Deck 8: Local Area Networks: Part II

Full screen (f)
exit full mode
Question
Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers.
Use Space or
up arrow
down arrow
to flip the card.
Question
The resources that a network operating system must manage typically include one or more network servers.
Question
Network operating systems are essential if the network is going to allow multiple users to share resources.
Question
Users cannot interact directly with the operating system through a shell.
Question
Linux shares many of the same advantages and disadvantages of Unix.
Question
Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing.
Question
NetWare 6 was the last version of Novell's network operating system.
Question
NetWare 5 dropped the NDS distributed database of network resources.
Question
In reality, a multitasking operating system runs only one program at a time.
Question
A network operating system does not perform network support functions.
Question
Unix runs on the widest variety of hardware of any network operating system.
Question
Microsoft Windows 7 is an example of a desktop operating system.
Question
It is not possible to create a Windows Server network with multiple domains.
Question
A bindery contains the data that pertains only to the server it resides in.
Question
Unix is often found with a text-based interface, although graphical user interfaces are available.
Question
The design of a tree should ideally be similar to a pyramid.
Question
Mac OS X Server is based on the Unix concept.
Question
Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language.
Question
Unlike NetWare's NDS, Active Directory creates a hierarchical structure of resources.
Question
A network operating system needs a host machine from which to operate.
Question
Every software company may create its own brand of user licenses and may name them something unique.
Question
A network server requires at least three connections to the network in the form of a network interface card.
Question
When a software package is installed on a multiuser system, it is not possible for multiple users to execute multiple copies of the single program.
Question
Wireless sniffers cannot detect how far wireless signals reach.
Question
Popular operating systems for microcomputers include Mac OS X, ____, Linux, and the various forms of Windows XP/Vista/7.

A)OS/390
B)AS/400
C)DEC's VMS
D)Unix
Question
____ was founded in 1983 and was one of the first developers of network operating systems.

A)Compaq
B)HP
C)Novell
D)Gateway
Question
A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.

A)print
B)network
C)file
D)memory
Question
Recently, business and home computer users have been victims of another type of intrusion from unscrupulous outsiders-spyware.
Question
Wireless local area networks are typically found in seven basic configurations.
Question
Browsers allow users to download and view World Wide Web pages.
Question
"Wireless Ethernet" is a local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations.
Question
A(n) ____ sends messages to applications, an interactive user, or a system operator about the status of the current operation.

A)operating system
B)router
C)hub
D)switch
Question
Many of the higher-power network servers support not one but multiple processors.
Question
A modern operating system must provide various levels of operating system ____, including directory and file security, memory security, and resource security.

A)size
B)memory
C)security
D)space
Question
In the wireless LAN ad hoc layout configuration, each user device communicates directly with the other user devices.
Question
Network servers only include mainframe computers.
Question
____ is an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network.

A)NetWare Directory Services (NDS)
B)Active Directory
C)LDAP
D)X.509
Question
The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals.

A)network
B)file
C)print
D)operating system
Question
The ____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer.

A)print server
B)operating system
C)file server
D)user system
Question
When peer-to-peer networks first appeared roughly 30 years ago, they were serverless networks.
Question
The most recent version of the Windows network operating system is Windows ____.

A)XP
B)2000
C)2003
D)2008
Question
One of NetWare Version 3's main features is the ____.

A)bindery
B)LDAP
C)X.509
D)iPrint
Question
A ____ is a server that has no cabinet or box, but resides on a single printed circuit card.

A)peer-to-peer server
B)server appliance
C)server blade
D)print server
Question
NetWare ____ server gives any authorized client anywhere on the Internet the ability to print and use storage services.

A)3
B)4
C)5
D)6
Question
Active Directory is built around the ____.

A)X.500 standard
B)Lightweight Directory Access Protocol (LDAP)
C)802.11 protocol
D)Ethernet standard
Question
The first version of NetWare to gain widespread popularity was ____.

A)Version 1
B)Version 3
C)Version 5
D)Version 6
Question
____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers.

A)Unix
B)Linux
C)Windows Me
D)Windows 95
Question
____ software is used to block unwanted e-mail and is available at many levels.

A)Antivirus
B)Network-monitoring
C)Crash protection
D)Antispam
Question
The ____ network operating systems were the first to perform redirection on a local area network.

A)Linux
B)Unix
C)Windows NT
D)Novell
Question
An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user.

