IS 101 - TMCC - TECHNOLOGY IN ACTION - CHAPTER 12 QUIZ

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A ________ topology uses more than one type of topology when building a network.

hybrid

A MAC address

is used for internal identification purposes on a network.

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

jam

The physical address assigned to each network adapter is called its ________ address.

media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

network

Which device is primarily responsible for network nodes being able to communicate with each other?

network adapter

NOS software is needed

on all computers in a client/server network.

The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network

topology.

Which type of server is used to host websites on a client/server network?

web

Scalability:

A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.

Centralized:

A characteristic of client/server networks where the server, not the individual nodes, provide services such as data security.

Decentralized:

A characteristic of peer-to-peer networks where the individual nodes provide services such as data security.

Open Systems Interconnection (OSI):

A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.

Client/server network:

A type of network that uses servers to deliver services to computers that are requesting them (clients).

________ is the standard communications protocol used on most client/server networks.

Ethernet

A bridge sends information between two networks.

False

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

False

An international company like Microsoft would use a MAN to connect all of its computers.

False

Data flows in both directions around the ring in a ring network.

False

MAC addresses and IP addresses are the same thing.

False

MAC addresses are restricted to Macintosh computers.

False

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

False

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Fiber-optic

A(n) ________ address is the address that external entities use when communicating with your network.

IP

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

The computers in a lab on a floor of a building would be connected using a ________.

LAN

Network adapters send data packets based on a(n)

MAC address.

Special software that needs to be installed on each computer connected to a network is known as ________ software.

NOS

A network consisting of devices used by a single person connected via wireless media is a

PAN.

Network administrator:

Person who maintains networks for a business or organization.

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks.

The process whereby users prove they have authorization to use a computer network is known as

authentication.

Which of the following is used to increase security on a client/server network?

bastion host

A ________ sends data from one collision domain to another.

bridge

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

bus

A ________ network can contain servers as well as individual computers.

client/server

Which server would a client/server network include to control data exchanges with other networks?

communications

Which of the following is NOT an advantage of installing a network in a business?

decentralization of files and data

Fiber-optic cable most likely would be used in a business network when

electrical or magnetic interference is present.

Which network cable type is virtually immune to signal interference?

fiber-optic

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

True

Transmission media comprise the system that data takes to flow between devices on the network.

True

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

True

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

To manage authorized connections to internal networks, which server would a client/server network include?

authentication

Providing adequate security on a corporate network involves all of the following issues EXCEPT

proprietary software encryption.

Which topology tends to provide the fairest allocation of network resources?

ring

On client/server networks, bridges

route data between two collision domains on a single network.

A ________ sends information between two networks.

router

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

scalability.

Which of the following is an advantage of installing a client/server network in a business?

sharing of peripherals

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

spooler

Which of the following is the most widely used network topology today?

star

Which device is used to send data on a specific route through an internal network?

switch

Which is NOT a key component of a typical client/server network?

terminator

Ring networks use the ________ method to avoid data collisions.

token


Kaugnay na mga set ng pag-aaral

Unit One: Basic Economic Concepts

View Set

Nurs 107 PrepU Chapter 49 Management of Patients with Urinary Disorders

View Set

Information Systems 300 CHAPTER 10

View Set

Chapter 57: Care of Patients with Inflammatory Intestinal Disorders

View Set

OSHA-10 Emergency Action Plans and Fire Protection

View Set

Chapter 11 Study Guide Eyes and Ears

View Set