Computers Are Your Future 12th Edition by LaBerta – Test Bank A+

$35.00
Computers Are Your Future 12th Edition by LaBerta – Test Bank A+

Computers Are Your Future 12th Edition by LaBerta – Test Bank A+

$35.00
Computers Are Your Future 12th Edition by LaBerta – Test Bank A+

The capability of a Macintosh computer to work with a UNIX computer is an example of:

  1. A) interactivity.
  2. B) cooperation.
  3. C) interoperability.
  4. D) communication.

Answer: C

Diff: 1

Reference: Interoperability

2) The TCP layer of communication design:

  1. A) handles the address part of each packet so that it gets to the right destination on the Internet.
  2. B) manages the assembling of a message or file into smaller packets that are transmitted over the Internet.
  3. C) ensures the security of information being transmitted from unauthorized parties.
  4. D) None of the above.

Answer: B

Diff: 2

Reference: Interoperability

3) ________ is the lower layer of Internet communication design.

  1. A) ISP
  2. B) IP
  3. C) DSL
  4. D) TCP

Answer: B

Diff: 2

Reference: Interoperability

4) Cyberspace is defined as:

  1. A) territory that isn’t an actual physical space and that is accessible only with computers.
  2. B) the location where all the Internet servers are housed.
  3. C) the overarching network of networks.
  4. D) the collection of Internet service providers.

Answer: A

Diff: 1

Reference: How the Internet Works

5) AOL is an example of an online service provider and is considered a(n) ________ organization that provides a proprietary network offering services to subscribers.

  1. A) educational
  2. B) governmental
  3. C) for-profit
  4. D) non-profit

Answer: C

Diff: 2

Reference: Internet Access Providers

6) In order from slowest to fastest, the correct order of the types of Internet access is as follows:

  1. A) DSL, dial-up, FiOS, cable, satellite.
  2. B) dial-up, DSL, cable, satellite, FiOS.
  3. C) dial-up, cable, DSL, satellite, FiOS.
  4. D) FiOS, satellite, cable, DSL, dial-up.

Answer: B

Diff: 2

Reference: Connection Options

7) The Internet is a(n) ________ whereas the Web is a(n) ________.

  1. A) collection of servers; network connections
  2. B) physical resources, URLs
  3. C) network of hardware; Internet information resource
  4. D) information resource; physical connection

Answer: C

Diff: 3

Reference: The Internet and the Web: What’s the Difference?

8) A ________ is a location that is accessible from the Internet and makes Web pages available.

  1. A) Web browser
  2. B) URL
  3. C) Web page
  4. D) Web site

Answer: D

Diff: 2

Reference: The Internet and the Web: What’s the Difference?

9) Another name for a home page is a(n):

  1. A) hypertext page.
  2. B) index page.
  3. C) URL.
  4. D) Web site.

Answer: B

Diff: 2

Reference: Content on the Web

10) Which of the following is the common term for a link to a document that has disappeared?

  1. A) Broken link
  2. B) Visited link
  3. C) Obsolete link
  4. D) Defunct link

Answer: A

Diff: 2

Reference: The Hypertext Concept

11) The information on a web page is in ________ or XHTML format.

  1. A) GML
  2. B) OOP
  3. C) HTML
  4. D) JAD

Answer: C

Diff: 1

Reference: The Hypertext Concept

12) In addition to being a hypertext system, the Web is a(n) ________ system.

  1. A) meta-linked
  2. B) centralized repository
  3. C) distributed hypermedia
  4. D) active/passive link

Answer: C

Diff: 2

Reference: The Hypertext Concept

13) Which of the following is NOT an example of a Web browser?

  1. A) Microsoft Internet Explorer
  2. B) Safari
  3. C) UNIX
  4. D) Mozilla Firefox

Answer: C

Diff: 1

Reference: Viewing Content: Web Browsers

14) The first graphical Web browsers were developed in which of the following years?

  1. A) 1988
  2. B) 1970
  3. C) 1993
  4. D) 2005

Answer: C

Diff: 1

Reference: Viewing Content: Web Browsers

15) In newer browsers, if a Web site requires a plug-in to function:

  1. A) a pop-up will appear indicating which plug-in is needed.
  2. B) the user cannot proceed further.
  3. C) the plug-in will automatically install behind the scenes.
  4. D) the user will be asked to pay for the plug-in first.

Answer: A

Diff: 2

Reference: Viewing Content: Web Browsers

16) As of April 2010, Mozilla Firefox had ________ percent of the browser market.

  1. A) 4
  2. B) 7
  3. C) 33
  4. D) 54

Answer: C

Diff: 2

Reference: Viewing Content: Web Browsers

17) ________ is the capability to store previously visited Web page files and graphics on your computer.

