VT chapter 9
Terms in this set (25)
P2P networks are normally found in ________.
Each computer is considered equal in a ________ network.
Peer to peer
Which of the following statements about P2P networks is FALSE?
The services and security are centralized
________ network is a network in which all computers are considered equal.
Peer to peer
________ network is one that has at least one computer that provides centralized management, resources, and security.
For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________.
In a WLAN, devices are connected by ________.
To connect peripherals at short ranges, you would use the ________ wireless technology.
One of the most important reasons for Ethernet standards is it ________.
assures equipment from different manufacturers is compatible
Which of the following transmission media is NOT used to transmit signals on an Ethernet network?
A ________ is a device that connects two or more networks together.
Which of the following is NOT a common LAN topology?
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.
Network speeds are measured in ________ per second.
Wi-Fi networks used in homes and public hotspots use the ________.
IEEE 802.11 standards
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
A ________ is a device that connects multiple devices on a LAN.
Most home routers also include a built-in ________
A ________ can be set by an employer to prevent you from accessing eBay
A ________ is a network composed of a group of clients and servers under the control of one central security database.
The rules for communication between devices are called ________.
The ________ protocol resolves the domain name amazon.com to an IP address.
When you decide to use your neighbor's open wireless network without permission, you are ________.
Moving through a neighborhood trying to locate open wireless access points is called ______
YOU MIGHT ALSO LIKE...
Chapter 9: Networks and Communication
decision support systems vis tech CH 9 - final study guide
ITSC Ch. 9 Quiz
Computers CIS 120 - C12 Quiz
OTHER SETS BY THIS CREATOR
Spmg-human resource management
Spmg-leadership and motivation
Spmg-managing organizational communications
THIS SET IS OFTEN IN FOLDERS WITH...
VT chapter 6
VT chapter 7
VT chapter 12
excel ch 3