Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Computer network wikipedia , lookup
Wireless security wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Peer-to-peer wikipedia , lookup
Technology In Action, Introductory, 10e (Evans et al.) Chapter 7 Networking: Connecting Computing Devices 1) ______ is software that takes an existing Internet connection and turns it into a wireless hotspot. A) Netify B) Multiply C) Mobilefy D) Connectify Answer: D Diff: 2 Section Ref: How Cool Is This? 2) A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A) software and hardware B) the Internet C) at least one server D) Ethernet cable Answer: A Diff: 2 Section Ref: Networking Fundamentals 3) A(n) ________ is a device connected to a network such as a computer or a game console. A) architecture B) node C) server D) modem Answer: B Diff: 1 Section Ref: Networking Fundamentals 4) All of the following are benefits of networks EXCEPT, ________. A) sharing an Internet connection B) sharing printers and other peripherals C) sharing files D) sharing an operating system Answer: D Diff: 2 Section Ref: Networking Fundamentals 1 Copyright © 2014 Pearson Education, Inc. 5) Network architectures are classified according to ________. A) the distance between the hub and the router B) the bandwidth supplied by the connection C) the way in which they are managed and the distance between their nodes D) the speed at which the processor runs Answer: C Diff: 3 Section Ref: Network Architectures 6) All of the following involve tasks for network administration, EXCEPT ________. A) installing new computers and devices on the network B) updating and installing new software on the network C) setting up proper security for a network D) purchasing initial equipment for the network Answer: D Diff: 2 Section Ref: Networking Fundamentals 7) ________ is the maximum speed at which data can be transferred between two nodes. A) Throughput B) Bandwidth C) Band speed D) Through speed Answer: B Diff: 2 Section Ref: Networking Fundamentals 8) All of the following are used to classify network architectures, EXCEPT ________. A) the distance between nodes B) the protocol used to exchange data between nodes C) the communication medium used to transport data D) the number of nodes on the network Answer: D Diff: 2 Section Ref: Network Architectures 9) A ________ is a network located in your home that connects to all your digital devices. A) MAN B) WAN C) HAN D) LAN Answer: C Diff: 2 Section Ref: Network Architecture Defined by Distance 2 Copyright © 2014 Pearson Education, Inc. 10) A network used to communicate among devices close to one person is called a ________. A) MAN B) LAN C) PAN D) WAN Answer: C Diff: 2 Section Ref: Network Architecture Defined by Distance 11) A large network designed to provide access to a specific geographic area, such as a large city is a ________. A) MAN B) PAN C) LAN D) WAN Answer: A Diff: 2 Section Ref: Network Architecture Defined by Distance 12) Which transmission medium transmits data the fastest? A) Twisted-pair cable B) Coaxial cable C) Wireless D) Fiber-optic cable Answer: D Diff: 2 Section Ref: Transmission Media 13) A client/server network is an example of ________ administration A) local B) wide area C) central D) corporate Answer: C Diff: 2 Section Ref: Network Architecture Defined by Levels of Administration 14) Normal telephone cable is a type of ________. A) fiber-optic cable B) twisted-pair cable C) coaxial cable D) Ethernet cable Answer: B Diff: 2 Section Ref: Transmission Media 3 Copyright © 2014 Pearson Education, Inc. 15) A peer-to-peer network is an example of ________ administration. A) local B) wide area C) central D) corporate Answer: A Diff: 2 Section Ref: Network Architecture Defined by Levels of Administration 16) Network adapters ________. A) are built into the motherboard on each node B) enable nodes in a network to communicate with each other C) are always Ethernet NICs D) are necessary only on servers in a client/server network Answer: B Diff: 2 Section Ref: Basic Network Hardware 17) The current version of wireless Ethernet is ________. A) 802.11m B) 802.11g C) 802.11p D) 802.11n Answer: D Diff: 2 Section Ref: Ethernet Protocols 18) Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A) Routers and switches B) USB ports C) Firewalls D) Network interface cards (NICs) Answer: A Diff: 3 Section Ref: Basic Network Hardware 19) Which of the following is NOT a type of cable used in wired networks? A) Twisted-pair cable B) Coaxial cable C) Fiber-optic cable D) Router cable Answer: D Diff: 2 Section Ref: Transmission Media 4 Copyright © 2014 Pearson Education, Inc. 20) Client/server networks are controlled by a central server that runs a specialized piece of software called ________. A) Windows 7 B) a network operating system (NOS) C) a firewall D) firmware Answer: B Diff: 2 Section Ref: Network Software 21) Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A) Cat 