Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
Which of the following is the most commonly used client/server network topology?
(Multiple Choice)
4.9/5
(39)
A(n) ________ can often be equipped to act as a hardware firewall.
(Short Answer)
4.8/5
(36)
A(n) ________ server is a server that stores and manages files for network users.
(Multiple Choice)
4.9/5
(28)
A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
(Short Answer)
4.7/5
(37)
An international company like Microsoft would use a MAN to connect all of its computers.
(True/False)
4.8/5
(31)
A(n) ________ server is a server used to fulfill one specific purpose.
(Short Answer)
4.9/5
(35)
A(n) ________ network is often the type of network that is set up in a home or very small business.
(Short Answer)
4.9/5
(36)
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
(Multiple Choice)
4.8/5
(33)
Data flows in both directions around the ring in a ring network.
(True/False)
4.9/5
(34)
The computers in a lab on a floor of a building would be connected using a ________.
(Multiple Choice)
4.7/5
(37)
A ________ uses the Internet communications infrastructure to build a secure and private network.
(Multiple Choice)
4.9/5
(40)
Ring networks use the ________ method to avoid data collisions.
(Multiple Choice)
4.9/5
(41)
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
(Multiple Choice)
4.7/5
(39)
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
(Short Answer)
4.7/5
(27)
Showing 41 - 60 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)