Networks And Communication Chapter 9 Complete Test Bank - Complete Test Bank | Visualizing Technology 7e by Debra Geoghan. DOCX document preview.

Networks And Communication Chapter 9 Complete Test Bank

Visualizing Technology Complete, 9e (Geoghan)

Chapter 9 Networks and Communication

1) P2P networks are normally found in ________.

A) corporations

B) universities

C) homes

D) libraries

Diff: 2

Objective: 9.1 Discuss the Importance of Computer Networks

2) Each computer is considered equal in a ________ network.

A) client-server

B) wide area

C) virtual private

D) peer-to-peer

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

3) Which of the following statements about P2P networks is false?

A) They can only support a small number of devices.

B) The services and security are centralized.

C) All computers are considered equal.

D) They can share a printer.

Diff: 3

Objective: 9.1 Discuss the Importance of Computer Networks

4) Which of the following is not true about Bluetooth technology?

A) Bluetooth is not a part of the Internet of Things technology.

B) It is referred to as a personal area network.

C) It has a range of about 30 to 300 feet.

D) Each Bluetooth device can connect to up to seven other devices at a time.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

5) A ________ network is one that has at least one computer that provides centralized management, resources, and security.

A) homegroup

B) peer-to-peer

C) workgroup

D) client-server

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

6) For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.

A) WAN

B) MAN

C) LAN

D) PAN

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

7) In a WLAN, devices are connected by ________.

A) ultraviolet

B) Bluetooth

C) Wi-Fi

D) RFID

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

8) To connect peripherals at short ranges, you would use the ________ wireless technology.

A) ultraviolet

B) Bluetooth

C) infrared

D) RFID

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

9) One of the most important reasons for Ethernet standards is they ________.

A) can prevent unauthorized users from accessing the Internet

B) allow the government to keep tabs on what you are doing

C) assure equipment from different manufacturers is compatible

D) prevent overburdening your computer

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

10) Which of the following is not used to transmit signals on an Ethernet network?

A) Quad-pair cable

B) Twisted-pair cable

C) Fiber-optic cable

D) Wi-Fi

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

11) A ________ is a device that connects two or more networks together.

A) router

B) hub

C) switch

D) modem

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

12) Which of the following is not a common LAN topology?

A) Star

B) Bus

C) Hierarchical

D) Ring

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

13) A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.

A) PAN

B) WLAN

C) WAN

D) MAN

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

14) Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.

A) PAN

B) LAN

C) VPN

D) WLAN

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

15) Network speeds are measured in ________ per second.

A) bits

B) hertz

C) nanos

D) bytes

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

16) Wi-Fi networks used in homes and public hotspots use the ________.

A) W3C standards

B) IEEE 802.11 standards

C) POP protocols

D) SMTP protocols

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

17) If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

A) repeater

B) router

C) terminator

D) switch

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

18) A ________ is a device that connects multiple devices on a LAN.

A) bus

B) switch

C) router

D) repeater

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

19) Most home routers also include a built-in ________.

A) range extender

B) switch

C) hub

D) network interface card

Diff: 1

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

20) A ________ can be set by an employer to prevent you from accessing eBay.

A) switch

B) firewall

C) router

D) wireless access point

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

21) A ________ is a network composed of a group of clients and servers under the control of one central security database.

A) homegroup

B) workgroup

C) domain

D) client

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

22) The rules for communication between network devices are called ________.

A) firewalls

B) protocols

C) packets

D) domains

Diff: 1

Objective: 9.4 List and Describe Network Software and Protocols

23) By default, Windows computers are set to obtain an IP address automatically, using ________.

A) SMTP

B) DHCP

C) POP

D) FTP

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

24) When you decide to use your neighbor's open wireless network without permission, you are ________.

A) hacking

B) trolling

C) wardriving

D) piggybacking

Diff: 2

Objective: 9.5 Explain How to Protect a Network

25) Moving through a neighborhood trying to locate open wireless access points is called ________.

A) surfing

B) trolling

C) hacking

D) wardriving

Diff: 2

Objective: 9.5 Explain How to Protect a Network

26) Most larger businesses use a ________ type of network.

