Deck 7: Networking: Connecting Computing Devices

Full screen (f)
exit full mode
Question
Which of the following is NOT a standard for wireless Ethernet networks?

A) 802.11n
B) 802.11g
C) 802.11ab
D) 802.11ac
Use Space or
up arrow
down arrow
to flip the card.
Question
A ________ is any device connected to a network such as a computer, printer, or game console.

A) packet
B) node
C) NOS
D) NIC
Question
For the nodes on a network to communicate with each other and access the network, each node needs a ________.

A) DSL modem
B) network adapter
C) hub
D) router
Question
On a network, a(n) ________ helps prevent data packets from colliding with each other.

A) access point
B) hub
C) adapter
D) switch
Question
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.

A) Network
B) Device
C) Setup
D) Hardware
Question
A peer-to-peer (P2P) network is an example of ________ administration.

A) local
B) wide area
C) central
D) corporate
Question
Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance.

A) security engineer
B) IT managers
C) computer technicians
D) network administrators
Question
The network architecture that spans the largest physical distance is called a ________.

A) MAN
B) LAN
C) PAN
D) WAN
Question
________ is the actual speed of data transfer that is achieved between two nodes on a network and is always less than or equal to the data transfer rate.

A) Benchmark
B) Broadband
C) Bandwidth
D) Throughput
Question
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?

A) Cat 5E
B) Cat 6
C) Cat 6A
D) Cat 7B
Question
When setting up a home network, make sure each node has ________.

A) a NOS installed
B) the proper software installed on each node
C) a network adapter
D) the proper security protocols in place
Question
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

A) 802.11bc
B) 802.11n
C) 802.11ac
D) 802.3ac
Question
Wireless network devices use ________ to communicate with each other.

A) fiber optics
B) satellites
C) radio waves
D) DSL
Question
Which of the following is NOT a common network architecture type?

A) Local area network (LAN)
B) Home area network (HAN)
C) Intraoffice area network (IAN)
D) Personal area network (PAN)
Question
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

A) MAN
B) PAN
C) LAN
D) WAN
Question
A client/server network is an example of ________ administration.

A) local
B) wide area
C) central
D) remote
Question
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

A) network
B) switch
C) broadband
D) node
Question
Which of the following is NOT a type of cable used in wired networks?

A) Unshielded twisted-pair
B) Coaxial
C) Fiber-optic
D) Unshielded coaxial
Question
What transmission media is used for normal telephone service?

A) Fiber-optic cable
B) Twisted-pair cable
C) Coaxial cable
D) Ethernet cable
Question
Which transmission medium transmits data the fastest?

A) Twisted-pair cable
B) Coaxial cable
C) Wireless
D) Fiber-optic cable
Question
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

A) multipersonnel operating system (MPOS)
B) network operating system (NOS)
C) central operating system (COS)
D) central server operating system (CCOS)
Question
Which of the following is NOT a home operating system that supports P2P networking?

A) Windows
B) macOS
C) Unix
D) Linux
Question
A(n) ________ is a device that receives data packets and sends them to their intended nodes on the same network while preventing data collisions.
Question
________ are devices that transfer packets of data between two or more networks.
Question
Data are sent through a network in bundles called ________.

A) packages
B) pouches
C) packets
D) nodes
Question
A computer lab is an example of a(n) ________ type of network.
Question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

A) MAC
B) IP
C) SSID
D) network
Question
________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.
Question
The capability of current devices to use earlier standards, in addition to the current standard, is known as ________.
Question
To transfer data packets between two or more networks, a ________ is used.

A) router
B) hub
C) modem
D) switch
Question
A network used to communicate among devices close to one person is called a(n) ________.
Question
________ cable is composed of four pairs of wires that are wrapped around each other with no external casing.
Question
A(n) ________ device facilitates file sharing and data backup.

A) NAS
B) WAN
C) UTP
D) NOS
Question
Which hardware device connects your network to the Internet?

