Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: Using Technology to Change the World72 Questions
Exam 2: Looking at Computers: Understanding the Parts75 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources75 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World75 Questions
Exam 13: Behind the Scenes: How the Internet Works75 Questions
Exam 14: Tif 1: the History of the Personal Computer38 Questions
Exam 15: Tif 2: Information Technology Ethics37 Questions
Exam 16: Tif 3: Under the Hood38 Questions
Exam 17: Tif 4: Careers in It38 Questions
Select questions type
NIC stands for ________.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
network interface card
The computers in a lab on a floor of a building would be connected using a ________.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
Most home networks use ________ cable, which is most susceptible to interference.
(Multiple Choice)
4.9/5
(29)
A(n) ________ server is a server used to fulfill one specific purpose.
(Short Answer)
4.9/5
(30)
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
(Multiple Choice)
4.9/5
(34)
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
(Multiple Choice)
4.9/5
(29)
A(n) ________ can often be equipped to act as a hardware firewall.
(Short Answer)
4.7/5
(30)
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
(True/False)
4.7/5
(29)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(39)
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
(Short Answer)
4.8/5
(46)
Transmission media comprise the physical system that data take to flow between devices on the network.
(True/False)
4.8/5
(34)
________ technology places data packets inside other data packets.
(Short Answer)
4.8/5
(41)
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
(Short Answer)
4.9/5
(32)
In an active topology, each node helps to move data through a network.
(True/False)
4.8/5
(29)
Which of the following is the most commonly used client/server network topology?
(Multiple Choice)
4.7/5
(41)
A(n) ________ server is a server that stores and manages files for network users.
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)