Chapter 7 test

An emerging standard of wireless Ethernet, also known as 802.11 ad, is

WiGig

The type of network used for communication among a laptop and smartphone using Bluetooth is a

PAN

The fastest broadband Internet service is usually

fiber-optic

Which of the following allows you to connect to the Internet wirelessly?

Wifi 4G LTE mobile hotspot

The device used to connect a network to the Internet is called a

modem

What would you use to see what network adapters are installed in your Windows computer?

Device Manager utility

What device would you use to amplify your wireless signal?

wireless range extender

Why would you want to disable SSID broadcast?

to make it more difficult for hackers to detect your network & to make it difficult for a neighbor to connect to your network

To share files between computers on a Windows home network, you must

create a home group

How can you tell what wireless devices are connected to your router?

Log in to the routers IP address and check the configuration page

Which of the following would NOT be a benefit of networking computers?

sharing software licenses

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes On his iPad. What kind of network does this family have?

P2P network

What two devices are often combined into one device in a small network to connect the home network to the internet and to share the connection between devices on the network?

Modem and router

Which of the following is used to access the Internet when wifi is not available?

mobile hotspot 4G LTE internet access 3G internet access

Which of the following should you not do to secure a wireless network?

Keep the default network name and router password

Which of the following might cause interference or poor connectivity between nodes on a wireless network?

-concrete walls -nodes that are too far apart -some appliances

802.11 ac is the current wireless Ethernet standard.

True

4G is the latest Wifi standard.

False

Actual data throughput is usually higher on wireless networks than on wired networks.

False

Data is sent through the network in bundles called packages.

False

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

network

A ________ is any device connected to a network such as a computer, printer, or game console.

node

________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.

Throughput

Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance.

network administrator

Which of the following is NOT a common network architecture type?

intraoffice area network (IAN)

...

________ is the maximum speed at which data can be transferred between two nodes. Bandwidth

A ________ is a network located in your residence that connects to all your digital devices.

HAN

...

...

A network that spans a large physical distance is called a ________.

WAN

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN

Which transmission medium transmits data the fastest?

Fiber-optic cable

Normal telephone cable is a type of ________.

twisted-pair cable

A client/server network is an example of ________ administration.

central

A peer-to-peer (P2P) network is an example of ________ administration.

local

Which of the following is NOT a standard for wireless fidelity Ethernet networks?

802.11ab

Which of the following is NOT a type of cable used in wired networks?

Unshielded coaxial

The term network ______________________________________ refers to the design of a network.

.architecture

...

...

A(n) ______________________________________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.

.peer-to-peer

...

...

Many cities in the United States now provide a(n) ______________________________________ area network to allow Internet access to residents and tourists.

...

...

...

______________________________________ cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference.

...

...

...

...

...

...

______________________________________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. coaxial

1. Which of the following would NOT be a benefit of networking computers?

sharing software licenses

...

...

2. Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have?

P2P network

What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network?

.modem and router

Which of the following is used to access the Internet when WiFi is not available?

3G Internet access, mobile hotspot, 4G LTE Internet access

5. Which of the following should you NOT do to secure a wireless network?

Keep the default network name and router password.

Which of the following might cause interference or poor connectivity between nodes on a wireless network?

nodes that are too far apart some appliances concrete walls

802.11ac is the current wireless Ethernet standard.

True

4G is the latest WiFi standard.

False

9. Actual data throughput is usually higher on wireless networks than on wired networks.

False

10. Data is sent through the network in bundles called packages.

False

Which statement about ultrabook computers is false?

Ultrabook computers have the fastest optical drives.

SSD is classified as what type of storage?

Nonvolatile.

When would you consider RAID 1 technology?

When you need instant backup of your work.

CPUs have several internal components including:

Level 2 cache memory, Level 1 cache memory, and ALU.

SuperFetch is a memory-management technique that:

Preloads the applications you use most into system memory.

A quad core CPU with hyperthreading has 8 virtual CPUs.

True.

SSD hard drives are a cheaper alternative to RAM.

False.

To document a problem you are having, you can use:

Problem Steps Recorder.

Which is not a type of video port?

USB 3.0.

A sound card that supports 7.1 surround sound will support:

8 speakers.

To improve video performance, modern computers have a ________ in addition to the CPU.

GPU.

The fastest data transfer port for computers today is the ________ port.

Thunderbolt.

