CP102 - Microcomputers : Chapter 7
False
A P2P network needs network operating system software installed on every node.
B
A ________ is a device connected to a network such as a printer or a game console. a. Packet b. Node c. NOS d. NIC
C
A ________ is a network located in your residence that connects to all your digital devices. a. MAN b. WAN c. HAN d. LAN
C
A client/server network is an example of ________ administration a. Local b. Wide area c. Central d. Remote
A
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. a. Network b. Switch c. Broadband d. Node
A
A large network designed to provide access to a specific geographic area, such as a large city, is a ________. a. MAN b. PAN c. LAN d. WAN
LAN
A network in which the nodes are located within a computer lab is called a(n) ________.
D
A network that spans a large physical distance is called a ________. a. MAN b. LAN c. PAN d. WAN
PAN
A network used to communicate among devices close to one person is called a(n) ________.
A
A peer-to-peer (P2P) network is an example of ________ administration. a. Local b. Wide area c. Central d. Corporate
True
A printer connected to a wireless network is considered to be a node on that network.
False
A router acts like a traffic signal on a network.
A
A(n) ________ device facilitates file sharing and data backup. a. NAS b. WAN c. UTP d. NOS
Switch
A(n) ________ is a device that receives data packets and sends them to their intended nodes while preventing data collisions.
Peer-to-Peer
A(n) ________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.
Evil Twin
A(n) ________ network is set up near a wireless network and has a sound-alike name to lure unsuspecting web surfers.
Wireless
A(n) ________ network uses radio waves as its transmission medium.
B
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. a. Change your network name (SSID) b. Enable SSID broadcast c. Turn on security protocols d. Create a passphrase
D
All of the following are tasks for network administration of a large organization EXCEPT ________. a. Installing new computers and devices on the network b. Updating and installing new software on the network c. Monitoring network performance d. Purchasing initial equipment for the network
C
All of the following operating systems support P2P networking EXCEPT ________. a. Windows b. OS X c. Unix d. Linux
Service Set Identifier
All wireless networks have their own name, referred to as the ________, which is used to identify the network.
B
Client/server networks are controlled by a central server that runs specialized software called a(n) ________. a. Information management system (ISM) b. Network operating system (NOS) c. Digital subscriber line (DSL) d. Service set identifier (SSID)
False
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
Twisted Pair
DSL uses ________ cable.
C
Data are sent through a network in bundles called ________. a. Packages b. Pouches c. Packets d. Nodes
False
Ethernet networks are always connected using twisted-pair cable technology.
B
For the nodes on a network to communicate with each other and access the network, each node needs a ________. a. DSL modem b. Network adapter c. Hub d. Router
False
In a peer-to-peer network, one computer acts as the central computer.
Network Operating System
In terms of networking, NOS stands for ________.
False
Limiting your signal range does not help increase wireless network security.
Metropolitan
Many cities in the United States now provide a(n) ________ area network to allow Internet access to residents and tourists.
B, D, A, C, E
Match each of the following network types to its definition: - HAN - MAN - LAN - PAN - WAN a. Confined to a small geographic location beyond the home b. Services a residence c. Used to communicate among devices near an individual d. Covers a city e. A network that covers a great distance
B, D, A, C, E
Match each of the following terms to its definition: - Fiber-optic - Twisted pair - Coaxial cable - Peer-to-peer - Client/server a. Single copper wire surrounded by layers of plastic b. Made up of plastic or glass and transmits data at extremely fast speeds c. Each node can communicate directly with every other node on the network d. Made up of copper wires e. Central computer provides information and resources to other computers
C, E, A, B, D
Match each of the following terms to its definition: - NOS - Broadband - Router - Switch - NIC a. Directs data traffic between networks b. Handles data traffic between nodes on the same network c. Software used to set up and manage a network d. Connects a node to a network e. High-speed Internet connection
D, C, A, E, B
Match each of the following terms to its definition: - Server - Client - Network - Piggyback - Node a. Two or more computers connected together via software and hardware so they can communicate b. A computer, peripheral, or communication device on a network c. Computer on which users accomplish specific tasks and make specific requests d. Provides information and resources to other computers on a network e. Unauthorized connection to a wireless network
B, C, E, D, A
Match each of the following terms to its definition: - Throughput - Packet - Firmware - Firewall - Bandwidth a. Maximum speed at which data can be transmitted b. The actual speed of data transfer that is achieved on a network c. The format in which data is sent over transmission media d. Hardware or software for protecting computers from hackers e. Instructions in read-only memory
True
Most computers today come with Ethernet adapters already installed.
