Exam 15: Networks
Exam 1: The Big Picture52 Questions
Exam 2: Binary Values and Number Systems49 Questions
Exam 3: Data Representation51 Questions
Exam 4: Gates and Circuits49 Questions
Exam 5: Computing Components49 Questions
Exam 6: Low-Level Programming Languages and Pseudocode49 Questions
Exam 7: Problem Solving and Algorithms48 Questions
Exam 8: Abstract Data Types and Subprograms49 Questions
Exam 9: Object-Oriented Design and High-Level Programming Languages47 Questions
Exam 10: Operating Systems49 Questions
Exam 11: File Systems and Directories49 Questions
Exam 12: Information Systems45 Questions
Exam 13: Artificial Intelligence47 Questions
Exam 14: Simulation, Graphics, Gaming, and Other Applications50 Questions
Exam 15: Networks48 Questions
Exam 16: The World Wide Web44 Questions
Exam 17: Computer Security49 Questions
Exam 18: Limitations of Computing50 Questions
Exam 19: broad concept of computer security and its importance in modern society.102 Questions
Select questions type
____________ computing is a service that provides storage space and other resources on the Internet.
(Short Answer)
4.8/5
(37)
Which of the following breaks messages into packets, hands them off for delivery, and then orders and reassembles them at their destination?
(Multiple Choice)
4.9/5
(44)
A(n) _______________ is a set of rules that defines how data is formatted and processed on a network.
(Short Answer)
4.7/5
(30)
A(n) _______________ is a computer that attempts to translate a hostname into an IP address.
(Short Answer)
4.9/5
(30)
Which of the following is the term used to describe a machine and software that protects a network from inappropriate access?
(Multiple Choice)
4.8/5
(39)
The domain name system (DNS) uses one large table to map hostnames to IP addresses.
(True/False)
4.9/5
(40)
Which of the following would correspond to an organization, such as a university or company?
(Multiple Choice)
4.8/5
(37)
Computer networks may be connected without the use of physical wires.
(True/False)
4.9/5
(34)
The layered approach to networking allows new protocols to be developed without abandoning fundamental aspects of lower levels.
(True/False)
4.8/5
(43)
A ring topology is a LAN configuration in which a central node controls all message traffic.
(True/False)
4.9/5
(45)
Which of the following is a high-level protocol used to specify the transfer of electronic mail?
(Multiple Choice)
4.7/5
(36)
matisse.csc.villanova.edu is an example of a(n) _______________ that uniquely identifies one computer among all others on the Internet.
(Short Answer)
4.7/5
(40)
Network packets contain instructions regarding the route they should travel to reach their destination.
(True/False)
4.8/5
(31)
Which of the following would correspond to an organization, such as a university or company?
(Multiple Choice)
4.8/5
(28)
IPv6 operates in parallel with IPv4 addressing, creating essentially two parallel networks.
(True/False)
4.8/5
(40)
Which of the following provides a way to uniquely identify a single computer among all others on the Internet?
(Multiple Choice)
4.8/5
(33)
A firewall is a barrier that protects network equipment from physical damage.
(True/False)
4.8/5
(36)
Showing 21 - 40 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)