A ________ is a group of 2 or more computers, or nodes, configured to share information and resources.
a. network
b. route
c. bridge
d. bus
a. network

Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?
A. Enable software sharing
B. Facilitate knowledge sharing
C. Enhanced communication capabilities
D. Ease of maintenance and administration
D. Ease of maintenance and administration

A ___ allows multiple users to connect to the Internet through one connection.
A. file server
B. hub
C. network
D. packet screener
C. network

___ networks contain servers as well as computers that individual users access and use.
A. Client/Server
B. Peer-to-peer
C. Switch
D. CSMA/CD
A. Client/Server

In a(n) _________ network, each node connected to the network communicates directly with every other node.
a. peer-to-peer
b. intranet
c. extranet
d. client/server
a. peer-to-peer

P2P networks become difficult to manage when they are expanded beyond ________ users
a. 20
b. 5
c. 10
d. 50
C. 10

A ________ is a network used by one person connected via wireless media
a. LAN
b. PAN
c. WAN
d. MAN
B. PAN

A _______ uses the public Internet communications infrastructure to build a secure, private network
a. LAN
b. WAN
c. MAN
d. VPN
D. VPN

A(n) ___ is used exclusively within a corporation or organization.
A. VPN
B. intranet
C. extranet
D. Internet
B. intranet

A(n) ___ server tracks who is logging on to the network as well as which services on the network are available to each user.
A. gateway
B. authentication
C. dedicated
D. File
B. authentication

Which of the following is FALSE about servers?
A. Servers are the workhorses of the client/server network
B. Servers interface with many different network users
C. A file server stores and manages files for a network
D. All networks require at least two servers
D. All networks requires at least two serveers

A(n) server is a server that stores and manages files for network users.
A. file
B. e-mail
C. print
D. database
A. file

A print server uses a print ___ as a software holding area for printing jobs.
A. strack
B. queue
C. buffer
D. heap
B. queue

When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ___ server delivers the software to the client computer.
A. communication database
B. database
C. application
D. file
C. Application

Which of the following is NOT a common network topology?
A. Star
B. Cluster
C. Bus
D. Ring
B. Cluster

A ___ is a set of rules for how information and communication are exchanged.
A. protocol
B. token
C. switch
D. packet
A. protocol

Ring networks use the ___ method to avoid data collisions.
A. packet screening
B. active-check
C. token
D. passive-check
C. token

The ends of the cable in a bus network use a(n) ___ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal.
A. endcap
B. terminator
C. stopper
D. block
B. terminator

Which of the following networks is most known for data collisions?
A. Star
B. Bus
C. Hierarchical
D. Cluster
B. Bus

A ___ is passed from computer from computer to computer around the ring of a ring topology network.
A. packet
B. protocol
C. proxy
D. token
D. token

Which of the following is he most commonly used client/server network topology?
A. Star
B. Cluster
C. Ring
D. Hierarchical
A. Star

The star topology uses a central ___ to connect all network nodes.
A. terminator
B. gateway
C. switch
D. router
C. switch

If fair allocation of network access is a major requirement of the network, choose a(n) _________ topology
a. ring
b. cluster
c. star
d. bus
A. ring

What is CSMA/CD?
A. A type of network topology
B. A special signal of a star network
C. a method used to avoid data collisions
D. The central communication device on a star or ring network
C. a method used to avoid data collisions

In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ___ signal.
A. hit
B. crash
C. stop
D. jam
D. jam

A ___ topology is created when more than one topology is used to build a network.
A. hybrid
B. multiple-use
C. fusion
D. crossover
A. hybrid

Which of the following networks has high scalability?
A. star
B. ring
C. bus
D. hybrid
A. star

For business networks, which of the following is NOT main cable type?
a. twister-pair
b. coaxial
c. duplex
d. fiber-optic
C. duplex

Which of the following is NOT a factor to consider when selecting network cabling?
A. Cable diameter
B. Interference
C. Maximum run length
D. Bandwidth
A. cable diameter

Which of the following causes interference when a cable is exposed to strong electromagnetic fields?
A. EMI
B. RFI
C. STP
D. IEEE
A. EMI

________ cable is NOT subject to electromagnetic interference or radio frequency interference.
A. Twisted-pair
B. Fiber-optic
C. Polycarbonate
D. Coaxial
B. Fiber-optic

________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection.
A) Shielding
B) Cladding
C) Sheathing
D) Coating
B.) Cladding

Which cable type is the most costly to install?
A. Fiber-optic
B. Twisted-pair
C. ThinNet coaxial
D. ThickNet coaxial
A. Fiber-optic

_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers.
A. Radio frequency interference
B. Transitional
C. Crosstalk
D. Electromagnetic
D. Electromagnetic

Which is NOT a networking protocol?
A. Apple File Protocol (AFP)
B. NetBios Extended User Interface (NetBEUI)
C. Internet Packet Exchange (IPX)
D. HyperText Transfer Protocol (HTTP)
D. HyperText Transfer Protocol (HTTP)

Which of the following is something a network adapter does NOT do?
A. It uses high-powered signals so data can move easily over network transmission media.
B. It allows or denies access to the computer in which it is installed.
C. It verifies that all information transmitted from the computer is correctly received by the recipient.
D. It breaks down data and puts it into packets.
C. It verifies that all information transmitted from the computer is correctly

The standard communications protocol used on most client/server networks is ________.
A) Ethernet
B) NOS
C) TCP/IP
D) VPN
A) Ethernet

What is another name for the physical address assigned to each network adapter?
A. Network Access Control (NAC)
B. Physical Address Control (PAC)
C. Network Physical Address (NPA)
D. Media Access Control (MAC)
D. Media Access Control (MAC)

A(n) _________ address is the address external entities use to communicate with your network.
A. AL
B. MAC
C. WI
D. IP
D. IP

Which of the following devices sends data from one collision domain to another?
A. Switch
B. Bridge
C. Link
D. Band
B. Bridge

___ are devices used to send data between two networks.
A. Repeaters
B. Switches
C. Hubs
D. Routers
D. Routers

A _________ keeps your computer safe by confirming who is trying to access it.
A. Gateway
B. Firewall
C. Hub
D. Switch
B. Firewall

________ are often equipped to act as hardware firewalls.
A. Repeaters
B. Switches
C. Jammers
D. Routers
D. Routers

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
A. viewing
B. Browsing
C. filtering
D. screening
D. screening

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
TIA CHAPTER 12 EXAM SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE