Chapter 12
A(n) ______ server is a server used to fulfill one specific purpose.
dedicated
Printer Servers:
Manage all printing jobs for client computers
Database Servers
Provide client computers with database access
Application Servers
Serve as a repository for application software
E-mail Servers
Store and manage files for network users
File Servers
Store and manage files for network users
Client/server networks are generally more secure than P2P networks
True
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
True
A(n) ____ is made up of two or more LANs that are miles apart
WAN
Bus topology (linear)
) is where all computers are connected in sequence on a single cable. ADV.Simple installation, lowcost. DIS.If there is a break in the cable, network is disrupted. Only one cpu communicates at a time= increase cpus = delayed data
Why are P2P networks not usually installed in businesses? A) Security is stronger on client/server networks. B) They require dedicated servers. C) They are more scalable than client/server networks.- more users can be + easily w/o affecting performance other nodes D) Client/server networks are cheaper to install.
A) Security is stronger on client/server networks.
A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database
A) file
A ________ is a set of rules for how information and communication are exchanged. A) protocol B) token C) frame D) packet
A) protocol
To manage authorized connections to the internal network, which server would a client/server network include? A) Internet B) authentication C) communications D) application
B) authentication
Which of the following is an advantage of installing a client/server network in a business? A) centralization of network adapters B) centralization of network security protection- central server is protected instead of each cpu C) decentralization of files and data D) decentralization of peripherals
B) centralization of network security protection
I. switch B II. firewall C III. router E IV. bridge D V. packet A A. data broken into a small segment with an address to which it is sent B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node C. software or hardware that prevents unauthorized entry D. sends data between different collision domains E. device that sends information between two networks
B, C, E, D, A
I. authentication II. web III. cloud IV. database V. application A. acts as a repository for application software B. keeps track of user logins to the network and which services are available to each user C. a server not physically located at a company's site D. allows client computers to access a database E. hosts websites that can be accessed via the Internet
B, E, C, D, A
Why are client/server networks usually installed in businesses? A) Security is weaker on client/server networks. B) They do not require dedicated servers like P2P networks. C) They are more scalable than P2P networks. D) Client/server networks are cheaper to install.
C) They are more scalable than P2P networks.
Which of the following is not an advantage of installing a network in a business? A) enables peripheral sharing B) enables software sharing C) decentralization of files and data D) centralization of files and data
C) decentralization of files and data
Ring networks use the ________ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check
C) token
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
FALSE
Communication Servers
Handle all communications between the network and other networks
Web/Cloud Servers
Host websites to make them available through the internet
Authentication Servers
Keep track of users logged onto the network
Hybrid topology
combining multiple topologies into one network
Star topology
is the most widely used in client/server networks because it offers the most flexibility for a low price. The nodes connect to a central communications device-switch in a pattern resembling a star. ADV. failure of one cpu does not affect the rest; easy to add nodes; centralization makes troubleshooting repairs easier DIS. requires more cables, if switch fails all is lost
Ring topology (loop)
is where all the computers and peripherals in a ring (loop) laid out in a configuration resembling a circle. Data moves in one direction only. Data is passed using token, special data packet. Only one CPU can hold onto token at one time passing it along actively when data transmission is complete another token is generated and passed: token method. ADV. use of token= equal chance to send data, performance is not affected by # of cpus DIS. if one computer fails to retransmit token= halt; hard for network admin to find; easy to exp and but doing so ceases function until cpu is installed
Network topology
refers to the physical or logical arrangement of computers, transmission media (cable) and other network components.
A(n) ____server is used to host an Internet site.
web