Chapter 8 - Networking

78 terms by anamaria_ 

Create a new folder

Advertisement Upgrade to remove ads

Network operating systems are essential if the network is going to allow multiple users to share resources.

True

Users cannot interact directly with the operating system through a shell.

False

In reality, a multitasking operating system runs only one program at a time.

True

The resources that a network operating system must manage typically include one or more network servers.

True

A network operating system does not perform network support functions.

False

Microsoft Windows 7 is an example of a desktop operating system.

True

NetWare 6 was the last version of Novell's network operating system.

True

A bindery contains the data that pertains only to the server it resides in.

True

The design of a tree should ideally be similar to a pyramid.

True

NetWare 5 dropped the NDS distributed database of network resources.

False

Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing.

True

It is not possible to create a Windows Server network with multiple domains.

False

Unlike NetWare's NDS, Active Directory creates a hierarchical structure of resources.

False

Unix is often found with a text-based interface, although graphical user interfaces are available.

True

Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language.

False

Unix runs on the widest variety of hardware of any network operating system.

True

Linux shares many of the same advantages and disadvantages of Unix.

True

Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers.

False

Mac OS X Server is based on the Unix concept.

True

A network operating system needs a host machine from which to operate.

True

Network servers only include mainframe computers.

False

Many of the higher-power network servers support not one but multiple processors.

True

A network server requires at least three connections to the network in the form of a network interface card.

False

When peer-to-peer networks first appeared roughly 30 years ago, they were serverless networks.

True

Recently, business and home computer users have been victims of another type of intrusion from unscrupulous outsiders—spyware.

True

Wireless sniffers cannot detect how far wireless signals reach.

False

Browsers allow users to download and view World Wide Web pages.

True

When a software package is installed on a multiuser system, it is not possible for multiple users to execute multiple copies of the single program.

False

Every software company may create its own brand of user licenses and may name them something unique.

True

"Wireless Ethernet" is a local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations.

True

Wireless local area networks are typically found in seven basic configurations.

False

In the wireless LAN ad hoc layout configuration, each user device communicates directly with the other user devices.

True

The ____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer.
a. print server
b. operating system
c. file server
d. user system

operating system

A modern operating system must provide various levels of operating system ____, including directory and file security, memory security, and resource security.
a. size
b. memory
c. security
d. space

security

A(n) ____ sends messages to applications, an interactive user, or a system operator about the status of the current operation.
a. operating system
b. router
c. hub
d. switch

operating system

Popular operating systems for microcomputers include Mac OS X, ____, Linux, and the various forms of Windows XP/Vista/7.
a. OS/390
b. AS/400
c. DEC's VMS
d. Unix

Unix

The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals.
a. network
b. file
c. print
d. operating system

network

A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
a. print
b. network
c. file
d. memory

network

____ was founded in 1983 and was one of the first developers of network operating systems.
a. Compaq
b. HP
c. Novell
d. Gateway

Novell

____ is an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network.
a. NetWare Directory Services (NDS)
b. Active Directory
c. LDAP
d. X.509

NetWare Directory Services (NDS)

An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user.
a. login process
b. logout process
c. user interface
d. loading process

user interface

The ____ network operating systems were the first to perform redirection on a local area network.
a. Linux
b. Unix
c. Windows NT
d. Novell

Novell

The first version of NetWare to gain widespread popularity was ____.
a. Version 1
b. Version 3
c. Version 5
d. Version 6

Version 3

One of NetWare Version 3's main features is the ____.
a. bindery
b. LDAP
c. X.509
d. iPrint

bindery

The ____ of NetWare version 3 holds information about other services provided by the server to the client, such as printer, modem, and switch/router access information.
a. iPrint
b. iClient
c. Remote Manager
d. bindery

bindery

NetWare ____ introduced NetWare Directory Services (NDS).
a. Version 2
b. Version 3
c. Version 4
d. Version 6

Version 4

NDS is based on a well-known standard for directory services called ____.
a. X.300
b. X.500
c. X.600
d. X.700

X.500

On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser.
a. NetWare 3
b. NetWare 4
c. NetWare 5
d. NetWare 6

NetWare 6

NetWare ____ server gives any authorized client anywhere on the Internet the ability to print and use storage services.
a. 3
b. 4
c. 5
d. 6

6

First released in August 1996, Windows ____ contained a number of significant features that quickly made it a serious competitor in the network operating system market.
a. 2000
b. NT Version 4
c. Me
d. XP

