Exam 5: Local Area Networks
Exam 1: Computers and Digital Basics147 Questions
Exam 2: Computer Hardware150 Questions
Exam 3: Software149 Questions
Exam 4: Operating Systems and File Management150 Questions
Exam 5: Local Area Networks150 Questions
Exam 6: The Internet149 Questions
Exam 7: The Web and E-mail150 Questions
Exam 8: Digital Media150 Questions
Exam 9: The Computer Industry: History,Careers,and Ethics150 Questions
Exam 10: Information Systems Analysis and Design150 Questions
Exam 11: Databases150 Questions
Exam 12: Computer Programming150 Questions
Select questions type
In the context of networks,the communications ____________________ refers to the set of rules for efficiently transmitting data from one network node to another.
(Short Answer)
4.9/5
(32)
You have just secured a new job with a new firm that is very security conscious. You’ve been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects.
-You decide to use public key encryption to protect e-commerce transactions.Once the browser uses the public key it receives from the server to encrypt the credit card information,who can decrypt the message?
(Multiple Choice)
4.9/5
(31)
MAC addresses are used for some low-level network functions and can also be employed to establish network security.
(True/False)
4.8/5
(47)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-An encrypted message
(Multiple Choice)
4.8/5
(37)
To connect a phone or other device to a network,make sure that ____ is enabled,then wait for the device to sense the network,and when asked,enter the encryption key.
(Multiple Choice)
4.8/5
(32)
A WAN provides connectivity within a limited geographical area,often within a single building.
(True/False)
5.0/5
(32)
-In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.

(True/False)
4.8/5
(33)
Which of the following is NOT an advantage of using a wired network?
(Multiple Choice)
4.8/5
(36)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-A parcel of data that is sent across a computer network
(Multiple Choice)
4.8/5
(40)
A network ____ usually contains a computer,networked peripheral,or network device.
(Multiple Choice)
4.8/5
(24)
WPA2 makes sure that packets have not been intercepted or tampered with in any way.
(True/False)
4.9/5
(40)
____ is a wireless MAN or WAN technology commonly used for fixed Internet access.
(Multiple Choice)
4.7/5
(30)
____________________ resources like hardware,software,and data are made available for authorized network users to access.
(Short Answer)
4.8/5
(34)
If networked,____ can be accessed by an authorized LAN user.
(Multiple Choice)
4.8/5
(32)
You have just secured a new job with a new firm that is very security conscious. You’ve been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects.
-As part of your research,you find that the longer the key,the longer it will take a devious competitor to crack the code.You also find that most encryption today uses a ____ key,and so you decide to use an encryption key of that size.
(Multiple Choice)
4.8/5
(33)
Showing 101 - 120 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)