Network |
A ________ is a group of two or more computers, or nodes, configured to share information and resources. |
Ease of maintenance and administration |
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? |
Network |
A ________ allows multiple users to connect to the Internet through one connection. |
Client/server |
________ networks contain servers as well as computers that individual users access and use. |
Peer-to-peer |
In a(n) ________ network, each node connected to the network communicates directly with every other node. |
10 |
P2P networks become difficult to manage when they are expanded beyond ________ users |
Pan |
A ________ is a network used by one person connected via wireless media. |
Vpn |
A ________ uses the public Internet communications infrastructure to build a secure, private network. |
intranet |
A(n) ________ is used exclusively within a corporation or organization. |
authentication |
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. |
All networks require at least two servers |
Which of the following is FALSE about servers? |
Files |
A(n) ________ server is a server that stores and manages files for network users. |
Queue |
A print server uses a print ________ as a software holding area for printing jobs |
Application |
When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer. |
Cluster |
Which of the following is NOT a common network topology? |
Protocol |
A ________ is a set of rules for how information and communication are exchanged. |
Token |
Ring networks use the ________ method to avoid data collisions |
Terminator |
The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal. |
Bis |
Which of the following networks is most known for data collisions? |
Token |
A _____ is passed from computer to computer around the ring of a ring topology network. |
Star |
Which of the following is the most commonly used client/server network topology? |
Switch |
The star topology uses a central ________ to connect all network nodes. |
Ring |
If fair allocation of network access is a major requirement of the network, choose a(n) ________ topology. |
A method used to avoid data collisions |
What is CSMA/CD? |
Jam |
In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ________ signal. |
Hybrid |
A ________ topology is created when more than one topology is used to build a network. |
Star |
Which of the following networks has high scalability? |
Duplex |
For business networks, which of the following is NOT a main cable type? |
Cable diameter |
Which of the following is NOT a factor to consider when selecting network cabling? |
Emi |
Which of the following causes interference when a cable is exposed to strong electromagnetic fields? |
Fiber-optic |
________ cable is NOT subject to electromagnetic interference or radio frequency interference. |
Cladding |
________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. |
Fiber optic |
Which cable type is the most costly to install? |
Electromagnetic |
________ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers. |
HyperText transfer protocol |
Which is NOT a networking protocol? |
Network operating system |
A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. |
(It verifies that all information transmitted from the computer is correctly received by the) |
Which of the following is something a network adapter does NOT do? |
Ethernet |
The standard communications protocol used on most client/server networks is ______. |
Media access control |
What is another name for the physical address assigned to each network adapter? |
IP |
A(n) ________ address is the address external entities use to communicate with your network. |
Bridge |
Which of the following devices sends data from one collision domain to another? |
Routers |
________ are devices used to send data between two networks. |
Firewall |
A ________ keeps your computer safe by confirming who is trying to access it. |
Routers |
________ are often equipped to act as hardware firewalls. |
Screening |
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. |
Bastion host |
A(n) ________ server is a heavily secured server located on a special perimeter network between a company’s secure internal network and its firewall. |
Biometric |
Facial recognition is an example of ________ authentication. |
Chapter 12 notes
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price