Deck 5: Local Area Networks

ملء الشاشة (f)
exit full mode
سؤال
  In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.<div style=padding-top: 35px>
In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most routers supply a WAN port designed for an Internet connection.
سؤال
  In the accompanying figure,the networks that don't have an icon of a lock next to them aren't secured,and are open targets for hackers to steal data,spread viruses,and create a launching pad for spam.<div style=padding-top: 35px>
In the accompanying figure,the networks that don't have an icon of a lock next to them aren't secured,and are open targets for hackers to steal data,spread viruses,and create a launching pad for spam.
سؤال
A cryptographic algorithm is a word,number,or phrase that must be known to encrypt or decrypt a message.
سؤال
IP addresses can be assigned by ISPs or system managers.
سؤال
Windows automatically senses nearby networks and displays their SSIDs.
سؤال
In the early years of personal computers,networks were plentiful.
سؤال
A packet always travels from the source directly to the destination,never traveling through intermediate routing devices.
سؤال
WPA2 makes sure that packets have not been intercepted or tampered with in any way.
سؤال
MAC addresses are used for some low-level network functions and can also be employed to establish network security.
سؤال
  The wave on the bottom in the accompanying figure depicts a digital signal.<div style=padding-top: 35px>
The wave on the bottom in the accompanying figure depicts a digital signal.
سؤال
  The wave on the top in the accompanying figure depicts an analog signal.<div style=padding-top: 35px>
The wave on the top in the accompanying figure depicts an analog signal.
سؤال
A transceiver is a combination of a transmitter and a receiver.
سؤال
  In the accompanying figure,the item on the left simply plugs into a serial port on the outside of the system unit.<div style=padding-top: 35px>
In the accompanying figure,the item on the left simply plugs into a serial port on the outside of the system unit.
سؤال
  In the accompanying figure,the item on the left can be used with a notebook or desktop computer.<div style=padding-top: 35px>
In the accompanying figure,the item on the left can be used with a notebook or desktop computer.
سؤال
Microwaves cannot be aimed in a single direction and have less carrying capacity than radio waves.
سؤال
A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
سؤال
A WAN provides connectivity within a limited geographical area,often within a single building.
سؤال
Bluetooth is often used to connect workstations to a LAN.
سؤال
A gateway joins two different types of networks.
سؤال
The process of converting ciphertext into plaintext is called encryption._________________________
سؤال
A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.

A) LAN
B) PAN
C) MAN
D) WAN
سؤال
A wireless ad hoc network uses a centralized broadcasting device,such as a wireless access point or router._________________________
سؤال
Data in a(n)wired network travels without the use of network cables._________________________
سؤال
Wi-Fi signals cannot be disrupted by interference from devices such as microwave ovens,cordless telephones,and baby monitors._________________________
سؤال
  A more efficient alternative to packet switching is shown in the accompanying figure._________________________<div style=padding-top: 35px>
A more efficient alternative to packet switching is shown in the accompanying figure._________________________
سؤال
The Internet is the world's largest example of a(n)LAN._________________________
سؤال
A ____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.

A) LAN
B) WAN
C) MAN
D) PAN
سؤال
A storage device that directly connects to a network is called network peripheral storage._________________________
سؤال
  In the accompanying figure,IWC-guest is a(n)secure network._________________________<div style=padding-top: 35px>
In the accompanying figure,IWC-guest is a(n)secure network._________________________
سؤال
  When network discovery is turned on in a device like the one shown in the accompanying figure,any Wi-Fi enabled device within range of your network can see its URL._________________________<div style=padding-top: 35px>
When network discovery is turned on in a device like the one shown in the accompanying figure,any Wi-Fi enabled device within range of your network can see its URL._________________________
سؤال
If you are using a file server without its own keyboard or monitor,server configuration software is accessible using a(n)browser._________________________
سؤال
A LAN would be used to ____.

A) connect personal computers within a very limited geographical area, such as a single building
B) connect several smaller networks together
C) provide high-speed connectivity for a metropolitan area
D) connect devices over a large geographical area
سؤال
Which of the following is NOT a type of network device?

A) hub
B) switch
C) workstation
D) router
سؤال
High-bandwidth communications systems,such as cable TV and DSL,are sometimes referred to as peakband._________________________
سؤال
The best-known communications protocol is probably SMTP,which regulates Internet data transport._________________________
سؤال
Which of the following,if networked,can be accessed by an authorized LAN user?

