Exam 7: Networking: Connecting Computing Devices
Exam 1: Using Technology to Change the World72 Questions
Exam 2: Looking at Computers: Understanding the Parts75 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources75 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World75 Questions
Exam 13: Behind the Scenes: How the Internet Works75 Questions
Exam 14: Tif 1: the History of the Personal Computer38 Questions
Exam 15: Tif 2: Information Technology Ethics37 Questions
Exam 16: Tif 3: Under the Hood38 Questions
Exam 17: Tif 4: Careers in It38 Questions
Select questions type
On a network, a(n) ________ helps prevent data packets from colliding with each other.
(Multiple Choice)
4.7/5
(32)
Wireless networks are more vulnerable to attack than wired networks.
(True/False)
4.9/5
(35)
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
(Multiple Choice)
4.9/5
(31)
A client/server network is an example of ________ administration
(Multiple Choice)
4.9/5
(37)
Which of the following is NOT a wired broadband Internet connection option?
(Multiple Choice)
4.8/5
(33)
A(n) ________ network uses radio waves as its transmission medium.
(Short Answer)
4.8/5
(27)
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
(Multiple Choice)
4.7/5
(34)
A(n) ________ network is set up near a wireless network and has a sound-alike name to lure unsuspecting web surfers.
(Short Answer)
4.9/5
(34)
When using a wireless connection, ________ translates data so that it is protected.
(Short Answer)
4.7/5
(33)
A peer-to-peer (P2P) network is an example of ________ administration.
(Multiple Choice)
4.7/5
(37)
All wireless networks have their own name, referred to as the ________, which is used to identify the network.
(Short Answer)
4.7/5
(26)
The capability of current devices to use earlier standards is known as ________.
(Short Answer)
4.8/5
(35)
In a peer-to-peer network, one computer acts as the central computer.
(True/False)
4.8/5
(35)
Limiting your signal range does not help increase wireless network security.
(True/False)
4.9/5
(31)
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
(Multiple Choice)
4.8/5
(35)
A(n) ________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.
(Short Answer)
4.7/5
(28)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(31)
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
(True/False)
4.8/5
(37)
The most popular transmission media option for wired Ethernet networks is UTP cable.
(True/False)
4.9/5
(31)
Showing 21 - 40 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)