Chapter 1 Review / Guide to Networking Essentials, Seventh Edition

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

a. Perform a POST d. Begin the boot procedure. Note: A main function of the BIOS is to tell the CPU to perform certain tasks when power is first applied to the computer, including initializing motherboard hardware, performing a poweron self-test (POST), and beginning the boot procedure.

8. Which of the following is a task usually performed by the BIOS? (Choose all that apply.) a. Perform a POST. b. Create an interrupt. c. Store the operating system. d. Begin the boot procedure.

d. Extranet Note: Extranet sits somewhere between the Internet and an intranet. It allows limited and controlled access to internal network resources by outside users. It's used when two organizations need to share resources, so controls are put in place to allow these organizations to access resources without making resources available to the wider Internet.

A company has just made an agreement with another organization to share their two networks' resources by using TCP/IP protocols. What best describes this arrangement? a. MAN b. LAN c. Intranet d. Extranet

a. LAN Note: A small network, limited to a single collection of machines and connected by one or more interconnecting devices in a small geographic area, is called a local area network (LAN). LANs also form the building blocks for constructing larger networks called "internetworks."

A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following? a. LAN b. MAN c. WAN d. Internetwork

b. ping

A(n) ________ message is used to determine whether a computer is listening on the network. a. MAC b. ping c. IP d. TCP

d. 2, 3, 1, 4 Note: A user's attempt to access network resources is summarized in these basic steps: 1. An application tries to access a network resource by attempting to send a message to it. 2. Network client software detects the attempt to access the network. Client software formats the message generated by the application and passes the message on to the network protocol. 3. The protocol packages the message in a format suitable for the network and sends it to the NIC driver. 4. The NIC driver sends the data in the request to the NIC card, which converts it into the necessary signals to be transmitted across the network medium.

Choose the correct order for the process of a user attempting to access network resources: 1. Network protocol 2. Application 3. Network client 4. NIC driver a. 4, 2, 1, 3 b. 3, 2, 1, 4 c. 1, 4, 2, 3 d. 2, 3, 1, 4 e. 3, 1, 2, 4

b. Encapsulation Note: Encapsulation is the process of adding IP addresses and then MAC addresses to chunks of data. Information added at the front of data is called a Header, and information added at the end of data is called a Trailer.

Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following? a. Packetization b. Encapsulation c. Deencapsulation d. Layering

a. MAC d. Physical (The MAC address is stored as part of the physical NIC, which is why the MAC address is referred to as the "physical address.") Tomsho, Greg (2015-10-29). Guide to Networking Essentials (Page 18). Course Technology. Kindle Edition. Note: A Frame is a packet with the source and destination MAC addresses added to it. In addition, frames have an error-checking code added to the back end of the packet, so the packet is "framed" by MAC addresses (and other network interface information) on one end and an error-checking code on the other. A frame is like a letter that's been addressed and stamped and is ready to deliver. Frames are essentially the final state of data before it's placed on the network medium as bits.

In network communication, the ___________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.) a. MAC b. logical c. IP d. physical

a. Tight security is required. Note: Managing resources and their security is difficult on a peer-to-peer network, even small networks of a few computers sometimes opt to use the server or domain network model.

Peer-to-peer networks aren't suitable in which of the following situations? a. Tight security is required. b. Five or fewer users need network access. c. Budget is the primary consideration. d. No one uses the network heavily.

1. d. Power is applied (to motherboard). 2. b. CPU starts. 3. e. The POST is executed. 4. f. Boot devices are searched 5. a. The OS is loaded into RAM. 6. c. OS services are started. Note: 1. Power is applied to the motherboard. 2. The CPU starts. 3. The CPU carries out the BIOS startup routines, including the POST. 4. Boot devices, as specified in the BIOS configuration, are searched for an OS. 5. The OS is loaded into RAM. 6. OS services are started.

Place the following steps of the boot procedure in order. a. The OS is loaded into RAM. b. CPU starts. c. OS services are started. d. Power is applied. e. The POST is executed. f. Boot devices are searched. .

d. Network protocol NOTE: A network protocol can be likened to a human language. Just as two people who want to communicate must speak the same language, two computers that want to communicate must use the same protocol. An example of a network protocol is TCP/IP.