B
Normal telephone cable is a type of ________. a. Fiber-optic cable b. Twisted-pair cable c. Coaxial cable d. Ethernet cable
D
On a network, a(n) ________ helps prevent data packets from colliding with each other. a. Router b. Hub c. Adapter d. Switch
True
P2P networks are most commonly used in home networks.
Hotspots
Public places where you can wirelessly connect to the Internet are known as ________.
Service Set Identifier
SSID stands for ________.
True
Sharing files is a benefit of a network.
Hacker
Someone who breaks into computer systems to create mischief or steal information is a(n) ________.
A
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? a. Routers and switches b. USB ports c. Firewalls d. Firmware
Cloud
Storing files on the ________ avoids having to save them on multiple devices.
True
The Internet is a WAN.
Backward Compatibility
The capability of current devices to use earlier standards is known as ________.
D
The fastest version of wireless Ethernet is ________. a. 802.11n b. 802.11g c. 802.11ab d. 802.11ac
True
The most popular transmission media option for wired Ethernet networks is UTP cable.
C
The most popular transmission media option for wired home Ethernet networks is ________ cable. a. Fiber-optic b. Power-line c. Unshielded twisted-pair (UTP) d. Coaxial
Network Operating System
The server on a client/server network has specialized ________ software installed.
Architecture
The term network ________ refers to the design of a network.
A
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. a. MAC b. IP c. SSID d. Network
A
To transfer data packets between two or more networks, a ________ is used. a. Router b. Hub c. Firewall d. Switch
C
Using a network without the network owner's permission is known as ________. a. Hijacking b. Spamming c. Piggybacking d. Phishing
False
WEP is a stronger form of security than WPA.
Wired Equivalent Privacy
WEP stands for ________.
Wi-Fi Protected Access
WPA stands for ________.
Encryption
When using a wireless connection, ________ translates data so that it is protected.
D
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network? a. Cat 5E b. Cat 6 c. Cat 6A d. Cat 7B
D
Which of the following is NOT a type of cable used in wired networks? a. Unshielded twisted-pair b. Coaxial c. Fiber-optic d. Unshielded coaxial
B
Which of the following is NOT a wired broadband Internet connection option? a. Cable b. Dial-up c. DSL d. Fiber-optic
C
Which of the following is NOT used to classify network architectures? a. Distance between nodes b. Communication medium c. Speed of the network d. Protocol used to exchange data
D
Which transmission medium transmits data the fastest? a. Twisted-pair cable b. Coaxial cable c. Wireless d. Fiber-optic cable
True
Wireless network connections are slower than wired broadband connections.
C
Wireless network devices use ________ to communicate with each other. a. Fiber optics b. Satellites c. Radio waves d. DSL
True
Wireless networks are more vulnerable to attack than wired networks.
Routers
________ are devices that transfer packets of data between two or more networks.
Coaxial
________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.
Unshielded Twisted-Pair
________ cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference.
Broadband
________ is often referred to as "high-speed Internet."
D
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. a. Benchmark b. Broadband c. Bandwidth d. Throughput
B
________ is the maximum speed at which data can be transferred between two nodes. a. Throughput b. Bandwidth c. Broadband d. Through speed
Piggybacking
________ refers to connecting to a wireless connection without the permission of the owner.