  1. A) Phrase searching
  2. B) Caching
  3. C) Uploading
  4. D) Saving

Answer: B

Diff: 1

Reference: Viewing Content: Web Browsers

18) ________, which was originally an Apple browser, is now available for PCs.

  1. A) Mozilla Firefox
  2. B) Mosaic
  3. C) Safari
  4. D) Internet Explorer

Answer: C

Diff: 2

Reference: Viewing Content: Web Browsers

19) A complete URL has four parts: protocol, ________, path, and resource name.

  1. A) network id
  2. B) IP address
  3. C) domain name
  4. D) server name

Answer: C

Diff: 1

Reference: Web Addresses

20) URL is an abbreviation for which of the following terms?

  1. A) Unified Record Label
  2. B) Unique Resource Label
  3. C) Unified Record Locator
  4. D) Uniform Resource Locator

Answer: D

Diff: 2

Reference: Web Addresses

21) Which of the following names is the path that houses the Web page in the fictitious URL given below?

http://www.univ.edu/classroom/...

  1. A) www.univ.edu
  2. B) classroom
  3. C) classroom/welcome.htm
  4. D) welcome.htm

Answer: B

Diff: 2

Reference: Web Addresses

22) FTP is an abbreviation for which of the following terms?

  1. A) File transfer program
  2. B) File transfer protocol
  3. C) File tagging program
  4. D) File transport program

Answer: B

Diff: 2

Reference: Web Addresses

23) A Web site’s domain name correlates to the:

  1. A) path name.
  2. B) type of organization it belongs to.
  3. C) network identifier.
  4. D) Web server IP address.

Answer: D

Diff: 2

Reference: Web Addresses

24) Which of the following is NOT a way to access Web pages with a Web browser?

  1. A) Clicking the Download button
  2. B) Clicking a button on the Links toolbar
  3. C) Selecting a URL from the status bar
  4. D) Typing a URL into the Address bar

Answer: C

Diff: 2

Reference: Browsing the Web

25) A ________ is a computer program used by search engines to roam the World Wide Web via the Internet, visit sites and databases, and keep the databases of the Web search engines pages up-to-date.

  1. A) seeker
  2. B) spider
  3. C) snail
  4. D) searcher

Answer: B

Diff: 1

Reference: Using Search Engines

26) Which of the following is NOT an example of a Web search tool?

  1. A) Listmaker
  2. B) Google
  3. C) Ask
  4. D) Yahoo!

Answer: A

Diff: 2

Reference: Using Hyperlinks to Surf the Web

27) How does a Web search service that offers a subject guide differ from a general-purpose search engine?

  1. A) It searches every Web page currently available across the world and reports results only when an exhaustive search has been completed.
  2. B) It uses a wizard with a series of questions to help you refine your search.
  3. C) It employs multiple commercial search engines to find the maximum set of Web pages related to the query.
  4. D) It offers a smaller selection of quality pages related to a set of the more useful Web pages in a given category.

Answer: D

Diff: 3

Reference: Using Hyperlinks to Surf the Web

28) Which of the following is the term for a gateway that provides a structured guide to Internet material such as news, weather, sports, or e-mail?

  1. A) Network access point
  2. B) Portal
  3. C) Search engine
  4. D) Extranet

Answer: B

Diff: 2

Reference: Using Hyperlinks to Surf the Web

29) ________ are gaining in popularity – Web sites that provide quick access to information from many sources in one location.

  1. A) Aggregators
  2. B) Search engines
  3. C) URLs
  4. D) Browsers

Answer: A

Diff: 2

Reference: Sharing Information

30) Which of the following wildcard characters can be used as a substitute for any number of characters in a keyword?

  1. A) !
  2. B) +
  3. C) ?
  4. D) *

Answer: D

Diff: 2

Reference: Search Basics

31) Which of the following Boolean search operators is most similar in meaning to the inclusion operator?

  1. A) AND
  2. B) LIKE
  3. C) NOT
  4. D) OR

Answer: A

Diff: 1

Reference: Search Basics

32) What of the following is the crucial difference between unsolicited postal advertising and spam?

  1. A) There is no difference.
  2. B) Spam is not as bulky.
  3. C) With postal advertising, the advertiser pays for the postage; with spam, the recipient pays for the postage.
  4. D) With postal advertising, the recipient pays for the postage; with spam, the advertiser pays for the postage.

Answer: C

Diff: 2

Reference: Spam: Can It Be Stopped?

33) A ________ controls a set of computers by infecting them with a malicious program.

  1. A) wiki
  2. B) bot herder
  3. C) blog
  4. D) thread

Answer: B

Diff: 2

Reference: Spam: Can It Be Stopped?

34) Which of the following Internet services is threatened by spimming?

  1. A) Internet Relay Chat (IRC)
  2. B) E-mail
  3. C) Instant messaging (IM)
  4. D) Voice over Internet Protocol (VoIP)

Answer: C

Diff: 2

Reference: Instant Messaging: E-mail Made Faster

35) ________ is the use of networks or the Internet to carry out business of any type.

