Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: Using Technology to Change the World72 Questions
Exam 2: Looking at Computers: Understanding the Parts75 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources75 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World75 Questions
Exam 13: Behind the Scenes: How the Internet Works75 Questions
Exam 14: Tif 1: the History of the Personal Computer38 Questions
Exam 15: Tif 2: Information Technology Ethics37 Questions
Exam 16: Tif 3: Under the Hood38 Questions
Exam 17: Tif 4: Careers in It38 Questions
Select questions type
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
(Multiple Choice)
4.9/5
(28)
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
(Multiple Choice)
4.8/5
(33)
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
(Multiple Choice)
4.8/5
(39)
In a client/server network, each network node communicates directly with every other node on the network.
(True/False)
5.0/5
(39)
Match each of the following dedicated servers to its function:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(25)
A(n) ________ is an area of an intranet to which only certain external corporations or individuals have access.
(Short Answer)
4.9/5
(36)
P2P networks become difficult to manage when they exceed five users.
(True/False)
5.0/5
(38)
A ________ uses the Internet communications infrastructure to build a secure and private network.
(Multiple Choice)
4.9/5
(35)
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
(True/False)
4.7/5
(35)
For business networks, which of the following is NOT a main cable type?
(Multiple Choice)
4.9/5
(34)
A(n) ________ network is often the type of network that is set up in a home or very small business.
(Short Answer)
4.9/5
(35)
Showing 61 - 75 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)