A) Modem
B) Router
C) Firewall
D) Switch
Question
Many cities in the United States now provide a(n) ________ type of network to allow Internet access to residents and tourists.
Question
Using a wireless network without the network owner's permission is known as ________.

A) hijacking
B) spamming
C) piggybacking
D) phishing
Question
Which of the following is NOT a wired broadband Internet connection option?

A) Cable
B) Dial-up
C) DSL
D) Fiber-optic
Question
A(n) ________ network is one in which each computer can communicate directly with the others.
Question
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.

A) change your network name (SSID)
B) enable SSID broadcast
C) turn on security protocols
D) create a passphrase
Question
The term network ________ is the same as the network design.
Question
A printer connected to a wireless network is considered to be a node on that network.
Question
A(n)________ acts like a traffic signal on a network.
Question
The server on a client/server network has specialized ________ software installed.
Question
All wireless networks have their own name, referred to as the ________, which is used to identify the network.
Question
________ is a much stronger protocol than WEP for wireless security.
Question
________ has faster cellular data transfer rates than 3G.
Question
A(n) ________ is someone who attempts to access your network without your knowledge.
Question
SSID stands for ________.
Question
Public places where you can wirelessly connect to the Internet are known as ________.
Question
The Internet is a WAN.
Question
A(n) ________ network uses radio waves as its transmission medium.
Question
When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router.
Question
________ is often referred to as "high-speed Internet."
Question
DSL broadband service uses ________ cable.
Question
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
Question
A wireless ________ extender is a wireless network device that repeats your wireless signal.
Question
Sharing files is a benefit of a network.
Question
When using a wireless connection, the process of ________ translates data into code so that it is protected.
Question
In terms of networking, NOS stands for ________.
Question
P2P networks are most commonly used in home networks.
Question
Limiting your signal range does not help increase wireless network security.
Question
A P2P network needs specialized network operating system software installed on every node.
Question
Wireless networks are more vulnerable to attack than wired networks.
Question
Wireless network connections are slower than wired broadband connections.
Question
Most computers today come with network adapters already installed.
Question
WEP is a stronger form of security than WPA.
Question
An access point connects to the main router wirelessly.
Question
A switch acts like a traffic signal on a network.
Question
Match between columns
LAN
services a residence
LAN
covers a city
LAN
confined to a small geographic location beyond the home
LAN
used to communicate among devices near an individual
LAN
a network that covers the greatest distance
MAN
services a residence
MAN
covers a city
MAN
confined to a small geographic location beyond the home
MAN
used to communicate among devices near an individual
MAN
a network that covers the greatest distance
PAN
services a residence
PAN
covers a city
PAN
confined to a small geographic location beyond the home
PAN
used to communicate among devices near an individual
PAN
a network that covers the greatest distance
WAN
services a residence
WAN
covers a city
WAN
confined to a small geographic location beyond the home
WAN
used to communicate among devices near an individual
WAN
a network that covers the greatest distance
HAN
services a residence
HAN
covers a city
HAN
confined to a small geographic location beyond the home
HAN
used to communicate among devices near an individual
HAN
a network that covers the greatest distance
Question
Match between columns
fiber-optic
made up of plastic or glass and transmits data at extremely fast speeds
fiber-optic
made up of copper wires
fiber-optic
single copper wire surrounded by layers of plastic
fiber-optic
each node can communicate directly with every other node on the network
fiber-optic
central computer provides information and resources to other computers
coaxial cable
made up of plastic or glass and transmits data at extremely fast speeds
coaxial cable
made up of copper wires
coaxial cable
single copper wire surrounded by layers of plastic
coaxial cable
each node can communicate directly with every other node on the network
coaxial cable
central computer provides information and resources to other computers
twisted-pair
made up of plastic or glass and transmits data at extremely fast speeds
twisted-pair
made up of copper wires
twisted-pair
single copper wire surrounded by layers of plastic
twisted-pair
each node can communicate directly with every other node on the network
twisted-pair
central computer provides information and resources to other computers
peer-to-peer
made up of plastic or glass and transmits data at extremely fast speeds
peer-to-peer
made up of copper wires
peer-to-peer
single copper wire surrounded by layers of plastic
peer-to-peer
each node can communicate directly with every other node on the network
