Name: 
 

Chapter 24 Key Applications



True/False
Indicate whether the statement is true or false.
 

 1. 

A network is simply a group of two or more computers linked together.
 

 2. 

The Internet is the biggest network of all.
 

 3. 

A standalone computer system is vulnerable to the same kinds of risks as a network.
 

 4. 

Networks are divided into four main types.
 

 5. 

The communication area of a LAN might be as large as a state, country, or even the world.
 

 6. 

Client/server networks are easier to set up and manage than peer-to-peer networks.
 

 7. 

To connect wirelessly requires different equipment than that used for a wired connection.
 

 8. 

Electronic identification cards are used to gain access to certain areas within a building or department.
 

 9. 

The best plan for a company that handles secure information is to handle security breaches as they occur.
 

 10. 

Biometric security measures are usually applied when high-level security is required.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

What types of phones are supported through the Public Switched Telephone Network (PSTN)?
a.
Digital
c.
Standard
b.
Mobile
d.
All of the above
 

 12. 

Which of the following network benefit do companies take advantage of when they purchase a site license?
a.
Enhanced communication
c.
Software sharing
b.
Hardware sharing
d.
Collaborative environment
 

 13. 

Which of the following is true about e-mail?
a.
The cost depends on the size of the message
c.
It is private
b.
Delivery is almost instantaneous
d.
It cannot be sabotaged
 

 14. 

In a client/server network, which of the following would be considered the client?
a.
Microsoft Windows
c.
Printer
b.
Internet Explorer
d.
Desktop computer
 

 15. 

Which of the following can contain communication links across metropolitan, regional, or national boundaries?
a.
LAN
c.
WAN
b.
Wireless LAN
d.
Intranet
 

 16. 

In a client/server network, the ____ manages network resources.
a.
client
c.
node
b.
server
d.
router
 

 17. 

Handbooks, employee manuals, and employment forms would most likely be found on ____.
a.
an intranet
c.
the Internet
b.
an extranet
d.
a hub
 

 18. 

The word modem is an acronym for ____.
a.
modern demarcation
c.
modulate demodulate
b.
most demand
d.
modification demonstration
 

 19. 

Which of the following uses coaxial cable to send and receive data?
a.
Modem
c.
Digital subscriber line (DSL)
b.
Cable modem
d.
T-1 line
 

 20. 

The ____ determines the amount of data that can be sent at one time.
a.
router
c.
node
b.
hub
d.
bandwidth
 

 21. 

Computer information is stored digitally, but information sent over the telephone lines is transmitted in the form of ____.
a.
analog waves
c.
air waves
b.
bridges
d.
fiber optics
 

 22. 

A(n) ____ is a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.
a.
DSL
c.
VDSL
b.
HDSL
d.
T-1 line
 

 23. 

“Sniffer” software is used to ____.
a.
prevent hackers from accessing your computer
b.
locate wireless hot spots
c.
transmit voice data over telephone lines
d.
set up and manage a peer-to-peer network
 

 24. 

Antivirus software should ____.
a.
be run when you suspect a problem
c.
be run monthly
b.
be run weekly
d.
always be running
 

 25. 

A(n) ____ acts like a switchboard through a firewall.
a.
Web server
c.
proxy server
b.
FTP server
d.
database server
 

 26. 

A cache is a(n) ____.
a.
place to store something temporarily
c.
external wireless adapter
b.
special type of password
d.
dedicated connection to the Internet
 

 27. 

Companies handling sensitive information should back up data regularly and store it ____.
a.
on the same computer
c.
on CDs
b.
on the network server
d.
off site
 

 28. 

Biometric security measures examine any of the following, except ____.
a.
fingerprints
c.
voice pattern
b.
blood type
d.
retina of the eye
 
 
FIGURE 24-1
nar001-1.jpg
 

 29. 

Figure 24-1 above shows an example of ____.
a.
a communication channel
c.
a peer-to-peer network
b.
a client/server network
d.
T-1 lines
 
 
FIGURE 24-2
nar002-1.jpg
 

 30. 

Figure 24-2 above shows a computer with a ____ attached.
a.
dial-up modem
c.
hub
b.
wireless router
d.
T-1 line
 
 
Case 24-1
Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider.
 

 31. 

The speeds Javier will get with his new wireless connection will be more than ____ times faster than his old dial-up connection.
a.
2
c.
30
b.
7
d.
384
 

 32. 

To connect his laptop wirelessly to the Internet, Javier will need a(n) ____.
a.
hub
c.
T-1 line
b.
router
d.
adapter
 
 
Case 24-2
Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets.
 

 33. 

When Bryah creates a password to restrict access to her computer, she should ____.
a.
change it frequently
c.
write it down
b.
use all lowercase letters
d.
use the same one as her Internet account
 

 34. 

When Bryah is traveling, accidental association would be a concern when she is ____.
a.
connecting wirelessly to the Internet
c.
screening potential employees
b.
employing biometric security measures
d.
backing up data
 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
Communication channel
b.
Router
c.
Node
d.
Hub
e.
Modem
 

 35. 

Small, simple, inexpensive device that joins multiple computers together
 

 36. 

Connects two or more LANs to make a WAN
 

 37. 

Enables a computer to transmit voice data over telephone lines
 

 38. 

Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
 

 39. 

Each device on the network
 



 
Check Your Work     Start Over