Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: Using Technology to Change the World72 Questions
Exam 2: Looking at Computers: Understanding the Parts75 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources75 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World75 Questions
Exam 13: Behind the Scenes: How the Internet Works75 Questions
Exam 14: Tif 1: the History of the Personal Computer38 Questions
Exam 15: Tif 2: Information Technology Ethics37 Questions
Exam 16: Tif 3: Under the Hood38 Questions
Exam 17: Tif 4: Careers in It38 Questions
Select questions type
An international company like Microsoft would use a MAN to connect all of its computers.
(True/False)
4.7/5
(45)
A ________ topology uses more than one topology when building a network.
(Multiple Choice)
4.8/5
(37)
Match each of the following networks to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
(Multiple Choice)
4.8/5
(41)
A(n) ________ is made up of two or more LANs that are miles apart.
(Short Answer)
4.9/5
(38)
A(n) ________ is a group of data packets that are sent together.
(Short Answer)
4.8/5
(35)
A facial-recognition scanner is an example of a biometric authentication device.
(True/False)
4.8/5
(44)
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
(Multiple Choice)
4.9/5
(46)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(44)
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
(True/False)
4.8/5
(27)
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
(Short Answer)
5.0/5
(30)
Ring networks use the ________ method to avoid data collisions.
(Multiple Choice)
4.8/5
(37)
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
(Multiple Choice)
4.8/5
(33)
A(n) ________ address is the address that external entities use when communicating with your network.
(Multiple Choice)
4.7/5
(31)
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
(Short Answer)
4.8/5
(35)
________ is the process that requires users to prove that they have permission to access a computer network.
(Short Answer)
4.8/5
(40)
A(n) ________ is used exclusively within a corporation or organization.
(Short Answer)
4.8/5
(29)
A ________ keeps your computer safe by determining who is trying to access it.
(Multiple Choice)
4.8/5
(36)
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
(Short Answer)
4.9/5
(36)
A ________ is a set of rules for how information and communication are exchanged.
(Multiple Choice)
4.8/5
(29)
Showing 41 - 60 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)