5E B) Cat 6 C) Cat 6A D) Cat 7B Answer: D Diff: 2 Section Ref: Transmission Media 22) For the nodes on a network to communicate with each other and access the network, each node needs a ________. A) DSL modem B) network adapter C) network interface card D) router Answer: B Diff: 2 Section Ref: Basic Network Hardware 23) Data are sent through a network on bundles called ________. A) packages B) pouches C) packets D) switches Answer: C Diff: 2 Section Ref: Basic Network Hardware 24) The most popular transmission media option for wired Ethernet networks is ________. A) fiber-optic cable B) power-line cable C) unshielded twisted-pair (UTP) cable D) coaxial cable Answer: C Diff: 2 Section Ref: Transmission Media 5 Copyright © 2014 Pearson Education, Inc. 25) Wireless Internet is available using ________. A) fiber optics B) satellite C) radio waves D) DSL Answer: C Diff: 2 Section Ref: Wired Broadband Internet Connections 26) All of the following operating systems support P2P networking, EXCEPT ________. A) Windows B) OS X C) Unix D) Linux Answer: C Diff: 2 Section Ref: Network Software 27) Using a network without the network owner's permission is known as ________. A) hyjacking B) chillijacking C) piggybacking D) hybacking Answer: C Diff: 2 Section Ref: Ethics in IT: Sharing your Internet Connection with your Neighbors: Legal? Ethical? Safe? 28) SSID stands for ________. A) service set identity B) service set identifier C) service security identity D) service security identifier Answer: B Diff: 2 Section Ref: Securing Wireless Networks 29) All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A) change your network name (SSID) B) enable SSID broadcast C) turn on security protocols D) create a passphrase Answer: B Diff: 2 Section Ref: Securing Wireless Networks 6 Copyright © 2014 Pearson Education, Inc. 30) The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A) MAC B) IP C) SSID D) network Answer: A Diff: 2 Section Ref: Securing Wireless Networks 31) ________ enables you to use an existing Internet connection and turn it into a wireless hotspot. Answer: Connectify, connectify Diff: 2 Section Ref: How Cool Is This? 32) The term network ________ refers to the design of a network. Answer: architecture Diff: 1 Section Ref: Network Architectures 33) Each device connected to a network is called a(n) ________. Answer: node Diff: 2 Section Ref: Networking Fundamentals 34) A(n) ________ network is when each computer can communicate directly with each other, rather than having a separate device exercise central control over the entire network. Answer: peer-to-peer Diff: 1 Section Ref: Network Architecture Defined by Levels of Administration 35) Network ________ involves tasks such as installing new computers and devices and configuring proper security for a network. Answer: administration Diff: 1 Section Ref: Networking Fundamentals 36) A(n) ________ network is one in which the nodes are located within a small geographical area. Answer: local area Diff: 1 Section Ref: Network Architecture Defined by Distance 7 Copyright © 2014 Pearson Education, Inc. 37) A network in your home that connects all your digital devices is called a(n) ________. Answer: HAN Diff: 1 Section Ref: Network Architecture Defined by Distance 38) In a(n) ________ administered network, tasks performed on one computer can affect the other computers on the network. Answer: centrally Diff: 2 Section Ref: Network Architecture Defined by Distance 39) Many cities in the United States now deploy ________ to provide Internet access to residents and tourists. Answer: MANs Diff: 2 Section Ref: Network Architecture Defined by Distance 40) In a client/server network, a(n) ________ is a computer on which users accomplish tasks. Answer: client Diff: 2 Section Ref: Transmission Media 41) ________ cable is made up of plastic or glass fibers that transmit data at extremely fast speeds. Answer: Fiber-optic Diff: 2 Section Ref: Transmission Media 42) ________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. Answer: Coaxial Diff: 2 Section Ref: Transmission Media 43) The majority of home and corporate networks are ________ networks. Answer: Ethernet Diff: 2 Section Ref: Ethernet Protocols 44) The capability of current devices to use earlier standards is known as ________. Answer: backward compatibility Diff: 2 Section Ref: Ethernet Protocols 8 Copyright © 2014 Pearson Education, Inc. 45) Network adapters installed inside the device are called ________. Answer: network interface cards, NICs Diff: 2 Section Ref: Basic Network Hardware 46) ________ transfer packets of data between two or more networks. Answer: Routers Diff: 2 Section Ref: Basic Network Hardware 47) ________ receive data packets and send them to the node for which they are intended. Answer: Switches Diff: 2 Section Ref: Basic Network Hardware 48) Bundles of data sent over transmission media are called ________. Answer: packets Diff: 2 Section Ref: Network Navigation Devices 49) The server on a client/server network has specialized ________ software installed. Answer: network operating system, NOS Diff: 2 Section Ref: Network Software 50) In reference to the wireless Ethernet standard, ________ devices achieve much higher data transfer rates and cover a wider area than 802.11g devices. Answer: 802.11n Diff: 3 Section Ref: Ethernet Protocols 51) ______ is often referred to as "high-speed Internet." Answer: Broadband Diff: 2 Section Ref: Wired Broadband Internet Connections 52) DSL uses ________ cable. Answer: twisted-pair Diff: 2 Section Ref: Wired Broadband Internet Connections 53) A(n) ________ network uses radio waves as its transmission medium. Answer: wireless Diff: 1 Section Ref: Wired Broadband Internet Connections 9 Copyright © 2014 Pearson Education, Inc. 54) To access the Internet wirelessly, you need to use a(n) ________ that features wireless capabilities. Answer: router Diff: 1 Section Ref: Wireless Internet Access 55) A popular Web-based application for storing files on the cloud is ________. Answer: Dropbox Diff: 3 Section Ref: Trends in IT: Where Should You Store Your Files? The Cloud is Calling! 56) ________ cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference. Answer: UTP Diff: 3 Section Ref: Transmission Media 57) In terms of networking, NOS stands for ________. Answer: network operating system Diff: 1 Section Ref: Network Software 58) Public places where you can wirelessly connect to the Internet are known as ________. Answer: hotspots Diff: 2 Section Ref: Wireless Internet Access 59) Someone who breaks into computer systems to create mischief or steal information is a(n) ________. Answer: hacker Diff: 1 Section Ref: Securing Wireless Networks 60) ________ is a method of translating data into code. Answer: Encryption Diff: 3 Section Ref: Securing Wireless Networks 61) All wireless networks have their own name, referred to as the ________, which is used to identify the network. Answer: SSID Diff: 2 Section Ref: Securing Wireless Networks 10 Copyright © 2014 Pearson Education, Inc. 62) WEP stands for ________. Answer: Wired Equivalent Privacy Diff: 3 Section Ref: Securing Wireless Networks 63) WPA stands for ________. Answer: Wi-Fi Protected Access Diff: 3 Section Ref: Securing Wireless Networks 64) The read-only memory written in a router is referred to as ________. Answer: firmware Diff: 2 Section Ref: Securing Wireless Networks 65) ________ refers to connecting to a wireless connection without the permission of the owner. Answer: Piggybacking Diff: 2 Section Ref: Securing Wireless Networks 66) Data are sent through a network in bundles called ________. Answer: packets Diff: 2 Section Ref: Basic Network Hardware 67) A(n) ________ device can be connected directly to a network, either through a wired or wireless connection. Answer: network-ready Diff: 2 Section Ref: Digital Entertainment Devices on a Network 68) ________ devices, which are becoming popular for home use, provide centralized data storage and access for networks. Answer: Network attached storage Diff: 2 Section Ref: Network-Attached Storage Devices 69) A printer connected to a wireless network is considered to be a node on that network. Answer: TRUE Diff: 1 Section Ref: Networking Fundamentals 70) Connectify enables you to connect all your WiFi-enabled devices through the same Internet connection. Answer: TRUE Diff: 2 Section Ref: How Cool Is This? 11 Copyright © 2014 Pearson Education, Inc. 71) A network must be three or more computers that are connected through software and hardware so they can communicate with each other. Answer: FALSE Diff: 2 Section Ref: Networking Fundamentals 72) A client computer is the computer on which users accomplish specific tasks. Answer: TRUE Diff: 1 Section Ref: Describing Networks Based on Network Administration 73) Sharing files is a benefit of a network. Answer: TRUE Diff: 2 Section Ref: Networking Fundamentals 74) For a home network, there are no real disadvantages. Answer: TRUE Diff: 2 Section Ref: Networking Fundamentals 75) In a peer-to-peer network, one computer acts as the server. Answer: FALSE Diff: 1 Section Ref: Network Architecture Defined by Levels of Administration 76) P2P networks are most commonly used in home networks. Answer: TRUE Diff: 1 Section Ref: Network Architecture Defined by Levels of Administration 77) MAN spans a large physical distance. Answer: FALSE Diff: 2 Section Ref: Network Architecture Defined by Distance 78) In a locally administered network, tests performed on one computer can affect other computers on the network. Answer: FALSE Diff: 2 Section Ref: Network Architecture Defined by Levels of Administration 12 Copyright © 2014 Pearson Education, Inc. 79) Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds. Answer: FALSE Diff: 1 Section Ref: Transmission Media 80) Ethernet networks are