  1. A) E-tailing
  2. B) E-sales
  3. C) E-business
  4. D) E-commerce

Answer: D

Diff: 1

Reference: E-Commerce

36) Which of the following is NOT true about Web hosting services?

  1. A) It provides e-advertising to increase sales.
  2. B) It provides server space.
  3. C) It offers site management utilities.
  4. D) It makes the site available to the public.

Answer: A

Diff: 2

Reference: Building Your Own Online Business

37) ________ acts as a secure intermediary, offering users the ability to make payments from their bank account or credit card without revealing personal financial information to the seller.

  1. A) PurchasePal
  2. B) PayPal
  3. C) BuyerPal
  4. D) CommercePal

Answer: B

Diff: 2

Reference: Other Areas of E-Commerce Growth

38) ________ refers to software programs designed and written to damage a computer system such as deleting files from a hard drive.

  1. A) Botware
  2. B) Flameware
  3. C) Malware
  4. D) Spyware

Answer: C

Diff: 2

Reference: Avoiding Malware

39) Social networking is a way to:

  1. A) build expanding online communities.
  2. B) subscribe to “birds of a feather” newsletters.
  3. C) expand your list of electronic contacts.
  4. D) All of the above.

Answer: D

Diff: 1

Reference: Social Networking: Helping People Connect

40) ________ involves businesses that use the Internet to supply consumers with services, information, or products.

  1. A) C2C
  2. B) B2B
  3. C) C2B
  4. D) B2C

Answer: D

Diff: 1

Reference: Business-to-Consumer E-Commerce (B2C)

41) The Internet ________ is the main high-speed route through which data travels and is maintained by network service providers.

Answer: backbone

Diff: 2

Reference: Architecture

42) The communication layer that handles the address part of each packet so that it gets to the right destination is called by the acronym ________.

Answer: IP

Diff: 1

Reference: Interoperability

43) As in dial-up, DSL uses phone lines but also requires a special ________ modem.

Answer: external

Diff: 1

Reference: Connection Options

44) The type of Internet access that is often a viable alternative to dial-up in rural areas where DSL or cable is not available is ________.

Answer: satellite

Diff: 2

Reference: Connection Options

45) The organization that issues standards related to all facets of the Web is the Word Wide Web Consortium, also known by the acronym ________.

Answer: W3C

Diff: 2

Reference: The Internet and the Web: What’s the Difference?

46) A(n)________ hypermedia system is a network-based system that uses sounds, movies, and text as a method of navigation or illustration.

Answer: distributed

Diff: 3

Reference: The Hypertext Concept

47) Broken links are also called ________ links.

Answer: dead

Diff: 1

Reference: The Hypertext Concept

48) A computer that accepts and processes requests for Web pages is a Web ________.

Answer: server

Diff: 2

Reference: Storing Content:Web Servers

49) A nonprofit organization would most likely have a top-level domain name of ________.

Answer: .org

Diff: 1

Reference: Web Addresses

50) The process of copying a file from another computer to your computer is referred to as ________.

Answer: downloading

Diff: 1

Reference: Browsing the Web

51) A(n) ________ is the trail of Web links that you have followed to get to a particular site.

Answer: clickstream

Diff: 2

Reference: Using Search Engines

52) Podcasts files are released periodically by means of Web syndication, a delivery method that makes use of ________.

Answer: podcatchers.

Diff: 1

Reference: Sharing Information

53) Sites such as MSN, AOL, and Yahoo! are ________, or gateways, that provide subject guides to Internet content.

Answer: portals

Diff: 1

Reference: Using Hyperlinks to Surf the Web

54) Using a(n) ________ operator eliminates unwanted search results.

Answer: exclusion

Diff: 1

Reference: Search Basics

55) A(n) ________ can help improve the accuracy of a search if you are unsure about the exact spelling of a word.

Answer: wildcard

Diff: 1

Reference: Search Basics

56) The Boolean search operator ________ is similar in meaning to the exclusion operator.

Answer: NOT

Diff: 1

Reference: Search Basics

57) An e-mail ________ is a computer file that is included with an e-mail message.

Answer: attachment

Diff: 1

Reference: E-Mail: Staying in Touch

58) Hyperlinks that no longer work and Web pages that have been removed or restructured result in ________.

Answer: link rot

Diff: 2

Reference: Using Search Engines

59) IRC is an Internet service that organizes chat groups, called ________, for text-based conversations with other users.

Answer: channels

Diff: 2

Reference: Internet Relay Chat: Text Chatting in Real Time

60) With ________ FTP, any user can access the FTP server to download publicly presented files.

Answer: anonymous

Diff: 2

Reference: File Transfer Protocol: Transferring Files

61) In addition to accessing information using the HTTP protocol, the leading browsers can also transmit files using protocol known as FTP or ________ transfer protocol.