A)login process
B)logout process
C)user interface
D)loading process
Question
____ software is designed to detect and remove viruses that have infected your memory, disks, or operating system.

A)Antivirus
B)Remote access
C)Uninstall
D)Backup
Question
To protect the server from catastrophic disk failure, the disk drives on most network servers support one of the ____ techniques.

A)Lightweight Directory Access Protocol (LDAP)
B)IDE
C)redundant array of independent disks (RAID)
D)USB
Question
NDS is based on a well-known standard for directory services called ____.

A)X.300
B)X.500
C)X.600
D)X.700
Question
Windows ____, released in the year 2000, was the next generation of the Windows NT operating system and represented a significant improvement over the earlier versions of NT.

A)Me
B)XP
C)Server 2000
D)Server 2000N
Question
The ____ of NetWare version 3 holds information about other services provided by the server to the client, such as printer, modem, and switch/router access information.

A)iPrint
B)iClient
C)Remote Manager
D)bindery
Question
On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser.

A)NetWare 3
B)NetWare 4
C)NetWare 5
D)NetWare 6
Question
NetWare ____ introduced NetWare Directory Services (NDS).

A)Version 2
B)Version 3
C)Version 4
D)Version 6
Question
Windows Server 2000 incorporated Microsoft's answer to the highly popular NetWare NDS directory system: ____.

A)inode
B)X.509
C)iPrint
D)Active Directory
Question
____ technique is also known as disk mirroring.

A)RAID-0
B)RAID-1
C)RAID-3
D)RAID-5
Question
First released in August 1996, Windows ____ contained a number of significant features that quickly made it a serious competitor in the network operating system market.

A)2000
B)NT Version 4
C)Me
D)XP
Question
____ software works with the user to locate and remove applications that are no longer desired.

A)Uninstall
B)Backup
C)Remote access
D)Network monitoring
Question
In the ____ layout configuration, multiple cells are supported by multiple access points, as in a cellular telephone network.

A)extended service set
B)basic service set
C)one-cell
D)unique-cell
Question
____ software allows a user to access all of the possible functions of a personal computer workstation from a mobile or remote location.

A)Network monitoring
B)Sniffer
C)Remote access
D)Antispyware
Question
A ____ license allows a software package to be installed on any and all workstations and servers at a given site.

A)network server
B)site
C)corporate
D)single-user-multiple-station
Question
A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites.

A)site
B)network server
C)corporate
D)single-user-single-station
Question
____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive.

A)Antispam
B)Antispyware
C)Crash protection
D)Backup
Question
A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home.

A)single-user-single-station
B)interactive user
C)site
D)single-user-multiple-station
Question
____ software is the application or set of programs that stores Web pages and allows browsers from anywhere in the world to access those Web pages.

A)Remote access
B)Network monitoring
C)Web server
D)Antivirus
Question
The wireless LAN term for a collection of multiple Basic Service Sets is ____.

A)Multiple Service Set (MSS)
B)Basic Service Set (BSS)
C)Extended Service Set (ESS)
D)Complex Service Set (CSS)
Question
The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit.

A)antivirus
B)network monitoring
C)sniffer
D)crash protection
Question
With a system-based or ____ license, there is rarely a software counter controlling the current number of users.

A)network server
B)interactive user
C)site
D)corporate
Question
A(n) _________________________ is the program initially loaded into computer memory when the computer is turned on.
Question
The ____ is essentially the interface device between the wireless user device and the wired local area network.

A)wireless server
B)wireless workstation
C)NIC
D)access point
Question
In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____.

A)free space (FS)
B)frame time (FT)
C)interframe space (IFS)
D)intraframe time (IFT)
Question
Under the terms of the ____ license, the software package may be installed on a single machine, and then only a single user at one time may be using that machine.

A)interactive user
B)single-user-single-station
C)site
D)network server
Question
Even after an application starts and is being executed, the application makes use of the operating system by making service requests through a defined ___________________________________.
Question
A(n) ____ is a valuable device in the event of a power failure.

A)media converter
B)Blu-Ray DVD
C)thin client
D)uninterruptible power supply (UPS)
Question
In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.

A)peer-to-peer
B)multiple-cell
C)single-cell
D)random-cell
Question
____ software incorporates a fairly large number of network support tools.

A)Network-monitoring
B)Crash protection
C)Antispam
D)Backup
Question
A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____.