Donating a computer always puts your personal information at risk.

False.

GDDR5 technology s often used in external hard drives.

False.

Each device connected to a network is known as a:

Node.

A small network used for communication between personal computing devices is a :

PAN.

The fastest broadband internet service is usually:

Fiber-optic.

The part of the network that establishes a communications channel between the nodes of the network is known as:

Transmission media.

The device used to route data between two nodes is called a:

Router.

Actual data throughput is usually higher on wired networks than on wireless networks.

True.

Home networks are usually configured as a client/server network.

False.

When setting up a home network, the router is attached:

Directly to the broadband modem.

All of the following are methods to secure your wireless network except:

Disabling WEP.

Which network-ready device facilitates file sharing and data backup?

Network-attached storage, Time Capsule, and Home network server.

To share files between computers on a Windows home network, you must:

Create a home group.

Which of the following is not recommended to do when securing a home wireless network?

Enable SSID broadcast.

Network-ready devices contain Ethernet switches.

False.

Home network servers are a specialized type of NAS device.

True.

The operating system on your cell/smartphone is stored in:

Read-only memory.

VolP is phone service that:

Works over an internet connection.

Which service allows you to use your cell/smart phone to send messages that contain images?

MMS.

Digital convergence means that:

One device can perform the jobs of several.

There are several categories of mobile devices because:

There is a range of tradeoffs between weight and performance.

Digital convergence means that all cellular networks will become 4G.

False.

Ultrabooks are a type of notebook computer with the fastest processor and largest screen size.

False.

If you are in a location with free Wi-Fi, it is better to use Wi-Fi than the 3G cellular signal.

True.

Which is not a factor that determines the quality of images taken with a digital camera?

Eye-Fi.

The quickest way to distribute your bands new song to a lot of listeners is to:

Use an application to post it on Facebook.

P2P is an acronym for:

Peer-to-peer sharing.

An analog signal is different from a digital signal because:

It is continuous.

Which of the following is not true about modern televisions?

They run word processing and spreadsheet software.

Digital music files must be converted to the MP3 format if they are transferred to a mobile device.

False.

A codec is the algorithm that compresses and decompresses video files.

True.

If your digital camera doesn't support wireless connectivity, you can use a memory card with built-in Wi-Fi.

True.

each device connected to a network is known as a

node

a small network used for communication between personal computing devices is a

PAN

the fastest broadband internet service is usually

fiber optic

the part of the network that establishes a communications channel between the nodes of the network is known as

transmission media

the device used to move data between two networks is called a

router

actual data throughput is usually higher on wired networks than on wireless networks

true

home networks are usually configured as a client/server network

false

___ is software that takes an existing internet connection and turns it into a wireless hotspot

connectify

a computer network is defined as two or more computers connected via ___ so that they can communicate with each other

software and hardware

a ___ is a device connected to a network such as a computer or game console

node

all of the following are benefits of networks EXCEPT

sharing an operating system

network architectures are classified according to

the way in which they are managed and the distance between their nodes

all of the following involve tasks for network administration, EXCEPT

purchasing initial equipment for the network

is the maximum speed at which data can be transferred between two nodes

bandwidth

all of the following are used to classify network architectures, EXCEPT

the number of nodes on the network

a ___ is a network located in your home that connects to all your digital devices

HAN

a large network designed to provide access to a specific geographic area, such as a large city is a

MAN

which transmission medium transmits data the fastest

fiber optic cable

a client/server network is an example of ___ administration

central

normal telephone cable is a type of

twisted pair cable

a peer to peer (P2P) network is an example of ___ administration

local

network adapters ___

enable nodes in a network to communicate with each other

the current version of wireless Ethernet is

802.11n

sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network

routers and switches

which of the following is NOT a type of cable used in wired networks

router cable

client/server networks are controlled by a central server that runs a specialized piece of software called

NOS (network operating system)

which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network

Cat 7B

for the nodes on a network to communicate with each other and access the network, each node needs a

network adapters

data are sent through a network on bundles called

packets

the most popular transmission media option for wired Ethernet networks is

unshielded twisted-pair (UTP) cable

wireless internet is available using

radio waves

all of the following operating systems support P2P networking, EXCEPT

Unix

using a network without the network owner's permission is known as

piggy backing

SSID stands for

service set identifier

all of the following are extra precautions you can take to secure a wireless network EXCEPT

enable SSID braodcast

the unique number assigned to a network adapter by the manufacturer is referred to as the