peer-to-peer
central computer provides information and resources to other computers
client/server
made up of plastic or glass and transmits data at extremely fast speeds
client/server
made up of copper wires
client/server
single copper wire surrounded by layers of plastic
client/server
each node can communicate directly with every other node on the network
client/server
central computer provides information and resources to other computers
Question
Match between columns
server
provides information and resources to other computers on a network
server
computer on which users accomplish specific tasks and make specific requests
server
two or more computers connected together via software and hardware so they can communicate
server
unauthorized connection to a wireless network
server
a computer, peripheral, or communication device on a network
network
provides information and resources to other computers on a network
network
computer on which users accomplish specific tasks and make specific requests
network
two or more computers connected together via software and hardware so they can communicate
network
unauthorized connection to a wireless network
network
a computer, peripheral, or communication device on a network
client
provides information and resources to other computers on a network
client
computer on which users accomplish specific tasks and make specific requests
client
two or more computers connected together via software and hardware so they can communicate
client
unauthorized connection to a wireless network
client
a computer, peripheral, or communication device on a network
piggyback
provides information and resources to other computers on a network
piggyback
computer on which users accomplish specific tasks and make specific requests
piggyback
two or more computers connected together via software and hardware so they can communicate
piggyback
unauthorized connection to a wireless network
piggyback
a computer, peripheral, or communication device on a network
node
provides information and resources to other computers on a network
node
computer on which users accomplish specific tasks and make specific requests
node
two or more computers connected together via software and hardware so they can communicate
node
unauthorized connection to a wireless network
node
a computer, peripheral, or communication device on a network
Question
Match between columns
bandwidth
the actual speed of data transfer that is achieved on a network
bandwidth
the format in which data is sent over transmission media
bandwidth
instructions in read-only memory
bandwidth
hardware or software for protecting computers from hackers
bandwidth
maximum speed at which data can be transmitted
packet
the actual speed of data transfer that is achieved on a network
packet
the format in which data is sent over transmission media
packet
instructions in read-only memory
packet
hardware or software for protecting computers from hackers
packet
maximum speed at which data can be transmitted
firewall
the actual speed of data transfer that is achieved on a network
firewall
the format in which data is sent over transmission media
firewall
instructions in read-only memory
firewall
hardware or software for protecting computers from hackers
firewall
maximum speed at which data can be transmitted
throughput
the actual speed of data transfer that is achieved on a network
throughput
the format in which data is sent over transmission media
throughput
instructions in read-only memory
throughput
hardware or software for protecting computers from hackers
throughput
maximum speed at which data can be transmitted
firmware
the actual speed of data transfer that is achieved on a network
firmware
the format in which data is sent over transmission media
firmware
instructions in read-only memory
firmware
hardware or software for protecting computers from hackers
firmware
maximum speed at which data can be transmitted
Question
Match between columns
router
software used to set up and manage a network
router
high-speed Internet connection
router
directs data traffic between networks
router
handles data traffic between nodes on the same network
router
connects a node to a network
switch
software used to set up and manage a network
switch
high-speed Internet connection
switch
directs data traffic between networks
switch
handles data traffic between nodes on the same network
switch
connects a node to a network
NIC
software used to set up and manage a network
NIC
high-speed Internet connection
NIC
directs data traffic between networks
NIC
handles data traffic between nodes on the same network
NIC
connects a node to a network
NOS
software used to set up and manage a network
NOS
high-speed Internet connection
NOS
directs data traffic between networks
NOS
handles data traffic between nodes on the same network
NOS
connects a node to a network
broadband
software used to set up and manage a network
broadband
high-speed Internet connection
broadband
directs data traffic between networks
broadband
handles data traffic between nodes on the same network
broadband
connects a node to a network
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/73
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Networking: Connecting Computing Devices
1
Which of the following is NOT a standard for wireless Ethernet networks?