A)FDDI
B)wireless LAN
C)token ring
D)MAU
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/113
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Local Area Networks: Part II
1
Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers.
False
2
The resources that a network operating system must manage typically include one or more network servers.
True
3
Network operating systems are essential if the network is going to allow multiple users to share resources.
True
4
Users cannot interact directly with the operating system through a shell.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
5
Linux shares many of the same advantages and disadvantages of Unix.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
6
Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
7
NetWare 6 was the last version of Novell's network operating system.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
8
NetWare 5 dropped the NDS distributed database of network resources.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
9
In reality, a multitasking operating system runs only one program at a time.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
10
A network operating system does not perform network support functions.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
11
Unix runs on the widest variety of hardware of any network operating system.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
12
Microsoft Windows 7 is an example of a desktop operating system.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
13
It is not possible to create a Windows Server network with multiple domains.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
14
A bindery contains the data that pertains only to the server it resides in.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
15
Unix is often found with a text-based interface, although graphical user interfaces are available.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
16
The design of a tree should ideally be similar to a pyramid.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
17
Mac OS X Server is based on the Unix concept.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
18
Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
19
Unlike NetWare's NDS, Active Directory creates a hierarchical structure of resources.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
20
A network operating system needs a host machine from which to operate.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
21
Every software company may create its own brand of user licenses and may name them something unique.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
22
A network server requires at least three connections to the network in the form of a network interface card.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
23
When a software package is installed on a multiuser system, it is not possible for multiple users to execute multiple copies of the single program.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
24
Wireless sniffers cannot detect how far wireless signals reach.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
25
Popular operating systems for microcomputers include Mac OS X, ____, Linux, and the various forms of Windows XP/Vista/7.

A)OS/390
B)AS/400
C)DEC's VMS
D)Unix
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
26
____ was founded in 1983 and was one of the first developers of network operating systems.

A)Compaq
B)HP
C)Novell
D)Gateway
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
27
A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.

A)print
B)network
C)file
D)memory
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
28
Recently, business and home computer users have been victims of another type of intrusion from unscrupulous outsiders-spyware.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
29
Wireless local area networks are typically found in seven basic configurations.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
30
Browsers allow users to download and view World Wide Web pages.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
31
"Wireless Ethernet" is a local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) ____ sends messages to applications, an interactive user, or a system operator about the status of the current operation.

A)operating system
B)router
C)hub
D)switch
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
33
Many of the higher-power network servers support not one but multiple processors.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
34
A modern operating system must provide various levels of operating system ____, including directory and file security, memory security, and resource security.

A)size
B)memory
C)security
D)space
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
35
In the wireless LAN ad hoc layout configuration, each user device communicates directly with the other user devices.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
36
Network servers only include mainframe computers.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
37
____ is an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network.

A)NetWare Directory Services (NDS)
B)Active Directory
C)LDAP
D)X.509
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
38
The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals.

A)network
B)file
C)print
D)operating system
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer.

A)print server
B)operating system
C)file server
D)user system
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
40
When peer-to-peer networks first appeared roughly 30 years ago, they were serverless networks.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
41
The most recent version of the Windows network operating system is Windows ____.

A)XP
B)2000
C)2003
D)2008
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
42
One of NetWare Version 3's main features is the ____.

A)bindery
B)LDAP
C)X.509
D)iPrint
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
43
A ____ is a server that has no cabinet or box, but resides on a single printed circuit card.

A)peer-to-peer server
B)server appliance
C)server blade
D)print server
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
44
NetWare ____ server gives any authorized client anywhere on the Internet the ability to print and use storage services.

A)3
B)4
C)5
D)6
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
45
Active Directory is built around the ____.

A)X.500 standard
B)Lightweight Directory Access Protocol (LDAP)
C)802.11 protocol
D)Ethernet standard
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
46
The first version of NetWare to gain widespread popularity was ____.

A)Version 1
B)Version 3
C)Version 5
D)Version 6
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
47
____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers.

A)Unix
B)Linux
C)Windows Me
D)Windows 95
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
48
____ software is used to block unwanted e-mail and is available at many levels.

A)Antivirus
B)Network-monitoring
C)Crash protection
D)Antispam
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
49
The ____ network operating systems were the first to perform redirection on a local area network.

A)Linux
B)Unix
C)Windows NT
D)Novell
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
50
An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user.

A)login process
B)logout process
C)user interface
D)loading process
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
51
____ software is designed to detect and remove viruses that have infected your memory, disks, or operating system.