MAC

connectify enables you to connect all your wifi-enabled devices through the same internet connection

true

a network must be three or more computers that are connected through software and hardware so they can communicate with each other

false

a client computer is the computer on which users accomplish specific tasks

true

sharing files is a benefit of a network

true

Ethernet networks are always connected using twisted-pair cable technology

false

p2p networks are more expensive than client/server networks

false

most computers today come with Ethernet adapters already installed

true

the capability of current devices to use earlier standards is known as backward compatibility

true

a p2p network needs network operating system software installed on every node

false

it is possible to limit your signal range on your home wireless network

true

Network architecture

refers to the design of a network

network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.

Peer 2 peer

Local area network

A network in which the nodes are located within a computer lab is called a(n)

Personal area network

A network used to communicate among devices close to one person is called

Metropolitan area network

area network to allow Internet access to residents and tourists.

unshielded twisted pair

cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference

backwards compatability

The capability of current devices use earlier standards is known as

routers

devices that transfer packets of data between two or more networks

switch

a device that receives data packets and sends them to their intended nodes while preventing data collections

network operating system

The server on a client/server network has specialized _____ installed

broadband

high speed internet

DSL uses what kind of cable

twisted pair

uses radio waves as its transmission medium

wireless network

storing files on the _____ avoids having to save them on multiple devices

cloud

NOS stands for

Network operating system

an ________network is set up near a wireless network and has a sound alike name to lure unsuspecting web surfers

evil twin

hotspot

public places where you can wirelessly connect to the Internet are known as

encryption

When using a wireless connection, _____ translates data so that it is protected

SSID stands for

server set identifier

All wireless networks have their own name, referred to as the ____ which is used to identify the network.

SSID

WEP stands for

wired equivalent privacy

WPA stands for

wifi protection access

refers to connecting to a wireless connection without the permission of the owner.

piggy backing

Network

Two or more computers connected via software and hardware so they can communicate with each other

Nodes

devices that are connected to a network

Router

Device you can install on your network so 2 or more nodes can share the same broadband connection

Network Architecture

refers to the design of a network

Peer-to-Peer Network

Network in which all nodes can communicate directly with each other

Client Server Network

Contains two different types of computers: clients and servers; network that uses more than 10 nodes

Client

computer at which users accomplish specific tasks and make specific requests

Server

Computer that provides information and resources for the clients on the network

Local area networks

Netork in which nodes are located within a small geographical area

Wide area networks

Network made up of LANs connected over long distances

Transmission media

establishes a communications channel between nodes on a netowrk

Twisted pair cable

twisted copper wires surrounded by a plastic jacket

Coaxial cable

Single copper wire surrounded by layers of plastic

Fiber-optic cable

Plastic or glass fibers that transmit data at very high speeds

Bandwidth

Maximum speed at which data can be transmitted between two nodes on a network

Throughput

Actual speed of data that is acheived; usually less than the bandwidth

Network adapters

Devices connected or installed on the network that allows the nodes to communicate with each other and access the network

Network Interface Card

Network adapter located inside computers and peripherals as expansion cards

Packets

Form in which data is sent over transmission media; Bundle

Network navigation devices

Device that helps to make the flow of data possible and enables the transmission of data

Switches

Received data packets and send them to the node for which they are intended

Network operating system

Special network software for client/server networks

Ethernet Networks

use the ethernet protocol as the means by which the nodes on a network communicate

Unshielded twisted pair cable

Composed of 4 pairs of wires that are twisted around each other to reduce electrical interferance

Repeaters

devices that are intalled on long cable runs to amplify the signal

DSL/cable router

Device that combines switches and routers that were designed to connect to DSL or cable modems

Wireless Network

uses radio waves rather than wires or cables as it's transmission media

802.11 standard

established in 1997 also known as wireless fidelity

Wireless Network Adapter

Device that is required for each node on a network to be able to communicate with other nodes on the Network

transceiver

Device that translates the electronic data that needs to be sent along the network in radio waves and broadcast the radio waves to other nodes.

