An emerging standard of wireless Ethernet, also known as 802.11 ad, is |
WiGig |
The type of network used for communication among a laptop and smartphone using Bluetooth is a |
PAN |
The fastest broadband Internet service is usually |
fiber-optic |
Which of the following allows you to connect to the Internet wirelessly? |
Wifi 4G LTE mobile hotspot |
The device used to connect a network to the Internet is called a |
modem |
What would you use to see what network adapters are installed in your Windows computer? |
Device Manager utility |
What device would you use to amplify your wireless signal? |
wireless range extender |
Why would you want to disable SSID broadcast? |
to make it more difficult for hackers to detect your network & to make it difficult for a neighbor to connect to your network |
To share files between computers on a Windows home network, you must |
create a home group |
How can you tell what wireless devices are connected to your router? |
Log in to the routers IP address and check the configuration page |
Which of the following would NOT be a benefit of networking computers? |
sharing software licenses |
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes On his iPad. What kind of network does this family have? |
P2P network |
What two devices are often combined into one device in a small network to connect the home network to the internet and to share the connection between devices on the network? |
Modem and router |
Which of the following is used to access the Internet when wifi is not available? |
mobile hotspot 4G LTE internet access 3G internet access |
Which of the following should you not do to secure a wireless network? |
Keep the default network name and router password |
Which of the following might cause interference or poor connectivity between nodes on a wireless network? |
-concrete walls -nodes that are too far apart -some appliances |
802.11 ac is the current wireless Ethernet standard. |
True |
4G is the latest Wifi standard. |
False |
Actual data throughput is usually higher on wireless networks than on wired networks. |
False |
Data is sent through the network in bundles called packages. |
False |
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. |
network |
A ________ is any device connected to a network such as a computer, printer, or game console. |
node |
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. |
Throughput |
Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance. |
network administrator |
Which of the following is NOT a common network architecture type? |
intraoffice area network (IAN) |
… |
________ is the maximum speed at which data can be transferred between two nodes. Bandwidth |
A ________ is a network located in your residence that connects to all your digital devices. |
HAN |
… |
… |
A network that spans a large physical distance is called a ________. |
WAN |
A large network designed to provide access to a specific geographic area, such as a large city, is a ________. |
MAN |
Which transmission medium transmits data the fastest? |
Fiber-optic cable |
Normal telephone cable is a type of ________. |
twisted-pair cable |
A client/server network is an example of ________ administration. |
central |
A peer-to-peer (P2P) network is an example of ________ administration. |
local |
Which of the following is NOT a standard for wireless fidelity Ethernet networks? |
802.11ab |
Which of the following is NOT a type of cable used in wired networks? |
Unshielded coaxial |
The term network ______________________________________ refers to the design of a network. |
.architecture |
… |
… |
A(n) ______________________________________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network. |
.peer-to-peer |
… |
… |
Many cities in the United States now provide a(n) ______________________________________ area network to allow Internet access to residents and tourists. |
… |
… |
… |
______________________________________ cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference. |
… |
… |
… |
… |
… |
… |
______________________________________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. coaxial |
1. Which of the following would NOT be a benefit of networking computers? |
sharing software licenses |
… |
… |
2. Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? |
P2P network |
What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network? |
.modem and router |
Which of the following is used to access the Internet when WiFi is not available? |
3G Internet access, mobile hotspot, 4G LTE Internet access |
5. Which of the following should you NOT do to secure a wireless network? |
Keep the default network name and router password. |
Which of the following might cause interference or poor connectivity between nodes on a wireless network? |
nodes that are too far apart some appliances concrete walls |
802.11ac is the current wireless Ethernet standard. |
True |
4G is the latest WiFi standard. |
False |
9. Actual data throughput is usually higher on wireless networks than on wired networks. |
False |
10. Data is sent through the network in bundles called packages. |
False |
Which statement about ultrabook computers is false? |
Ultrabook computers have the fastest optical drives. |
SSD is classified as what type of storage? |
Nonvolatile. |
