Exam 5: Local Area Networks
Exam 1: Computers and Digital Basics147 Questions
Exam 2: Computer Hardware150 Questions
Exam 3: Software149 Questions
Exam 4: Operating Systems and File Management150 Questions
Exam 5: Local Area Networks150 Questions
Exam 6: The Internet149 Questions
Exam 7: The Web and E-Mail150 Questions
Exam 8: Digital Media150 Questions
Exam 9: The Computer Industry: History, careers, and Ethics150 Questions
Exam 10: Information Systems Analysis and Design150 Questions
Exam 11: Databases150 Questions
Exam 12: Computer Programming150 Questions
Select questions type
Symptoms of network problems include which of the following?
(Multiple Choice)
4.8/5
(38)
A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.
(Multiple Choice)
4.8/5
(31)
Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend.
-Thomas's friend has a particular folder into which he wants to allow people to put files without allowing them to open,copy,or change any files in that folder.What kind of permission should Thomas assign to this folder?
(Multiple Choice)
4.8/5
(28)
Which of the following is a disadvantage of using a wireless network when compared to a wired network?
(Multiple Choice)
4.9/5
(42)
-In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.

(True/False)
4.8/5
(38)
In areas where there are overlapping wireless networks,such as in a city or on a college campus,____ help you log in to the right network,rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.
(Multiple Choice)
4.7/5
(32)
A ____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.
(Multiple Choice)
4.9/5
(35)
You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects.
-You decide to use public key encryption to protect e-commerce transactions.Once the browser uses the public key it receives from the server to encrypt the credit card information,who can decrypt the message?
(Multiple Choice)
4.9/5
(37)
The original Ethernet standard carried data over a coaxial cable bus topology at ____.
(Multiple Choice)
4.9/5
(34)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-A set of rules for efficiently transmitting data from one network node to another
(Multiple Choice)
4.9/5
(36)
____________________ connectivity replaces the short cables that would otherwise tether a mouse,keyboard,game controller,or similar device to a computer.
(Short Answer)
4.9/5
(32)
The bandwidth of a digital channel is usually measured in ____________________ per second (bps).
(Short Answer)
4.7/5
(37)
On an Ethernet,a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
(Multiple Choice)
4.8/5
(43)
A ____ is a network device that extends a wired network by adding additional ports.
(Multiple Choice)
4.9/5
(33)
Public key encryption uses one key to encrypt a message and another key to decrypt it._________________________
(True/False)
4.8/5
(32)
Transmission signals can be disrupted by interference called ____________________,which has the potential to corrupt data.
(Short Answer)
4.8/5
(38)
Showing 101 - 120 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)