Wireless Router

Device that combines the capabilities of a wired router with the ability to receive wireless signals

Wireless Access Point (WAP)

device that attaches to a network and provides wireless nodes with a means of wirelessly connecting to the network

Power-Line Networks

existing electrical wiring in your home to connect the nodes to a network

cybercrime

Criminal action perpetrated primarily through the use of a computer

Hacker

Anyone who breaks into computer system unlawfully

white-hat hackers

Hackers that don't wish to steal or cause problems. They also like to inform companies of how vulnerable they are

black-hat hackers

Those that break into computer systems to steal information or for illegal gain

Script kiddies

don't create programs but use programs made by professional hackers to wreak havoc

Packet sniffer

program that looks at each packet as it travels on the internet

Identity Theft

When someone uses personal information about you to assume your identity for the purpose of defrauding others

Trojan Horse

Program that appears to be useful but is actually doing malicious things in the background without you knowing.

backdoor programs

Allows hackers to take almost complete control of your computer without you knowing it

Zombies

What the computers hackers take control of are referred to as.

Denial of Service attack

Legitamate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system

Logical Ports

virtual communication gateways that allow a computer to organize requests for information

Firewalls

Programs designed to keep computers safe from hackers

Personal Firewalls

firewalls specifically designed for home networks. Are easy to intall

Virus

Computer program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged

Boot-Sector Viruses

replicate themselves into the master Boot Record, ensuring that the virus will be loaded into the memory immediately

Master Boot Record

a program that executes whenever a computer boots up

Logic Bombs

viruses that are triggered when certain logical conditions are met; such as opening a file

Time Bombs

Viruses that are triggered by the passage of time or on a certain date

Worms

Attempt to travel between systems through network connections to spread infections

Scripts

A series of commands that are executed without your knowledge

Macro Viruses

are attached to documents that use Macros

e-mail Virus

use the address book in the victims email system to distribute the virus

Polymorphic viruses

Change their own code periodically to avoid detection

Multipartite viruses

Designed to infect multiple files tyes in an effort to fool anti virus software

Stealth Viruses

Temporarily erase their own code from the files where they reside and hide in the active memory of the computer

antivirus software

Designed to detect viruses and keep your computer safe from them

quarantining

process in which antivirus software places a virus in a secured area of your hard drive to prevent the spread of infection

Inoculation

involves the antivirus software recording key attribute about files on your computer and keeps those statistics in a safe place on the hard drive

Chapter 7 test - Subjecto.com

Chapter 7 test

Your page rank:

Total word count: 3409
Pages: 12

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

An emerging standard of wireless Ethernet, also known as 802.11 ad, is

WiGig

The type of network used for communication among a laptop and smartphone using Bluetooth is a

PAN

The fastest broadband Internet service is usually

fiber-optic

Which of the following allows you to connect to the Internet wirelessly?

Wifi 4G LTE mobile hotspot

The device used to connect a network to the Internet is called a

modem

What would you use to see what network adapters are installed in your Windows computer?

Device Manager utility

What device would you use to amplify your wireless signal?

wireless range extender

Why would you want to disable SSID broadcast?

to make it more difficult for hackers to detect your network & to make it difficult for a neighbor to connect to your network

To share files between computers on a Windows home network, you must

create a home group

How can you tell what wireless devices are connected to your router?

Log in to the routers IP address and check the configuration page

Which of the following would NOT be a benefit of networking computers?

sharing software licenses

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes On his iPad. What kind of network does this family have?

P2P network

What two devices are often combined into one device in a small network to connect the home network to the internet and to share the connection between devices on the network?

Modem and router

Which of the following is used to access the Internet when wifi is not available?

mobile hotspot 4G LTE internet access 3G internet access

Which of the following should you not do to secure a wireless network?

Keep the default network name and router password

Which of the following might cause interference or poor connectivity between nodes on a wireless network?

-concrete walls -nodes that are too far apart -some appliances

802.11 ac is the current wireless Ethernet standard.

True

4G is the latest Wifi standard.

False

Actual data throughput is usually higher on wireless networks than on wired networks.

False

Data is sent through the network in bundles called packages.

False

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

network

A ________ is any device connected to a network such as a computer, printer, or game console.

node

________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.

Throughput

Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance.

network administrator

Which of the following is NOT a common network architecture type?

intraoffice area network (IAN)

________ is the maximum speed at which data can be transferred between two nodes. Bandwidth

A ________ is a network located in your residence that connects to all your digital devices.

HAN

A network that spans a large physical distance is called a ________.

WAN

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN

Which transmission medium transmits data the fastest?