always connected using twisted-pair cable technology. Answer: FALSE Diff: 1 Section Ref: Transmission Media 81) P2P networks are more expensive than client/server networks. Answer: FALSE Diff: 2 Section Ref: Network Architecture Defined by Levels of Administration 82) Most computers today come with Ethernet adapters already installed. Answer: TRUE Diff: 1 Section Ref: Basic Network Hardware 83) The capability of current devices to use earlier standards is known as backward compatibility. Answer: TRUE Diff: 2 Section Ref: Network Architecture Defined by Levels of Administration 84) A P2P network needs network operating system software installed on every node. Answer: FALSE Diff: 2 Section Ref: Network Software 85) The most popular transmission media option for wired Ethernet networks is UTP cable. Answer: TRUE Diff: 2 Section Ref: Transmission Media 86) Current wireless Ethernet networks in the United States are based on the IEEE 802.3 standard. Answer: FALSE Diff: 3 Section Ref: Ethernet Protocols 87) Cat 6 cable is probably the best choice for home networking cable. Answer: TRUE Diff: 2 Section Ref: Transmission Media 13 Copyright © 2014 Pearson Education, Inc. 88) Although 802.11n works with 802.11g adapters, you will not achieve 802.11n data transfer rates unless all adapters are 802.11n. Answer: TRUE Diff: 3 Section Ref: Ethernet Protocols 89) A router acts like a traffic signal on a network. Answer: FALSE Diff: 2 Section Ref: Basic Network Hardware 90) Wireless networks are more vulnerable to attack than wired networks. Answer: TRUE Diff: 2 Section Ref: Securing Wireless Networks 91) WEP is a stronger form of security than WAP. Answer: FALSE Diff: 2 Section Ref: Securing Wireless Networks 92) The practice of piggybacking is illegal in many places. Answer: TRUE Diff: 2 Section Ref: Securing Wireless Networks 93) Cable TV and cable Internet are the same service. Answer: FALSE Diff: 2 Section Ref: Wired Broadband Internet Connections 94) Limiting your signal range does not help increase wireless network security. Answer: FALSE Diff: 1 Section Ref: Securing Wireless Networks 95) Dropbox can be used only with computers using Windows. Answer: FALSE Diff: 2 Section Ref: Trends in IT: Where Should You Store Your Files? The Cloud is Calling! 96) Each wireless network has its own name to identify it, known as service set identity. Answer: FALSE Diff: 2 Section Ref: Securing Wireless Networks 14 Copyright © 2014 Pearson Education, Inc. 97) It is possible to limit your signal range on your home wireless network. Answer: TRUE Diff: 2 Section Ref: Securing Wireless Networks 98) Match the following terms to their definitions: I. throughput II. packet III. hub IV. firewall V. NOS A. software used to set up and manage a network B. the actual speed of data transfer that is achieved on a network C. the format in which data is sent over transmission media D. hardware or software for protecting computers from hackers E. retransmits a signal to all other nodes attached to it Answer: B, C, E ,D, A Diff: 2 Section Ref: Multiple locations in the chapter 99) Match the following terms to their definitions: I. fiber-optic II. twisted pair III. LAN IV. peer-to-peer V. WAN A. network that is confined to a small geographic location B. made up of plastic or glass and transmits data at extremely fast speeds C. each node can communicate directly with every other node on the network D. made up of copper wires E. a network that covers a great distance Answer: B, D, A, C, E Diff: 1 Section Ref: Multiple locations in the chapter 15 Copyright © 2014 Pearson Education, Inc. 100) Match the following terms to their definitions: I. server II. client III. network IV. node A. two or more computers connected together via software and hardware so they can communicate B. can be a computer, peripheral, or communication device on a network C. the computer on which users accomplish specific tasks and make specific requests D. provides information and/or resources to the client computers on a network Answer: D, C, A, B Diff: 1 Section Ref: Multiple locations in the chapter 101) Match the following terms to their definitions: I. WiFi II. SSID III. MAC IV. NAS V. DMR A. address assigned by router manufacturers B. provides for centralized data storage and access C. also known as the 802.11 wireless standard D. device designed to store digital media E. a name used to identify a wireless network Answer: C, E, A, B, D Diff: 2 Section Ref: Multiple locations in the chapter 102) Match the following terms to their definitions: I. bandwidth II. throughput III. router IV. switch V. NIC A. directs data traffic between networks B. handles data traffic between nodes on the same network C. maximum speed at which data can be transmitted D. network adapter E. actual speed of data transfer Answer: C, E, A, B ,D Diff: 3 Section Ref: Multiple locations in the chapter 16 Copyright © 2014 Pearson Education, Inc.