Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
A(n) ________ can often be equipped to act as a hardware firewall.
(Short Answer)
4.8/5
(31)
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
(True/False)
4.7/5
(37)
A(n) ________ server acts as a repository for software such as Microsoft Office.
(Short Answer)
4.8/5
(34)
The ________ method is the access method that ring networks use to avoid data collisions.
(Short Answer)
5.0/5
(24)
All of the following are considered dedicated servers EXCEPT ________.
(Multiple Choice)
4.8/5
(42)
Each network adapter has a unique physical address called a(n) ________ that identifies it.
(Multiple Choice)
4.8/5
(33)
A ________ sends data from one collision domain to another.
(Multiple Choice)
4.7/5
(34)
Which of the following is not a major factor to consider when selecting network cabling?
(Multiple Choice)
4.7/5
(32)
Coaxial cable has all the following components, EXCEPT ________.
(Multiple Choice)
5.0/5
(32)
A(n) ________ server is a server used to fulfill one specific purpose.
(Short Answer)
4.9/5
(23)
The computers in a lab on a floor of a building would be connected using a ________.
(Multiple Choice)
4.8/5
(26)
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
(Multiple Choice)
4.8/5
(26)
Every device you would like to connect to a network, whether wired or wireless must have a(n) ________ installed in it.
(Multiple Choice)
4.8/5
(31)
All modern computing devices have a(n) ________ preinstalled that enables them to connect to a wired or wireless network.
(Short Answer)
4.7/5
(41)
A(n) ________ is an area of an intranet to which only certain external users have access.
(Short Answer)
4.8/5
(42)
________ cable is not subject to electromagnetic interference or radio frequency interference.
(Multiple Choice)
4.9/5
(33)
Which of the following would not be considered a possessed object?
(Multiple Choice)
4.7/5
(40)
Which of the following are NOT a typical wired network transmission medium?
(Multiple Choice)
4.7/5
(36)
A(n) ________ network is often the type of network that is set up in a home or very small business.
(Short Answer)
4.9/5
(44)
Showing 101 - 120 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)