Fiber-optic cable

Normal telephone cable is a type of ________.

twisted-pair cable

A client/server network is an example of ________ administration.

central

A peer-to-peer (P2P) network is an example of ________ administration.

local

Which of the following is NOT a standard for wireless fidelity Ethernet networks?

802.11ab

Which of the following is NOT a type of cable used in wired networks?

Unshielded coaxial

The term network ______________________________________ refers to the design of a network.

.architecture

A(n) ______________________________________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.

.peer-to-peer

Many cities in the United States now provide a(n) ______________________________________ area network to allow Internet access to residents and tourists.

______________________________________ cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference.

______________________________________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. coaxial

1. Which of the following would NOT be a benefit of networking computers?

sharing software licenses

2. Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have?

P2P network

What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network?

.modem and router

Which of the following is used to access the Internet when WiFi is not available?

3G Internet access, mobile hotspot, 4G LTE Internet access

5. Which of the following should you NOT do to secure a wireless network?

Keep the default network name and router password.

Which of the following might cause interference or poor connectivity between nodes on a wireless network?

nodes that are too far apart some appliances concrete walls

802.11ac is the current wireless Ethernet standard.

True

4G is the latest WiFi standard.

False

9. Actual data throughput is usually higher on wireless networks than on wired networks.

False

10. Data is sent through the network in bundles called packages.

False

Which statement about ultrabook computers is false?

Ultrabook computers have the fastest optical drives.

SSD is classified as what type of storage?

Nonvolatile.

When would you consider RAID 1 technology?

When you need instant backup of your work.

CPUs have several internal components including:

Level 2 cache memory, Level 1 cache memory, and ALU.

SuperFetch is a memory-management technique that:

Preloads the applications you use most into system memory.

A quad core CPU with hyperthreading has 8 virtual CPUs.

True.

SSD hard drives are a cheaper alternative to RAM.

False.

To document a problem you are having, you can use:

Problem Steps Recorder.

Which is not a type of video port?

USB 3.0.

A sound card that supports 7.1 surround sound will support:

8 speakers.

To improve video performance, modern computers have a ________ in addition to the CPU.

GPU.

The fastest data transfer port for computers today is the ________ port.

Thunderbolt.

Donating a computer always puts your personal information at risk.

False.

GDDR5 technology s often used in external hard drives.

False.

Each device connected to a network is known as a:

Node.

A small network used for communication between personal computing devices is a :

PAN.

The fastest broadband internet service is usually:

Fiber-optic.

The part of the network that establishes a communications channel between the nodes of the network is known as:

Transmission media.

The device used to route data between two nodes is called a:

Router.

Actual data throughput is usually higher on wired networks than on wireless networks.

True.

Home networks are usually configured as a client/server network.

False.

When setting up a home network, the router is attached:

Directly to the broadband modem.

All of the following are methods to secure your wireless network except:

Disabling WEP.

Which network-ready device facilitates file sharing and data backup?

Network-attached storage, Time Capsule, and Home network server.

To share files between computers on a Windows home network, you must:

Create a home group.

Which of the following is not recommended to do when securing a home wireless network?

Enable SSID broadcast.

Network-ready devices contain Ethernet switches.

False.

Home network servers are a specialized type of NAS device.

True.

The operating system on your cell/smartphone is stored in:

Read-only memory.

VolP is phone service that:

Works over an internet connection.

Which service allows you to use your cell/smart phone to send messages that contain images?

MMS.

Digital convergence means that:

One device can perform the jobs of several.

There are several categories of mobile devices because:

There is a range of tradeoffs between weight and performance.

Digital convergence means that all cellular networks will become 4G.

False.

Ultrabooks are a type of notebook computer with the fastest processor and largest screen size.

False.

If you are in a location with free Wi-Fi, it is better to use Wi-Fi than the 3G cellular signal.

True.

Which is not a factor that determines the quality of images taken with a digital camera?

Eye-Fi.

The quickest way to distribute your bands new song to a lot of listeners is to:

Use an application to post it on Facebook.

P2P is an acronym for:

Peer-to-peer sharing.

An analog signal is different from a digital signal because:

It is continuous.

Which of the following is not true about modern televisions?

They run word processing and spreadsheet software.

Digital music files must be converted to the MP3 format if they are transferred to a mobile device.

False.

A codec is the algorithm that compresses and decompresses video files.

True.