When would you consider RAID 1 technology? |
When you need instant backup of your work. |
CPUs have several internal components including: |
Level 2 cache memory, Level 1 cache memory, and ALU. |
SuperFetch is a memory-management technique that: |
Preloads the applications you use most into system memory. |
A quad core CPU with hyperthreading has 8 virtual CPUs. |
True. |
SSD hard drives are a cheaper alternative to RAM. |
False. |
To document a problem you are having, you can use: |
Problem Steps Recorder. |
Which is not a type of video port? |
USB 3.0. |
A sound card that supports 7.1 surround sound will support: |
8 speakers. |
To improve video performance, modern computers have a ________ in addition to the CPU. |
GPU. |
The fastest data transfer port for computers today is the ________ port. |
Thunderbolt. |
Donating a computer always puts your personal information at risk. |
False. |
GDDR5 technology s often used in external hard drives. |
False. |
Each device connected to a network is known as a: |
Node. |
A small network used for communication between personal computing devices is a : |
PAN. |
The fastest broadband internet service is usually: |
Fiber-optic. |
The part of the network that establishes a communications channel between the nodes of the network is known as: |
Transmission media. |
The device used to route data between two nodes is called a: |
Router. |
Actual data throughput is usually higher on wired networks than on wireless networks. |
True. |
Home networks are usually configured as a client/server network. |
False. |
When setting up a home network, the router is attached: |
Directly to the broadband modem. |
All of the following are methods to secure your wireless network except: |
Disabling WEP. |
Which network-ready device facilitates file sharing and data backup? |
Network-attached storage, Time Capsule, and Home network server. |
To share files between computers on a Windows home network, you must: |
Create a home group. |
Which of the following is not recommended to do when securing a home wireless network? |
Enable SSID broadcast. |
Network-ready devices contain Ethernet switches. |
False. |
Home network servers are a specialized type of NAS device. |
True. |
The operating system on your cell/smartphone is stored in: |
Read-only memory. |
VolP is phone service that: |
Works over an internet connection. |
Which service allows you to use your cell/smart phone to send messages that contain images? |
MMS. |
Digital convergence means that: |
One device can perform the jobs of several. |
There are several categories of mobile devices because: |
There is a range of tradeoffs between weight and performance. |
Digital convergence means that all cellular networks will become 4G. |
False. |
Ultrabooks are a type of notebook computer with the fastest processor and largest screen size. |
False. |
If you are in a location with free Wi-Fi, it is better to use Wi-Fi than the 3G cellular signal. |
True. |
Which is not a factor that determines the quality of images taken with a digital camera? |
Eye-Fi. |
The quickest way to distribute your bands new song to a lot of listeners is to: |
Use an application to post it on Facebook. |
P2P is an acronym for: |
Peer-to-peer sharing. |
An analog signal is different from a digital signal because: |
It is continuous. |
Which of the following is not true about modern televisions? |
They run word processing and spreadsheet software. |
Digital music files must be converted to the MP3 format if they are transferred to a mobile device. |
False. |
A codec is the algorithm that compresses and decompresses video files. |
True. |
If your digital camera doesn’t support wireless connectivity, you can use a memory card with built-in Wi-Fi. |
True. |
each device connected to a network is known as a |
node |
a small network used for communication between personal computing devices is a |
PAN |
the fastest broadband internet service is usually |
fiber optic |
the part of the network that establishes a communications channel between the nodes of the network is known as |
transmission media |
the device used to move data between two networks is called a |
router |
actual data throughput is usually higher on wired networks than on wireless networks |
true |
home networks are usually configured as a client/server network |
false |
___ is software that takes an existing internet connection and turns it into a wireless hotspot |
connectify |
a computer network is defined as two or more computers connected via ___ so that they can communicate with each other |
software and hardware |
a ___ is a device connected to a network such as a computer or game console |
node |
all of the following are benefits of networks EXCEPT |
sharing an operating system |
network architectures are classified according to |
the way in which they are managed and the distance between their nodes |
all of the following involve tasks for network administration, EXCEPT |
purchasing initial equipment for the network |
is the maximum speed at which data can be transferred between two nodes |
bandwidth |
all of the following are used to classify network architectures, EXCEPT |
the number of nodes on the network |
a ___ is a network located in your home that connects to all your digital devices |
HAN |
