computer 5

Unlock all answers in this set

Unlock answers
question
In the early years of personal computers, networks were plentiful.
answer
false
question
A WAN provides connectivity within a limited geographical area, often within a single building.
answer
false
question
A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
answer
true
question
MAC addresses are used for some low-level network functions and can also e employed to establish network security.
answer
true
question
A packer always travels from the source directly to the destination, never traveling through intermediate routing devices.
answer
false
question
IP addresses can be assigned by ISPs or system managers.
answer
true
question
Microwaves cannot be aimed in a single direction and they have less carrying capacity than radio waves
answer
false
question
A transceiver is a combination of a transmitter and a receiver.
answer
true
question
Bluetooth is often used to connect workstations to a LAN.
answer
false
question
A gateway joins two different types of networks.
answer
true
question
WPA2 makes sure that packets have not been intercepted or tampered with in any way.
answer
true
question
Most routers supply a WAN port designed for an internet connection.
answer
true
question
Windows automatically senses nearby networks and displays their SSIDs.
answer
true
question
A cryptographic algorithm is a word, number, or phrase that must be known to encrypt or decrypt a message.
answer
false
question
The internet is the world's largest example of a(n) LAN.
answer
false
question
A storage device that directly connects to a network is called network peripheral storage.
answer
false
question
High-bandwidth communications systems, such as cable TV and DSL, are sometimes referred to as peakband.
answer
false
question
The best-known communications protocol is probably SMTP, which regulates Internet data transport.
answer
false
question
Data in a(n) wired network travels without the use of network cables.
answer
false
question
Microwaves are electromagnetic signals that can be aimed in a single direction and have more carrying capacity than radio waves.
answer
true
question
Wi-Fi signals cannot be disrupted by interference from devices such as microwave ovens, cordless telephones, and baby monitors.
answer
false
question
A wireless ad hoc network uses a centralized broadcasting device, such as a wireless access point or router.
answer
false
question
The process of converting ciphertext into plaintext is called encryption.
answer
false
question
Public key encryption uses one key to encrypt a message and another key to decrypt it.
answer
true
question
A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.
answer
MAN
question
To connect to a LAN, a computer requires ____.
answer
a network interface card
question
The most important network device is a ____.
answer
router
question
A ____ is a physical path or a frequency used for signal transmissions.
answer
communications channel
question
High-bandwidth communications systems are sometimes referred to as ____.
answer
broadband
question
Dial-up Internet access is an example of a(n) ____ communications system.
answer
narrowband
question
In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.
answer
packet switching
question
A protocol known as ____ is designed to automatically distribute IP addresses.
answer
DHCP
question
Which of the following is NOT an advantage of using a wired network?
answer
unlimited mobility
question
Ethernet is a wired technology that is defined by ____ standards.
answer
IEEE 802.3
question
Ethernet is easy to ____.
answer
all of the above
question
On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
answer
packet
question
Most wireless networks transport data as ____ signals.
answer
RF (radio frequency)
question
____ is a disadvantage of using a wireless network when compared to a wired network.
answer
all of the above
question
Wireless signal range can be limited by ____.
answer
all of the above
question
The most popular wireless LAN technology is ____.
answer
Wi-Fi
question
____ is a wireless MAN or WAN technology commonly used for fixed Internet access.
answer
WiMAX
question
In ____ mode two Bluetooth devices can find each other and exchange passkeys.
answer
discovery
question
A Wi-Fi device ____.
answer
both a. and b.
question
To stay with the current Wi-Fi standard, make sure your device is compatible with ____.
answer
802.11n
question
Legacy equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a(n) ____.
answer
either a. or b.
question
Devices with one or more antennas use ____ technology to boost signals and spread them more evenly over the signal range.
answer
MIMO
question
Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure.
answer
router
question
The configuration settings are stored in the router's ____ memory.
answer
EEPROM
question
To access your router's configuration utility, open a browser and enter the router ____.
answer
address
question
In areas where there are overlapping wireless networks, such as in a city or on a college campus, ____ help you log in to the right network, rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.
answer
SSIDs
question
Most routers ship with a(n) ____ predefined by the manufacturer.
answer
SSID
question
A ____ is a network device that extends a wired network by adding additional ports.
answer
hub
question
A ____ is a network device that connects two similar networks.
answer
bridge
question
Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.
answer
encryption
question
The original wireless encryption was called ____.
