.

False

The Domain Name Server translates the Web address to a packet so it can be switched over the network.

False

The internet is a private network that can only be accessed by users with a passcode.

False

To communicate on a WLAN, the computer and other devices that access the network must contain a modem.

False

VPN is a technology that allows you to make telephone calls over a computer network like the internet.

False

WAN stands for wireless access network.

False

In a ________ network, all the connected computers are equal.

P2P

The international collection of interconnected commercial and government owned voice based systems.

PSTN

A _______directs the flow of data from a local area network to another network connection.

Router

A local network that uses few if any physical wires.

WLAN

WiMAX is an alternative cable and DSL.

True

Most of today's networks use the __________ technology to share data and resources.

IP

The __________ is a worldwide system composed of thousands of smaller networks.

Internet

A common communications protocol is TCP/IP.

True

A computer network requires both software and hardware components.

True

A modem converts analog signals to digital and vice versa.

True

A __________ is a description of the rules computers must follow to facilitate device identification and data transfer.

protocol

A fiber-optic telephone line used for data transfer on a network.

T-1 line

PSTN stands for public switched ______network. a. telephone b. telecommunications c. technology d. triangular

a

A server can support file sharing.

True

Digital, mobile, and standard telephones are supported through the PSTX network.

True

Networks can be categorized by types such as LANs or WANs.

True

The term client/server network describes a network design model.

True

Cable media comes in all of the following types EXCEPT. a.A cable modem uses the same type of cable as used for cable TV. b.The bandwidth is much greater with a cable modem than with a dial-up modem. c.Broadband over powerline is one way to access the internet. d.A DSL modem can transmit data, but not voice.

b

Simon tells the board that all of the employee computers have a unique ____________. a. packet b. IP address c. operating system d. gateway

b

Which of the following is Not true about network risks. a. Server malfunctions or failures mean users temporarily lose access to printers and shared files. b.once set up, a network requires very little ongoing maintenance and management. c.Hackers can steal info d.Some people threaten networks and data by creating viruses and other types of malicious software.

b

a_______ is a hardware that can be used to share mail, databases, and more. a. client b. server c. operating system d. router

b

A ______ network limits its accessibility to only authorized users. a.ISP b.PSN c.Private d.Public

c

Ali learns that _______ is high-speed internet access. a.dial-up b.USB c.broadband d.firewall

c

Simon is in charge of network security at a medium-sized company. His boss has asked him to give an overview of the company's network security to the board of directors. Simon tells the board that he set up a ___________for the employees so they can access work files from home. a. proxy server b.firewall c.Virtual Private Network d.Integrated Services Digital Network

c

Which of the following is NOT an example of malicious code. a.Trojan Horses b.worms c.hackers d.spyware

c

Which of the following is NOT true about network risks? a. As data flows through a number of networks, computers are vulnerable to unauthorized access. b. Malware can cause equipment malfunctions and system failures. c. Networks can grant an individual more autonomy by controlling which software programs are available. d. Natural disasters can cause server malfunctions.

c

_______operating systems provide network control and include special functions for connecting computers and other devices. a.client b.LAN c.Serber d.WAN

c

which of the following is not a type of server operating system? a. Microsoft Windows b. Mac OS X c. Adobe Dreamweaver d. Linux

c

Most troubleshooting tools for your network connection can be found on the _____ in windows

control panel

Which of the following is NOT a classification type for a network? a. client/server b. peer to peer c. internet d. gateway

d

Which of the following is NOT true about connecting to the Internet? a. A cable modem uses the same type of cable as used for cable TV. b. The bandwidth is much greater with a cable modem than with a dial-up modem. c. Broadband over powerline is one way to access the Internet. d. A DSL modem can transmit data, but not voice.

d

Which of the following is true about the benefits of networking? a.people share info through special group projects, databases, blogs, social media, and more. b. one hardware device connected to a network can serve the needs of many users. c. software sharing saves money d. all of the above

d


Conjuntos de estudio relacionados

EMT - Chapter 17: Neurologic Emergencies - Questions (MFD)

View Set

Biology Final (Plant Reproduction Section)

View Set

Stock Bonds and Mutual Funds and Personal Finance Fundamentals

View Set

Chapter 14 & 24 Lab Manual Questions

View Set

Environmental Science OL HW Assignments

View Set

Human Anatomy 260 CH 6. HW terms

View Set