Answer: file

Diff: 2

Reference: File Transfer Protocol: Transferring Files

62) In a newsgroup, a(n) ________ is a series of articles that offers a continuing commentary on the same general subject.

Answer: thread

Diff: 2

Reference: Usenet: Joining Online Discussions

63) ________ is the use of networks or the Internet to carry out business of any type.

Answer: E-commerce

Diff: 1

Reference: E-Commerce

64) A business that uses the Internet to provide another business with the materials, services, and/or supplies it needs to conduct its operations is known by the acronym ________.

Answer: B2B

Diff: 1

Reference: Business-to-Business E-Commerce (B2B)

65) The online exchange or trade of goods, services, or information between individual consumers is called consumer-to-consumer or the acronym ________.

Answer: C2C.

Diff: 1

Reference: Consumer-to-Consumer E-Commerce (C2C)

66) ________ is a volunteer organization of thousands of Internet users worldwide that exists to protect children in cyberspace.

Answer: CyberAngels

Diff: 2

Reference: Protecting Children in Cyberspace

67) When one individual targets another for some form of torment or abuse using digital tools, it is called ________.

Answer: cyberbullying

Diff: 2

Reference: Protecting Children in Cyberspace

68) Interoperability prevents computers of different brands from working together.

Answer: FALSE

Diff: 2

Reference: Interoperability

69) TCP stands for Transmission Control Procedures.

Answer: FALSE

Diff: 2

Reference: Interoperability

70) A B2C business uses the Internet to supply consumers with services, information, or products.

Answer: TRUE

Diff: 1

Reference: Business-to-Consumer E-Commerce (B2C)

71) In the address of a site, https:// instead of http:// tells the user that the Web site is secure.

Answer: TRUE

Diff: 1

Reference: Avoiding E-Commerce Hazards

72) ISP is an acronym for Internet service provider.

Answer: TRUE

Diff: 2

Reference: Internet Service Providers and Online Services

73) Satellite access does not work well in rural or less congested areas.

Answer: FALSE

Diff: 2

Reference: Internet Service Providers and Online Services

74) The Internet is the physical connection of millions of networks.

Answer: TRUE

Diff: 2

Reference: The Internet and the Web: What’s the Difference?

75) The next generation of the Web is called Web 4.1.

Answer: FALSE

Diff: 2

Reference: The Hypertext Concept

76) Hyperlinks are words or images you can click to bring another document into view.

Answer: TRUE

Diff: 2

Reference: The Hypertext Concept

77) The Apple Quick Time plug-in enables movies, animation, and virtual reality worlds to be viewed within a browser window.

Answer: TRUE

Diff: 2

Reference: Web Browsers and Web Servers

78) The first successful graphical browser was Mosaic.

Answer: TRUE

Diff: 2

Reference: Web Browsers and Web Servers

79) Google has joined the Internet browser competition with its entry named Chrome.

Answer: TRUE

Diff: 2

Reference: Web Browsers and Web Servers

80) A spider is a type of Internet virus.

Answer: FALSE

Diff: 2

Reference: Techtalk Sidebar

81) A modern way to send spam is through a botnet.

Answer: TRUE

Diff: 2

Reference: Spam: Can It Be Stopped?

82) Podcasts continue to contain just sound, although expansion to include images and video are in the developmental stages.

Answer: FALSE

Diff: 2

Reference: Sharing Information

83) A portal is a gateway that provides a conveniently organized subject guide to Internet content.

Answer: TRUE

Diff: 2

Reference: Finding Information on the Web

84) Search engines maintain databases of viruses and other malicious software that reside on the Internet.

Answer: FALSE

Diff: 2

Reference: Finding Information on the Web

85) Uploading and downloading is how computers transfer files between each other.

Answer: TRUE

Diff: 2

Reference: Browsing the Web

86) The host name is the name of the group or institution hosting the site.

Answer: TRUE

Diff: 2

Reference: Web Addresses

87) The third part of a complete URL specifies the location of the document on the server.

Answer: TRUE

Diff: 2

Reference: Web Addresses

88) The second part of a complete URL specifies the domain name.

Answer: TRUE

Diff: 2

Reference: Web Addresses

89) Although Opera is a high-quality product for navigating the Internet, it is limited due to its inability to be used with a wide range of operating systems.

Answer: FALSE

Diff: 2

Reference: Web Browsers and Web Servers

90) The first part of a complete URL specifies the directory name.

