Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Web's Resources76 Questions
Exam 4: Application Software: Programs That Let You Work and Play74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: The History of the Personal Computer41 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 15: Information Technology Ethics37 Questions
Exam 16: Under the Hood38 Questions
Exam 17: Careers in IT38 Questions
Select questions type
The ends of the cable in a bus network use a(n)________ to absorb signals so that they are not reflected back to network components that have already received the signals.
(Multiple Choice)
4.8/5
(27)
A(n)________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
(Short Answer)
4.8/5
(35)
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
(Multiple Choice)
4.9/5
(32)
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
(Multiple Choice)
4.8/5
(37)
A(n)________ can often be equipped to act as a hardware firewall.
(Short Answer)
4.7/5
(37)
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
(Multiple Choice)
4.9/5
(32)
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
(True/False)
4.9/5
(35)
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
(True/False)
4.8/5
(31)
________ is the process that requires users to prove that they have permission to access a computer network.
(Short Answer)
4.7/5
(40)
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
(Short Answer)
5.0/5
(40)
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
(Multiple Choice)
4.8/5
(38)
In a client/server network, each network node communicates directly with every other node on the network.
(True/False)
4.8/5
(40)
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
(True/False)
4.7/5
(42)
In an active topology, each node helps to move data through a network.
(True/False)
4.8/5
(31)
An international company like Microsoft would use a MAN to connect all of its computers.
(True/False)
4.9/5
(41)
Showing 41 - 60 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)