The capability of a Macintosh computer to work with a UNIX computer is an example of:
- A) interactivity.
- B) cooperation.
- C) interoperability.
- D) communication.
Answer: C
Diff: 1
Reference: Interoperability
2) The TCP layer of communication design:
- A) handles the address part of each packet so that it gets to the right destination on the Internet.
- B) manages the assembling of a message or file into smaller packets that are transmitted over the Internet.
- C) ensures the security of information being transmitted from unauthorized parties.
- D) None of the above.
Answer: B
Diff: 2
Reference: Interoperability
3) ________ is the lower layer of Internet communication design.
- A) ISP
- B) IP
- C) DSL
- D) TCP
Answer: B
Diff: 2
Reference: Interoperability
4) Cyberspace is defined as:
- A) territory that isn’t an actual physical space and that is accessible only with computers.
- B) the location where all the Internet servers are housed.
- C) the overarching network of networks.
- D) the collection of Internet service providers.
Answer: A
Diff: 1
Reference: How the Internet Works
5) AOL is an example of an online service provider and is considered a(n) ________ organization that provides a proprietary network offering services to subscribers.
- A) educational
- B) governmental
- C) for-profit
- D) non-profit
Answer: C
Diff: 2
Reference: Internet Access Providers
6) In order from slowest to fastest, the correct order of the types of Internet access is as follows:
- A) DSL, dial-up, FiOS, cable, satellite.
- B) dial-up, DSL, cable, satellite, FiOS.
- C) dial-up, cable, DSL, satellite, FiOS.
- D) FiOS, satellite, cable, DSL, dial-up.
Answer: B
Diff: 2
Reference: Connection Options
7) The Internet is a(n) ________ whereas the Web is a(n) ________.
- A) collection of servers; network connections
- B) physical resources, URLs
- C) network of hardware; Internet information resource
- D) information resource; physical connection
Answer: C
Diff: 3
Reference: The Internet and the Web: What’s the Difference?
8) A ________ is a location that is accessible from the Internet and makes Web pages available.
- A) Web browser
- B) URL
- C) Web page
- D) Web site
Answer: D
Diff: 2
Reference: The Internet and the Web: What’s the Difference?
9) Another name for a home page is a(n):
- A) hypertext page.
- B) index page.
- C) URL.
- D) Web site.
Answer: B
Diff: 2
Reference: Content on the Web
10) Which of the following is the common term for a link to a document that has disappeared?
- A) Broken link
- B) Visited link
- C) Obsolete link
- D) Defunct link
Answer: A
Diff: 2
Reference: The Hypertext Concept
11) The information on a web page is in ________ or XHTML format.
- A) GML
- B) OOP
- C) HTML
- D) JAD
Answer: C
Diff: 1
Reference: The Hypertext Concept
12) In addition to being a hypertext system, the Web is a(n) ________ system.
- A) meta-linked
- B) centralized repository
- C) distributed hypermedia
- D) active/passive link
Answer: C
Diff: 2
Reference: The Hypertext Concept
13) Which of the following is NOT an example of a Web browser?
- A) Microsoft Internet Explorer
- B) Safari
- C) UNIX
- D) Mozilla Firefox
Answer: C
Diff: 1
Reference: Viewing Content: Web Browsers
14) The first graphical Web browsers were developed in which of the following years?
- A) 1988
- B) 1970
- C) 1993
- D) 2005
Answer: C
Diff: 1
Reference: Viewing Content: Web Browsers
15) In newer browsers, if a Web site requires a plug-in to function:
- A) a pop-up will appear indicating which plug-in is needed.
- B) the user cannot proceed further.
- C) the plug-in will automatically install behind the scenes.
- D) the user will be asked to pay for the plug-in first.
Answer: A
Diff: 2
Reference: Viewing Content: Web Browsers
16) As of April 2010, Mozilla Firefox had ________ percent of the browser market.
- A) 4
- B) 7
- C) 33
- D) 54
Answer: C
Diff: 2
Reference: Viewing Content: Web Browsers
17) ________ is the capability to store previously visited Web page files and graphics on your computer.
- A) Phrase searching
- B) Caching
- C) Uploading
- D) Saving
Answer: B
Diff: 1
Reference: Viewing Content: Web Browsers
18) ________, which was originally an Apple browser, is now available for PCs.
- A) Mozilla Firefox
- B) Mosaic
- C) Safari
- D) Internet Explorer
Answer: C
Diff: 2
Reference: Viewing Content: Web Browsers
19) A complete URL has four parts: protocol, ________, path, and resource name.
