Download Chapter 4 – Database management SystemsApplied Computer

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

AppleTalk wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Net bias wikipedia , lookup

Computer security wikipedia , lookup

RS-232 wikipedia , lookup

Net neutrality law wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wireless USB wikipedia , lookup

Airborne Networking wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wireless security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
CIS 103 – Applied Computer Technology
Chapter 5 – Data Communications Questions
1. A byte is:
a. a binary digit
b. an 8-bit word
c. any group of bits
d. three nibbles
2. The number of bits that a computer works with at one time is:
a. a byte
b. the computer’s word length
c. always 32 bits
d. always 64 bits
3. Parallel communication is:
a. used between computers more often than serial communication
b. usually more less expensive than serial communication
c. usually faster than serial communication
d. requires byte addressable memory
4. Which of the following is not a serial data communication standard:
a. RS-232C
b. RJ-45
c. USB
d. Firewire
5. A software program that is sometimes used when devices are connected to a computer is:
a. a data bus
b. a driver
c. an analog to digital interface
d. a router
6. Which of the following is a trade association:
a. FCC
b. ITU
c. IEEE
d. EIA
7. How many standard USB connectors are there:
a. Two
b. four
c. six
d. eight
8. It is best to search for an equipment manufacturer’s manuals for connecting a device to a PC:
a. using Google
b. directly on the equipment manufacturer’s website
c. directly on the PC manufacturer’s website
d. at the place where the equipment was purchased
Chapter 5 – Data Communications
Applied Computer Technology
9. The best way to tell if a device needs a driver is to:
a. read the label on the device
b. plug it in and turn it on
c. take a driving test
d. read the manual for the device
10. USB devices:
a. always need peripheral drivers
b. always need bus drivers
c. never need drivers
d. sometimes need drivers
11. Which of the following is not a common ISP broadband network technology:
a. Coaxial cable
b. DSL
c. Ethernet
d. Fiber optics
12. Which device moves data between networks:
a. a broadband modem
b. an RJ-45 cable
c. a router
d. a network adapter
13. each computer connected to a wireless network must have:
a. a wireless broadband modem
b. a wireless RJ-45 cable
c. a wireless router
d. a wireless network adapter
14. An Internet Service Provider usually installs and sets up:
a. a broadband modem
b. the necessary RJ-45 cables
c. a wireless router
d. a network adapter
pg. 2
Chapter 5 – Data Communications
Applied Computer Technology
15. A router’s control panel is usually accessed:
a. only by the ISP
b. using a Web browser
c. by removing the access cover on the back of the router
d. by removing the router’s front cover
16. Which of the following uniquely identifies a network adapter?
a. SSID
b. MAC address
c. IP address
d. USB address
17. Which of the following is used to select a wireless home network from a PC?
a. SSID
b. MAC address
c. IP address
d. USB address
18. Which of the following is used to access a router’s control panel from a PC?
a. SSID
b. MAC address
c. IP address
d. USB address
19. If a wireless home network is unsecured, someone might be able to:
a. steal data and files from your computer
b. send email, spam or viruses to other computers from your computer
c. slow down your Internet connection
d. all of the above
20. Currently, most home that have Internet access have:
a. a dial-up connection to the Internet
b. fiber optic cable throughout the home
c. an 802.11a wireless network at home
d. an Ethernet broadband modem in the home
21. To help secure a wireless home network from outside intrusion, it is a good idea to:
a. Use data encryption for your network
b. Use an SSID that is not similar to your MAC address
c. Use an SSID that is similar to your IP address
d. Lock the wireless modem and router in a closet
pg. 3
Chapter 5 – Data Communications
Applied Computer Technology
22. Remote router administration on a home network:
a. Should always be disabled
b. Should never be enabled
c. Should be disabled most of the time, but enabled if you need remote help
d. Has no effect on network security
23. Which of these has a “home” IP address for a network:
a. a router
b. a printer
c. a USB hard drive
d. a computer’s internal data bus
24. to set up a wireless home network with Internet access you will first need to:
a. have your ISP install a wireless router
b. locate your broadband modem or have one installed
c. remove any wires from the home that could interfere with the network
d. apply for a home networking license from the FCC
25. MAC filtering on a router:
a. requires you to enter the MAC address of each network adapter in the network
b. prevents pesky Apple MAC owners from taking over your network
c. allows Apple MAC compatible data to move over your network freely
d. sends Apple MAC compatible data only to Apple MAC computers to avoid PC interference
pg. 4
Chapter 5 – Data Communications
Applied Computer Technology
CIS 103 – Applied Computer Technology
pg. 5
name:_____________________________________
Chapter 5 – Data Communications Answers Sheet section:_____________________________________
1. _b__
2. _b__
3. _c__
4. _b__
5. _b__
6. _d__
7. _c__
8. _b__
9. _d__
10. _d__
11. _c__
12. _c__
13. _d__
14. _a__
15. _b__
16. _b__
17. _a__
18. _c__
19. _d__
20. _d__
21. _a__
22. _c__
23. _a__
24. _b__
25. _a__