A) 802.11n
B) 802.11g
C) 802.11ab
D) 802.11ac
C
2
A ________ is any device connected to a network such as a computer, printer, or game console.

A) packet
B) node
C) NOS
D) NIC
B
3
For the nodes on a network to communicate with each other and access the network, each node needs a ________.

A) DSL modem
B) network adapter
C) hub
D) router
B
4
On a network, a(n) ________ helps prevent data packets from colliding with each other.

A) access point
B) hub
C) adapter
D) switch
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
5
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.

A) Network
B) Device
C) Setup
D) Hardware
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
6
A peer-to-peer (P2P) network is an example of ________ administration.

A) local
B) wide area
C) central
D) corporate
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
7
Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance.

A) security engineer
B) IT managers
C) computer technicians
D) network administrators
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
8
The network architecture that spans the largest physical distance is called a ________.

A) MAN
B) LAN
C) PAN
D) WAN
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
9
________ is the actual speed of data transfer that is achieved between two nodes on a network and is always less than or equal to the data transfer rate.

A) Benchmark
B) Broadband
C) Bandwidth
D) Throughput
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?

A) Cat 5E
B) Cat 6
C) Cat 6A
D) Cat 7B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
11
When setting up a home network, make sure each node has ________.

A) a NOS installed
B) the proper software installed on each node
C) a network adapter
D) the proper security protocols in place
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
12
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

A) 802.11bc
B) 802.11n
C) 802.11ac
D) 802.3ac
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
13
Wireless network devices use ________ to communicate with each other.

A) fiber optics
B) satellites
C) radio waves
D) DSL
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT a common network architecture type?

A) Local area network (LAN)
B) Home area network (HAN)
C) Intraoffice area network (IAN)
D) Personal area network (PAN)
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
15
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

A) MAN
B) PAN
C) LAN
D) WAN
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
16
A client/server network is an example of ________ administration.

A) local
B) wide area
C) central
D) remote
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
17
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

A) network
B) switch
C) broadband
D) node
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a type of cable used in wired networks?

A) Unshielded twisted-pair
B) Coaxial
C) Fiber-optic
D) Unshielded coaxial
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
19
What transmission media is used for normal telephone service?

A) Fiber-optic cable
B) Twisted-pair cable
C) Coaxial cable
D) Ethernet cable
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
20
Which transmission medium transmits data the fastest?

A) Twisted-pair cable
B) Coaxial cable
C) Wireless
D) Fiber-optic cable
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
21
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

A) multipersonnel operating system (MPOS)
B) network operating system (NOS)
C) central operating system (COS)
D) central server operating system (CCOS)
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is NOT a home operating system that supports P2P networking?

A) Windows
B) macOS
C) Unix
D) Linux
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ________ is a device that receives data packets and sends them to their intended nodes on the same network while preventing data collisions.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
24
________ are devices that transfer packets of data between two or more networks.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
25
Data are sent through a network in bundles called ________.

A) packages
B) pouches
C) packets
D) nodes
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
26
A computer lab is an example of a(n) ________ type of network.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
27
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

A) MAC
B) IP
C) SSID
D) network
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
28
________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
29
The capability of current devices to use earlier standards, in addition to the current standard, is known as ________.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
30
To transfer data packets between two or more networks, a ________ is used.

A) router
B) hub
C) modem
D) switch
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
31
A network used to communicate among devices close to one person is called a(n) ________.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
32
________ cable is composed of four pairs of wires that are wrapped around each other with no external casing.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ________ device facilitates file sharing and data backup.

A) NAS
B) WAN
C) UTP
D) NOS
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
34
Which hardware device connects your network to the Internet?

A) Modem
B) Router
C) Firewall
D) Switch
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
35
Many cities in the United States now provide a(n) ________ type of network to allow Internet access to residents and tourists.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
36
Using a wireless network without the network owner's permission is known as ________.

A) hijacking
B) spamming
C) piggybacking
D) phishing
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is NOT a wired broadband Internet connection option?

A) Cable
B) Dial-up
C) DSL
D) Fiber-optic
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) ________ network is one in which each computer can communicate directly with the others.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
39
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.

A) change your network name (SSID)
B) enable SSID broadcast
C) turn on security protocols
D) create a passphrase
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
40
The term network ________ is the same as the network design.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
41
A printer connected to a wireless network is considered to be a node on that network.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)________ acts like a traffic signal on a network.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
43
The server on a client/server network has specialized ________ software installed.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
44
All wireless networks have their own name, referred to as the ________, which is used to identify the network.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
45
________ is a much stronger protocol than WEP for wireless security.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
46
________ has faster cellular data transfer rates than 3G.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ________ is someone who attempts to access your network without your knowledge.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
48
SSID stands for ________.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
49
Public places where you can wirelessly connect to the Internet are known as ________.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
50
The Internet is a WAN.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
51
A(n) ________ network uses radio waves as its transmission medium.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
52
When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
53
________ is often referred to as "high-speed Internet."
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
54
DSL broadband service uses ________ cable.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
55
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
56
A wireless ________ extender is a wireless network device that repeats your wireless signal.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
57
Sharing files is a benefit of a network.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
58
When using a wireless connection, the process of ________ translates data into code so that it is protected.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
59
In terms of networking, NOS stands for ________.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
60
P2P networks are most commonly used in home networks.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
61
Limiting your signal range does not help increase wireless network security.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
62
A P2P network needs specialized network operating system software installed on every node.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
63
Wireless networks are more vulnerable to attack than wired networks.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
64
Wireless network connections are slower than wired broadband connections.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
65
Most computers today come with network adapters already installed.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
66
WEP is a stronger form of security than WPA.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
67
An access point connects to the main router wirelessly.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
68
A switch acts like a traffic signal on a network.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
69
Match between columns
LAN
services a residence
LAN
covers a city
LAN
confined to a small geographic location beyond the home
LAN
used to communicate among devices near an individual
LAN
a network that covers the greatest distance
MAN
services a residence
MAN
covers a city
MAN
confined to a small geographic location beyond the home
MAN
used to communicate among devices near an individual
MAN
a network that covers the greatest distance
PAN
services a residence
PAN
covers a city
PAN
confined to a small geographic location beyond the home
PAN
used to communicate among devices near an individual
PAN
a network that covers the greatest distance
WAN
services a residence
WAN
covers a city
WAN
confined to a small geographic location beyond the home
WAN
used to communicate among devices near an individual
WAN
a network that covers the greatest distance
HAN
services a residence
HAN
covers a city
HAN
confined to a small geographic location beyond the home
HAN
used to communicate among devices near an individual
HAN
a network that covers the greatest distance
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
70
Match between columns
fiber-optic
made up of plastic or glass and transmits data at extremely fast speeds
fiber-optic
made up of copper wires
fiber-optic
single copper wire surrounded by layers of plastic
fiber-optic
each node can communicate directly with every other node on the network
fiber-optic
central computer provides information and resources to other computers
coaxial cable
made up of plastic or glass and transmits data at extremely fast speeds
coaxial cable
made up of copper wires
coaxial cable
single copper wire surrounded by layers of plastic