A) scanners
B) high-capacity storage devices
C) photo printers
D) all of the above
سؤال
Microwaves are electromagnetic signals that can be aimed in a single direction and have more carrying capacity than radio waves._________________________
سؤال
  In the accompanying figure,the lock icon indicates a network secured with wired encryption._________________________<div style=padding-top: 35px>
In the accompanying figure,the lock icon indicates a network secured with wired encryption._________________________
سؤال
Public key encryption uses one key to encrypt a message and another key to decrypt it._________________________
سؤال
To connect to a LAN,a computer requires ____.

A) a peer-to-peer network
B) network attached storage
C) a network interface card
D) a client
سؤال
Two devices on a network might have to negotiate their communications protocols through a process called ____.

A) handshaking
B) synchronization
C) realization
D) introduction
سؤال
In the technology referred to as ____,a message is divided into several parcels that can be routed independently to their destination.

A) packet switching
B) handshaking
C) circuit switching
D) protocol
سؤال
A wired network is one that uses ____ to connect network devices.

A) NICs
B) radio frequency waves
C) cables
D) infrared light
سؤال
Dial-up Internet access is an example of a(n)____ communications system.

A) broadband
B) fireband
C) narrowband
D) Internet 2
سؤال
Most wireless networks transport data as ____ signals.

A) infrared
B) satellite
C) microwave
D) RF (radio frequency)
سؤال
The original Ethernet standard carried data over a coaxial cable bus topology at ____.

A) 10 Mbps
B) 100 Mbps
C) 10 Gbps
D) 100 Gbps
سؤال
Ethernet is a wired technology that is defined by ____ standards.

A) IEEE 802.3u
B) IEEE 802.3
C) IEEE 802.3ba
D) IEEE 802.3ae
سؤال
A protocol known as ____ is designed to automatically distribute IP addresses.

A) DHCP
B) packet switching
C) CSMA/CD
D) a piconet
سؤال
Ethernet networks ____.

A) are difficult to implement, manage, and maintain
B) use a nonproprietary technology, making Ethernet equipment available from a variety of vendors
C) do not offer much flexibility in network design
D) are not compatible with Wi-Fi wireless networks
سؤال
The telephone system uses a technology called ____,which establishes a dedicated,private link between telephones for the duration of a call.

A) packet switching
B) circuit switching
C) bus switching
D) ring switching
سؤال
A ____ is a physical path or a frequency used for signal transmissions.

A) logical channel
B) communications channel
C) connecting link
D) node link
سؤال
Ethernet is easy to ____.

A) implement
B) maintain
C) manage
D) All of the above
سؤال
On an Ethernet,a ____ is broadcast to every device but is accepted only by the device to which it is addressed.

A) code
B) packet
C) band
D) node
سؤال
The most important network device is a ____.

A) router
B) switch
C) hub
D) wireless access point
سؤال
High-bandwidth communications systems are sometimes referred to as ____.

A) quickband
B) broadband
C) fireband
D) Internet 2
سؤال
What is the IEEE designation for the Gigabit Ethernet standard?

A) IEEE 802.3
B) IEEE 802.3ae
C) IEEE 802.3u
D) IEEE 802.3z
سؤال
Which of the following is a disadvantage of using a wireless network when compared to a wired network?

A) speed
B) range
C) security
D) all of the above
سؤال
A network ____ usually contains a computer,networked peripheral,or network device.

A) node
B) file
C) application
D) index
سؤال
Which of the following is NOT an advantage of using a wired network?

A) Increased security
B) Fast access
C) Simple to configure
D) Unlimited mobility
سؤال
Which of the following is NOT true about Wi-Fi standards?

A) IEEE 802.11b is the original standard.
B) All of the standards are cross compatible.
C) IEEE 802.11a is not compatible with 802.11b.
D) IEEE 802.11n is faster than, but compatible with, b and
G)
سؤال
Wi-Fi encompasses all of the following standards EXCEPT ____.

A) 802.11b
B) 802.11g
C) 802.11n
D) 802.11p
سؤال
A ____ is a network device that extends the range of a network by restoring signals to maximum strength and retransmitting them.

A) bridge
B) hub
C) switch
D) repeater
سؤال
In a wireless ____ network,devices broadcast directly to each other.

A) ad-hoc
B) infrastructure
C) embedded
D) SSID
سؤال
A ____ is a network device that intelligently facilitates communication among multiple devices on a network.

A) bridge
B) hub
C) switch
D) repeater
سؤال
Computers without Wi-Fi or those with slow Wi-Fi protocols can be upgraded using a Wi-Fi ____.