Answer: FALSE

Diff: 2

Reference: Web Addresses

Match the following top-level domain names with a sample owner:

  1. A) The University of Wisconsin
  2. B) A clothing store
  3. C) An Internet service provider
  4. D) Internal Revenue Service
  5. E) A public service group

91) .com

Diff: 1

Reference: Web Addresses

92) .edu

Diff: 1

Reference: Web Addresses

93) .org

Diff: 1

Reference: Web Addresses

94) .gov

Diff: 1

Reference: Web Addresses

95) .net

Diff: 1

Reference: Web Addresses

Answers: 91) B 92) A 93) E 94) D 95) C

Match the following terms to their descriptions:

  1. A) A hypertext document often written in HTML
  2. B) A text or graphic area that when clicked brings another document into view
  3. C) A computer that stores and transmits Web pages when requested
  4. D) The first page displayed when a user visits the top level of a Web site
  5. E) Software that interprets HTML tags and displays Web pages

96) Hyperlink

Diff: 1

Reference: The Internet and Web

97) Index page

Diff: 1

Reference: The Internet and Web

98) Web browser

Diff: 1

Reference: The Internet and Web

99 )Web page

Diff: 1

Reference: The Internet and Web

100) Web server

Diff: 1

Reference: The Internet and Web

Answers: 96) B 97) D 98) E 99) A 100) C

Computers Are Your Future, 12e (LaBerta)

Chapter 7 Networks: Communicating and Sharing Resources

1) Which of the following is NOT a network communications device?

  1. A) Switch
  2. B) Router
  3. C) NIC
  4. D) LAN

Answer: D

Diff: 2

Reference: Network Fundamentals

2) Which of the following is the largest wide area network (WAN)?

  1. A) Internet
  2. B) International Banking System
  3. C) United States Government
  4. D) NATO

Answer: A

Diff: 1

Reference: Network Fundamentals

3) Which of the following is NOT a function of communication devices?

  1. A) Boost signal strength
  2. B) Facilitate digital communication
  3. C) Encryption
  4. D) Determine efficient data-transfer pathways

Answer: C

Diff: 2

Reference: Network Fundamentals

4) When a computer is connected to a network, it is called a:

  1. A) peripheral.
  2. B) router.
  3. C) communications device.
  4. D) node.

Answer: D

Diff: 2

Reference: Network Fundamentals

5) Which of the following network devices has the capability to determine the best path to transmit data and determine alternative pathways?

  1. A) Router
  2. B) Switch
  3. C) Pathfinder
  4. D) Director

Answer: A

Diff: 2

Reference: Network Fundamentals

6) Another term for a network administrator is a network:

  1. A) supervisor.
  2. B) operator.
  3. C) engineer.
  4. D) manager.

Answer: C

Diff: 1

Reference: Network Fundamentals

7) Each node on a network has a unique logical address, which is:

  1. A) assigned by the network administrator when the node is installed.
  2. B) assigned by the software in use.
  3. C) built into the hardware.
  4. D) None of the above.

Answer: B

Diff: 2

Reference: Network Fundamentals

8) Which of the following is NOT a disadvantage of networks?

  1. A) Lack of privacy
  2. B) Loss of autonomy
  3. C) Sharing important information
  4. D) Security issues

Answer: C

Diff: 1

Reference: Advantages and Disadvantages of Networking

9) Which of the following is the approximate effective inside range for wireless LAN signals?

  1. A) 2,500 to 3,500 feet
  2. B) 500 to 1,500 feet
  3. C) 125 to 300 feet
  4. D) 1 mile

Answer: C

Diff: 1

Reference: Local Area Networks

10) How do most wireless LANs ensure security with radio transmission?

  1. A) By using a random series of frequencies
  2. B) By scrambling the signals
  3. C) By splitting the signals
  4. D) All of the above

Answer: A

Diff: 3

Reference: Local Area Networks

11) A local area network (LAN) in which all the computers are equals is called a(n) ________ network.

  1. A) equal resource
  2. B) peer-to-peer
  3. C) client/server
  4. D) equal sharing

Answer: B

Diff: 1

Reference: Peer-to-Peer Networks

12) A VPN operates as a private network over which larger type of network?

  1. A) LAN
  2. B) WAN
  3. C) Internet
  4. D) Governmental network

Answer: C

Diff: 1

Reference: Virtual Private Network (VPN)

13) The term network topology refers to the:

  1. A) type of network operating system used on the file server.
  2. B) type of Internet connections available to users of the network.
  3. C) physical layout of a local area network.
  4. D) contention-management strategy used to resolve collisions.

Answer: C

Diff: 2

Reference: LAN Topologies

14) Contention sometimes results in:

  1. A) multiplexing.
  2. B) parity errors.
  3. C) terminators.
  4. D) collisions.

Answer: D

Diff: 1

Reference: LAN Topologies

15) Which of the following is NOT an advantage of the bus topology?

  1. A) Simple
  2. B) Easy to expand
  3. C) Length
  4. D) Reliable

Answer: C

Diff: 2

Reference: LAN Topologies

16) In a(n) ________ topology, the network nodes are connected to a central hub or switch.

