True/False Indicate whether the
statement is true or false.
|
|
1.
|
A network is simply a group of two or more computers linked together.
|
|
2.
|
The Internet is the biggest network of all.
|
|
3.
|
A standalone computer system is vulnerable to the same kinds of risks as a
network.
|
|
4.
|
Networks are divided into four main types.
|
|
5.
|
The communication area of a LAN might be as large as a state, country, or even
the world.
|
|
6.
|
Client/server networks are easier to set up and manage than peer-to-peer
networks.
|
|
7.
|
To connect wirelessly requires different equipment than that used for a wired
connection.
|
|
8.
|
Electronic identification cards are used to gain access to certain areas within
a building or department.
|
|
9.
|
The best plan for a company that handles secure information is to handle
security breaches as they occur.
|
|
10.
|
Biometric security measures are usually applied when high-level security is
required.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
11.
|
What types of phones are supported through the Public Switched Telephone Network
(PSTN)?
a. | Digital | c. | Standard | b. | Mobile | d. | All of the
above |
|
|
12.
|
Which of the following network benefit do companies take advantage of when they
purchase a site license?
a. | Enhanced communication | c. | Software sharing | b. | Hardware sharing | d. | Collaborative
environment |
|
|
13.
|
Which of the following is true about e-mail?
a. | The cost depends on the size of the message | c. | It is private | b. | Delivery is almost
instantaneous | d. | It cannot be
sabotaged |
|
|
14.
|
In a client/server network, which of the following would be considered the
client?
a. | Microsoft Windows | c. | Printer | b. | Internet Explorer | d. | Desktop
computer |
|
|
15.
|
Which of the following can contain communication links across metropolitan,
regional, or national boundaries?
a. | LAN | c. | WAN | b. | Wireless LAN | d. | Intranet |
|
|
16.
|
In a client/server network, the ____ manages network resources.
a. | client | c. | node | b. | server | d. | router |
|
|
17.
|
Handbooks, employee manuals, and employment forms would most likely be found on
____.
a. | an intranet | c. | the Internet | b. | an extranet | d. | a hub |
|
|
18.
|
The word modem is an acronym for ____.
a. | modern demarcation | c. | modulate
demodulate | b. | most demand | d. | modification
demonstration |
|
|
19.
|
Which of the following uses coaxial cable to send and receive data?
a. | Modem | c. | Digital subscriber line (DSL) | b. | Cable
modem | d. | T-1
line |
|
|
20.
|
The ____ determines the amount of data that can be sent at one time.
a. | router | c. | node | b. | hub | d. | bandwidth |
|
|
21.
|
Computer information is stored digitally, but information sent over the
telephone lines is transmitted in the form of ____.
a. | analog waves | c. | air waves | b. | bridges | d. | fiber optics |
|
|
22.
|
A(n) ____ is a type of fiber-optic telephone line that can transmit up to 1.544
megabits per second.
a. | DSL | c. | VDSL | b. | HDSL | d. | T-1 line |
|
|
23.
|
“Sniffer” software is used to ____.
a. | prevent hackers from accessing your computer | b. | locate wireless hot
spots | c. | transmit voice data over telephone lines | d. | set up and manage a
peer-to-peer network |
|
|
24.
|
Antivirus software should ____.
a. | be run when you suspect a problem | c. | be run monthly | b. | be run
weekly | d. | always be
running |
|
|
25.
|
A(n) ____ acts like a switchboard through a firewall.
a. | Web server | c. | proxy server | b. | FTP server | d. | database server |
|
|
26.
|
A cache is a(n) ____.
a. | place to store something temporarily | c. | external wireless
adapter | b. | special type of password | d. | dedicated connection to the Internet |
|
|
27.
|
Companies handling sensitive information should back up data regularly and store
it ____.
a. | on the same computer | c. | on CDs | b. | on the network server | d. | off site |
|
|
28.
|
Biometric security measures examine any of the following, except ____.
a. | fingerprints | c. | voice pattern | b. | blood type | d. | retina of the
eye |
|
|
|
FIGURE 24-1
|
|
29.
|
Figure 24-1 above shows an example of ____.
a. | a communication channel | c. | a peer-to-peer
network | b. | a client/server network | d. | T-1 lines |
|
|
|
FIGURE 24-2
|
|
30.
|
Figure 24-2 above shows a computer with a ____ attached.
a. | dial-up modem | c. | hub | b. | wireless router | d. | T-1 line |
|
|
|
Case 24-1 Javier has decided to upgrade his communication hardware and
get a faster Internet connection. After considering all the options, he has decided to use a wireless
Internet service provider.
|
|
31.
|
The speeds Javier will get with his new wireless connection will be more than
____ times faster than his old dial-up connection.
|
|
32.
|
To connect his laptop wirelessly to the Internet, Javier will need a(n)
____.
a. | hub | c. | T-1 line | b. | router | d. | adapter |
|
|
|
Case 24-2 Bryah owns a small business and travels frequently. She is
concerned about the security of the data on her laptop, which includes valuable information and trade
secrets.
|
|
33.
|
When Bryah creates a password to restrict access to her computer, she should
____.
a. | change it frequently | c. | write it down | b. | use all lowercase letters | d. | use the same one as her Internet
account |
|
|
34.
|
When Bryah is traveling, accidental association would be a concern when she is
____.
a. | connecting wirelessly to the Internet | c. | screening potential
employees | b. | employing biometric security measures | d. | backing up data |
|
Matching
|
|
|
Identify the letter of the choice that best
matches the phrase or definition.
a. | Communication
channel | b. | Router | c. | Node | d. | Hub | e. | Modem |
|
|
35.
|
Small, simple, inexpensive device that joins multiple computers
together
|
|
36.
|
Connects two or more LANs to make a WAN
|
|
37.
|
Enables a computer to transmit voice data over telephone lines
|
|
38.
|
Can include telephone lines, fiber optics, satellites, microwaves or any
combination of these
|
|
39.
|
Each device on the network
|