A)Antivirus
B)Remote access
C)Uninstall
D)Backup
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
52
To protect the server from catastrophic disk failure, the disk drives on most network servers support one of the ____ techniques.

A)Lightweight Directory Access Protocol (LDAP)
B)IDE
C)redundant array of independent disks (RAID)
D)USB
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
53
NDS is based on a well-known standard for directory services called ____.

A)X.300
B)X.500
C)X.600
D)X.700
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
54
Windows ____, released in the year 2000, was the next generation of the Windows NT operating system and represented a significant improvement over the earlier versions of NT.

A)Me
B)XP
C)Server 2000
D)Server 2000N
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
55
The ____ of NetWare version 3 holds information about other services provided by the server to the client, such as printer, modem, and switch/router access information.

A)iPrint
B)iClient
C)Remote Manager
D)bindery
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
56
On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser.

A)NetWare 3
B)NetWare 4
C)NetWare 5
D)NetWare 6
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
57
NetWare ____ introduced NetWare Directory Services (NDS).

A)Version 2
B)Version 3
C)Version 4
D)Version 6
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
58
Windows Server 2000 incorporated Microsoft's answer to the highly popular NetWare NDS directory system: ____.

A)inode
B)X.509
C)iPrint
D)Active Directory
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
59
____ technique is also known as disk mirroring.

A)RAID-0
B)RAID-1
C)RAID-3
D)RAID-5
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
60
First released in August 1996, Windows ____ contained a number of significant features that quickly made it a serious competitor in the network operating system market.

A)2000
B)NT Version 4
C)Me
D)XP
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
61
____ software works with the user to locate and remove applications that are no longer desired.

A)Uninstall
B)Backup
C)Remote access
D)Network monitoring
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
62
In the ____ layout configuration, multiple cells are supported by multiple access points, as in a cellular telephone network.

A)extended service set
B)basic service set
C)one-cell
D)unique-cell
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
63
____ software allows a user to access all of the possible functions of a personal computer workstation from a mobile or remote location.

A)Network monitoring
B)Sniffer
C)Remote access
D)Antispyware
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
64
A ____ license allows a software package to be installed on any and all workstations and servers at a given site.

A)network server
B)site
C)corporate
D)single-user-multiple-station
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
65
A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites.

A)site
B)network server
C)corporate
D)single-user-single-station
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
66
____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive.

A)Antispam
B)Antispyware
C)Crash protection
D)Backup
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home.

A)single-user-single-station
B)interactive user
C)site
D)single-user-multiple-station
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
68
____ software is the application or set of programs that stores Web pages and allows browsers from anywhere in the world to access those Web pages.

A)Remote access
B)Network monitoring
C)Web server
D)Antivirus
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
69
The wireless LAN term for a collection of multiple Basic Service Sets is ____.

A)Multiple Service Set (MSS)
B)Basic Service Set (BSS)
C)Extended Service Set (ESS)
D)Complex Service Set (CSS)
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
70
The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit.

A)antivirus
B)network monitoring
C)sniffer
D)crash protection
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
71
With a system-based or ____ license, there is rarely a software counter controlling the current number of users.

A)network server
B)interactive user
C)site
D)corporate
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) _________________________ is the program initially loaded into computer memory when the computer is turned on.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
73
The ____ is essentially the interface device between the wireless user device and the wired local area network.

A)wireless server
B)wireless workstation
C)NIC
D)access point
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
74
In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____.

A)free space (FS)
B)frame time (FT)
C)interframe space (IFS)
D)intraframe time (IFT)
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
75
Under the terms of the ____ license, the software package may be installed on a single machine, and then only a single user at one time may be using that machine.

A)interactive user
B)single-user-single-station
C)site
D)network server
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
76
Even after an application starts and is being executed, the application makes use of the operating system by making service requests through a defined ___________________________________.
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) ____ is a valuable device in the event of a power failure.

A)media converter
B)Blu-Ray DVD
C)thin client
D)uninterruptible power supply (UPS)
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
78
In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.

A)peer-to-peer
B)multiple-cell
C)single-cell
D)random-cell
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
79
____ software incorporates a fairly large number of network support tools.

A)Network-monitoring
B)Crash protection
C)Antispam
D)Backup
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
80
A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____.

A)FDDI
B)wireless LAN
C)token ring
D)MAU
Unlock Deck
Unlock for access to all 113 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 113 flashcards in this deck.