  1. A) star
  2. B) hierarchical
  3. C) layered
  4. D) ring

Answer: A

Diff: 2

Reference: LAN Topologies

17) Limitations of the bus topology include all of the following EXCEPT:

  1. A) loss of signal strength.
  2. B) length restrictions.
  3. C) breakage in the ring.
  4. D) number of nodes.

Answer: C

Diff: 3

Reference: LAN Topologies

18) A ________ is a simple broadcast device that does not manage traffic and usually results in frequent collisions.

  1. A) plug
  2. B) centralized computer
  3. C) hub
  4. D) switch

Answer: C

Diff: 1

Reference: LAN Topologies

19) Which of the following protocols use Ethernet?

  1. A) IP
  2. B) TCP/IP
  3. C) OSI
  4. D) CSMA/CD

Answer: D

Diff: 1

Reference: LAN Technologies

20) 10 Gigabit Ethernet makes a next-generation application, such as ________, possible.

  1. A) multicasting
  2. B) cloud computing
  3. C) network convergence
  4. D) All of the above

Answer: D

Diff: 2

Reference: LAN Technologies

21) ________ protocols are used to ensure that modems can communicate with each other.

  1. A) MMT
  2. B) TCP/IP
  3. C) Modulation
  4. D) Oscillation

Answer: C

Diff: 2

Reference: LAN Protocols

22) A protocol suite specifies how the network functions, or its:

  1. A) network suite.
  2. B) network architecture.
  3. C) network package.
  4. D) network configuration.

Answer: B

Diff: 2

Reference: LAN Protocols

23) Which of the following is NOT an issue addressed by modulation protocols?

  1. A) Data transfer rate
  2. B) Routing paths
  3. C) Data compression standards
  4. D) Error checking standards

Answer: B

Diff: 2

Reference: LAN Protocols

24) Because of their complexity, networks use an architecture that is divided into separate network:

  1. A) levels.
  2. B) modules.
  3. C) layers.
  4. D) elements.

Answer: C

Diff: 2

Reference: LAN Protocols

25) Which of the following types of networks require an access point?

  1. A) Packet switching
  2. B) Ethernet
  3. C) WiFi
  4. D) Novell

Answer: C

Diff: 1

Reference: WiFi

26) Which of the following types of media is used to connect today’s Ethernet star network?

  1. A) Twisted-pair wire
  2. B) Coaxial cable
  3. C) Phone lines
  4. D) Microwave signals

Answer: A

Diff: 2

Reference: LAN Protocols

27) Because a network’s layers are arranged vertically similar to the floors in a building, with each “floor” having its own protocols, the layers are known as a:

  1. A) protocol suite.
  2. B) protocol stack.
  3. C) modulation protocols.
  4. D) top-down protocols.

Answer: B

Diff: 2

Reference: Network Layers

28) Which of the following protocols do NOT use twisted-pair cabling?

  1. A) IBM Token Ring
  2. B) 100Base-T
  3. C) 10Base-5
  4. D) 10Base-T

Answer: C

Diff: 3

Reference: LAN Protocols

29) Which of the following types of networks require an access point?

  1. A) Novell
  2. B) Ethernet
  3. C) Packet switching
  4. D) WiFi

Answer: D

Diff: 1

Reference: WiFi

30) Which of the following is a wireless specification?

  1. A) 801.11d
  2. B) 800.11a
  3. C) 802.11g
  4. D) 803.11x

Answer: C

Diff: 3

Reference: WiFi

31) Which of the following features enable the strongest WiFi encryption protection?

  1. A) WEP
  2. B) WDDI
  3. C) WAP
  4. D) WPA

Answer: D

Diff: 2

Reference: WiFi

32) The ________ standard is used for Bluetooth technology and has a very short range (up to 10 meters).

  1. A) 802.15
  2. B) 802.11n
  3. C) 802.11g
  4. D) 802.16

Answer: A

Diff: 3

Reference: WiFi

33) ________, where networked computers work on small pieces of large complex tasks, is revolutionizing research in a number of areas.

  1. A) Complex-parceling
  2. B) Distributed computing
  3. C) Shared resources
  4. D) Group work

Answer: B

Diff: 2

Reference: Green Tech Tips

34) A point of presence (POP) is a:

  1. A) node on a WAN connected to the network through wireless technology.
  2. B) terminal in a store that processes a local order and connects to a company database through a WAN.
  3. C) wired or wireless WAN network that enables users to access the WAN.
  4. D) high-capacity transmission line carrying traffic for a WAN.

Answer: C

Diff: 2

Reference: Point of Presence

35) To carry computer data over the long haul, WANs need to have a(n) ________ in multiple towns and cities.

  1. A) ISP
  2. B) router
  3. C) POP
  4. D) hub

Answer: C

Diff: 2

Reference: Point of Presence

36) Which of the following is the name for the high-capacity transmission lines that carry WAN traffic?