- A) network id
- B) IP address
- C) domain name
- D) server name
Answer: C
Diff: 1
Reference: Web Addresses
20) URL is an abbreviation for which of the following terms?
- A) Unified Record Label
- B) Unique Resource Label
- C) Unified Record Locator
- D) Uniform Resource Locator
Answer: D
Diff: 2
Reference: Web Addresses
21) Which of the following names is the path that houses the Web page in the fictitious URL given below?
http://www.univ.edu/classroom/...
- A) www.univ.edu
- B) classroom
- C) classroom/welcome.htm
- D) welcome.htm
Answer: B
Diff: 2
Reference: Web Addresses
22) FTP is an abbreviation for which of the following terms?
- A) File transfer program
- B) File transfer protocol
- C) File tagging program
- D) File transport program
Answer: B
Diff: 2
Reference: Web Addresses
23) A Web site’s domain name correlates to the:
- A) path name.
- B) type of organization it belongs to.
- C) network identifier.
- D) Web server IP address.
Answer: D
Diff: 2
Reference: Web Addresses
24) Which of the following is NOT a way to access Web pages with a Web browser?
- A) Clicking the Download button
- B) Clicking a button on the Links toolbar
- C) Selecting a URL from the status bar
- D) Typing a URL into the Address bar
Answer: C
Diff: 2
Reference: Browsing the Web
25) A ________ is a computer program used by search engines to roam the World Wide Web via the Internet, visit sites and databases, and keep the databases of the Web search engines pages up-to-date.
- A) seeker
- B) spider
- C) snail
- D) searcher
Answer: B
Diff: 1
Reference: Using Search Engines
26) Which of the following is NOT an example of a Web search tool?
- A) Listmaker
- B) Google
- C) Ask
- D) Yahoo!
Answer: A
Diff: 2
Reference: Using Hyperlinks to Surf the Web
27) How does a Web search service that offers a subject guide differ from a general-purpose search engine?
- A) It searches every Web page currently available across the world and reports results only when an exhaustive search has been completed.
- B) It uses a wizard with a series of questions to help you refine your search.
- C) It employs multiple commercial search engines to find the maximum set of Web pages related to the query.
- D) It offers a smaller selection of quality pages related to a set of the more useful Web pages in a given category.
Answer: D
Diff: 3
Reference: Using Hyperlinks to Surf the Web
28) Which of the following is the term for a gateway that provides a structured guide to Internet material such as news, weather, sports, or e-mail?
- A) Network access point
- B) Portal
- C) Search engine
- D) Extranet
Answer: B
Diff: 2
Reference: Using Hyperlinks to Surf the Web
29) ________ are gaining in popularity – Web sites that provide quick access to information from many sources in one location.
- A) Aggregators
- B) Search engines
- C) URLs
- D) Browsers
Answer: A
Diff: 2
Reference: Sharing Information
30) Which of the following wildcard characters can be used as a substitute for any number of characters in a keyword?
- A) !
- B) +
- C) ?
- D) *
Answer: D
Diff: 2
Reference: Search Basics
31) Which of the following Boolean search operators is most similar in meaning to the inclusion operator?
- A) AND
- B) LIKE
- C) NOT
- D) OR
Answer: A
Diff: 1
Reference: Search Basics
32) What of the following is the crucial difference between unsolicited postal advertising and spam?
- A) There is no difference.
- B) Spam is not as bulky.
- C) With postal advertising, the advertiser pays for the postage; with spam, the recipient pays for the postage.
- D) With postal advertising, the recipient pays for the postage; with spam, the advertiser pays for the postage.
Answer: C
Diff: 2
Reference: Spam: Can It Be Stopped?
33) A ________ controls a set of computers by infecting them with a malicious program.
- A) wiki
- B) bot herder
- C) blog
- D) thread
Answer: B
Diff: 2
Reference: Spam: Can It Be Stopped?
34) Which of the following Internet services is threatened by spimming?
- A) Internet Relay Chat (IRC)
- B) E-mail
- C) Instant messaging (IM)
- D) Voice over Internet Protocol (VoIP)
Answer: C
Diff: 2
Reference: Instant Messaging: E-mail Made Faster
35) ________ is the use of networks or the Internet to carry out business of any type.
- A) E-tailing
- B) E-sales
- C) E-business
- D) E-commerce
Answer: D
Diff: 1
Reference: E-Commerce
36) Which of the following is NOT true about Web hosting services?
- A) It provides e-advertising to increase sales.
- B) It provides server space.
- C) It offers site management utilities.
- D) It makes the site available to the public.
