Networks And Communication Chapter 9 Complete Test Bank - Complete Test Bank | Visualizing Technology 7e by Debra Geoghan. DOCX document preview.
Visualizing Technology Complete, 9e (Geoghan)
Chapter 9 Networks and Communication
1) P2P networks are normally found in ________.
A) corporations
B) universities
C) homes
D) libraries
Diff: 2
Objective: 9.1 Discuss the Importance of Computer Networks
2) Each computer is considered equal in a ________ network.
A) client-server
B) wide area
C) virtual private
D) peer-to-peer
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
3) Which of the following statements about P2P networks is false?
A) They can only support a small number of devices.
B) The services and security are centralized.
C) All computers are considered equal.
D) They can share a printer.
Diff: 3
Objective: 9.1 Discuss the Importance of Computer Networks
4) Which of the following is not true about Bluetooth technology?
A) Bluetooth is not a part of the Internet of Things technology.
B) It is referred to as a personal area network.
C) It has a range of about 30 to 300 feet.
D) Each Bluetooth device can connect to up to seven other devices at a time.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
5) A ________ network is one that has at least one computer that provides centralized management, resources, and security.
A) homegroup
B) peer-to-peer
C) workgroup
D) client-server
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
6) For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.
A) WAN
B) MAN
C) LAN
D) PAN
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
7) In a WLAN, devices are connected by ________.
A) ultraviolet
B) Bluetooth
C) Wi-Fi
D) RFID
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
8) To connect peripherals at short ranges, you would use the ________ wireless technology.
A) ultraviolet
B) Bluetooth
C) infrared
D) RFID
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
9) One of the most important reasons for Ethernet standards is they ________.
A) can prevent unauthorized users from accessing the Internet
B) allow the government to keep tabs on what you are doing
C) assure equipment from different manufacturers is compatible
D) prevent overburdening your computer
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
10) Which of the following is not used to transmit signals on an Ethernet network?
A) Quad-pair cable
B) Twisted-pair cable
C) Fiber-optic cable
D) Wi-Fi
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
11) A ________ is a device that connects two or more networks together.
A) router
B) hub
C) switch
D) modem
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
12) Which of the following is not a common LAN topology?
A) Star
B) Bus
C) Hierarchical
D) Ring
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
13) A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
A) PAN
B) WLAN
C) WAN
D) MAN
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
14) Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.
A) PAN
B) LAN
C) VPN
D) WLAN
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
15) Network speeds are measured in ________ per second.
A) bits
B) hertz
C) nanos
D) bytes
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
16) Wi-Fi networks used in homes and public hotspots use the ________.
A) W3C standards
B) IEEE 802.11 standards
C) POP protocols
D) SMTP protocols
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
17) If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
A) repeater
B) router
C) terminator
D) switch
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
18) A ________ is a device that connects multiple devices on a LAN.
A) bus
B) switch
C) router
D) repeater
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
19) Most home routers also include a built-in ________.
A) range extender
B) switch
C) hub
D) network interface card
Diff: 1
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
20) A ________ can be set by an employer to prevent you from accessing eBay.
A) switch
B) firewall
C) router
D) wireless access point
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
21) A ________ is a network composed of a group of clients and servers under the control of one central security database.
A) homegroup
B) workgroup
C) domain
D) client
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
22) The rules for communication between network devices are called ________.
A) firewalls
B) protocols
C) packets
D) domains
Diff: 1
Objective: 9.4 List and Describe Network Software and Protocols
23) By default, Windows computers are set to obtain an IP address automatically, using ________.
A) SMTP
B) DHCP
C) POP
D) FTP
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
24) When you decide to use your neighbor's open wireless network without permission, you are ________.
A) hacking
B) trolling
C) wardriving
D) piggybacking
Diff: 2
Objective: 9.5 Explain How to Protect a Network
25) Moving through a neighborhood trying to locate open wireless access points is called ________.
A) surfing
B) trolling
C) hacking
D) wardriving
Diff: 2
Objective: 9.5 Explain How to Protect a Network
26) Most larger businesses use a ________ type of network.