  1. A) Negotiators
  2. B) Backbones
  3. C) Coaxial cables
  4. D) Cores

Answer: B

Diff: 1

Reference: Backbones

37) The scope of a backbone can be all of the following EXCEPT:

  1. A) regional.
  2. B) continental.
  3. C) atmospheric.
  4. D) transcontinental.

Answer: C

Diff: 1

Reference: Backbones

38) An IP address is composed of:

  1. A) five sets of numbers separated by periods.
  2. B) four sets of numbers separated by periods.
  3. C) five sets of numbers separated by commas.
  4. D) four sets of numbers separated by commas.

Answer: B

Diff: 3

Reference: The Internet Protocols

39) Which of the following switching methods is used by the Internet?

  1. A) Packet
  2. B) Circuit
  3. C) Token
  4. D) Distributed

Answer: A

Diff: 2

Reference: Circuit and Packet Switching

40) Which of the following is the maximum transfer speed for all digital line protocols such as switched multimegabit data service (SMDS)?

  1. A) 11 Mbps
  2. B) 56 Kbps
  3. C) 1 Gbps
  4. D) 155 Mbps

Answer: D

Diff: 3

Reference: Circuit and Packet Switching

41) A(n) ________ is comprised of several linked computer systems exchanging and sharing data and resources.

Answer: network

Diff: 1

Reference: Network Fundamentals

42) ________ area networks use cables, radio waves, or infrared transmissions to connect computers and peripherals devices.

Answer: Local

Diff: 1

Reference: Network Fundamentals

43) A networked computer may be called a node or a(n)________.

Answer: client

Diff: 2

Reference: Client/Server Networks

44) NOS is an acronym for ________ operating system.

Answer: network

Diff: 2

Reference: Network Fundamentals

45) A(n) ________ is used to connect two or more networks.

Answer: router

Diff: 2

Reference: Network Fundamentals

46) Each node on a network has a unique name or ________ address assigned by the software in use.

Answer: logical

Diff: 1

Reference: Network Fundamentals

47) A wireless access point is commonly used as a bridge between a wireless node and a(n) ________ network.

Answer: wired

Diff: 1

Reference: Network Fundamentals

48) Whether wired or wireless, LANs can be differentiated by the networking ________ they use.

Answer: model

Diff: 3

Reference: Local Area Networks

49) VPN stands for virtual ________ network.

Answer: private

Diff: 1

Reference: Virtual Private Network (VPN)

50) ________ occurs when two or more computers try access the LAN at the same time.

Answer: Contention

Diff: 2

Reference: LAN Topologies

51) A(n) ________ topology solves the expansion problems of the bus topology by using a central switch.

Answer: star

Diff: 2

Reference: LAN Topologies

52) A network in which each node is connected to the line is called a(n) ________ topology.

Answer: bus

Diff: 1

Reference: LAN Topologies

53) A network using a ring topology uses a(n) ________ to prevent collisions.

Answer: token

Diff: 2

Reference: LAN Topologies

54) A(n) ________ is a simple broadcast device that does not manage traffic and usually results in frequent collisions.

Answer: hub

Diff: 2

Reference: LAN Topologies

55) A(n) ________ home, which was manufactured and decorated from recycled and reusable resources is located in Chicago’s Museum of Science and Industry.

Answer: smart

Diff: 2

Reference: LAN Topologies

56) The standards that allow network-connected devices to communicate with each other are called ________.

Answer: protocols

Diff: 1

Reference: LAN Protocols

57) Network protocols are fixed, formalized exchanges that specify how dissimilar network components can establish ________.

Answer: communication

Diff: 2

Reference: LAN Protocols

58) The rate at which two modems can exchange data is known as the data-________ rate.

Answer: transfer

Diff: 2

Reference: LAN Protocols

59) The CSMA/CD protocol is used by the ________.

Answer: Ethernet

Diff: 2

Reference: LAN Technologies

60) WPA is an acronym for WiFi ________ Access.

Answer: Protected

Diff: 2

Reference: WiFi

61) One of the newest 802.11 standard is ________.

Answer: 802.11r

Diff: 2

Reference: WiFi

62) When ________ switching is used, data is transmitted over a physical end-to-end circuit between the sending and receiving computers.

Answer: circuit

Diff: 2

Reference: Circuit and Packet Switching

63) The delay found in packet-switching networks due to the examination of individual packets by multiple routers is called ________.

Answer: latency

Diff: 2

Reference: Circuit and Packet Switching

64) The oldest packet-switching protocol for WANs is ________.

Answer: X.25

Diff: 3

Reference: Circuit and Packet Switching

65) Home ________ networks are wireless networks in which each computer on the network broadcasts its information to another using radio signals.

Answer: Wi-Fi

Diff: 1

Reference: Wireless Home Networks

66) External Wi-Fi transceivers connect through USB connections.