Answer: A
Diff: 2
Reference: Building Your Own Online Business
37) ________ acts as a secure intermediary, offering users the ability to make payments from their bank account or credit card without revealing personal financial information to the seller.
- A) PurchasePal
- B) PayPal
- C) BuyerPal
- D) CommercePal
Answer: B
Diff: 2
Reference: Other Areas of E-Commerce Growth
38) ________ refers to software programs designed and written to damage a computer system such as deleting files from a hard drive.
- A) Botware
- B) Flameware
- C) Malware
- D) Spyware
Answer: C
Diff: 2
Reference: Avoiding Malware
39) Social networking is a way to:
- A) build expanding online communities.
- B) subscribe to “birds of a feather” newsletters.
- C) expand your list of electronic contacts.
- D) All of the above.
Answer: D
Diff: 1
Reference: Social Networking: Helping People Connect
40) ________ involves businesses that use the Internet to supply consumers with services, information, or products.
- A) C2C
- B) B2B
- C) C2B
- D) B2C
Answer: D
Diff: 1
Reference: Business-to-Consumer E-Commerce (B2C)
41) The Internet ________ is the main high-speed route through which data travels and is maintained by network service providers.
Answer: backbone
Diff: 2
Reference: Architecture
42) The communication layer that handles the address part of each packet so that it gets to the right destination is called by the acronym ________.
Answer: IP
Diff: 1
Reference: Interoperability
43) As in dial-up, DSL uses phone lines but also requires a special ________ modem.
Answer: external
Diff: 1
Reference: Connection Options
44) The type of Internet access that is often a viable alternative to dial-up in rural areas where DSL or cable is not available is ________.
Answer: satellite
Diff: 2
Reference: Connection Options
45) The organization that issues standards related to all facets of the Web is the Word Wide Web Consortium, also known by the acronym ________.
Answer: W3C
Diff: 2
Reference: The Internet and the Web: What’s the Difference?
46) A(n)________ hypermedia system is a network-based system that uses sounds, movies, and text as a method of navigation or illustration.
Answer: distributed
Diff: 3
Reference: The Hypertext Concept
47) Broken links are also called ________ links.
Answer: dead
Diff: 1
Reference: The Hypertext Concept
48) A computer that accepts and processes requests for Web pages is a Web ________.
Answer: server
Diff: 2
Reference: Storing Content:Web Servers
49) A nonprofit organization would most likely have a top-level domain name of ________.
Answer: .org
Diff: 1
Reference: Web Addresses
50) The process of copying a file from another computer to your computer is referred to as ________.
Answer: downloading
Diff: 1
Reference: Browsing the Web
51) A(n) ________ is the trail of Web links that you have followed to get to a particular site.
Answer: clickstream
Diff: 2
Reference: Using Search Engines
52) Podcasts files are released periodically by means of Web syndication, a delivery method that makes use of ________.
Answer: podcatchers.
Diff: 1
Reference: Sharing Information
53) Sites such as MSN, AOL, and Yahoo! are ________, or gateways, that provide subject guides to Internet content.
Answer: portals
Diff: 1
Reference: Using Hyperlinks to Surf the Web
54) Using a(n) ________ operator eliminates unwanted search results.
Answer: exclusion
Diff: 1
Reference: Search Basics
55) A(n) ________ can help improve the accuracy of a search if you are unsure about the exact spelling of a word.
Answer: wildcard
Diff: 1
Reference: Search Basics
56) The Boolean search operator ________ is similar in meaning to the exclusion operator.
Answer: NOT
Diff: 1
Reference: Search Basics
57) An e-mail ________ is a computer file that is included with an e-mail message.
Answer: attachment
Diff: 1
Reference: E-Mail: Staying in Touch
58) Hyperlinks that no longer work and Web pages that have been removed or restructured result in ________.
Answer: link rot
Diff: 2
Reference: Using Search Engines
59) IRC is an Internet service that organizes chat groups, called ________, for text-based conversations with other users.
Answer: channels
Diff: 2
Reference: Internet Relay Chat: Text Chatting in Real Time
60) With ________ FTP, any user can access the FTP server to download publicly presented files.
Answer: anonymous
Diff: 2
Reference: File Transfer Protocol: Transferring Files
61) In addition to accessing information using the HTTP protocol, the leading browsers can also transmit files using protocol known as FTP or ________ transfer protocol.
Answer: file
Diff: 2
Reference: File Transfer Protocol: Transferring Files
62) In a newsgroup, a(n) ________ is a series of articles that offers a continuing commentary on the same general subject.
Answer: thread
Diff: 2
Reference: Usenet: Joining Online Discussions
63) ________ is the use of networks or the Internet to carry out business of any type.
