Exam 5: Local Area Networks
Exam 1: Computers and Digital Basics147 Questions
Exam 2: Computer Hardware150 Questions
Exam 3: Software149 Questions
Exam 4: Operating Systems and File Management150 Questions
Exam 5: Local Area Networks150 Questions
Exam 6: The Internet149 Questions
Exam 7: The Web and E-mail150 Questions
Exam 8: Digital Media150 Questions
Exam 9: The Computer Industry: History,Careers,and Ethics150 Questions
Exam 10: Information Systems Analysis and Design150 Questions
Exam 11: Databases150 Questions
Exam 12: Computer Programming150 Questions
Select questions type
Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security.
-The signal on Esteban's wireless network is weak.What is the best solution to this problem?
(Multiple Choice)
4.8/5
(36)
On an Ethernet,a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
(Multiple Choice)
5.0/5
(41)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-The transmission capacity of a communications channel
(Multiple Choice)
4.9/5
(34)
To see a list of devices on your network,you can use your operating system's ____ utility.
(Multiple Choice)
4.9/5
(43)
On a home network,file ____ allows you to view and copy photos,for example,from your desktop computer to a tablet computer.
(Multiple Choice)
5.0/5
(26)
The best-known communications protocol is probably SMTP,which regulates Internet data transport._________________________
(True/False)
4.8/5
(36)
Legacy equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a(n)____.
(Multiple Choice)
4.9/5
(39)
Before using your network,you should adjust the configuration settings of the ____ to make sure your network is secure.
(Multiple Choice)
4.7/5
(38)
Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend.
-Thomas's friend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it.What kind of permission should Thomas assign to this file?
(Multiple Choice)
4.9/5
(39)
A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
(True/False)
4.8/5
(29)
A protocol known as ____ is designed to automatically distribute IP addresses.
(Multiple Choice)
4.8/5
(36)
The original Ethernet standard carried data over a coaxial cable bus topology at ____.
(Multiple Choice)
4.8/5
(34)
A(n)____________________ address is a series of numbers,such as 204.127.55.1,used to identify a network device.
(Short Answer)
4.9/5
(30)
Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.
(Multiple Choice)
4.9/5
(39)
If there are not unsecured networks in an area,networks with ____________________ encryption are the easiest to breach.
(Short Answer)
4.8/5
(33)
A cryptographic algorithm is a word,number,or phrase that must be known to encrypt or decrypt a message.
(True/False)
4.9/5
(39)
Showing 81 - 100 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)