Cayf12e Testbank 07 - Network

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Introduction to Computer Science

Chapter 7 Networks: Communicating and Sharing Resources

1) Which of the following is NOT a network communications device?


A) Switch
B) Router
C) NIC
D) LAN

2) Which of the following is the largest wide area network (WAN)?


A) Internet
B) International Banking System
C) United States Government
D) NATO

3) Which of the following is NOT a function of communication devices?


A) Boost signal strength
B) Facilitate digital communication
C) Encryption
D) Determine efficient data-transfer pathways

4) When a computer is connected to a network, it is called a:


A) peripheral.
B) router.
C) communications device.
D) node.

5) Which of the following network devices has the capability to determine the best path to
transmit data and determine alternative pathways?
A) Router
B) Switch
C) Pathfinder
D) Director

6) Another term for a network administrator is a network:


A) supervisor.
B) operator.
C) engineer.
D) manager.

7) Each node on a network has a unique logical address, which is:


A) assigned by the network administrator when the node is installed.
B) assigned by the software in use.
C) built into the hardware.
D) None of the above.

8) Which of the following is NOT a disadvantage of networks?

1
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
A) Lack of privacy
B) Loss of autonomy
C) Sharing important information
D) Security issues

9) Which of the following is the approximate effective inside range for wireless LAN signals?
A) 2,500 to 3,500 feet
B) 500 to 1,500 feet
C) 125 to 300 feet
D) 1 mile

10) How do most wireless LANs ensure security with radio transmission?
A) By using a random series of frequencies
B) By scrambling the signals
C) By splitting the signals
D) All of the above

11) A local area network (LAN) in which all the computers are equals is called a(n) ________
network.
A) equal resource
B) peer-to-peer
C) client/server
D) equal sharing

12) A VPN operates as a private network over which larger type of network?
A) LAN
B) WAN
C) Internet
D) Governmental network

13) The term network topology refers to the:


A) type of network operating system used on the file server.
B) type of Internet connections available to users of the network.
C) physical layout of a local area network.
D) contention-management strategy used to resolve collisions.

14) Contention sometimes results in:


A) multiplexing.
B) parity errors.
C) terminators.
D) collisions.

15) Which of the following is NOT an advantage of the bus topology?


A) Simple
B) Easy to expand
C) Length
D) Reliable

2
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) In a(n) ________ topology, the network nodes are connected to a central hub or switch.
A) star
B) hierarchical
C) layered
D) ring

17) Limitations of the bus topology include all of the following EXCEPT:
A) loss of signal strength.
B) length restrictions.
C) breakage in the ring.
D) number of nodes.

18) A ________ is a simple broadcast device that does not manage traffic and usually results in
frequent collisions.
A) plug
B) centralized computer
C) hub
D) switch

19) Which of the following protocols use Ethernet?


A) IP
B) TCP/IP
C) OSI
D) CSMA/CD

20) 10 Gigabit Ethernet makes a next-generation application, such as ________, possible.


A) multicasting
B) cloud computing
C) network convergence
D) All of the above

21) ________ protocols are used to ensure that modems can communicate with each other.
A) MMT
B) TCP/IP
C) Modulation
D) Oscillation

22) A protocol suite specifies how the network functions, or its:


A) network suite.
B) network architecture.
C) network package.
D) network configuration.

23) Which of the following is NOT an issue addressed by modulation protocols?


A) Data transfer rate
B) Routing paths
C) Data compression standards

3
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
D) Error checking standards

24) Because of their complexity, networks use an architecture that is divided into separate
network:
A) levels.
B) modules.
C) layers.
D) elements.

25) Which of the following types of networks require an access point?


A) Packet switching
B) Ethernet
C) WiFi
D) Novell

26) Which of the following types of media is used to connect today's Ethernet star network?
A) Twisted-pair wire
B) Coaxial cable
C) Phone lines
D) Microwave signals

27) Because a network's layers are arranged vertically similar to the floors in a building, with
each "floor" having its own protocols, the layers are known as a:
A) protocol suite.
B) protocol stack.
C) modulation protocols.
D) top-down protocols.

28) Which of the following protocols do NOT use twisted-pair cabling?


A) IBM Token Ring
B) 100Base-T
C) 10Base-5
D) 10Base-T

29) Which of the following types of networks require an access point?


A) Novell
B) Ethernet
C) Packet switching
D) WiFi

30) Which of the following is a wireless specification?


A) 801.11d
B) 800.11a
C) 802.11g
D) 803.11x

31) Which of the following features enable the strongest WiFi encryption protection?

4
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
A) WEP
B) WDDI
C) WAP
D) WPA

32) The ________ standard is used for Bluetooth technology and has a very short range (up to 10
meters).
A) 802.15
B) 802.11n
C) 802.11g
D) 802.16

33) ________, where networked computers work on small pieces of large complex tasks, is
revolutionizing research in a number of areas.
A) Complex-parceling
B) Distributed computing
C) Shared resources
D) Group work

34) A point of presence (POP) is a:


A) node on a WAN connected to the network through wireless technology.
B) terminal in a store that processes a local order and connects to a company database through a
WAN.
C) wired or wireless WAN network that enables users to access the WAN.
D) high-capacity transmission line carrying traffic for a WAN.