Answer: E-commerce
Diff: 1
Reference: E-Commerce
64) A business that uses the Internet to provide another business with the materials, services, and/or supplies it needs to conduct its operations is known by the acronym ________.
Answer: B2B
Diff: 1
Reference: Business-to-Business E-Commerce (B2B)
65) The online exchange or trade of goods, services, or information between individual consumers is called consumer-to-consumer or the acronym ________.
Answer: C2C.
Diff: 1
Reference: Consumer-to-Consumer E-Commerce (C2C)
66) ________ is a volunteer organization of thousands of Internet users worldwide that exists to protect children in cyberspace.
Answer: CyberAngels
Diff: 2
Reference: Protecting Children in Cyberspace
67) When one individual targets another for some form of torment or abuse using digital tools, it is called ________.
Answer: cyberbullying
Diff: 2
Reference: Protecting Children in Cyberspace
68) Interoperability prevents computers of different brands from working together.
Answer: FALSE
Diff: 2
Reference: Interoperability
69) TCP stands for Transmission Control Procedures.
Answer: FALSE
Diff: 2
Reference: Interoperability
70) A B2C business uses the Internet to supply consumers with services, information, or products.
Answer: TRUE
Diff: 1
Reference: Business-to-Consumer E-Commerce (B2C)
71) In the address of a site, https:// instead of http:// tells the user that the Web site is secure.
Answer: TRUE
Diff: 1
Reference: Avoiding E-Commerce Hazards
72) ISP is an acronym for Internet service provider.
Answer: TRUE
Diff: 2
Reference: Internet Service Providers and Online Services
73) Satellite access does not work well in rural or less congested areas.
Answer: FALSE
Diff: 2
Reference: Internet Service Providers and Online Services
74) The Internet is the physical connection of millions of networks.
Answer: TRUE
Diff: 2
Reference: The Internet and the Web: What’s the Difference?
75) The next generation of the Web is called Web 4.1.
Answer: FALSE
Diff: 2
Reference: The Hypertext Concept
76) Hyperlinks are words or images you can click to bring another document into view.
Answer: TRUE
Diff: 2
Reference: The Hypertext Concept
77) The Apple Quick Time plug-in enables movies, animation, and virtual reality worlds to be viewed within a browser window.
Answer: TRUE
Diff: 2
Reference: Web Browsers and Web Servers
78) The first successful graphical browser was Mosaic.
Answer: TRUE
Diff: 2
Reference: Web Browsers and Web Servers
79) Google has joined the Internet browser competition with its entry named Chrome.
Answer: TRUE
Diff: 2
Reference: Web Browsers and Web Servers
80) A spider is a type of Internet virus.
Answer: FALSE
Diff: 2
Reference: Techtalk Sidebar
81) A modern way to send spam is through a botnet.
Answer: TRUE
Diff: 2
Reference: Spam: Can It Be Stopped?
82) Podcasts continue to contain just sound, although expansion to include images and video are in the developmental stages.
Answer: FALSE
Diff: 2
Reference: Sharing Information
83) A portal is a gateway that provides a conveniently organized subject guide to Internet content.
Answer: TRUE
Diff: 2
Reference: Finding Information on the Web
84) Search engines maintain databases of viruses and other malicious software that reside on the Internet.
Answer: FALSE
Diff: 2
Reference: Finding Information on the Web
85) Uploading and downloading is how computers transfer files between each other.
Answer: TRUE
Diff: 2
Reference: Browsing the Web
86) The host name is the name of the group or institution hosting the site.
Answer: TRUE
Diff: 2
Reference: Web Addresses
87) The third part of a complete URL specifies the location of the document on the server.
Answer: TRUE
Diff: 2
Reference: Web Addresses
88) The second part of a complete URL specifies the domain name.
Answer: TRUE
Diff: 2
Reference: Web Addresses
89) Although Opera is a high-quality product for navigating the Internet, it is limited due to its inability to be used with a wide range of operating systems.
Answer: FALSE
Diff: 2
Reference: Web Browsers and Web Servers
90) The first part of a complete URL specifies the directory name.
