CP102 - Microcomputers : Chapter 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

False

A P2P network needs network operating system software installed on every node.

B

A ________ is a device connected to a network such as a printer or a game console. a. Packet b. Node c. NOS d. NIC

C

A ________ is a network located in your residence that connects to all your digital devices. a. MAN b. WAN c. HAN d. LAN

C

A client/server network is an example of ________ administration a. Local b. Wide area c. Central d. Remote

A

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. a. Network b. Switch c. Broadband d. Node

A

A large network designed to provide access to a specific geographic area, such as a large city, is a ________. a. MAN b. PAN c. LAN d. WAN

LAN

A network in which the nodes are located within a computer lab is called a(n) ________.

D

A network that spans a large physical distance is called a ________. a. MAN b. LAN c. PAN d. WAN

PAN

A network used to communicate among devices close to one person is called a(n) ________.

A

A peer-to-peer (P2P) network is an example of ________ administration. a. Local b. Wide area c. Central d. Corporate

True

A printer connected to a wireless network is considered to be a node on that network.

False

A router acts like a traffic signal on a network.

A

A(n) ________ device facilitates file sharing and data backup. a. NAS b. WAN c. UTP d. NOS

Switch

A(n) ________ is a device that receives data packets and sends them to their intended nodes while preventing data collisions.

Peer-to-Peer

A(n) ________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.

Evil Twin

A(n) ________ network is set up near a wireless network and has a sound-alike name to lure unsuspecting web surfers.

Wireless

A(n) ________ network uses radio waves as its transmission medium.

B

All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. a. Change your network name (SSID) b. Enable SSID broadcast c. Turn on security protocols d. Create a passphrase

D

All of the following are tasks for network administration of a large organization EXCEPT ________. a. Installing new computers and devices on the network b. Updating and installing new software on the network c. Monitoring network performance d. Purchasing initial equipment for the network

C

All of the following operating systems support P2P networking EXCEPT ________. a. Windows b. OS X c. Unix d. Linux

Service Set Identifier

All wireless networks have their own name, referred to as the ________, which is used to identify the network.

B

Client/server networks are controlled by a central server that runs specialized software called a(n) ________. a. Information management system (ISM) b. Network operating system (NOS) c. Digital subscriber line (DSL) d. Service set identifier (SSID)

False

Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.

Twisted Pair

DSL uses ________ cable.

C

Data are sent through a network in bundles called ________. a. Packages b. Pouches c. Packets d. Nodes

False

Ethernet networks are always connected using twisted-pair cable technology.

B

For the nodes on a network to communicate with each other and access the network, each node needs a ________. a. DSL modem b. Network adapter c. Hub d. Router

False

In a peer-to-peer network, one computer acts as the central computer.

Network Operating System

In terms of networking, NOS stands for ________.

False

Limiting your signal range does not help increase wireless network security.

Metropolitan

Many cities in the United States now provide a(n) ________ area network to allow Internet access to residents and tourists.

B, D, A, C, E

Match each of the following network types to its definition: - HAN - MAN - LAN - PAN - WAN a. Confined to a small geographic location beyond the home b. Services a residence c. Used to communicate among devices near an individual d. Covers a city e. A network that covers a great distance

B, D, A, C, E

Match each of the following terms to its definition: - Fiber-optic - Twisted pair - Coaxial cable - Peer-to-peer - Client/server a. Single copper wire surrounded by layers of plastic b. Made up of plastic or glass and transmits data at extremely fast speeds c. Each node can communicate directly with every other node on the network d. Made up of copper wires e. Central computer provides information and resources to other computers

C, E, A, B, D

Match each of the following terms to its definition: - NOS - Broadband - Router - Switch - NIC a. Directs data traffic between networks b. Handles data traffic between nodes on the same network c. Software used to set up and manage a network d. Connects a node to a network e. High-speed Internet connection

D, C, A, E, B

Match each of the following terms to its definition: - Server - Client - Network - Piggyback - Node a. Two or more computers connected together via software and hardware so they can communicate b. A computer, peripheral, or communication device on a network c. Computer on which users accomplish specific tasks and make specific requests d. Provides information and resources to other computers on a network e. Unauthorized connection to a wireless network

B, C, E, D, A

Match each of the following terms to its definition: - Throughput - Packet - Firmware - Firewall - Bandwidth a. Maximum speed at which data can be transmitted b. The actual speed of data transfer that is achieved on a network c. The format in which data is sent over transmission media d. Hardware or software for protecting computers from hackers e. Instructions in read-only memory

True

Most computers today come with Ethernet adapters already installed.