answer
WEP
question
A(n) ____ is the basis for scrambling and unscrambling the data transmitted between wireless devices.
answer
wireless encryption key
question
To connect a phone or other device to a network, make sure that ____ is enabled, then wait for the device to sense the network, and when asked, enter the encryption key.
answer
Wi-Fi
question
On a home network, file ____ allows you to view and copy photos, for example, from your desktop computer to a tablet computer.
answer
sharing
question
To see a list of devices on your network, you can use your operating system's ____ utility.
answer
file management
question
A ____ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.
answer
file
question
To configure a file server, open a browser from any workstation, enter the file server's ____ address, and provide the administrator ID and password.
answer
IP
question
Symptoms of network problems include ____.
answer
all of the above
question
A message that has not been encrypted is referred to as ____.
answer
plaintext
question
An encrypted message is referred to as ____.
answer
ciphertext
question
The process of converting ciphertext into plaintext is called ____.
answer
decryption
question
A ____ is a procedure for encrypting or decrypting a message.
answer
cryptographic algorithm
question
A ____ is a word, number, or phrase that must be known to encrypt or decrypt a message.
answer
cryptographic key
question
In ____ key encryption, the key used to encrypt a message is also used to decrypt the message.
answer
symmetric
question
____ encryption uses one key to encrypt a message but another key to decrypt the message.
answer
public key
question
____ is a crucial technology for e-commerce and e-mail.
answer
public key encryption
question
With PGP, you send the private key to ____.
answer
no one
question
Thomas's friend has asked that the network be configured such that, if he has photos on his tablet computer and wants to transfer them to his desktop computer, he can do so easily. What capability is Thomas's friend looking for?
answer
file sharing
question
Thomas's friend has a particular folder into which he wants to allow people to put files without allowing them to open, copy, or change any files in that folder. What kind of permission should Thomas assign to this folder?
answer
write only
question
Thomas's friend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it. What kind of permission should Thomas assign to this file?
answer
read
question
Esteban's router has no screen or keyboard of its own so the easiest way for him to access the router's configuration software is for him to make this connection with a(n) ____.
answer
Ethernet cable
question
As part of your research, you find that the longer the key, the longer it will take a devious competitor to crack the code. You also find that most encryption today uses a ____ key, and so you decide to use an encryption key of that size.
answer
128-bit
question
A(n) ____________________ is any device that contains network circuitry to directly connect to a network.
answer
NETWORKED PERIPHERAL
question
A(n) ____________________ is a connection point on a network.
answer
NODE
question
If a network interface card is not built into the main system board of a computer, it can be added to a slot in the system board or to a(n) ____________________ port.
answer
USB
question
A communications ____________________, or link, is a physical path or a frequency used for signal transmission.
answer
CHANNEL
question
High-bandwidth communications systems are sometimes referred to as ____________________.
answer
BROADBAND
question
Transmission signals can be disrupted by interference called ____________________, which has the potential to corrupt data.
answer
NOISE
question
A(n) ____________________ is a parcel of data that is sent across a computer network.
answer
PACKET
question
____________________ switching essentially establishes a private link between one telephone and another for the duration of a call.
answer
CIRCUIT
question
A(n) ____________________ address is a series of numbers, such as 204.127.55.1, used to identify a network device.
answer
IP
question
Most wireless networks transport data using ____________________ signals.
answer
RF
question
For a typical home network, all that's needed in terms of network equipment is a wireless ____________________ that includes an Ethernet switch and Internet gateway.
answer
ROUTER
question
A(n) ____________________ is the name of a wireless network.
answer
SSID
question
File ____________________ allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored.
answer
SHARING
question
The wave on the bottom in the accompanying figure depicts a digital signal.
answer
false
question
The wave on the top in the accompanying figure depicts an analog signal.
answer
false
question
In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit.
answer
false
question
In the accompanying figure, the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.
answer
true
question
In the accompanying figure, the item on the left can be used with a laptop or desktop computer.
answer
true
question
In the accompanying figure, the networks that don't have an icon of a lock next to them aren't secured, and are open targets for hackers to steal data, spread viruses, and create a launching pad for spam.
answer
true
question
When network discovery is turned on in a wireless network, any Wi-Fi enabled device within range of your network, such as the one shown in the accompanying figure, can see its URL.
answer
false
question
In the accompanying figure, the lock icon indicates a network secured with wired encryption.
answer
false
question
In the accompanying figure, IWC-guest is a(n) secure network.
answer
false
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New