Answer: FALSE
Diff: 2
Reference: Web Addresses
Match the following top-level domain names with a sample owner:
- A) The University of Wisconsin
- B) A clothing store
- C) An Internet service provider
- D) Internal Revenue Service
- E) A public service group
91) .com
Diff: 1
Reference: Web Addresses
92) .edu
Diff: 1
Reference: Web Addresses
93) .org
Diff: 1
Reference: Web Addresses
94) .gov
Diff: 1
Reference: Web Addresses
95) .net
Diff: 1
Reference: Web Addresses
Answers: 91) B 92) A 93) E 94) D 95) C
Match the following terms to their descriptions:
- A) A hypertext document often written in HTML
- B) A text or graphic area that when clicked brings another document into view
- C) A computer that stores and transmits Web pages when requested
- D) The first page displayed when a user visits the top level of a Web site
- E) Software that interprets HTML tags and displays Web pages
96) Hyperlink
Diff: 1
Reference: The Internet and Web
97) Index page
Diff: 1
Reference: The Internet and Web
98) Web browser
Diff: 1
Reference: The Internet and Web
99 )Web page
Diff: 1
Reference: The Internet and Web
100) Web server
Diff: 1
Reference: The Internet and Web
Answers: 96) B 97) D 98) E 99) A 100) C
Computers Are Your Future, 12e (LaBerta)
Chapter 7 Networks: Communicating and Sharing Resources
1) Which of the following is NOT a network communications device?
- A) Switch
- B) Router
- C) NIC
- D) LAN
Answer: D
Diff: 2
Reference: Network Fundamentals
2) Which of the following is the largest wide area network (WAN)?
- A) Internet
- B) International Banking System
- C) United States Government
- D) NATO
Answer: A
Diff: 1
Reference: Network Fundamentals
3) Which of the following is NOT a function of communication devices?
- A) Boost signal strength
- B) Facilitate digital communication
- C) Encryption
- D) Determine efficient data-transfer pathways
Answer: C
Diff: 2
Reference: Network Fundamentals
4) When a computer is connected to a network, it is called a:
- A) peripheral.
- B) router.
- C) communications device.
- D) node.
Answer: D
Diff: 2
Reference: Network Fundamentals
5) Which of the following network devices has the capability to determine the best path to transmit data and determine alternative pathways?
- A) Router
- B) Switch
- C) Pathfinder
- D) Director
Answer: A
Diff: 2
Reference: Network Fundamentals
6) Another term for a network administrator is a network:
- A) supervisor.
- B) operator.
- C) engineer.
- D) manager.
Answer: C
Diff: 1
Reference: Network Fundamentals
7) Each node on a network has a unique logical address, which is:
- A) assigned by the network administrator when the node is installed.
- B) assigned by the software in use.
- C) built into the hardware.
- D) None of the above.
Answer: B
Diff: 2
Reference: Network Fundamentals
8) Which of the following is NOT a disadvantage of networks?
- A) Lack of privacy
- B) Loss of autonomy
- C) Sharing important information
- D) Security issues
Answer: C
Diff: 1
Reference: Advantages and Disadvantages of Networking
9) Which of the following is the approximate effective inside range for wireless LAN signals?
- A) 2,500 to 3,500 feet
- B) 500 to 1,500 feet
- C) 125 to 300 feet
- D) 1 mile
Answer: C
Diff: 1
Reference: Local Area Networks
10) How do most wireless LANs ensure security with radio transmission?
- A) By using a random series of frequencies
- B) By scrambling the signals
- C) By splitting the signals
- D) All of the above
Answer: A
Diff: 3
Reference: Local Area Networks
11) A local area network (LAN) in which all the computers are equals is called a(n) ________ network.
- A) equal resource
- B) peer-to-peer
- C) client/server
- D) equal sharing
Answer: B
Diff: 1
Reference: Peer-to-Peer Networks
12) A VPN operates as a private network over which larger type of network?
- A) LAN
- B) WAN
- C) Internet
- D) Governmental network
Answer: C
Diff: 1
Reference: Virtual Private Network (VPN)
13) The term network topology refers to the:
- A) type of network operating system used on the file server.
- B) type of Internet connections available to users of the network.
- C) physical layout of a local area network.
- D) contention-management strategy used to resolve collisions.
Answer: C
Diff: 2
Reference: LAN Topologies
14) Contention sometimes results in:
- A) multiplexing.
- B) parity errors.
- C) terminators.
- D) collisions.
Answer: D
Diff: 1
Reference: LAN Topologies
15) Which of the following is NOT an advantage of the bus topology?
- A) Simple
- B) Easy to expand
- C) Length
- D) Reliable
Answer: C
Diff: 2
Reference: LAN Topologies
16) In a(n) ________ topology, the network nodes are connected to a central hub or switch.
- A) star
- B) hierarchical
- C) layered
- D) ring
Answer: A
Diff: 2
Reference: LAN Topologies
17) Limitations of the bus topology include all of the following EXCEPT:
- A) loss of signal strength.
