Which cable type is the most costly to install?
What do you call a group of data packets that are sent together?
A(n) ________ server acts as a liaison between an intranet and the Internet.
The Institute of Electrical and Electronics Engineers (IEEE) standard for WiFi is the ________ standard.
Client/server networks are said to be ________, in that many tasks can be carried out on the server.
________ networks do not require a dedicated server.
The Open Systems Interconnection (OSI) model provides the protocol guidelines for all modern networks and has ________ layers.
A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
network operating system
A(n) ________ address is the address external entities use to communicate with your network.
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?
Which of the following devices are used to send data between two networks?
________ cable is NOT subject to EMI (electromagnetic interference) and RFI (radio frequency interference).
A ________ allows multiple users to connect to the Internet through one connection.
For added security, a ________ server can be used as a go-between for internal network computers and an external network (the Internet).
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
Which topology connects all computers in sequence on a single cable?
A ________ topology is created when more than one topology is used to build a network.
A ________ is a set of rules that defines how information is exchanged on a network.
________ networks do not need specialized network operating system software.
________ cable contains a glass or plastic core.
________ topology refers to the physical or logical arrangement of computers, transmission media (cable), and other network components.
Each type of cable used in a network has a maximum ________ over which signals sent across it can be "heard" by devices connected to it.
In a peer-to-peer network, security can be handled by the server.
An authentication server keeps track of who is logging on to the network and which services on the network are available to each user.
Each network computer requires a network adapter to enable it to communicate on a network.