Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
In a client/server network, each network node communicates directly with every other node on the network.
(True/False)
4.7/5
(33)
A facial-recognition scanner is an example of a biometric authentication device.
(True/False)
4.8/5
(47)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(36)
Most wired home networks use ________ cable, which is most susceptible to interference.
(Multiple Choice)
4.9/5
(41)
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
(Essay)
4.9/5
(32)
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
(Multiple Choice)
4.7/5
(36)
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
(Short Answer)
4.7/5
(31)
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
(Multiple Choice)
4.7/5
(39)
A ________ topology uses more than one type of topology when building a network.
(Multiple Choice)
4.9/5
(39)
________ is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
(Essay)
4.9/5
(33)
In an active topology, each node helps to move data through a network.
(True/False)
4.8/5
(36)
A(n) ________ server is maintained by a hosting company and is connected to an internal network using the Internet.
(Short Answer)
4.9/5
(31)
A(n) ________ is a container that can hold multiple data packets that are sent together.
(Short Answer)
4.9/5
(37)
Showing 61 - 76 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)