TCP/IP is an example of which of the following? a. NIC b. Network client c. Network server d. Network protocol e. Device driver

a. DNS

TCP/IP uses __________ to look up a computer's IP address, given its name. a. DNS b. ping c. MAC d. TCP

b. Seek time

The time it takes for read/write heads to move to the correct spot on the platter is called which of the following? a. Rotational delay b. Seek time c. Transfer time d. Access time

c. frame

The unit of information containing MAC addresses and an error-checking code that's processed by the network interface layer is called a __________. a. packet b. ping c. frame d. chunk

a. CPU

The_________ executes instructions provided by computer programs. a. CPU b. NIC c. Hard drive d. USB

b. Core

When a CPU has two or more processors, each one is referred to as a(n) ____________. a. I/O b. Core c. OS d. Flash

c. Chipset Note: The chipset consists of two chips referred to as the Northbridge and the Southbridge. These chips control data transfers between memory, expansion slots, I/O devices, and the CPU. The heat sink sits on top of the chipset to prevent it from overheating.

Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU? a. RAM slots b. IDE connectors c. Chipset d. PCI-Express

b. A computer's primary role in the network is to run user applications and access network resources. Note: What the term "client" means depends on the context in which it's used. To clarify, it's usually used in these three contexts: Client operating system—The OS installed on a computer is designed mainly to access network resources, even though it might be capable of sharing its own resources. Windows 10, Windows 8.1, and Mac OS X fit this description, for example, as do certain distributions of Linux. A client OS is also often referred to as a "desktop OS." Client computer—This computer's primary role in a network is to run user applications and access network resources. Most computers in a network fit this description. Client software—It's the software that requests network resources from server software running on another computer. For example, a Web browser, an e-mail client (such as Microsoft Outlook), and Client for Microsoft Networks fit into this category.

Which of the following best describes a client? a. A computer's primary role in the network is to give other computers access to network resources and services. b. A computer's primary role in the network is to run user applications and access network resources. c. It's the software that responds to requests for network resources. d. The OS installed on a computer is designed mainly to share network resources.

a. Decentralized data storage b. Inexpensive c. User-managed resources

Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.) a. Decentralized data storage b. Inexpensive c. User-managed resources d. Centralized control e. Uses a directory service

a. Processing c. Input e. Output

Which of the following is a basic function a computer performs? (Choose all that apply.) a. Processing b. Internet access c. Input d. Graphics e. Output f. E-mail

a. USB or flash drive d. Hard drive Note: Long-term storage maintains its data even when there's no power. Examples include hard disks, CDs/DVDs, and USB flash drives as well as other types of removable media.

Which of the following is considered long-term storage? (Choose all that apply.) a. USB or flash drive b. RAM c. Working storage d. Hard drive

b. Network client Note: Network server software allows a computer to share its resources by fielding resource requests generated by network clients. Network protocols, which define the rules and formats a computer must use when sending information across the network.

Which of the following requests information stored on another computer? a. NIC b. Network client c. Network server d. Network protocol e. Device driver

d. Directory services Note: The software managing centralized access and security is a directory service. On Windows servers, the directory service software is Active Directory, and it's what makes a Windows server a domain controller.

You have installed Windows Server 2012 on a new server and want to centralize user logins and security policies. What type of software should you install and configure on this server? a. Naming services b. Application services c. Communication services d. Directory services

b. Device driver Note: Every NIC card installed in a computer must have an associated device driver installed in the OS. The device driver software manages the details of communicating with the NIC hardware to send and receive data to and from network media.

You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC? a. Network application b. Device driver c. BIOS d. Protocol

d. PCI-Express

You want to purchase a high-performance graphics card for your computer. Which type of connector should it have? a. PCI b. SATA c. IDE d. PCI-Express

b. Peer-to-peer network Note: No dedicated hardware or server OS required, making initial costs lower; lost productivity caused by increasing complexity can raise costs in the long run 1. Computers function as clients or servers, as circumstances dictate. 2. No centralized control over who has access to network resources; every user must act as the administrator and maintain control over his or her own shared resources. 3. Physically, a peer-to-peer network looks just like a server-based network; mainly, location and control over resources differentiate the two.

You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install? a. Server-based network b. Peer-to-peer network c. Wide area network d. Storage area network

c. Internetwork Note: Internetworking is the practice of connecting a computer network with other networks through the use of a router or gateway device that provide a common method of routing information packets between the networks. The resulting system of interconnected networks are called an internetwork, or simply an internet.

You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure? a. WAN b. MAN c. Internetwork d. Extended LAN


संबंधित स्टडी सेट्स

Ch 25: Assessment of Cardiovascular Function (2)

View Set

NCLEX ch 25 The Postpartum Period and Associated Complications

View Set

Chapter 4 - The Banking Services of Financial Institutions

View Set

General Psychology Chapter 8 Inquizitive

View Set

Critical Thinking Ch. 3-4 Study Guide

View Set