If your digital camera doesn’t support wireless connectivity, you can use a memory card with built-in Wi-Fi.

True.

each device connected to a network is known as a

node

a small network used for communication between personal computing devices is a

PAN

the fastest broadband internet service is usually

fiber optic

the part of the network that establishes a communications channel between the nodes of the network is known as

transmission media

the device used to move data between two networks is called a

router

actual data throughput is usually higher on wired networks than on wireless networks

true

home networks are usually configured as a client/server network

false

___ is software that takes an existing internet connection and turns it into a wireless hotspot

connectify

a computer network is defined as two or more computers connected via ___ so that they can communicate with each other

software and hardware

a ___ is a device connected to a network such as a computer or game console

node

all of the following are benefits of networks EXCEPT

sharing an operating system

network architectures are classified according to

the way in which they are managed and the distance between their nodes

all of the following involve tasks for network administration, EXCEPT

purchasing initial equipment for the network

is the maximum speed at which data can be transferred between two nodes

bandwidth

all of the following are used to classify network architectures, EXCEPT

the number of nodes on the network

a ___ is a network located in your home that connects to all your digital devices

HAN

a large network designed to provide access to a specific geographic area, such as a large city is a

MAN

which transmission medium transmits data the fastest

fiber optic cable

a client/server network is an example of ___ administration

central

normal telephone cable is a type of

twisted pair cable

a peer to peer (P2P) network is an example of ___ administration

local

network adapters ___

enable nodes in a network to communicate with each other

the current version of wireless Ethernet is

802.11n

sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network

routers and switches

which of the following is NOT a type of cable used in wired networks

router cable

client/server networks are controlled by a central server that runs a specialized piece of software called

NOS (network operating system)

which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network

Cat 7B

for the nodes on a network to communicate with each other and access the network, each node needs a

network adapters

data are sent through a network on bundles called

packets

the most popular transmission media option for wired Ethernet networks is

unshielded twisted-pair (UTP) cable

wireless internet is available using

radio waves

all of the following operating systems support P2P networking, EXCEPT

Unix

using a network without the network owner’s permission is known as

piggy backing

SSID stands for

service set identifier

all of the following are extra precautions you can take to secure a wireless network EXCEPT

enable SSID braodcast

the unique number assigned to a network adapter by the manufacturer is referred to as the

MAC

connectify enables you to connect all your wifi-enabled devices through the same internet connection

true

a network must be three or more computers that are connected through software and hardware so they can communicate with each other

false

a client computer is the computer on which users accomplish specific tasks

true

sharing files is a benefit of a network

true

Ethernet networks are always connected using twisted-pair cable technology

false

p2p networks are more expensive than client/server networks

false

most computers today come with Ethernet adapters already installed

true

the capability of current devices to use earlier standards is known as backward compatibility

true

a p2p network needs network operating system software installed on every node

false

it is possible to limit your signal range on your home wireless network

true

Network architecture

refers to the design of a network

network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.

Peer 2 peer

Local area network

A network in which the nodes are located within a computer lab is called a(n)

Personal area network

A network used to communicate among devices close to one person is called

Metropolitan area network

area network to allow Internet access to residents and tourists.

unshielded twisted pair

cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference

backwards compatability

The capability of current devices use earlier standards is known as

routers

devices that transfer packets of data between two or more networks

switch

a device that receives data packets and sends them to their intended nodes while preventing data collections

network operating system

The server on a client/server network has specialized _____ installed

broadband

high speed internet

DSL uses what kind of cable

twisted pair

uses radio waves as its transmission medium

wireless network

storing files on the _____ avoids having to save them on multiple devices

cloud

NOS stands for

Network operating system

an ________network is set up near a wireless network and has a sound alike name to lure unsuspecting web surfers

evil twin

hotspot

public places where you can wirelessly connect to the Internet are known as

encryption

When using a wireless connection, _____ translates data so that it is protected

SSID stands for

server set identifier

All wireless networks have their own name, referred to as the ____ which is used to identify the network.

