Exam 24: Network Fundamentals
Exam 1: Computers and Computer Systems46 Questions
Exam 2: Input, Output, and Processing46 Questions
Exam 3: Computer Protection46 Questions
Exam 4: Computer Maintenance46 Questions
Exam 5: Computer-Related Issues46 Questions
Exam 6: Software and Hardware Interaction46 Questions
Exam 7: Software Fundamentals46 Questions
Exam 8: Operating Systems46 Questions
Exam 9: Windows Management46 Questions
Exam 10: Operating System Customization46 Questions
Exam 11: Exploring Microsoft Office 200746 Questions
Exam 12: Getting Started With Word Essentials46 Questions
Exam 13: Editing and Formatting Documents46 Questions
Exam 14: Sharing Documents46 Questions
Exam 15: Working With Tables46 Questions
Exam 16: Enhancing Documents46 Questions
Exam 17: Getting Started With Excel Essentials46 Questions
Exam 18: Organizing and Enhancing Worksheets46 Questions
Exam 19: Creating Formulas and Charting Data46 Questions
Exam 20: Getting Started With Powerpoint Essentials46 Questions
Exam 21: Enhancing Presentations With Multimedia Effects46 Questions
Exam 22: Getting Started With Access Essentials46 Questions
Exam 23: Managing and Reporting Database Information46 Questions
Exam 24: Network Fundamentals46 Questions
Exam 25: Communication Services46 Questions
Exam 26: Communications and Collaboration46 Questions
Exam 27: Using the Internet and the World Wide Web46 Questions
Exam 28: Web Content46 Questions
Exam 29: Technology and Society46 Questions
Exam 30: Computer Safety and Ethics46 Questions
Select questions type
A(n) ____ is a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
A(n) ____________________ is designed for the exclusive use of people within an organization.
Free
(Short Answer)
4.9/5
(27)
Correct Answer:
intranet
A wide area network (WAN) connects personal computers, workstations, and other devices in a limited geographical area.
(True/False)
4.8/5
(46)
Biometric security measures examine any of the following, except ____.
(Multiple Choice)
4.8/5
(23)
The ____ determines the amount of data that can be sent at one time.
(Multiple Choice)
4.9/5
(39)
What types of phones are supported through the Public Switched Telephone Network (PSTN)?
(Multiple Choice)
5.0/5
(36)
Which of the following can contain communication links across metropolitan, regional, or national boundaries?
(Multiple Choice)
4.8/5
(22)
Computer information is stored digitally, but information sent over the telephone lines is transmitted in the form of ____.
(Multiple Choice)
4.9/5
(39)
Handbooks, employee manuals, and employment forms would most likely be found on ____.
(Multiple Choice)
4.8/5
(41)
The best plan for a company that handles secure information is to handle security breaches as they occur.
(True/False)
4.9/5
(23)
Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah creates a password to restrict access to her computer, she should ____.
(Multiple Choice)
5.0/5
(28)
Biometric security measures are usually applied when high-level security is required.
(True/False)
4.7/5
(39)
To connect wirelessly requires different equipment than that used for a wired connection.
(True/False)
4.9/5
(28)
A standalone computer system is vulnerable to the same kinds of risks as a network.
(True/False)
5.0/5
(38)
The term client/server network describes a software architectural model.
(True/False)
4.8/5
(39)
____________________ is a recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
(Short Answer)
4.9/5
(36)
Electronic identification cards are used to gain access to certain areas within a building or department.
(True/False)
4.7/5
(35)
Showing 1 - 20 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)