CSC chap 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A ________ is a network composed of a group of clients and servers under the control of one central security database. client workgroup homegroup domain

Domain

Data travels in both directions in a ring topology. True False

False

Network resources refer only to hardware and files. True False

False

The unauthorized use of your neighbor's wireless network is called trolling. True False

False

Which of the following is NOT a common LAN topology? Hierarchical Star Ring Bus

Hierarchial

When you decide to use your neighbor's open wireless network without permission, you are ________. wardriving piggybacking hacking trolling

Piggybacking

A ________ is a device that connects two or more networks together. modem router hub switch

Router

A ________ is a device that connects multiple devices on a LAN. repeater switch bus router

Switch

Most home routers also include a built-in ________. network interface card hub range extender switch

Switch

Which of the following statements about P2P networks is FALSE? All computers are considered equal. The services and security are centralized. They can only support a small number of devices. They can share a printer.

The services and security are centralized

A firewall can be used to shield your computer from direct access to the Internet. True False

True

A hybrid network in which several LANs are connected together can be called a Campus Area Network. True False

True

A star topology allows nodes to be easily added, removed, or moved, without disrupting the network. True False

True

In a network, a file can be an example of a resource. True False

True

One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain. True False

True

The HTTP protocol requests and delivers webpages. True False

True

The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots. True False

True

Windows Defender is antimalware software built-in to Microsoft operating systems. True False

True

In a WLAN, devices are connected by ________. Bluetooth ultraviolet Wi-Fi RFID

WiFi

One of the most important reasons for Ethernet standards is it ________. can prevent unauthorized users from accessing the Internet prevents overburdening your computer assures equipment from different manufacturers is compatible allows the government to keep tabs on what you are doing

assures equipment from different manufacturers is compatible


Ensembles d'études connexes

Quiz AP Econ Ch 24B Macro Economic Growth Barron

View Set

Biology Ch 27: Characteristics of Animals -If the question does not start capitalized choose the answer that is capitalized.

View Set

AH PrepU - Chapter 30: Peripheral Vascular Problems

View Set

Microeconomics 232, Unit 2 quiz answers

View Set

Extension of the Elbow: Synergist & Antagonist Muscles

View Set

California Real Estate Practice Chapter 5 Rockwell Slides

View Set

Person-Centered Care and the Nursing Process UNIT III

View Set

RNSG 2201 Care of Children and Families Ch 14 Evolve

View Set