A) FireWire
B) adapter
C) port
D) cable
سؤال
The most popular wireless LAN technology is ____.

A) WUSB (Wireless USB)
B) Wi-Fi
C) Bluetooth
D) WiMAX
سؤال
Which of the following is NOT true?

A) When lots of computer game players compete against each other over a LAN, a fast, wired network is desirable.
B) Speed increases as signal strength decreases.
C) On wireless connections, signal strength varies depending on distance from the transmitter and obstacles that might interfere with the signal.
D) Despite interference, wireless networks are fast enough for most applications.
سؤال
In what mode can two Bluetooth devices find each other and exchange passkeys?

A) distance
B) locational
C) transmission
D) discovery
سؤال
Wireless signal range can be limited by ____.

A) the type of signal
B) the physical environment
C) transmitter strength
D) all of the above
سؤال
In some versions of Mac OS,wireless networking is handled by an Apple rendition of Wi-Fi called ____.

A) Network Neighborhood
B) AirPort
C) Embedded Networking
D) SSID
سؤال
A ____ is a network device that extends a wired network by adding additional ports.

A) bridge
B) hub
C) switch
D) repeater
سؤال
Which of the following is true about Bluetooth?

A) It requires cables to connect electronic devices.
B) It has a very long transmission range of over 500 feet.
C) It is used exclusively to connect workstations to a LAN.
D) It forms networks automatically when two or more devices in discovery mode are within range.
سؤال
Most routers ship with a(n)____ predefined by the manufacturer.

A) gateway
B) ISP
C) SSID
D) topology
سؤال
To see the hardware listings in order to determine if your Windows computer has Wi-Fi capability,use the Start menu to access ____ and look for a wireless or WLAN adapter.

A) Network Neighborhood
B) Wi-Fi Manager
C) Device Manager
D) Network Infrastructure Utility
سؤال
Before using your network,you should adjust the configuration settings of the ____ to make sure your network is secure.

A) gateway
B) router
C) bridge
D) repeater
سؤال
____ is a wireless MAN or WAN technology commonly used for fixed Internet access.

A) FCC
B) WiMAX
C) Bluetooth
D) Ethernet
سؤال
A Wi-Fi network transmits data as radio waves over ____ frequencies.

A) 2.4 MHz or 5.8 MHz
B) 1.2 MHz or 2.4 MHz
C) 2.4 GHz or 5.8 GHz
D) 1.2 GHz or 2.4 GHz
سؤال
____ technology improves the speed and range of a LAN by using two or more antennae to essentially send multiple sets of signals between network devices.

A) WiMAX
B) MIMO
C) Zigbee
D) MAN
سؤال
In areas where there are overlapping wireless networks,such as in a city or on a college campus,____ help you log in to the right network,rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.

A) topographical maps
B) routers
C) ISPs
D) SSIDs
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/150
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Local Area Networks
1
  In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.
In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.
True
2
Most routers supply a WAN port designed for an Internet connection.
True
3
  In the accompanying figure,the networks that don't have an icon of a lock next to them aren't secured,and are open targets for hackers to steal data,spread viruses,and create a launching pad for spam.
In the accompanying figure,the networks that don't have an icon of a lock next to them aren't secured,and are open targets for hackers to steal data,spread viruses,and create a launching pad for spam.
True
4
A cryptographic algorithm is a word,number,or phrase that must be known to encrypt or decrypt a message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
5
IP addresses can be assigned by ISPs or system managers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
6
Windows automatically senses nearby networks and displays their SSIDs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
7
In the early years of personal computers,networks were plentiful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
8
A packet always travels from the source directly to the destination,never traveling through intermediate routing devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
9
WPA2 makes sure that packets have not been intercepted or tampered with in any way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
10
MAC addresses are used for some low-level network functions and can also be employed to establish network security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
11
  The wave on the bottom in the accompanying figure depicts a digital signal.
The wave on the bottom in the accompanying figure depicts a digital signal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
12
  The wave on the top in the accompanying figure depicts an analog signal.
The wave on the top in the accompanying figure depicts an analog signal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
13
A transceiver is a combination of a transmitter and a receiver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
14
  In the accompanying figure,the item on the left simply plugs into a serial port on the outside of the system unit.
In the accompanying figure,the item on the left simply plugs into a serial port on the outside of the system unit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
15
  In the accompanying figure,the item on the left can be used with a notebook or desktop computer.
In the accompanying figure,the item on the left can be used with a notebook or desktop computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
16
Microwaves cannot be aimed in a single direction and have less carrying capacity than radio waves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
17
A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
18
A WAN provides connectivity within a limited geographical area,often within a single building.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
19
Bluetooth is often used to connect workstations to a LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
20
A gateway joins two different types of networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
21
The process of converting ciphertext into plaintext is called encryption._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
22
A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.