SSID

WEP stands for

wired equivalent privacy

WPA stands for

wifi protection access

refers to connecting to a wireless connection without the permission of the owner.

piggy backing

Network

Two or more computers connected via software and hardware so they can communicate with each other

Nodes

devices that are connected to a network

Router

Device you can install on your network so 2 or more nodes can share the same broadband connection

Network Architecture

refers to the design of a network

Peer-to-Peer Network

Network in which all nodes can communicate directly with each other

Client Server Network

Contains two different types of computers: clients and servers; network that uses more than 10 nodes

Client

computer at which users accomplish specific tasks and make specific requests

Server

Computer that provides information and resources for the clients on the network

Local area networks

Netork in which nodes are located within a small geographical area

Wide area networks

Network made up of LANs connected over long distances

Transmission media

establishes a communications channel between nodes on a netowrk

Twisted pair cable

twisted copper wires surrounded by a plastic jacket

Coaxial cable

Single copper wire surrounded by layers of plastic

Fiber-optic cable

Plastic or glass fibers that transmit data at very high speeds

Bandwidth

Maximum speed at which data can be transmitted between two nodes on a network

Throughput

Actual speed of data that is acheived; usually less than the bandwidth

Network adapters

Devices connected or installed on the network that allows the nodes to communicate with each other and access the network

Network Interface Card

Network adapter located inside computers and peripherals as expansion cards

Packets

Form in which data is sent over transmission media; Bundle

Network navigation devices

Device that helps to make the flow of data possible and enables the transmission of data

Switches

Received data packets and send them to the node for which they are intended

Network operating system

Special network software for client/server networks

Ethernet Networks

use the ethernet protocol as the means by which the nodes on a network communicate

Unshielded twisted pair cable

Composed of 4 pairs of wires that are twisted around each other to reduce electrical interferance

Repeaters

devices that are intalled on long cable runs to amplify the signal

DSL/cable router

Device that combines switches and routers that were designed to connect to DSL or cable modems

Wireless Network

uses radio waves rather than wires or cables as it’s transmission media

802.11 standard

established in 1997 also known as wireless fidelity

Wireless Network Adapter

Device that is required for each node on a network to be able to communicate with other nodes on the Network

transceiver

Device that translates the electronic data that needs to be sent along the network in radio waves and broadcast the radio waves to other nodes.

Wireless Router

Device that combines the capabilities of a wired router with the ability to receive wireless signals

Wireless Access Point (WAP)

device that attaches to a network and provides wireless nodes with a means of wirelessly connecting to the network

Power-Line Networks

existing electrical wiring in your home to connect the nodes to a network

cybercrime

Criminal action perpetrated primarily through the use of a computer

Hacker

Anyone who breaks into computer system unlawfully

white-hat hackers

Hackers that don’t wish to steal or cause problems. They also like to inform companies of how vulnerable they are

black-hat hackers

Those that break into computer systems to steal information or for illegal gain

Script kiddies

don’t create programs but use programs made by professional hackers to wreak havoc

Packet sniffer

program that looks at each packet as it travels on the internet

Identity Theft

When someone uses personal information about you to assume your identity for the purpose of defrauding others

Trojan Horse

Program that appears to be useful but is actually doing malicious things in the background without you knowing.

backdoor programs

Allows hackers to take almost complete control of your computer without you knowing it

Zombies

What the computers hackers take control of are referred to as.

Denial of Service attack

Legitamate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system

Logical Ports

virtual communication gateways that allow a computer to organize requests for information

Firewalls

Programs designed to keep computers safe from hackers

Personal Firewalls

firewalls specifically designed for home networks. Are easy to intall

Virus

Computer program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged

Boot-Sector Viruses

replicate themselves into the master Boot Record, ensuring that the virus will be loaded into the memory immediately

Master Boot Record

a program that executes whenever a computer boots up

Logic Bombs

viruses that are triggered when certain logical conditions are met; such as opening a file

Time Bombs

Viruses that are triggered by the passage of time or on a certain date

Worms

Attempt to travel between systems through network connections to spread infections

Scripts

A series of commands that are executed without your knowledge

Macro Viruses

are attached to documents that use Macros

e-mail Virus

use the address book in the victims email system to distribute the virus

Polymorphic viruses

Change their own code periodically to avoid detection

Multipartite viruses

Designed to infect multiple files tyes in an effort to fool anti virus software

Stealth Viruses

Temporarily erase their own code from the files where they reside and hide in the active memory of the computer

antivirus software

Designed to detect viruses and keep your computer safe from them

quarantining

process in which antivirus software places a virus in a secured area of your hard drive to prevent the spread of infection

Inoculation

involves the antivirus software recording key attribute about files on your computer and keeps those statistics in a safe place on the hard drive

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending