Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
A(n) ________ address is the unique physical address of a network adapter.
(Short Answer)
4.8/5
(35)
________ signals are used to alert other nodes on a network that a collision has happened.
(Short Answer)
4.8/5
(40)
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
(Multiple Choice)
4.9/5
(36)
Data flows in both directions around the ring in a ring network.
(True/False)
4.8/5
(32)
The physical address assigned to each network adapter is called its ________ address.
(Multiple Choice)
4.8/5
(36)
P2P networks become difficult to administer when they have large numbers of users.
(True/False)
4.7/5
(30)
Data flows on a(n) ________ to get between different points on a network.
(Multiple Choice)
4.9/5
(37)
A ________ uses the Internet communications infrastructure to build a secure and private network.
(Multiple Choice)
4.8/5
(39)
In which topology are all computers connected in sequence on a single cable?
(Multiple Choice)
4.9/5
(33)
An application server acts as a repository for application software.
(True/False)
4.9/5
(31)
A(n) ________ server is a server that keeps track of who is logging on to the network and which services on the network are available to each user.
(Short Answer)
4.9/5
(36)
________ servers can act as overseers for the network, since they manage and coordinate the services that are available to each user.
(Short Answer)
4.8/5
(32)
________ means that additional users can easily be added to a network without affecting the performance of the other network nodes.
(Short Answer)
4.7/5
(27)
Because of the possibility of data collision, a(n) ________ method must be established to control which computer can use the transmission media at a certain time.
(Short Answer)
4.8/5
(30)
The Institute of Electrical and Electronics Engineers (IEEE) has established worldwide networking protocols, including the Open Systems Interconnection (OSI) reference model.
(True/False)
4.8/5
(32)
A network ________ is a set of rules for how information and communications are exchanged.
(Multiple Choice)
4.7/5
(27)
A facial-recognition scanner is an example of a biometric authentication device.
(True/False)
4.8/5
(33)
Showing 41 - 60 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)