chap 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

To connect peripherals at short ranges, you would use the ________ wireless technology.

Bluetooth

By default, Windows computers are set to obtain an IP address automatically, using ________.

DHCP

Network resources refer only to hardware and files.

False

PAN stands for Public Area Network.

False

The unauthorized use of your neighbor's wireless network is called trolling.

False

The physical layout of a LAN is called its topology.

True

Two wireless devices that are directly connected to each other form an ad hoc network.

True

Network speeds are measured in ________ per second.

bits

A ________ network is a network in which all computers are considered equal.

peer-to-peer

The rules for communication between network devices are called ________.

protocols

Moving through a neighborhood trying to locate open wireless access points is called ________.

wardriving

A workgroup and a homegroup refer to the same network feature.

False

Data travels in both directions in a ring topology.

False

Ethernet standards and equipment for your home LAN are different than those used in a business.

False

Which of the following is NOT a common LAN topology?

Hierarchical

Wi-Fi networks used in homes and public hotspots use the ________.

IEEE 802.11 standards

For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.

LAN

Which of the following statements about P2P networks is FALSE?

The services and security are centralized.

Which of the following is NOT used to transmit signals on an Ethernet network?

Topology

A firewall can be implemented using hardware or software.

True

A firewall can be used to shield your computer from direct access to the Internet.

True

A hybrid network in which several LANs are connected together can be called a Campus Area Network.

True

A peer-to-peer network can connect a Linux computer and a Windows PC.

True

A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.

True

All computers in a P2P network belong to a workgroup.

True

Bluetooth technology connects peripherals wirelessly at short ranges.

True

Fiber networks use optical network terminals to connect to the Internet.

True

In a bus topology, data travels along a single cable that is terminated at both ends.

True

In a network, a file can be an example of a resource.

True

One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain.

True

One of the advantages of using a wired network connection rather than a wireless network connection is speed.

True

Standards ensure that equipment made by different companies work together.

True

The HTTP protocol requests and delivers webpages.

True

The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots.

True

WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.

True

Windows Defender is antimalware software built-in to Microsoft operating systems.

True

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.

VPN

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.

WAN

In a WLAN, devices are connected by ________.

Wi-Fi

One of the most important reasons for Ethernet standards is it ________.

assures equipment from different manufacturers is compatible

A ________ network is one that has at least one computer that provides centralized management, resources, and security.

client-server

A ________ is a network composed of a group of clients and servers under the control of one central security database.

domain

A ________ can be set by an employer to prevent you from accessing eBay.

firewall

P2P networks are normally found in ________.

homes

Each computer is considered equal in a ________ network.

peer-to-peer

When you decide to use your neighbor's open wireless network without permission, you are ________.

piggybacking

A ________ is a device that connects two or more networks together.

router

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

A ________ is a device that connects multiple devices on a LAN

switch

Most home routers also include a built-in ________.

switch


Ensembles d'études connexes

Lesson 15.1: Mental health promotion

View Set

Multiplication (3 word problems)

View Set

a&p ch 20: lymphatic system immunity (innate immunity)

View Set