35) To carry computer data over the long haul, WANs need to have a(n) ________ in multiple
towns and cities.
A) ISP
B) router
C) POP
D) hub

36) Which of the following is the name for the high-capacity transmission lines that carry WAN
traffic?
A) Negotiators
B) Backbones
C) Coaxial cables
D) Cores

37) The scope of a backbone can be all of the following EXCEPT:


A) regional.
B) continental.
C) atmospheric.
D) transcontinental.

38) An IP address is composed of:

5
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
A) five sets of numbers separated by periods.
B) four sets of numbers separated by periods.
C) five sets of numbers separated by commas.
D) four sets of numbers separated by commas.

39) Which of the following switching methods is used by the Internet?


A) Packet
B) Circuit
C) Token
D) Distributed

40) Which of the following is the maximum transfer speed for all digital line protocols such as
switched multimegabit data service (SMDS)?
A) 11 Mbps
B) 56 Kbps
C) 1 Gbps
D) 155 Mbps

41) A(n) ________ is comprised of several linked computer systems exchanging and sharing
data and resources.

42) ________ area networks use cables, radio waves, or infrared transmissions to connect
computers and peripherals devices.

43) A networked computer may be called a node or a(n)________.

44) NOS is an acronym for ________ operating system.

45) A(n) ________ is used to connect two or more networks.

46) Each node on a network has a unique name or ________ address assigned by the software in
use.

47) A wireless access point is commonly used as a bridge between a wireless node and a(n)
________ network.

48) Whether wired or wireless, LANs can be differentiated by the networking ________ they
use.

49) VPN stands for virtual ________ network.

50) ________ occurs when two or more computers try access the LAN at the same time.

51) A(n) ________ topology solves the expansion problems of the bus topology by using a
central switch.

52) A network in which each node is connected to the line is called a(n) ________ topology.

6
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
53) A network using a ring topology uses a(n) ________ to prevent collisions.

54) A(n) ________ is a simple broadcast device that does not manage traffic and usually results
in frequent collisions.

55) A(n) ________ home, which was manufactured and decorated from recycled and reusable
resources is located in Chicago's Museum of Science and Industry.

56) The standards that allow network-connected devices to communicate with each other are
called ________.

57) Network protocols are fixed, formalized exchanges that specify how dissimilar network
components can establish ________.

58) The rate at which two modems can exchange data is known as the data-________ rate.

59) The CSMA/CD protocol is used by the ________.

60) WPA is an acronym for WiFi ________ Access.

61) One of the newest 802.11 standard is ________.

62) When ________ switching is used, data is transmitted over a physical end-to-end circuit
between the sending and receiving computers.

63) The delay found in packet-switching networks due to the examination of individual packets
by multiple routers is called ________.

64) The oldest packet-switching for WANs is ________.

65) Home ________ networks are wireless networks in which each computer on the network
broadcasts its information to another using radio signals.

66) External Wi-Fi transceivers connect through USB connections.

67) Network administrators support computer networks.

68) The physical address of a network node is assigned by the software in use.

69) A wireless access point is commonly used as a bridge between a wireless and a wired
network.

70) A disadvantage of networking is loss of autonomy.

71) An advantage of networking is fewer security threats.

7
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
72) VPN is the acronym for virtual public network.

73) An advantage of networking is centralized data management.

74) Many businesses use VPNs to provide their employees and customers with a quick, secure
access to corporate information.

75) In a P2P network, users can choose which files they wish to share.

76) With respect to wireless networks, it is important to properly secure your network and data,
due to the fact that signals can extend beyond the walls of your home.

77) Public wireless access locations are called hot spots.

78) Hubs are the only central wiring devices available to use the star topology.

79) A gigaPoP is a POP that provides access to a backbone service capable of data transfer rates
exceeding 1 Gbps.

80) Unlike other computer networks, WANs do NOT use protocols.

81) The Internet protocols are collectively called TCP/IP.

82) IP is a connection-less protocol.

83) Circuit switching works best when avoiding delivery delays is essential.

84) Packet-switching networks are reliable.

85) Another term for network congestion is overloading.

86) A point of presence is a LAN network connection point.

87) X.25 is the newest packet-switching protocol.

88) Convergence will be the future of home networking systems.

89) With packet switching, the message is sent over a physical end-to-end circuit.

90) The term wireless access point is used to describe a node on a network that acts as a receiver
and transmitter of wireless radio signals between other nodes on a network.

Match the following network topology terms to their meanings:


A) Central wiring device often used in a star topology
B) Unit of data that is passed in a ring topology
C) Corruption of network data when two computers transmit simultaneously
D) Occurs when two workstations attempt to access the LAN simultaneously

8
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
E) Special connector at the end of a bus
F) Has all nodes attached in a circular wiring arrangement

91) Collision

92) Contention

93) Terminator

94) Switch

95) Token

96) Ring topology

Match the following WAN-related terms to their meanings:


A) A packet-switching protocol for WANs
B) A protocol used with 100 percent digital lines
C) A WAN connection point
D) A computer at a retail store that is also linked to a data communications network

97) POS terminal

98) POP

99) SMDS

100) X.25

9
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

You might also like