a large network designed to provide access to a specific geographic area, such as a large city is a |
MAN |
which transmission medium transmits data the fastest |
fiber optic cable |
a client/server network is an example of ___ administration |
central |
normal telephone cable is a type of |
twisted pair cable |
a peer to peer (P2P) network is an example of ___ administration |
local |
network adapters ___ |
enable nodes in a network to communicate with each other |
the current version of wireless Ethernet is |
802.11n |
sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network |
routers and switches |
which of the following is NOT a type of cable used in wired networks |
router cable |
client/server networks are controlled by a central server that runs a specialized piece of software called |
NOS (network operating system) |
which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network |
Cat 7B |
for the nodes on a network to communicate with each other and access the network, each node needs a |
network adapters |
data are sent through a network on bundles called |
packets |
the most popular transmission media option for wired Ethernet networks is |
unshielded twisted-pair (UTP) cable |
wireless internet is available using |
radio waves |
all of the following operating systems support P2P networking, EXCEPT |
Unix |
using a network without the network owner’s permission is known as |
piggy backing |
SSID stands for |
service set identifier |
all of the following are extra precautions you can take to secure a wireless network EXCEPT |
enable SSID braodcast |
the unique number assigned to a network adapter by the manufacturer is referred to as the |
MAC |
connectify enables you to connect all your wifi-enabled devices through the same internet connection |
true |
a network must be three or more computers that are connected through software and hardware so they can communicate with each other |
false |
a client computer is the computer on which users accomplish specific tasks |
true |
sharing files is a benefit of a network |
true |
Ethernet networks are always connected using twisted-pair cable technology |
false |
p2p networks are more expensive than client/server networks |
false |
most computers today come with Ethernet adapters already installed |
true |
the capability of current devices to use earlier standards is known as backward compatibility |
true |
a p2p network needs network operating system software installed on every node |
false |
it is possible to limit your signal range on your home wireless network |
true |
Network architecture |
refers to the design of a network |
network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network. |
Peer 2 peer |
Local area network |
A network in which the nodes are located within a computer lab is called a(n) |
Personal area network |
A network used to communicate among devices close to one person is called |
Metropolitan area network |
area network to allow Internet access to residents and tourists. |
unshielded twisted pair |
cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference |
backwards compatability |
The capability of current devices use earlier standards is known as |
routers |
devices that transfer packets of data between two or more networks |
switch |
a device that receives data packets and sends them to their intended nodes while preventing data collections |
network operating system |
The server on a client/server network has specialized _____ installed |
broadband |
high speed internet |
DSL uses what kind of cable |
twisted pair |
uses radio waves as its transmission medium |
wireless network |
storing files on the _____ avoids having to save them on multiple devices |
cloud |
NOS stands for |
Network operating system |
an ________network is set up near a wireless network and has a sound alike name to lure unsuspecting web surfers |
evil twin |
hotspot |
public places where you can wirelessly connect to the Internet are known as |
encryption |
When using a wireless connection, _____ translates data so that it is protected |
SSID stands for |
server set identifier |
All wireless networks have their own name, referred to as the ____ which is used to identify the network. |
SSID |
WEP stands for |
wired equivalent privacy |
WPA stands for |
wifi protection access |
refers to connecting to a wireless connection without the permission of the owner. |
piggy backing |
Network |
Two or more computers connected via software and hardware so they can communicate with each other |
Nodes |
devices that are connected to a network |
Router |
Device you can install on your network so 2 or more nodes can share the same broadband connection |
Network Architecture |
refers to the design of a network |
Peer-to-Peer Network |
Network in which all nodes can communicate directly with each other |
Client Server Network |
Contains two different types of computers: clients and servers; network that uses more than 10 nodes |
Client |
computer at which users accomplish specific tasks and make specific requests |
Server |
Computer that provides information and resources for the clients on the network |
Local area networks |
Netork in which nodes are located within a small geographical area |
Wide area networks |
Network made up of LANs connected over long distances |
Transmission media |