A) client-server

B) peer-to-peer

C) business-to-business

D) workgroup

Diff: 2

Objective: 9.1 Discuss the Importance of Computer Networks

27) ________ is responsible for addressing and routing packets of data to their destination.

A) Internet Protocol

B) FTP

C) HTTP

D) POP

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

28) A network that covers a single geographic area is known as a ________.

A) local area network (LAN)

B) campus area network (CAN)

C) metropolitan area network (MAN)

D) wide area network (WAN)

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

29) Which of the following is not true about a server computer?

A) It is most used in homes and very small businesses.

B) It is a multiuser computer.

C) It runs a network operating system.

D) It can provide various services to clients.

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

30) Which of the following refers to radio transmitters which expand wireless networks?

A) Servers

B) Wireless access points

C) Switches

D) Wireless mesh networks

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

31) In a network, a file can be an example of a resource.

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

32) Standards ensure that equipment made by different companies work together.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

33) Using the workgroup feature on a MAC allows you to share and remotely access files on a MAC network.

Diff: 1

Objective: 9.4 List and Describe Network Software and Protocols

34) All computers in a P2P network belong to a workgroup.

Diff: 2

Objective: 9.1 Discuss the Importance of Computer Networks

35) PAN stands for Public Area Network.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

36) The physical layout of a LAN is called its topology.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

37) Network resources refer only to hardware and files.

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

38) Bluetooth technology connects peripherals wirelessly at short ranges.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

39) Ethernet standards and equipment for your home LAN are different than those used in a business.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

40) In a bus topology, data travels along a single cable that is terminated at both ends.

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

41) A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

42) Data travels in both directions in a ring topology.

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

43) One of the advantages of using a wired network connection rather than a wireless network connection is speed.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

44) Two wireless devices that are directly connected to each other form an ad hoc network.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

45) Fiber networks use optical network terminals to connect to the Internet.

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

46) The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots.

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

47) A firewall can be implemented using hardware or software.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

48) A hybrid network in which several LANs are connected together can be called a Campus Area Network.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

49) A peer-to-peer network can connect a Linux computer and a Windows PC.

Diff: 1

Objective: 9.4 List and Describe Network Software and Protocols

50) One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain.

Diff: 1

Objective: 9.4 List and Describe Network Software and Protocols

51) Windows Defender is antimalware software built-in to Microsoft operating systems.

Diff: 1

Objective: 9.5 Explain How to Protect a Network

52) The HTTP protocol requests and delivers webpages.

Diff: 1

Objective: 9.4 List and Describe Network Software and Protocols

53) A firewall can be used to shield your computer from direct access to the Internet.

Diff: 1

Objective: 9.5 Explain How to Protect a Network

54) The unauthorized use of your neighbor's wireless network is called trolling.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

55) WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

56) Antispyware software prevents and removes adware and spyware infections.

Diff: 1

Objective: 9.5 Explain How to Protect a Network

57) Encryption is the process of converting plain text into code, called securetext.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

58) Companies that have massive amounts of information to move and store may have a(n) ________ area network.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

59) A(n) ________ consists of two or more computers that share resources.

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

60) In a(n) ________ wireless network, devices connect through a wireless access point.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

61) Wi-Fi is used to transmit data on a(n) ________, which provides faster speeds and a larger range than a PAN.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

62) You can use ________ technology to connect your smartphone to a wireless headset.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

63) The ________ standard defines the way data is transmitted over a local area network.

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

64) In a(n) ________ topology, nodes can be easily added, removed, or moved, without disrupting the network.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

65) Wireless ________ adds security to a wireless network.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

66) A(n) ________ creates a private network through the Internet.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

67) A 4G network is an example of a(n) ________ network, which is used to transmit voice and data over large distances.

Diff: 1

Objective: 9.2 Compare Different Types of LANs and WANs

68) A(n) ________ determines the path that data packets take along the Internet to get to their final destination.

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

69) A(n) ________ is a device that is used to connect multiple devices on a LAN.

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

70) A(n) ________ can prevent unauthorized access to a network.

Diff: 1

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

71) A(n) ________ is a communication device used to establish a connection with a network.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

72) Wi-Fi networks found in homes and public hotspots use the ________ standards.

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

73) WAP stands for ________.