A) LAN
B) PAN
C) MAN
D) WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
23
A wireless ad hoc network uses a centralized broadcasting device,such as a wireless access point or router._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
24
Data in a(n)wired network travels without the use of network cables._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
25
Wi-Fi signals cannot be disrupted by interference from devices such as microwave ovens,cordless telephones,and baby monitors._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
26
  A more efficient alternative to packet switching is shown in the accompanying figure._________________________
A more efficient alternative to packet switching is shown in the accompanying figure._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
27
The Internet is the world's largest example of a(n)LAN._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
28
A ____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.

A) LAN
B) WAN
C) MAN
D) PAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
29
A storage device that directly connects to a network is called network peripheral storage._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
30
  In the accompanying figure,IWC-guest is a(n)secure network._________________________
In the accompanying figure,IWC-guest is a(n)secure network._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
31
  When network discovery is turned on in a device like the one shown in the accompanying figure,any Wi-Fi enabled device within range of your network can see its URL._________________________
When network discovery is turned on in a device like the one shown in the accompanying figure,any Wi-Fi enabled device within range of your network can see its URL._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
32
If you are using a file server without its own keyboard or monitor,server configuration software is accessible using a(n)browser._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
33
A LAN would be used to ____.

A) connect personal computers within a very limited geographical area, such as a single building
B) connect several smaller networks together
C) provide high-speed connectivity for a metropolitan area
D) connect devices over a large geographical area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is NOT a type of network device?

A) hub
B) switch
C) workstation
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
35
High-bandwidth communications systems,such as cable TV and DSL,are sometimes referred to as peakband._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
36
The best-known communications protocol is probably SMTP,which regulates Internet data transport._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following,if networked,can be accessed by an authorized LAN user?

A) scanners
B) high-capacity storage devices
C) photo printers
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
38
Microwaves are electromagnetic signals that can be aimed in a single direction and have more carrying capacity than radio waves._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
39
  In the accompanying figure,the lock icon indicates a network secured with wired encryption._________________________
In the accompanying figure,the lock icon indicates a network secured with wired encryption._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
40
Public key encryption uses one key to encrypt a message and another key to decrypt it._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
41
To connect to a LAN,a computer requires ____.

A) a peer-to-peer network
B) network attached storage
C) a network interface card
D) a client
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
42
Two devices on a network might have to negotiate their communications protocols through a process called ____.

A) handshaking
B) synchronization
C) realization
D) introduction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
43
In the technology referred to as ____,a message is divided into several parcels that can be routed independently to their destination.

A) packet switching
B) handshaking
C) circuit switching
D) protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
44
A wired network is one that uses ____ to connect network devices.

A) NICs
B) radio frequency waves
C) cables
D) infrared light
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
45
Dial-up Internet access is an example of a(n)____ communications system.

A) broadband
B) fireband
C) narrowband
D) Internet 2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
46
Most wireless networks transport data as ____ signals.

A) infrared
B) satellite
C) microwave
D) RF (radio frequency)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
47
The original Ethernet standard carried data over a coaxial cable bus topology at ____.

A) 10 Mbps
B) 100 Mbps
C) 10 Gbps
D) 100 Gbps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
48
Ethernet is a wired technology that is defined by ____ standards.

A) IEEE 802.3u
B) IEEE 802.3
C) IEEE 802.3ba
D) IEEE 802.3ae
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
49
A protocol known as ____ is designed to automatically distribute IP addresses.

A) DHCP
B) packet switching
C) CSMA/CD
D) a piconet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
50
Ethernet networks ____.

A) are difficult to implement, manage, and maintain
B) use a nonproprietary technology, making Ethernet equipment available from a variety of vendors
C) do not offer much flexibility in network design
D) are not compatible with Wi-Fi wireless networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
51
The telephone system uses a technology called ____,which establishes a dedicated,private link between telephones for the duration of a call.

A) packet switching
B) circuit switching
C) bus switching
D) ring switching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
52
A ____ is a physical path or a frequency used for signal transmissions.

A) logical channel
B) communications channel
C) connecting link
D) node link
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
53
Ethernet is easy to ____.

A) implement
B) maintain
C) manage
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
54
On an Ethernet,a ____ is broadcast to every device but is accepted only by the device to which it is addressed.