A) client-server
B) peer-to-peer
C) business-to-business
D) workgroup
Diff: 2
Objective: 9.1 Discuss the Importance of Computer Networks
27) ________ is responsible for addressing and routing packets of data to their destination.
A) Internet Protocol
B) FTP
C) HTTP
D) POP
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
28) A network that covers a single geographic area is known as a ________.
A) local area network (LAN)
B) campus area network (CAN)
C) metropolitan area network (MAN)
D) wide area network (WAN)
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
29) Which of the following is not true about a server computer?
A) It is most used in homes and very small businesses.
B) It is a multiuser computer.
C) It runs a network operating system.
D) It can provide various services to clients.
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
30) Which of the following refers to radio transmitters which expand wireless networks?
A) Servers
B) Wireless access points
C) Switches
D) Wireless mesh networks
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
31) In a network, a file can be an example of a resource.
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
32) Standards ensure that equipment made by different companies work together.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
33) Using the workgroup feature on a MAC allows you to share and remotely access files on a MAC network.
Diff: 1
Objective: 9.4 List and Describe Network Software and Protocols
34) All computers in a P2P network belong to a workgroup.
Diff: 2
Objective: 9.1 Discuss the Importance of Computer Networks
35) PAN stands for Public Area Network.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
36) The physical layout of a LAN is called its topology.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
37) Network resources refer only to hardware and files.
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
38) Bluetooth technology connects peripherals wirelessly at short ranges.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
39) Ethernet standards and equipment for your home LAN are different than those used in a business.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
40) In a bus topology, data travels along a single cable that is terminated at both ends.
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
41) A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
42) Data travels in both directions in a ring topology.
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
43) One of the advantages of using a wired network connection rather than a wireless network connection is speed.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
44) Two wireless devices that are directly connected to each other form an ad hoc network.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
45) Fiber networks use optical network terminals to connect to the Internet.
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
46) The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots.
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
47) A firewall can be implemented using hardware or software.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
48) A hybrid network in which several LANs are connected together can be called a Campus Area Network.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
49) A peer-to-peer network can connect a Linux computer and a Windows PC.
Diff: 1
Objective: 9.4 List and Describe Network Software and Protocols
50) One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain.
Diff: 1
Objective: 9.4 List and Describe Network Software and Protocols
51) Windows Defender is antimalware software built-in to Microsoft operating systems.
Diff: 1
Objective: 9.5 Explain How to Protect a Network
52) The HTTP protocol requests and delivers webpages.
Diff: 1
Objective: 9.4 List and Describe Network Software and Protocols
53) A firewall can be used to shield your computer from direct access to the Internet.
Diff: 1
Objective: 9.5 Explain How to Protect a Network
54) The unauthorized use of your neighbor's wireless network is called trolling.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
55) WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
56) Antispyware software prevents and removes adware and spyware infections.
Diff: 1
Objective: 9.5 Explain How to Protect a Network
57) Encryption is the process of converting plain text into code, called securetext.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
58) Companies that have massive amounts of information to move and store may have a(n) ________ area network.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
59) A(n) ________ consists of two or more computers that share resources.
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
60) In a(n) ________ wireless network, devices connect through a wireless access point.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
61) Wi-Fi is used to transmit data on a(n) ________, which provides faster speeds and a larger range than a PAN.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
62) You can use ________ technology to connect your smartphone to a wireless headset.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
63) The ________ standard defines the way data is transmitted over a local area network.
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs
64) In a(n) ________ topology, nodes can be easily added, removed, or moved, without disrupting the network.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
65) Wireless ________ adds security to a wireless network.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
66) A(n) ________ creates a private network through the Internet.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
67) A 4G network is an example of a(n) ________ network, which is used to transmit voice and data over large distances.
Diff: 1
Objective: 9.2 Compare Different Types of LANs and WANs
68) A(n) ________ determines the path that data packets take along the Internet to get to their final destination.
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
69) A(n) ________ is a device that is used to connect multiple devices on a LAN.
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
70) A(n) ________ can prevent unauthorized access to a network.
