Deck 24: Network Fundamentals

Full screen (f)
exit full mode
Question
An extranet is similar to a(n) server but it allows specific users outside of the organization to access internal information systems.
Use Space or
up arrow
down arrow
to flip the card.
Question
A wide area network (WAN) connects personal computers, workstations, and other devices in a limited geographical area.
Question
Client/server networks are easier to set up and manage than peer-to-peer networks.
Question
Networks are divided into four main types.
Question
Server operating systems are high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
Question
To connect wirelessly requires different equipment than that used for a wired connection.
Question
What types of phones are supported through the Public Switched Telephone Network (PSTN)?

A) Digital
B) Mobile
C) Standard
D) All of the above
Question
A standalone computer system is vulnerable to the same kinds of risks as a network.
Question
Which of the following network benefit do companies take advantage of when they purchase a site license?

A) Enhanced communication
B) Hardware sharing
C) Software sharing
D) Collaborative environment
Question
The term client/server network describes a software architectural model.
Question
A network is simply a group of two or more computers linked together.
Question
Which of the following can contain communication links across metropolitan, regional, or national boundaries?

A) LAN
B) Wireless LAN
C) WAN
D) Intranet
Question
Electronic identification cards are used to gain access to certain areas within a building or department.
Question
Which of the following is true about e-mail?

A) The cost depends on the size of the message
B) Delivery is almost instantaneous
C) It is private
D) It cannot be sabotaged
Question
The communication area of a LAN might be as large as a state, country, or even the world.
Question
The Internet is the biggest network of all.
Question
The best plan for a company that handles secure information is to handle security breaches as they occur.
Question
In a client/server network, all computers are equal.
Question
Biometric security measures are usually applied when high-level security is required.
Question
In a client/server network, which of the following would be considered the client?

A) Microsoft Windows
B) Internet Explorer
C) Printer
D) Desktop computer
Question
Handbooks, employee manuals, and employment forms would most likely be found on ____.

A) an intranet
B) an extranet
C) the Internet
D) a hub
Question
Case 24-1 Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider. The speeds Javier will get with his new wireless connection will be more than ____ times faster than his old dial-up connection.

A) 2
B) 7
C) 30
D) 384
Question
Which of the following uses coaxial cable to send and receive data?

A) Modem
B) Cable modem
C) Digital subscriber line (DSL)
D) T-1 line
Question
Case 24-1 Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider. To connect his laptop wirelessly to the Internet, Javier will need a(n) ____.

A) hub
B) router
C) T-1 line
D) adapter
Question
A cache is a(n) ____.

A) place to store something temporarily
B) special type of password
C) external wireless adapter
D) dedicated connection to the Internet
Question
In a client/server network, the ____ manages network resources.

A) client
B) server
C) node
D) router
Question
A(n) ____ is a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.

A) DSL
B) HDSL
C) VDSL
D) T-1 line
Question
Computer information is stored digitally, but information sent over the telephone lines is transmitted in the form of ____.

A) analog waves
B) bridges
C) air waves
D) fiber optics
Question
The word modem is an acronym for ____.

A) mo dern dem arcation
B) mo st dem and
C) mo dulate dem odulate
D) mo dification dem onstration
Question
Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah creates a password to restrict access to her computer, she should ____.

A) change it frequently
B) use all lowercase letters
C) write it down
D) use the same one as her Internet account
Question
FIGURE 24-1 <strong>FIGURE 24-1   Figure 24-1 above shows an example of ____.</strong> A) a communication channel B) a client/server network C) a peer-to-peer network D) T-1 lines <div style=padding-top: 35px> Figure 24-1 above shows an example of ____.

A) a communication channel
B) a client/server network
C) a peer-to-peer network
D) T-1 lines
Question
Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah is traveling, accidental association would be a concern when she is ____.

A) connecting wirelessly to the Internet
B) employing biometric security measures
C) screening potential employees
D) backing up data
Question
FIGURE 24-2 <strong>FIGURE 24-2   Figure 24-2 above shows a computer with a ____ attached.</strong> A) dial-up modem B) wireless router C) hub D) T-1 line <div style=padding-top: 35px> Figure 24-2 above shows a computer with a ____ attached.

A) dial-up modem
B) wireless router
C) hub
D) T-1 line
Question
Antivirus software should ____.