A) code
B) packet
C) band
D) node
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
55
The most important network device is a ____.

A) router
B) switch
C) hub
D) wireless access point
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
56
High-bandwidth communications systems are sometimes referred to as ____.

A) quickband
B) broadband
C) fireband
D) Internet 2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is the IEEE designation for the Gigabit Ethernet standard?

A) IEEE 802.3
B) IEEE 802.3ae
C) IEEE 802.3u
D) IEEE 802.3z
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is a disadvantage of using a wireless network when compared to a wired network?

A) speed
B) range
C) security
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
59
A network ____ usually contains a computer,networked peripheral,or network device.

A) node
B) file
C) application
D) index
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is NOT an advantage of using a wired network?

A) Increased security
B) Fast access
C) Simple to configure
D) Unlimited mobility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following is NOT true about Wi-Fi standards?

A) IEEE 802.11b is the original standard.
B) All of the standards are cross compatible.
C) IEEE 802.11a is not compatible with 802.11b.
D) IEEE 802.11n is faster than, but compatible with, b and
G)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
62
Wi-Fi encompasses all of the following standards EXCEPT ____.

A) 802.11b
B) 802.11g
C) 802.11n
D) 802.11p
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
63
A ____ is a network device that extends the range of a network by restoring signals to maximum strength and retransmitting them.

A) bridge
B) hub
C) switch
D) repeater
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
64
In a wireless ____ network,devices broadcast directly to each other.

A) ad-hoc
B) infrastructure
C) embedded
D) SSID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
65
A ____ is a network device that intelligently facilitates communication among multiple devices on a network.

A) bridge
B) hub
C) switch
D) repeater
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
66
Computers without Wi-Fi or those with slow Wi-Fi protocols can be upgraded using a Wi-Fi ____.

A) FireWire
B) adapter
C) port
D) cable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
67
The most popular wireless LAN technology is ____.

A) WUSB (Wireless USB)
B) Wi-Fi
C) Bluetooth
D) WiMAX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following is NOT true?

A) When lots of computer game players compete against each other over a LAN, a fast, wired network is desirable.
B) Speed increases as signal strength decreases.
C) On wireless connections, signal strength varies depending on distance from the transmitter and obstacles that might interfere with the signal.
D) Despite interference, wireless networks are fast enough for most applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
69
In what mode can two Bluetooth devices find each other and exchange passkeys?

A) distance
B) locational
C) transmission
D) discovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
70
Wireless signal range can be limited by ____.

A) the type of signal
B) the physical environment
C) transmitter strength
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
71
In some versions of Mac OS,wireless networking is handled by an Apple rendition of Wi-Fi called ____.

A) Network Neighborhood
B) AirPort
C) Embedded Networking
D) SSID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
72
A ____ is a network device that extends a wired network by adding additional ports.

A) bridge
B) hub
C) switch
D) repeater
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is true about Bluetooth?

A) It requires cables to connect electronic devices.
B) It has a very long transmission range of over 500 feet.
C) It is used exclusively to connect workstations to a LAN.
D) It forms networks automatically when two or more devices in discovery mode are within range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
74
Most routers ship with a(n)____ predefined by the manufacturer.

A) gateway
B) ISP
C) SSID
D) topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
75
To see the hardware listings in order to determine if your Windows computer has Wi-Fi capability,use the Start menu to access ____ and look for a wireless or WLAN adapter.

A) Network Neighborhood
B) Wi-Fi Manager
C) Device Manager
D) Network Infrastructure Utility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
76
Before using your network,you should adjust the configuration settings of the ____ to make sure your network is secure.

A) gateway
B) router
C) bridge
D) repeater
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
77
____ is a wireless MAN or WAN technology commonly used for fixed Internet access.

A) FCC
B) WiMAX
C) Bluetooth
D) Ethernet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
78
A Wi-Fi network transmits data as radio waves over ____ frequencies.

A) 2.4 MHz or 5.8 MHz
B) 1.2 MHz or 2.4 MHz
C) 2.4 GHz or 5.8 GHz
D) 1.2 GHz or 2.4 GHz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
79
____ technology improves the speed and range of a LAN by using two or more antennae to essentially send multiple sets of signals between network devices.

A) WiMAX
B) MIMO
C) Zigbee
D) MAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
80
In areas where there are overlapping wireless networks,such as in a city or on a college campus,____ help you log in to the right network,rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.

A) topographical maps
B) routers
C) ISPs
D) SSIDs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.