In a networked environment, no authorized computer user can access data and information stored on other computers on the network.
False
Users connected to a network have access to software on the network.
True
The main differentiation among network classifications is whether they are wired or wireless.
False
An extranet essentially is a small version of the Internet that exists within an organization.
False
A WLAN cannot communicate with a wired LAN.
False
A MAN usually is managed by a consortium of users or by a single network provider that sells the service to the users.
False
On a client/server network, the client sometimes is called a host computer.
False
Although it can connect any number of computers, a client/server network typically provides an efficient means to connect 10 or fewer computers.
False
When users log off a P2P network, other users still can access their hard disks.
False
A star network consists of a single central cable, to which all computers and other devices connect.
False
Bus networks are unpopular on LANs because they are expensive and difficult to install.
False
The star topology is primarily used for LANs but it is also used in WANs.
False
Data transmitted on a ring network travels from device to device around the entire ring, in both directions.
False
On a ring network, if the hub fails the entire network is inoperable until the hub is repaired.
False
As data move through a network from one program to another, it can use at most one kind of network standard.
False
Depending on the transmission media used, Ethernet networks have data transfer rates that range from 10 Gbps for small office/home users to 1000 Gbps for enterprise users.
False
Each token ring network has several tokens.
False
On a token ring network, a packet is a special series of bits that function like a ticket, allowing the device with the packet to transmit data over the network.
False
With TCP/IP, each packet contains data as well as the recipient (destination), origin (sender), and the sequence information used to reassemble the data at the destination.
True
Wi-Fi networks easily can be integrated with wired Ethernet networks.
False
Hot spots offer mobile users the ability to connect to the Internet with their Wi-Fi enabled wireless computers and devices.
True
One advantage of Bluetooth is its high bandwidth.
False
Contactless payment is a popular use of UWB technology.
False
Communications software usually is bundled with the operating system or communications devices.
True
Consumers can purchase blank NFC tags at a reasonable cost and easily program them to perform certain actions.
True
With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called multiplexing.
True
ADSL is ideal for Internet access because most users upload more information than they download from the Internet.
False
ISDN is more widely used now than in the past.
False
Data, instructions, and information travel along transmission media in either analog or digital form, depending on the transmission media.
True
With FTTP service, an optical terminal at your location receives the signals and transfers them to a router connected to a computer.
True
Phone networks, the Internet, and other networks with large amounts of traffic use ATM.
True
ISDN and DSL are more widely used than cable.
False
A dial-up modem connected to a sending computer converts the computer's digital signals into analog signals.
True
A DSL modem converts digital signals to analog signals and vice versa so that data can travel along an analog phone line.
False
Some smartphones can function as a wireless modem, called a mobile hot spot, when tethered to a personal computer.
True
Some mobile users have a wireless modem that uses a mobile phone provider's network to connect to the Internet wirelessly from a computer or other mobile device.
True
Wireless access points have high-quality antennas for optimal signals.
True
Only small networks use routers.
False
IP hijacking is one of the largest Internet security threats.
True
One of the more widely used transmission media for network cabling and landline phone systems is twisted-pair cable.
True
Most of today's computer networks use coaxial cable.
False
In a fiber-optic cable, each strand, called an optical fiber, is as thin as a human hair.
True
Fiber-optic cables have the capability of carrying significantly more signals than wire cables.
True
Wireless transmission media are used when it is impossible to install cables.
True
Infrared (IR) is a wireless transmission medium that sends signals using infrared light waves.
True
For radio transmissions, a transmitter is needed to send the broadcast radio signal and a receiver to accept it.
True
The fifth generation of cellular transmissions is expected to provide artificial intelligence capabilities on wearable devices.
True
Transmission from a satellite to an earth-based station is called an uplink.
False
A GPS receiver is a handheld, mountable, or embedded device that contains an antenna, a radio receiver, and a processor.
True