- B) length restrictions.
- C) breakage in the ring.
- D) number of nodes.
Answer: C
Diff: 3
Reference: LAN Topologies
18) A ________ is a simple broadcast device that does not manage traffic and usually results in frequent collisions.
- A) plug
- B) centralized computer
- C) hub
- D) switch
Answer: C
Diff: 1
Reference: LAN Topologies
19) Which of the following protocols use Ethernet?
- A) IP
- B) TCP/IP
- C) OSI
- D) CSMA/CD
Answer: D
Diff: 1
Reference: LAN Technologies
20) 10 Gigabit Ethernet makes a next-generation application, such as ________, possible.
- A) multicasting
- B) cloud computing
- C) network convergence
- D) All of the above
Answer: D
Diff: 2
Reference: LAN Technologies
21) ________ protocols are used to ensure that modems can communicate with each other.
- A) MMT
- B) TCP/IP
- C) Modulation
- D) Oscillation
Answer: C
Diff: 2
Reference: LAN Protocols
22) A protocol suite specifies how the network functions, or its:
- A) network suite.
- B) network architecture.
- C) network package.
- D) network configuration.
Answer: B
Diff: 2
Reference: LAN Protocols
23) Which of the following is NOT an issue addressed by modulation protocols?
- A) Data transfer rate
- B) Routing paths
- C) Data compression standards
- D) Error checking standards
Answer: B
Diff: 2
Reference: LAN Protocols
24) Because of their complexity, networks use an architecture that is divided into separate network:
- A) levels.
- B) modules.
- C) layers.
- D) elements.
Answer: C
Diff: 2
Reference: LAN Protocols
25) Which of the following types of networks require an access point?
- A) Packet switching
- B) Ethernet
- C) WiFi
- D) Novell
Answer: C
Diff: 1
Reference: WiFi
26) Which of the following types of media is used to connect today’s Ethernet star network?
- A) Twisted-pair wire
- B) Coaxial cable
- C) Phone lines
- D) Microwave signals
Answer: A
Diff: 2
Reference: LAN Protocols
27) Because a network’s layers are arranged vertically similar to the floors in a building, with each “floor” having its own protocols, the layers are known as a:
- A) protocol suite.
- B) protocol stack.
- C) modulation protocols.
- D) top-down protocols.
Answer: B
Diff: 2
Reference: Network Layers
28) Which of the following protocols do NOT use twisted-pair cabling?
- A) IBM Token Ring
- B) 100Base-T
- C) 10Base-5
- D) 10Base-T
Answer: C
Diff: 3
Reference: LAN Protocols
29) Which of the following types of networks require an access point?
- A) Novell
- B) Ethernet
- C) Packet switching
- D) WiFi
Answer: D
Diff: 1
Reference: WiFi
30) Which of the following is a wireless specification?
- A) 801.11d
- B) 800.11a
- C) 802.11g
- D) 803.11x
Answer: C
Diff: 3
Reference: WiFi
31) Which of the following features enable the strongest WiFi encryption protection?
- A) WEP
- B) WDDI
- C) WAP
- D) WPA
Answer: D
Diff: 2
Reference: WiFi
32) The ________ standard is used for Bluetooth technology and has a very short range (up to 10 meters).
- A) 802.15
- B) 802.11n
- C) 802.11g
- D) 802.16
Answer: A
Diff: 3
Reference: WiFi
33) ________, where networked computers work on small pieces of large complex tasks, is revolutionizing research in a number of areas.
- A) Complex-parceling
- B) Distributed computing
- C) Shared resources
- D) Group work
Answer: B
Diff: 2
Reference: Green Tech Tips
34) A point of presence (POP) is a:
- A) node on a WAN connected to the network through wireless technology.
- B) terminal in a store that processes a local order and connects to a company database through a WAN.
- C) wired or wireless WAN network that enables users to access the WAN.
- D) high-capacity transmission line carrying traffic for a WAN.
Answer: C
Diff: 2
Reference: Point of Presence
35) To carry computer data over the long haul, WANs need to have a(n) ________ in multiple towns and cities.
- A) ISP
- B) router
- C) POP
- D) hub
Answer: C
Diff: 2
Reference: Point of Presence
36) Which of the following is the name for the high-capacity transmission lines that carry WAN traffic?
- A) Negotiators
- B) Backbones
- C) Coaxial cables
- D) Cores
Answer: B
Diff: 1
Reference: Backbones
37) The scope of a backbone can be all of the following EXCEPT:
- A) regional.
- B) continental.
- C) atmospheric.
- D) transcontinental.
