* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 4 – Database management SystemsApplied Computer
Survey
Document related concepts
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer security wikipedia , lookup
Net neutrality law wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Wireless USB wikipedia , lookup
Airborne Networking wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Transcript
CIS 103 – Applied Computer Technology Chapter 5 – Data Communications Questions 1. A byte is: a. a binary digit b. an 8-bit word c. any group of bits d. three nibbles 2. The number of bits that a computer works with at one time is: a. a byte b. the computer’s word length c. always 32 bits d. always 64 bits 3. Parallel communication is: a. used between computers more often than serial communication b. usually more less expensive than serial communication c. usually faster than serial communication d. requires byte addressable memory 4. Which of the following is not a serial data communication standard: a. RS-232C b. RJ-45 c. USB d. Firewire 5. A software program that is sometimes used when devices are connected to a computer is: a. a data bus b. a driver c. an analog to digital interface d. a router 6. Which of the following is a trade association: a. FCC b. ITU c. IEEE d. EIA 7. How many standard USB connectors are there: a. Two b. four c. six d. eight 8. It is best to search for an equipment manufacturer’s manuals for connecting a device to a PC: a. using Google b. directly on the equipment manufacturer’s website c. directly on the PC manufacturer’s website d. at the place where the equipment was purchased Chapter 5 – Data Communications Applied Computer Technology 9. The best way to tell if a device needs a driver is to: a. read the label on the device b. plug it in and turn it on c. take a driving test d. read the manual for the device 10. USB devices: a. always need peripheral drivers b. always need bus drivers c. never need drivers d. sometimes need drivers 11. Which of the following is not a common ISP broadband network technology: a. Coaxial cable b. DSL c. Ethernet d. Fiber optics 12. Which device moves data between networks: a. a broadband modem b. an RJ-45 cable c. a router d. a network adapter 13. each computer connected to a wireless network must have: a. a wireless broadband modem b. a wireless RJ-45 cable c. a wireless router d. a wireless network adapter 14. An Internet Service Provider usually installs and sets up: a. a broadband modem b. the necessary RJ-45 cables c. a wireless router d. a network adapter pg. 2 Chapter 5 – Data Communications Applied Computer Technology 15. A router’s control panel is usually accessed: a. only by the ISP b. using a Web browser c. by removing the access cover on the back of the router d. by removing the router’s front cover 16. Which of the following uniquely identifies a network adapter? a. SSID b. MAC address c. IP address d. USB address 17. Which of the following is used to select a wireless home network from a PC? a. SSID b. MAC address c. IP address d. USB address 18. Which of the following is used to access a router’s control panel from a PC? a. SSID b. MAC address c. IP address d. USB address 19. If a wireless home network is unsecured, someone might be able to: a. steal data and files from your computer b. send email, spam or viruses to other computers from your computer c. slow down your Internet connection d. all of the above 20. Currently, most home that have Internet access have: a. a dial-up connection to the Internet b. fiber optic cable throughout the home c. an 802.11a wireless network at home d. an Ethernet broadband modem in the home 21. To help secure a wireless home network from outside intrusion, it is a good idea to: a. Use data encryption for your network b. Use an SSID that is not similar to your MAC address c. Use an SSID that is similar to your IP address d. Lock the wireless modem and router in a closet pg. 3 Chapter 5 – Data Communications Applied Computer Technology 22. Remote router administration on a home network: a. Should always be disabled b. Should never be enabled c. Should be disabled most of the time, but enabled if you need remote help d. Has no effect on network security 23. Which of these has a “home” IP address for a network: a. a router b. a printer c. a USB hard drive d. a computer’s internal data bus 24. to set up a wireless home network with Internet access you will first need to: a. have your ISP install a wireless router b. locate your broadband modem or have one installed c. remove any wires from the home that could interfere with the network d. apply for a home networking license from the FCC 25. MAC filtering on a router: a. requires you to enter the MAC address of each network adapter in the network b. prevents pesky Apple MAC owners from taking over your network c. allows Apple MAC compatible data to move over your network freely d. sends Apple MAC compatible data only to Apple MAC computers to avoid PC interference pg. 4 Chapter 5 – Data Communications Applied Computer Technology CIS 103 – Applied Computer Technology pg. 5 name:_____________________________________ Chapter 5 – Data Communications Answers Sheet section:_____________________________________ 1. _b__ 2. _b__ 3. _c__ 4. _b__ 5. _b__ 6. _d__ 7. _c__ 8. _b__ 9. _d__ 10. _d__ 11. _c__ 12. _c__ 13. _d__ 14. _a__ 15. _b__ 16. _b__ 17. _a__ 18. _c__ 19. _d__ 20. _d__ 21. _a__ 22. _c__ 23. _a__ 24. _b__ 25. _a__