establishes a communications channel between nodes on a netowrk |
Twisted pair cable |
twisted copper wires surrounded by a plastic jacket |
Coaxial cable |
Single copper wire surrounded by layers of plastic |
Fiber-optic cable |
Plastic or glass fibers that transmit data at very high speeds |
Bandwidth |
Maximum speed at which data can be transmitted between two nodes on a network |
Throughput |
Actual speed of data that is acheived; usually less than the bandwidth |
Network adapters |
Devices connected or installed on the network that allows the nodes to communicate with each other and access the network |
Network Interface Card |
Network adapter located inside computers and peripherals as expansion cards |
Packets |
Form in which data is sent over transmission media; Bundle |
Network navigation devices |
Device that helps to make the flow of data possible and enables the transmission of data |
Switches |
Received data packets and send them to the node for which they are intended |
Network operating system |
Special network software for client/server networks |
Ethernet Networks |
use the ethernet protocol as the means by which the nodes on a network communicate |
Unshielded twisted pair cable |
Composed of 4 pairs of wires that are twisted around each other to reduce electrical interferance |
Repeaters |
devices that are intalled on long cable runs to amplify the signal |
DSL/cable router |
Device that combines switches and routers that were designed to connect to DSL or cable modems |
Wireless Network |
uses radio waves rather than wires or cables as it’s transmission media |
802.11 standard |
established in 1997 also known as wireless fidelity |
Wireless Network Adapter |
Device that is required for each node on a network to be able to communicate with other nodes on the Network |
transceiver |
Device that translates the electronic data that needs to be sent along the network in radio waves and broadcast the radio waves to other nodes. |
Wireless Router |
Device that combines the capabilities of a wired router with the ability to receive wireless signals |
Wireless Access Point (WAP) |
device that attaches to a network and provides wireless nodes with a means of wirelessly connecting to the network |
Power-Line Networks |
existing electrical wiring in your home to connect the nodes to a network |
cybercrime |
Criminal action perpetrated primarily through the use of a computer |
Hacker |
Anyone who breaks into computer system unlawfully |
white-hat hackers |
Hackers that don’t wish to steal or cause problems. They also like to inform companies of how vulnerable they are |
black-hat hackers |
Those that break into computer systems to steal information or for illegal gain |
Script kiddies |
don’t create programs but use programs made by professional hackers to wreak havoc |
Packet sniffer |
program that looks at each packet as it travels on the internet |
Identity Theft |
When someone uses personal information about you to assume your identity for the purpose of defrauding others |
Trojan Horse |
Program that appears to be useful but is actually doing malicious things in the background without you knowing. |
backdoor programs |
Allows hackers to take almost complete control of your computer without you knowing it |
Zombies |
What the computers hackers take control of are referred to as. |
Denial of Service attack |
Legitamate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system |
Logical Ports |
virtual communication gateways that allow a computer to organize requests for information |
Firewalls |
Programs designed to keep computers safe from hackers |
Personal Firewalls |
firewalls specifically designed for home networks. Are easy to intall |
Virus |
Computer program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged |
Boot-Sector Viruses |
replicate themselves into the master Boot Record, ensuring that the virus will be loaded into the memory immediately |
Master Boot Record |
a program that executes whenever a computer boots up |
Logic Bombs |
viruses that are triggered when certain logical conditions are met; such as opening a file |
Time Bombs |
Viruses that are triggered by the passage of time or on a certain date |
Worms |
Attempt to travel between systems through network connections to spread infections |
Scripts |
A series of commands that are executed without your knowledge |
Macro Viruses |
are attached to documents that use Macros |
e-mail Virus |
use the address book in the victims email system to distribute the virus |
Polymorphic viruses |
Change their own code periodically to avoid detection |
Multipartite viruses |
Designed to infect multiple files tyes in an effort to fool anti virus software |
Stealth Viruses |
Temporarily erase their own code from the files where they reside and hide in the active memory of the computer |
antivirus software |
Designed to detect viruses and keep your computer safe from them |
quarantining |
process in which antivirus software places a virus in a secured area of your hard drive to prevent the spread of infection |
Inoculation |
involves the antivirus software recording key attribute about files on your computer and keeps those statistics in a safe place on the hard drive |
Chapter 7 test
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price