Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:



Similar documents
Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Local Area Networks (LANs) Blueprint (May 2012 Release)

Discovering Computers Chapter 9 Communications and Networks


Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

NETWORKING TECHNOLOGIES

Computer Networking: A Survey

Local-Area Network -LAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Higher Computing Networking 1

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Page 1 of 7. Computer Networking

IST101 - Test 6 Ch 7,12 Test 6 consists of 50 questions drawn from the following:

Introduction to computer networks and Cloud Computing

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Chapter 4: Networking and the Internet

Network System Design Lesson Objectives

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Network Design. Yiannos Mylonas

COMPUTER NETWORK TECHNOLOGY (300)

Chapter 9 Communications and Networks

Telecommunications, Networks, and Wireless Computing

CSCI 362 Computer and Network Security

MANAGEMENT INFORMATION SYSTEMS 8/E

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Network Fundamentals CHAPTER 1

Networks. The two main network types are: Peer networks

Telecommunications, the Internet, and Wireless Technology

Cisco Network Performance Evaluation Using Packet Tracer

Chapter 1 Personal Computer Hardware hours

Network Topologies. Network Topologies

Introduction to Ethernet

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Module 15: Network Structures

Computer Networking Type A: Very Short Answer Questions

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

National Unit Specification: general information. UNIT Computing: Computer Networking Fundamentals (SCQF level 5) CODE F1KH 11 SUMMARY OUTCOMES

Based on Computer Networking, 4 th Edition by Kurose and Ross

EKT 331/4 COMMUNICATION NETWORK

Networking. Topic 5. Contents

Network Topology Comparison

Introduction Chapter 1. Uses of Computer Networks

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

Lesson 24 Network Fundamentals

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

COURSE NUMBER: CTS 2371

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Performance Evaluation of Wired and Wireless Local Area Networks

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Different Types Of Network

Chapter 14: Distributed Operating Systems

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Network Technology CMP-354-TE. TECEP Test Description

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Post-Class Quiz: Telecommunication & Network Security Domain

524 Computer Networks

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Networking Devices. Lesson 6

In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network

Chapter 16: Distributed Operating Systems

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

2 Basic Concepts. Contents

Communication Networks. MAP-TELE 2011/12 José Ruela

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Industrial Networks & Databases

Advanced Higher Computing. Computer Networks. Homework Sheets

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Mathatma Gandhi University

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Local Area Network. OSI Seven Layer Model. Whole Building Network

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

Cornerstones of Security

Security Design.

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Introduction To Computer Networks

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Transcription:

1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of files and data d. centralization of network adapters 2. Why are P2P networks not usually installed in businesses? a. They require dedicated servers. b. They are more scalable than client/server networks. c. Security is stronger on client/server networks. d. Client/server networks are cheaper to install. 3. To ensure only authorized users are logging onto a network, which server would a client/server network include? a. application b. Internet c. communications d. authentication 4. Which of the following is a private network set up by a business that s used exclusively by a select group of employees and suppliers? a. HAN b. MAN c. Vendor network d. Intranet 5. Network adapters send data packets based on a(n) a. IP address. b. router address. c. frame address. d. MAC address. 6. Providing adequate security on a corporate network involves all of the following issues except a. authentication. b. restricting access to servers. c. limiting network access by requiring passwords. d. proprietary software lockout. 1

7. A is a group of two or more computers, or nodes, designed to share information and resources. a. network b. router c. bridge d. bus 8. A network can contain servers as well as individual computers. a. peer-to-peer b. distributed c. client/server d. switch 9. In a network, each node connected to the network communicates directly with every other node. a. peer-to-peer b. router c. client/server d. bridge 10. The computers in a lab on a floor of a building would be connected using a. a. PAN b. WAN c. LAN d. MAN 11. A uses the Internet communications infrastructure to build a secure and private network. a. HAN b. VPN c. WAN d. PAN 2

12. A(n) server tracks who is logging on to the network as well as which services on the network are available to each user. a. authentication b. file c. dedicated d. application 13. A(n) server is a server that stores and manages files for network users. a. print b. database c. e-mail d. file 14. A print server uses a print as a software holding area for jobs waiting to be printed. a. stack b. spooler c. logger d. heap 15. Which of the following is NOT a common network topology? a. Star b. Linear bus c. Cluster d. Ring 16. A is a set of rules for how information and communication are exchanged. a. token b. protocol c. packet d. frame 17. Ring networks use the method to avoid data collisions. a. passive-check b. active-check c. packet screening d. token 3

18. The ends of the cable in a bus network use a(n) to absorb signals so that they are not reflected back to network components that have already received the signals. a. endcap b. stopper c. block d. terminator 19. In a network, data collisions can occur fairly easily because the network is essentially composed of a single cable. a. Cluster b. Hierarchical c. Bus d. Star 20. Which of the following is the most commonly used client/server network topology? a. Star b. Hierarchical c. Ring d. Cluster 21. In an Ethernet network, the signal that is sent to indicate a signal collision is called a signal. a. hit b. crash c. jam d. stop 22. A topology uses more than one topology when building a network. a. multiple-use b. hybrid c. fusion d. crossover 4

23. is the amount of data that can be transmitted across a transmission medium in a certain amount of time. a. Data capacity b. Scalability c. Bandwidth d. Infusion 24. Which of the following is NOT a factor to consider when selecting network cabling? a. Cable diameter b. Maximum run length c. Bandwidth d. Interference 25. cable is NOT subject to electromagnetic interference or radio frequency interference. a. Coaxial b. Polycarbonate c. Twisted-pair d. Fiber-optic 26. For business networks, which of the following is NOT a main cable type? a. Duplex b. Coaxial c. Fiber-optic d. Twisted-pair 27. Most home networks use cable, which is most susceptible to interference. a. unshielded twisted-pair b. wi-fi c. fiber-optic d. coaxial 5

28. A(n) server is a heavily secured server located between a company's secure internal network and its firewall. a. armored b. proxy c. bastion host d. transitional 29. Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a. a. worm b. spammer c. brute force attack d. Trojan horse 30. provides the capability for troops on the ground to communicate with each other by routing signals through advanced sensor and targeting pods aboard military aircraft. a. IP7 b. ROVER-5 c. DOU-Z d. Net-T 6