NT Version 4

Windows ____, released in the year 2000, was the next generation of the Windows NT operating system and represented a significant improvement over the earlier versions of NT.
a. Me
b. XP
c. Server 2000
d. Server 2000N

Server 2000

Windows Server 2000 incorporated Microsoft's answer to the highly popular NetWare NDS directory system: ____.
a. inode
b. X.509
c. iPrint
d. Active Directory

Active Directory

Active Directory is built around the ____.
a. X.500 standard
b. Lightweight Directory Access Protocol (LDAP)
c. 802.11 protocol
d. Ethernet standard

Lightweight Directory Access Protocol (LDAP)

The most recent version of the Windows network operating system is Windows ____.
a. XP
b. 2000
c. 2003
d. 2008

2008

____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers.
a. Unix
b. Linux
c. Windows Me
d. Windows 95

Unix

To protect the server from catastrophic disk failure, the disk drives on most network servers support one of the ____ techniques.
a. Lightweight Directory Access Protocol (LDAP)
b. IDE
c. redundant array of independent disks (RAID)
d. USB

redundant array of independent disks (RAID)

____ technique is also known as disk mirroring.
a. RAID-0
b. RAID-1
c. RAID-3
d. RAID-5

RAID-1

A ____ is a server that has no cabinet or box, but resides on a single printed circuit card.
a. peer-to-peer server
b. server appliance
c. server blade
d. print server

server blade

____ software is designed to detect and remove viruses that have infected your memory, disks, or operating system.
a. Antivirus
b. Remote access
c. Uninstall
d. Backup

Antivirus

____ software is used to block unwanted e-mail and is available at many levels.
a. Antivirus
b. Network-monitoring
c. Crash protection
d. Antispam

Antispam

____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive.
a. Antispam
b. Antispyware
c. Crash protection
d. Backup

Antispyware

The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit.
a. antivirus
b. network monitoring
c. sniffer
d. crash protection

crash protection

____ software incorporates a fairly large number of network support tools.
a. Network-monitoring
b. Crash protection
c. Antispam
d. Backup

Network-monitoring

____ software allows a user to access all of the possible functions of a personal computer workstation from a mobile or remote location.
a. Network monitoring
b. Sniffer
c. Remote access
d. Antispyware

Remote access

____ software works with the user to locate and remove applications that are no longer desired.
a. Uninstall
b. Backup
c. Remote access
d. Network monitoring

Uninstall

____ software is the application or set of programs that stores Web pages and allows browsers from anywhere in the world to access those Web pages.
a. Remote access
b. Network monitoring
c. Web server
d. Antivirus

Web server

Under the terms of the ____ license, the software package may be installed on a single machine, and then only a single user at one time may be using that machine.
a. interactive user
b. single-user-single-station
c. site
d. network server

single-user-single-station

A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home.
a. single-user-single-station
b. interactive user
c. site
d. single-user-multiple-station

single-user-multiple-station

With a system-based or ____ license, there is rarely a software counter controlling the current number of users.
a. network server
b. interactive user
c. site
d. corporate

network server

A ____ license allows a software package to be installed on any and all workstations and servers at a given site.
a. network server
b. site
c. corporate
d. single-user-multiple-station

network server

A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites.
a. site
b. network server
c. corporate
d. single-user-single-station

corporate

A(n) ____ is a valuable device in the event of a power failure.
a. media converter
b. Blu-Ray DVD
c. thin client
d. uninterruptible power supply (UPS)

uninterruptible power supply (UPS)

A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____.
a. FDDI
b. wireless LAN
c. token ring
d. MAU

wireless LAN

The ____ is essentially the interface device between the wireless user device and the wired local area network.
a. wireless server
b. wireless workstation
c. NIC
d. access point

access point

In the ____ layout configuration, multiple cells are supported by multiple access points, as in a cellular telephone network.
a. extended service set
b. basic service set
c. one-cell
d. unique-cell

extended service set

The wireless LAN term for a collection of multiple Basic Service Sets is ____.
a. Multiple Service Set (MSS)
b. Basic Service Set (BSS)
c. Extended Service Set (ESS)
d. Complex Service Set (CSS)

Extended Service Set (ESS)

In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
a. peer-to-peer
b. multiple-cell
c. single-cell
d. random-cell

peer-to-peer

In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____.
a. free space (FS)
b. frame time (FT)
c. interframe space (IFS)
d. intraframe time (IFT)

interframe space (IFS)

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set