Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
(Short Answer)
4.7/5
(41)
Transmission media comprise the system that data takes to flow between devices on the network.
(True/False)
4.7/5
(37)
________ technology for a VPN places data packets inside other data packets.
(Short Answer)
4.8/5
(39)
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
(True/False)
4.9/5
(33)
A library book reservation service is a good example of a use for a(n) ________ server.
(Short Answer)
4.9/5
(39)
A network ________ is a set of rules for how information and communications are exchanged.
(Multiple Choice)
4.9/5
(31)
A(n) ________ server acts as a liaison between an internal network and an external network.
(Short Answer)
4.8/5
(35)
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
(Essay)
4.9/5
(30)
________ is the process that requires users to prove that they have permission to access a computer network.
(Short Answer)
4.8/5
(35)
A ________ sends data from one collision domain to another.
(Multiple Choice)
4.8/5
(35)
In a ________ network, each node connected to the network communicates directly with every other node.
(Multiple Choice)
4.7/5
(31)
Which of the following is NOT a major factor to consider when selecting network cabling?
(Multiple Choice)
4.9/5
(32)
________ means that additional users can easily be added to a network without affecting the performance of the other network nodes.
(Short Answer)
5.0/5
(36)
Match each of the following networks to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(34)
For business networks, which of the following is NOT one of the main cable types?
(Multiple Choice)
4.9/5
(22)
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
(Multiple Choice)
4.9/5
(27)
________ is the standard communications protocol used on most client/server networks.
(Multiple Choice)
4.8/5
(32)
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
(True/False)
4.9/5
(47)
Showing 21 - 40 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)