coaxial cable
each node can communicate directly with every other node on the network
coaxial cable
central computer provides information and resources to other computers
twisted-pair
made up of plastic or glass and transmits data at extremely fast speeds
twisted-pair
made up of copper wires
twisted-pair
single copper wire surrounded by layers of plastic
twisted-pair
each node can communicate directly with every other node on the network
twisted-pair
central computer provides information and resources to other computers
peer-to-peer
made up of plastic or glass and transmits data at extremely fast speeds
peer-to-peer
made up of copper wires
peer-to-peer
single copper wire surrounded by layers of plastic
peer-to-peer
each node can communicate directly with every other node on the network
peer-to-peer
central computer provides information and resources to other computers
client/server
made up of plastic or glass and transmits data at extremely fast speeds
client/server
made up of copper wires
client/server
single copper wire surrounded by layers of plastic
client/server
each node can communicate directly with every other node on the network
client/server
central computer provides information and resources to other computers
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
server
provides information and resources to other computers on a network
server
computer on which users accomplish specific tasks and make specific requests
server
two or more computers connected together via software and hardware so they can communicate
server
unauthorized connection to a wireless network
server
a computer, peripheral, or communication device on a network
network
provides information and resources to other computers on a network
network
computer on which users accomplish specific tasks and make specific requests
network
two or more computers connected together via software and hardware so they can communicate
network
unauthorized connection to a wireless network
network
a computer, peripheral, or communication device on a network
client
provides information and resources to other computers on a network
client
computer on which users accomplish specific tasks and make specific requests
client
two or more computers connected together via software and hardware so they can communicate
client
unauthorized connection to a wireless network
client
a computer, peripheral, or communication device on a network
piggyback
provides information and resources to other computers on a network
piggyback
computer on which users accomplish specific tasks and make specific requests
piggyback
two or more computers connected together via software and hardware so they can communicate
piggyback
unauthorized connection to a wireless network
piggyback
a computer, peripheral, or communication device on a network
node
provides information and resources to other computers on a network
node
computer on which users accomplish specific tasks and make specific requests
node
two or more computers connected together via software and hardware so they can communicate
node
unauthorized connection to a wireless network
node
a computer, peripheral, or communication device on a network
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
bandwidth
the actual speed of data transfer that is achieved on a network
bandwidth
the format in which data is sent over transmission media
bandwidth
instructions in read-only memory
bandwidth
hardware or software for protecting computers from hackers
bandwidth
maximum speed at which data can be transmitted
packet
the actual speed of data transfer that is achieved on a network
packet
the format in which data is sent over transmission media
packet
instructions in read-only memory
packet
hardware or software for protecting computers from hackers
packet
maximum speed at which data can be transmitted
firewall
the actual speed of data transfer that is achieved on a network
firewall
the format in which data is sent over transmission media
firewall
instructions in read-only memory
firewall
hardware or software for protecting computers from hackers
firewall
maximum speed at which data can be transmitted
throughput
the actual speed of data transfer that is achieved on a network
throughput
the format in which data is sent over transmission media
throughput
instructions in read-only memory
throughput
hardware or software for protecting computers from hackers
throughput
maximum speed at which data can be transmitted
firmware
the actual speed of data transfer that is achieved on a network
firmware
the format in which data is sent over transmission media
firmware
instructions in read-only memory
firmware
hardware or software for protecting computers from hackers
firmware
maximum speed at which data can be transmitted
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
73
Match between columns
router
software used to set up and manage a network
router
high-speed Internet connection
router
directs data traffic between networks
router
handles data traffic between nodes on the same network
router
connects a node to a network
switch
software used to set up and manage a network
switch
high-speed Internet connection
switch
directs data traffic between networks
switch
handles data traffic between nodes on the same network
switch
connects a node to a network
NIC
software used to set up and manage a network
NIC
high-speed Internet connection
NIC
directs data traffic between networks
NIC
handles data traffic between nodes on the same network
NIC
connects a node to a network
NOS
software used to set up and manage a network
NOS
high-speed Internet connection
NOS
directs data traffic between networks
NOS
handles data traffic between nodes on the same network
NOS
connects a node to a network
broadband
software used to set up and manage a network
broadband
high-speed Internet connection
broadband
directs data traffic between networks
broadband
handles data traffic between nodes on the same network
broadband
connects a node to a network
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 73 flashcards in this deck.