B

Normal telephone cable is a type of ________. a. Fiber-optic cable b. Twisted-pair cable c. Coaxial cable d. Ethernet cable

D

On a network, a(n) ________ helps prevent data packets from colliding with each other. a. Router b. Hub c. Adapter d. Switch

True

P2P networks are most commonly used in home networks.

Hotspots

Public places where you can wirelessly connect to the Internet are known as ________.

Service Set Identifier

SSID stands for ________.

True

Sharing files is a benefit of a network.

Hacker

Someone who breaks into computer systems to create mischief or steal information is a(n) ________.

A

Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? a. Routers and switches b. USB ports c. Firewalls d. Firmware

Cloud

Storing files on the ________ avoids having to save them on multiple devices.

True

The Internet is a WAN.

Backward Compatibility

The capability of current devices to use earlier standards is known as ________.

D

The fastest version of wireless Ethernet is ________. a. 802.11n b. 802.11g c. 802.11ab d. 802.11ac

True

The most popular transmission media option for wired Ethernet networks is UTP cable.

C

The most popular transmission media option for wired home Ethernet networks is ________ cable. a. Fiber-optic b. Power-line c. Unshielded twisted-pair (UTP) d. Coaxial

Network Operating System

The server on a client/server network has specialized ________ software installed.

Architecture

The term network ________ refers to the design of a network.

A

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. a. MAC b. IP c. SSID d. Network

A

To transfer data packets between two or more networks, a ________ is used. a. Router b. Hub c. Firewall d. Switch

C

Using a network without the network owner's permission is known as ________. a. Hijacking b. Spamming c. Piggybacking d. Phishing

False

WEP is a stronger form of security than WPA.

Wired Equivalent Privacy

WEP stands for ________.

Wi-Fi Protected Access

WPA stands for ________.

Encryption

When using a wireless connection, ________ translates data so that it is protected.

D

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network? a. Cat 5E b. Cat 6 c. Cat 6A d. Cat 7B

D

Which of the following is NOT a type of cable used in wired networks? a. Unshielded twisted-pair b. Coaxial c. Fiber-optic d. Unshielded coaxial

B

Which of the following is NOT a wired broadband Internet connection option? a. Cable b. Dial-up c. DSL d. Fiber-optic

C

Which of the following is NOT used to classify network architectures? a. Distance between nodes b. Communication medium c. Speed of the network d. Protocol used to exchange data

D

Which transmission medium transmits data the fastest? a. Twisted-pair cable b. Coaxial cable c. Wireless d. Fiber-optic cable

True

Wireless network connections are slower than wired broadband connections.

C

Wireless network devices use ________ to communicate with each other. a. Fiber optics b. Satellites c. Radio waves d. DSL

True

Wireless networks are more vulnerable to attack than wired networks.

Routers

________ are devices that transfer packets of data between two or more networks.

Coaxial

________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.

Unshielded Twisted-Pair

________ cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference.

Broadband

________ is often referred to as "high-speed Internet."

D

________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. a. Benchmark b. Broadband c. Bandwidth d. Throughput

B

________ is the maximum speed at which data can be transferred between two nodes. a. Throughput b. Bandwidth c. Broadband d. Through speed

Piggybacking

________ refers to connecting to a wireless connection without the permission of the owner.


Set pelajaran terkait

Management 101: Cengage Chapter 2

View Set

DOMANDE AREA TP TRATTAMENTO UNGUEALE

View Set

Arithmetic Sequences, Geometric Sequences

View Set

Ch 13 Small Business Accounting: Projecting and Evaluating Performance

View Set

Disorders of Neuromuscular Function

View Set

CSC 415 Operating Systems All Units

View Set

N128 Week 2 - Adaptive Quizzing #2

View Set