Diff: 3

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

74) A(n) ________ runs on a server and controls the software and hardware on a network.

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

75) A(n) ________ determines how data is formatted, transmitted, received, and acknowledged.

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

76) ________ is the protocol stack that runs on the Internet and most LANs.

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

77) TCP stands for ________.

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

78) The ________ is the person in charge of managing the hardware and software on a network.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

79) The unauthorized use of a neighbor's wireless network is called ________.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

80) Cruising a neighborhood in search of open wireless networks is called ________.

Diff: 3

Objective: 9.5 Explain How to Protect a Network

81) When two wireless devices connect to each other directly, they create a(n) ________ network.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

82) ________ programs protect against many forms of malware.

Diff: 1

Objective: 9.5 Explain How to Protect a Network

83) Multiple LANs located in the same location are sometimes called a(n) ________ area network.

Diff: 2

Objective: 9.2 Compare Different Types of LANs and WANs

84) Personal computers and other computer devices that connect to the server are called ________.

Diff: 2

Objective: 9.1 Discuss the Importance of Computer Networks

85) A computer network is two or more computers that share ________.

Diff: 1

Objective: 9.1 Discuss the Importance of Computer Networks

86) A(n) ________ is a unique numeric address assigned to each node on a network.

Diff: 2

Objective: 9.4 List and Describe Network Software and Protocols

87) Any software that has malicious intent is known as ________.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

88) The computing device that is known as a modular-demodulator is also called a(n) ________.

Diff: 2

Objective: 9.3 List and Describe the Hardware Used in Both Wired and Wireless Networks

89) The name of your wireless network is known as your ________.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

90) Wireless ________ adds security to a wireless network.

Diff: 2

Objective: 9.5 Explain How to Protect a Network

91) Match each of the following terms to its description:

I. peer-to-peer

II. sneakernet

III. client-server

IV. client

V. server

A. network in which one computer provides centralized resources

B. network in which there is no central computer providing resources

C. computer connected to a server

D. computer that centralizes the network management, resources, and security

E. transferring files by physically carrying a disk to another computer

Diff: 3

Objective: 9.1 Discuss the Importance of Computer Networks

92) Match each of the following terms to its description:

I. TCP

II. IP

III. HTTP

IV. FTP

V. SMTP

A. ensures that all packets are transmitted reliably

B. transfers files between computers

C. requests and delivers webpages

D. sends email

E. addresses and routes packets to their destination

Diff: 3

Objective: 9.4 List and Describe Network Software and Protocols

93) Match each of the following terms to its description:

I. POP

II. DHCP

III. NOS

IV. WAP

V. VPN

A. operating system software used on a server

B. protocol used to receive email

C. allows wireless devices to join a network

D. allows Windows computers to obtain their IP address automatically

E. creates a private network through the Internet

Diff: 3

Objective: Multiple objectives in the chapter

94) Match each of the following terms to its description:

I. homegroup

II. router

III. Bluetooth

IV. switch

V. protocol

A. short range wireless technology

B. can be used on computers that run Windows 7 or higher

C. connects devices to a LAN

D. connects two or more networks together

E. defines the rules for communication between devices

Diff: 3

Objective: Multiple objectives in the chapter

95) Match each of the following terms to its description:

I. workgroup

II. wardriving

III. piggybacking

IV. topology

V. domain

A. computers in a P2P network

B. using your neighbor's open wireless network without obtaining permission

C. a LAN's physical layout

D. moving through a neighborhood in search of open wireless access points

E. group of clients and servers under the control of a central security database

Diff: 3

Objective: Multiple objectives in the chapter

96) Match each of the following network types to its network coverage area:

I. CAN

II. LAN

III. MAN

IV. PAN

V. WAN

A. all the campuses in a state-wide university system

B. a single geographic area such as Orlando

C. a single building on your campus

D. all the devices in your dorm room

E. a single college campus

Diff: 3

Objective: 9.2 Compare Different Types of LANs and WANs

Document Information

Document Type:
DOCX
Chapter Number:
9
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 9 Networks And Communication
Author:
Debra Geoghan

Connected Book

Complete Test Bank | Visualizing Technology 7e

By Debra Geoghan

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party