Chapter 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

A(n) ______ server is a server used to fulfill one specific purpose.

dedicated

Printer Servers:

Manage all printing jobs for client computers

Database Servers

Provide client computers with database access

Application Servers

Serve as a repository for application software

E-mail Servers

Store and manage files for network users

File Servers

Store and manage files for network users

Client/server networks are generally more secure than P2P networks

True

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

True

A(n) ____ is made up of two or more LANs that are miles apart

WAN

Bus topology (linear)

) is where all computers are connected in sequence on a single cable. ADV.Simple installation, lowcost. DIS.If there is a break in the cable, network is disrupted. Only one cpu communicates at a time= increase cpus = delayed data

Why are P2P networks not usually installed in businesses? A) Security is stronger on client/server networks. B) They require dedicated servers. C) They are more scalable than client/server networks.- more users can be + easily w/o affecting performance other nodes D) Client/server networks are cheaper to install.

A) Security is stronger on client/server networks.

A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database

A) file

A ________ is a set of rules for how information and communication are exchanged. A) protocol B) token C) frame D) packet

A) protocol

To manage authorized connections to the internal network, which server would a client/server network include? A) Internet B) authentication C) communications D) application

B) authentication

Which of the following is an advantage of installing a client/server network in a business? A) centralization of network adapters B) centralization of network security protection- central server is protected instead of each cpu C) decentralization of files and data D) decentralization of peripherals

B) centralization of network security protection

I. switch B II. firewall C III. router E IV. bridge D V. packet A A. data broken into a small segment with an address to which it is sent B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node C. software or hardware that prevents unauthorized entry D. sends data between different collision domains E. device that sends information between two networks

B, C, E, D, A

I. authentication II. web III. cloud IV. database V. application A. acts as a repository for application software B. keeps track of user logins to the network and which services are available to each user C. a server not physically located at a company's site D. allows client computers to access a database E. hosts websites that can be accessed via the Internet

B, E, C, D, A

Why are client/server networks usually installed in businesses? A) Security is weaker on client/server networks. B) They do not require dedicated servers like P2P networks. C) They are more scalable than P2P networks. D) Client/server networks are cheaper to install.

C) They are more scalable than P2P networks.

Which of the following is not an advantage of installing a network in a business? A) enables peripheral sharing B) enables software sharing C) decentralization of files and data D) centralization of files and data

C) decentralization of files and data

Ring networks use the ________ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check

C) token

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

FALSE

Communication Servers

Handle all communications between the network and other networks

Web/Cloud Servers

Host websites to make them available through the internet

Authentication Servers

Keep track of users logged onto the network

Hybrid topology

combining multiple topologies into one network

Star topology

is the most widely used in client/server networks because it offers the most flexibility for a low price. The nodes connect to a central communications device-switch in a pattern resembling a star. ADV. failure of one cpu does not affect the rest; easy to add nodes; centralization makes troubleshooting repairs easier DIS. requires more cables, if switch fails all is lost

Ring topology (loop)

is where all the computers and peripherals in a ring (loop) laid out in a configuration resembling a circle. Data moves in one direction only. Data is passed using token, special data packet. Only one CPU can hold onto token at one time passing it along actively when data transmission is complete another token is generated and passed: token method. ADV. use of token= equal chance to send data, performance is not affected by # of cpus DIS. if one computer fails to retransmit token= halt; hard for network admin to find; easy to exp and but doing so ceases function until cpu is installed

Network topology

refers to the physical or logical arrangement of computers, transmission media (cable) and other network components.

A(n) ____server is used to host an Internet site.

web


Conjuntos de estudio relacionados

Solutions Pre-Int 3rd Ed 3G Expressing likes and dislikes prepositions

View Set

ISQS 4348 - Business Systems Analysis

View Set

End of life and Emergency response lab test

View Set

Gonadotropin hormones and their receptors

View Set