Answer: C
Diff: 1
Reference: Backbones
38) An IP address is composed of:
- A) five sets of numbers separated by periods.
- B) four sets of numbers separated by periods.
- C) five sets of numbers separated by commas.
- D) four sets of numbers separated by commas.
Answer: B
Diff: 3
Reference: The Internet Protocols
39) Which of the following switching methods is used by the Internet?
- A) Packet
- B) Circuit
- C) Token
- D) Distributed
Answer: A
Diff: 2
Reference: Circuit and Packet Switching
40) Which of the following is the maximum transfer speed for all digital line protocols such as switched multimegabit data service (SMDS)?
- A) 11 Mbps
- B) 56 Kbps
- C) 1 Gbps
- D) 155 Mbps
Answer: D
Diff: 3
Reference: Circuit and Packet Switching
41) A(n) ________ is comprised of several linked computer systems exchanging and sharing data and resources.
Answer: network
Diff: 1
Reference: Network Fundamentals
42) ________ area networks use cables, radio waves, or infrared transmissions to connect computers and peripherals devices.
Answer: Local
Diff: 1
Reference: Network Fundamentals
43) A networked computer may be called a node or a(n)________.
Answer: client
Diff: 2
Reference: Client/Server Networks
44) NOS is an acronym for ________ operating system.
Answer: network
Diff: 2
Reference: Network Fundamentals
45) A(n) ________ is used to connect two or more networks.
Answer: router
Diff: 2
Reference: Network Fundamentals
46) Each node on a network has a unique name or ________ address assigned by the software in use.
Answer: logical
Diff: 1
Reference: Network Fundamentals
47) A wireless access point is commonly used as a bridge between a wireless node and a(n) ________ network.
Answer: wired
Diff: 1
Reference: Network Fundamentals
48) Whether wired or wireless, LANs can be differentiated by the networking ________ they use.
Answer: model
Diff: 3
Reference: Local Area Networks
49) VPN stands for virtual ________ network.
Answer: private
Diff: 1
Reference: Virtual Private Network (VPN)
50) ________ occurs when two or more computers try access the LAN at the same time.
Answer: Contention
Diff: 2
Reference: LAN Topologies
51) A(n) ________ topology solves the expansion problems of the bus topology by using a central switch.
Answer: star
Diff: 2
Reference: LAN Topologies
52) A network in which each node is connected to the line is called a(n) ________ topology.
Answer: bus
Diff: 1
Reference: LAN Topologies
53) A network using a ring topology uses a(n) ________ to prevent collisions.
Answer: token
Diff: 2
Reference: LAN Topologies
54) A(n) ________ is a simple broadcast device that does not manage traffic and usually results in frequent collisions.
Answer: hub
Diff: 2
Reference: LAN Topologies
55) A(n) ________ home, which was manufactured and decorated from recycled and reusable resources is located in Chicago’s Museum of Science and Industry.
Answer: smart
Diff: 2
Reference: LAN Topologies
56) The standards that allow network-connected devices to communicate with each other are called ________.
Answer: protocols
Diff: 1
Reference: LAN Protocols
57) Network protocols are fixed, formalized exchanges that specify how dissimilar network components can establish ________.
Answer: communication
Diff: 2
Reference: LAN Protocols
58) The rate at which two modems can exchange data is known as the data-________ rate.
Answer: transfer
Diff: 2
Reference: LAN Protocols
59) The CSMA/CD protocol is used by the ________.
Answer: Ethernet
Diff: 2
Reference: LAN Technologies
60) WPA is an acronym for WiFi ________ Access.
Answer: Protected
Diff: 2
Reference: WiFi
61) One of the newest 802.11 standard is ________.
Answer: 802.11r
Diff: 2
Reference: WiFi
62) When ________ switching is used, data is transmitted over a physical end-to-end circuit between the sending and receiving computers.
Answer: circuit
Diff: 2
Reference: Circuit and Packet Switching
63) The delay found in packet-switching networks due to the examination of individual packets by multiple routers is called ________.
Answer: latency
Diff: 2
Reference: Circuit and Packet Switching
64) The oldest packet-switching protocol for WANs is ________.
Answer: X.25
Diff: 3
Reference: Circuit and Packet Switching
65) Home ________ networks are wireless networks in which each computer on the network broadcasts its information to another using radio signals.
Answer: Wi-Fi
Diff: 1
Reference: Wireless Home Networks
66) External Wi-Fi transceivers connect through USB connections.
Answer: TRUE
Diff: 2
Reference: WiFi
67) Network administrators support computer networks.