Answer: TRUE

Diff: 2

Reference: WiFi

67) Network administrators support computer networks.

Answer: TRUE

Diff: 1

Reference: Network Fundamentals

68) The physical address of a network node is assigned by the software in use.

Answer: FALSE

Diff: 1

Reference: Network Fundamentals

69) A wireless access point is commonly used as a bridge between a wireless and a wired network.

Answer: TRUE

Diff: 1

Reference: Network Fundamentals

70) A disadvantage of networking is loss of autonomy.

Answer: TRUE

Diff: 1

Reference: Advantages and Disadvantages of Networking

71) An advantage of networking is fewer security threats.

Answer: FALSE

Diff: 1

Reference: Advantages and Disadvantages of Networking

72) VPN is the acronym for virtual public network.

Answer: FALSE

Diff: 2

Reference: Virtual Private Network (VPN)

73) An advantage of networking is centralized data management.

Answer: TRUE

Diff: 1

Reference: Advantages and Disadvantages of Networking

74) Many businesses use VPNs to provide their employees and customers with a quick, secure access to corporate information.

Answer: TRUE

Diff: 2

Reference: Virtual Private Network (VPN)

75) In a P2P network, users can choose which files they wish to share.

Answer: TRUE

Diff: 2

Reference: Peer-to-Peer Networks

76) With respect to wireless networks, it is important to properly secure your network and data, due to the fact that signals can extend beyond the walls of your home.

Answer: TRUE

Diff: 2

Reference: WiFi

77) Public wireless access locations are called hot spots.

Answer: TRUE

Diff: 1

Reference: WiFi

78) Hubs are the only central wiring devices available to use the star topology.

Answer: FALSE

Diff: 1

Reference: LAN Topologies

79) A gigaPoP is a POP that provides access to a backbone service capable of data transfer rates exceeding 1 Gbps.

Answer: TRUE

Diff: 2

Reference: Backbones

80) Unlike other computer networks, WANs do NOT use protocols.

Answer: FALSE

Diff: 1

Reference: Wide Area Networks

81) The Internet protocols are collectively called TCP/IP.

Answer: TRUE

Diff: 1

Reference: The Internet Protocols

82) IP is a connection-less protocol.

Answer: TRUE

Diff: 3

Reference: The Internet Protocols

83) Circuit switching works best when avoiding delivery delays is essential.

Answer: TRUE

Diff: 3

Reference: Circuit and Packet Switching

84) Packet-switching networks are reliable.

Answer: TRUE

Diff: 3

Reference: Circuit and Packet Switching

85) Another term for network congestion is overloading.

Answer: TRUE

Diff: 3

Reference: Circuit and Packet Switching

86) A point of presence is a LAN network connection point.

Answer: FALSE

Diff: 1

Reference: Point of Presence

87) X.25 is the newest packet-switching protocol.

Answer: FALSE

Diff: 3

Reference: Circuit and Packet Switching

88) Convergence will be the future of home networking systems.

Answer: TRUE

Diff: 2

Reference: The Future of Home Networking

89) With packet switching, the message is sent over a physical end-to-end circuit.

Answer: FALSE

Diff: 1

Reference: Circuit and Packet Switching

90) The term wireless access point is used to describe a node on a network that acts as a receiver and transmitter of wireless radio signals between other nodes on a network.

Answer: TRUE

Diff: 1

Reference: Network Fundamentals

Match the following network topology terms to their meanings:

  1. A) Central wiring device often used in a star topology
  2. B) Unit of data that is passed in a ring topology
  3. C) Corruption of network data when two computers transmit simultaneously
  4. D) Occurs when two workstations attempt to access the LAN simultaneously
  5. E) Special connector at the end of a bus
  6. F) Has all nodes attached in a circular wiring arrangement

91) Collision

Diff: 2

Reference: LAN Topologies

92) Contention

Diff: 2

Reference: LAN Topologies

93) Terminator

Diff: 2

Reference: LAN Topologies

94) Switch

Diff: 2

Reference: LAN Topologies

95) Token

Diff: 2

Reference: LAN Topologies

96) Ring topology

Diff: 1

Reference: LAN Topologies

Answers: 91) C 92) D 93) E 94) A 95) B 96) F

Match the following WAN-related terms to their meanings:

  1. A) A packet-switching protocol for WANs
  2. B) A protocol used with 100 percent digital lines
  3. C) A WAN connection point
  4. D) A computer at a retail store that is also linked to a data communications network

97) POS terminal

Diff: 3

Reference: WAN Applications

98) POP

Diff: 3

Reference: Point of Presence

99) SMDS

Diff: 3

Reference: Circuit and Packet Switching

100) X.25

Diff: 3

Reference: Circuit and Packet Switching

Answers: 97) D 98) C 99) B 100) A

+
-
Only 0 units of this product remain

You might also be interested in