Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
(True/False)
4.9/5
(43)
The shielded cable with a solid copper core that is more resistant to interference than twisted-pair is known as ________ cable.
(Short Answer)
4.7/5
(32)
A library book reservation service is a good example of a use for a(n) ________ server.
(Short Answer)
4.9/5
(33)
A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
(Short Answer)
4.8/5
(28)
Which of the following is the most commonly used client/server network topology?
(Multiple Choice)
5.0/5
(27)
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
(Multiple Choice)
4.9/5
(31)
The foil sheath on a STP cable is there to help cut down on interference.
(True/False)
4.8/5
(33)
Match each of the following networks to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(39)
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
(Multiple Choice)
4.7/5
(33)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(30)
Ring networks use the ________ method to avoid data collisions.
(Multiple Choice)
4.8/5
(41)
________ technology for a VPN places data packets inside other data packets.
(Short Answer)
4.8/5
(35)
A very cost effective wired media for an environment with little to no interference is ________.
(Multiple Choice)
4.9/5
(39)
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
(Short Answer)
4.8/5
(31)
Showing 61 - 80 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)