Answer: TRUE
Diff: 1
Reference: Network Fundamentals
68) The physical address of a network node is assigned by the software in use.
Answer: FALSE
Diff: 1
Reference: Network Fundamentals
69) A wireless access point is commonly used as a bridge between a wireless and a wired network.
Answer: TRUE
Diff: 1
Reference: Network Fundamentals
70) A disadvantage of networking is loss of autonomy.
Answer: TRUE
Diff: 1
Reference: Advantages and Disadvantages of Networking
71) An advantage of networking is fewer security threats.
Answer: FALSE
Diff: 1
Reference: Advantages and Disadvantages of Networking
72) VPN is the acronym for virtual public network.
Answer: FALSE
Diff: 2
Reference: Virtual Private Network (VPN)
73) An advantage of networking is centralized data management.
Answer: TRUE
Diff: 1
Reference: Advantages and Disadvantages of Networking
74) Many businesses use VPNs to provide their employees and customers with a quick, secure access to corporate information.
Answer: TRUE
Diff: 2
Reference: Virtual Private Network (VPN)
75) In a P2P network, users can choose which files they wish to share.
Answer: TRUE
Diff: 2
Reference: Peer-to-Peer Networks
76) With respect to wireless networks, it is important to properly secure your network and data, due to the fact that signals can extend beyond the walls of your home.
Answer: TRUE
Diff: 2
Reference: WiFi
77) Public wireless access locations are called hot spots.
Answer: TRUE
Diff: 1
Reference: WiFi
78) Hubs are the only central wiring devices available to use the star topology.
Answer: FALSE
Diff: 1
Reference: LAN Topologies
79) A gigaPoP is a POP that provides access to a backbone service capable of data transfer rates exceeding 1 Gbps.
Answer: TRUE
Diff: 2
Reference: Backbones
80) Unlike other computer networks, WANs do NOT use protocols.
Answer: FALSE
Diff: 1
Reference: Wide Area Networks
81) The Internet protocols are collectively called TCP/IP.
Answer: TRUE
Diff: 1
Reference: The Internet Protocols
82) IP is a connection-less protocol.
Answer: TRUE
Diff: 3
Reference: The Internet Protocols
83) Circuit switching works best when avoiding delivery delays is essential.
Answer: TRUE
Diff: 3
Reference: Circuit and Packet Switching
84) Packet-switching networks are reliable.
Answer: TRUE
Diff: 3
Reference: Circuit and Packet Switching
85) Another term for network congestion is overloading.
Answer: TRUE
Diff: 3
Reference: Circuit and Packet Switching
86) A point of presence is a LAN network connection point.
Answer: FALSE
Diff: 1
Reference: Point of Presence
87) X.25 is the newest packet-switching protocol.
Answer: FALSE
Diff: 3
Reference: Circuit and Packet Switching
88) Convergence will be the future of home networking systems.
Answer: TRUE
Diff: 2
Reference: The Future of Home Networking
89) With packet switching, the message is sent over a physical end-to-end circuit.
Answer: FALSE
Diff: 1
Reference: Circuit and Packet Switching
90) The term wireless access point is used to describe a node on a network that acts as a receiver and transmitter of wireless radio signals between other nodes on a network.
Answer: TRUE
Diff: 1
Reference: Network Fundamentals
Match the following network topology terms to their meanings:
- A) Central wiring device often used in a star topology
- B) Unit of data that is passed in a ring topology
- C) Corruption of network data when two computers transmit simultaneously
- D) Occurs when two workstations attempt to access the LAN simultaneously
- E) Special connector at the end of a bus
- F) Has all nodes attached in a circular wiring arrangement
91) Collision
Diff: 2
Reference: LAN Topologies
92) Contention
Diff: 2
Reference: LAN Topologies
93) Terminator
Diff: 2
Reference: LAN Topologies
94) Switch
Diff: 2
Reference: LAN Topologies
95) Token
Diff: 2
Reference: LAN Topologies
96) Ring topology
Diff: 1
Reference: LAN Topologies
Answers: 91) C 92) D 93) E 94) A 95) B 96) F
Match the following WAN-related terms to their meanings:
- A) A packet-switching protocol for WANs
- B) A protocol used with 100 percent digital lines
- C) A WAN connection point
- D) A computer at a retail store that is also linked to a data communications network
97) POS terminal
Diff: 3
Reference: WAN Applications
98) POP
Diff: 3
Reference: Point of Presence
99) SMDS
Diff: 3
Reference: Circuit and Packet Switching
100) X.25
Diff: 3
Reference: Circuit and Packet Switching
Answers: 97) D 98) C 99) B 100) A