Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Web's Resources76 Questions
Exam 4: Application Software: Programs That Let You Work and Play74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: The History of the Personal Computer41 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 15: Information Technology Ethics37 Questions
Exam 16: Under the Hood38 Questions
Exam 17: Careers in IT38 Questions
Select questions type
The physical address assigned each network adapter is called its ________.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
D
Because of its centralized design, a(n)________ topology is the simplest to troubleshoot and repair.
Free
(Short Answer)
4.9/5
(41)
Correct Answer:
star
A bridge sends information between two networks.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
The computers in a lab on a floor of a building would be connected using a ________.
(Multiple Choice)
4.8/5
(45)
A(n)________ server tracks who is logging on to the network as well as which services on the network are available to each user.
(Multiple Choice)
4.8/5
(37)
A ________ network can contain servers as well as individual computers.
(Multiple Choice)
4.8/5
(37)
A(n)________ server is a heavily secured server located between a company's secure internal network and its firewall.
(Multiple Choice)
4.8/5
(34)
A(n)________ address is the address that external entities use when communicating with your network.
(Multiple Choice)
4.8/5
(42)
A ________ uses the Internet communications infrastructure to build a secure and private network.
(Multiple Choice)
4.7/5
(27)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(41)
________ is the standard communications protocol used on most client/server networks.
(Multiple Choice)
4.8/5
(43)
A(n)________ server is a server that stores and manages files for network users.
(Multiple Choice)
4.9/5
(26)
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
(Short Answer)
4.8/5
(34)
A(n)________ is a group of data packets that are sent together.
(Short Answer)
4.8/5
(28)
Which of the following is the most commonly used client/server network topology?
(Multiple Choice)
4.9/5
(32)
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
(Multiple Choice)
4.9/5
(36)
In a ________ network, each node connected to the network communicates directly with every other node.
(Multiple Choice)
4.9/5
(42)
A ________ sends data from one collision domain to another.
(Multiple Choice)
4.8/5
(25)
A ________ keeps your computer safe by determining who is trying to access it.
(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)