A) be run when you suspect a problem
B) be run weekly
C) be run monthly
D) always be running
Question
A(n) ____ acts like a switchboard through a firewall.

A) Web server
B) FTP server
C) proxy server
D) database server
Question
Biometric security measures examine any of the following, except ____.

A) fingerprints
B) blood type
C) voice pattern
D) retina of the eye
Question
"Sniffer" software is used to ____.

A) prevent hackers from accessing your computer
B) locate wireless hot spots
C) transmit voice data over telephone lines
D) set up and manage a peer-to-peer network
Question
____________________ are people who break into computer systems to steal services and information.
Question
Companies handling sensitive information should back up data regularly and store it ____.

A) on the same computer
B) on the network server
C) on CDs
D) off site
Question
The ____ determines the amount of data that can be sent at one time.

A) router
B) hub
C) node
D) bandwidth
Question
Match between columns
Small, simple, inexpensive device that joins multiple computers together
Hub
Small, simple, inexpensive device that joins multiple computers together
Router
Small, simple, inexpensive device that joins multiple computers together
Modem
Small, simple, inexpensive device that joins multiple computers together
Communication channel
Small, simple, inexpensive device that joins multiple computers together
Node
Connects two or more LANs to make a WAN
Hub
Connects two or more LANs to make a WAN
Router
Connects two or more LANs to make a WAN
Modem
Connects two or more LANs to make a WAN
Communication channel
Connects two or more LANs to make a WAN
Node
Enables a computer to transmit voice data over telephone lines
Hub
Enables a computer to transmit voice data over telephone lines
Router
Enables a computer to transmit voice data over telephone lines
Modem
Enables a computer to transmit voice data over telephone lines
Communication channel
Enables a computer to transmit voice data over telephone lines
Node
Each device on the network
Hub
Each device on the network
Router
Each device on the network
Modem
Each device on the network
Communication channel
Each device on the network
Node
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Hub
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Router
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Modem
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Communication channel
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Node
Question
____________________ consist of special hardware and software to protect individual companies' networks from external networks.
Question
What are some of the changes that have occurred in our society because of the Internet? What are some disadvantages of being so dependent on the Internet?
Question
The ____________________ is a worldwide system composed of thousands of smaller networks.
Question
____________________ is a recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
Question
A(n) ____________________ is designed for the exclusive use of people within an organization.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 24: Network Fundamentals
1
An extranet is similar to a(n) server but it allows specific users outside of the organization to access internal information systems.
False
2
A wide area network (WAN) connects personal computers, workstations, and other devices in a limited geographical area.
False
3
Client/server networks are easier to set up and manage than peer-to-peer networks.
False
4
Networks are divided into four main types.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
Server operating systems are high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
To connect wirelessly requires different equipment than that used for a wired connection.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
What types of phones are supported through the Public Switched Telephone Network (PSTN)?

A) Digital
B) Mobile
C) Standard
D) All of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
A standalone computer system is vulnerable to the same kinds of risks as a network.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following network benefit do companies take advantage of when they purchase a site license?

A) Enhanced communication
B) Hardware sharing
C) Software sharing
D) Collaborative environment
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
The term client/server network describes a software architectural model.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
A network is simply a group of two or more computers linked together.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following can contain communication links across metropolitan, regional, or national boundaries?

A) LAN
B) Wireless LAN
C) WAN
D) Intranet
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
Electronic identification cards are used to gain access to certain areas within a building or department.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about e-mail?

A) The cost depends on the size of the message
B) Delivery is almost instantaneous
C) It is private
D) It cannot be sabotaged
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
The communication area of a LAN might be as large as a state, country, or even the world.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
The Internet is the biggest network of all.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
The best plan for a company that handles secure information is to handle security breaches as they occur.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
In a client/server network, all computers are equal.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
Biometric security measures are usually applied when high-level security is required.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
In a client/server network, which of the following would be considered the client?

A) Microsoft Windows
B) Internet Explorer
C) Printer
D) Desktop computer
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
Handbooks, employee manuals, and employment forms would most likely be found on ____.

A) an intranet
B) an extranet
C) the Internet
D) a hub
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
Case 24-1 Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider. The speeds Javier will get with his new wireless connection will be more than ____ times faster than his old dial-up connection.