Diff: 1
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
71) A(n) ________ is a communication device used to establish a connection with a network.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
72) Wi-Fi networks found in homes and public hotspots use the ________ standards.
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
73) WAP stands for ________.
Diff: 3
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
74) A(n) ________ runs on a server and controls the software and hardware on a network.
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
75) A(n) ________ determines how data is formatted, transmitted, received, and acknowledged.
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
76) ________ is the protocol stack that runs on the Internet and most LANs.
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
77) TCP stands for ________.
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
78) The ________ is the person in charge of managing the hardware and software on a network.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
79) The unauthorized use of a neighbor's wireless network is called ________.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
80) Cruising a neighborhood in search of open wireless networks is called ________.
Diff: 3
Objective: 9.5 Explain How to Protect a Network
81) When two wireless devices connect to each other directly, they create a(n) ________ network.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
82) ________ programs protect against many forms of malware.
Diff: 1
Objective: 9.5 Explain How to Protect a Network
83) Multiple LANs located in the same location are sometimes called a(n) ________ area network.
Diff: 2
Objective: 9.2 Compare Different Types of LANs and WANs
84) Personal computers and other computer devices that connect to the server are called ________.
Diff: 2
Objective: 9.1 Discuss the Importance of Computer Networks
85) A computer network is two or more computers that share ________.
Diff: 1
Objective: 9.1 Discuss the Importance of Computer Networks
86) A(n) ________ is a unique numeric address assigned to each node on a network.
Diff: 2
Objective: 9.4 List and Describe Network Software and Protocols
87) Any software that has malicious intent is known as ________.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
88) The computing device that is known as a modular-demodulator is also called a(n) ________.
Diff: 2
Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks
89) The name of your wireless network is known as your ________.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
90) Wireless ________ adds security to a wireless network.
Diff: 2
Objective: 9.5 Explain How to Protect a Network
91) Match each of the following terms to its description:
I. peer-to-peer
II. sneakernet
III. client-server
IV. client
V. server
A. network in which one computer provides centralized resources
B. network in which there is no central computer providing resources
C. computer connected to a server
D. computer that centralizes the network management, resources, and security
E. transferring files by physically carrying a disk to another computer
Diff: 3
Objective: 9.1 Discuss the Importance of Computer Networks
92) Match each of the following terms to its description:
I. TCP
II. IP
III. HTTP
IV. FTP
V. SMTP
A. ensures that all packets are transmitted reliably
B. transfers files between computers
C. requests and delivers webpages
D. sends email
E. addresses and routes packets to their destination
Diff: 3
Objective: 9.4 List and Describe Network Software and Protocols
93) Match each of the following terms to its description:
I. POP
II. DHCP
III. NOS
IV. WAP
V. VPN
A. operating system software used on a server
B. protocol used to receive email
C. allows wireless devices to join a network
D. allows Windows computers to obtain their IP address automatically
E. creates a private network through the Internet
Diff: 3
Objective: Multiple objectives in the chapter
94) Match each of the following terms to its description:
I. homegroup
II. router
III. Bluetooth
IV. switch
V. protocol
A. short range wireless technology
B. can be used on computers that run Windows 7 or higher
C. connects devices to a LAN
D. connects two or more networks together
E. defines the rules for communication between devices
Diff: 3
Objective: Multiple objectives in the chapter
95) Match each of the following terms to its description:
I. workgroup
II. wardriving
III. piggybacking
IV. topology
V. domain
A. computers in a P2P network
B. using your neighbor's open wireless network without obtaining permission
C. a LAN's physical layout
D. moving through a neighborhood in search of open wireless access points
E. group of clients and servers under the control of a central security database
Diff: 3
Objective: Multiple objectives in the chapter
96) Match each of the following network types to its network coverage area:
I. CAN
II. LAN
III. MAN
IV. PAN
V. WAN
A. all the campuses in a state-wide university system
B. a single geographic area such as Orlando
C. a single building on your campus
D. all the devices in your dorm room
E. a single college campus
Diff: 3
Objective: 9.2 Compare Different Types of LANs and WANs