A) 2
B) 7
C) 30
D) 384
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following uses coaxial cable to send and receive data?

A) Modem
B) Cable modem
C) Digital subscriber line (DSL)
D) T-1 line
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Case 24-1 Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider. To connect his laptop wirelessly to the Internet, Javier will need a(n) ____.

A) hub
B) router
C) T-1 line
D) adapter
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
A cache is a(n) ____.

A) place to store something temporarily
B) special type of password
C) external wireless adapter
D) dedicated connection to the Internet
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
In a client/server network, the ____ manages network resources.

A) client
B) server
C) node
D) router
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ is a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.

A) DSL
B) HDSL
C) VDSL
D) T-1 line
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
Computer information is stored digitally, but information sent over the telephone lines is transmitted in the form of ____.

A) analog waves
B) bridges
C) air waves
D) fiber optics
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
The word modem is an acronym for ____.

A) mo dern dem arcation
B) mo st dem and
C) mo dulate dem odulate
D) mo dification dem onstration
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah creates a password to restrict access to her computer, she should ____.

A) change it frequently
B) use all lowercase letters
C) write it down
D) use the same one as her Internet account
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
FIGURE 24-1 <strong>FIGURE 24-1   Figure 24-1 above shows an example of ____.</strong> A) a communication channel B) a client/server network C) a peer-to-peer network D) T-1 lines Figure 24-1 above shows an example of ____.

A) a communication channel
B) a client/server network
C) a peer-to-peer network
D) T-1 lines
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah is traveling, accidental association would be a concern when she is ____.

A) connecting wirelessly to the Internet
B) employing biometric security measures
C) screening potential employees
D) backing up data
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
FIGURE 24-2 <strong>FIGURE 24-2   Figure 24-2 above shows a computer with a ____ attached.</strong> A) dial-up modem B) wireless router C) hub D) T-1 line Figure 24-2 above shows a computer with a ____ attached.

A) dial-up modem
B) wireless router
C) hub
D) T-1 line
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
Antivirus software should ____.

A) be run when you suspect a problem
B) be run weekly
C) be run monthly
D) always be running
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ____ acts like a switchboard through a firewall.

A) Web server
B) FTP server
C) proxy server
D) database server
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
Biometric security measures examine any of the following, except ____.

A) fingerprints
B) blood type
C) voice pattern
D) retina of the eye
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
"Sniffer" software is used to ____.

A) prevent hackers from accessing your computer
B) locate wireless hot spots
C) transmit voice data over telephone lines
D) set up and manage a peer-to-peer network
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ are people who break into computer systems to steal services and information.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
Companies handling sensitive information should back up data regularly and store it ____.

A) on the same computer
B) on the network server
C) on CDs
D) off site
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ determines the amount of data that can be sent at one time.

A) router
B) hub
C) node
D) bandwidth
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Small, simple, inexpensive device that joins multiple computers together
Hub
Small, simple, inexpensive device that joins multiple computers together
Router
Small, simple, inexpensive device that joins multiple computers together
Modem
Small, simple, inexpensive device that joins multiple computers together
Communication channel
Small, simple, inexpensive device that joins multiple computers together
Node
Connects two or more LANs to make a WAN
Hub
Connects two or more LANs to make a WAN
Router
Connects two or more LANs to make a WAN
Modem
Connects two or more LANs to make a WAN
Communication channel
Connects two or more LANs to make a WAN
Node
Enables a computer to transmit voice data over telephone lines
Hub
Enables a computer to transmit voice data over telephone lines
Router
Enables a computer to transmit voice data over telephone lines
Modem
Enables a computer to transmit voice data over telephone lines
Communication channel
Enables a computer to transmit voice data over telephone lines
Node
Each device on the network
Hub
Each device on the network
Router
Each device on the network
Modem
Each device on the network
Communication channel
Each device on the network
Node
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Hub
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Router
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Modem
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Communication channel
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Node
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ consist of special hardware and software to protect individual companies' networks from external networks.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
What are some of the changes that have occurred in our society because of the Internet? What are some disadvantages of being so dependent on the Internet?
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
The ____________________ is a worldwide system composed of thousands of smaller networks.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ is a recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ____________________ is designed for the exclusive use of people within an organization.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 46 flashcards in this deck.