Organizations use the following to allow suppliers and others limited access to their networks.

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only A$47.99/year

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (45)

This device enables connectivity between two LANS or a LAN and a larger network

Network gateway

Organizations use the following to allow suppliers and others limited access to their networks

Intranets
Extranets
Firewalls
Proxy servers

Extranets

The capacity of a communication channel is measured in ____

bandwidth
bit capacity
band rate
data flow

bandwidth

A network gateway can be used to connect the LAN of one office group to the LAN of another office group T/F

True

A service that uses existing phone lines to provide high-speed connections is called ____________

DSL

In a network environment, a client provides resources for the servers T/F

False

Network operation systems (NOS) control and coordinate the activities of all computers and other devices on a network T/F

True

Remote users can connect to an organization's network through this type of secure private connection

VPN

The ________ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes

client
server
switch
gateway

switch

With respect to peer-to-peer network, there is an abundant amount of powerful management software that monitors the network activities T/F

False

_______________ is the process of breaking down information sent or transmitted across the internet into small parts

Packetization

Fiber-optic cable transmits data as pulses of light through tiny tubes of glass T/F

True

WiMax stands for _____

Wide-area Access for Maximum Reach
Wide-area Range to Maximize Access
Worldwide Interoperability for Microwave Access
Worldwide Access to Maximize Interoperability

Worldwide Interoperability for Microwave Access

The client/server network strategy can handle very large networks efficiently T/F

True

In a communication system, which among the following convert messages into packets that can travel across the communication channel?

Connection devices

Standard telephone lines use coaxial cables T/F

False

Intrusion detection systems can recognize signs of a network attack and disable access before an intruder can do damage T/F

True

Every computer on the Internet has a unique numeric address called a(n) _________

domain address
protocol address
IP address
Web address

IP address

The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet

DNS
TCP/IP
FTP
HTTPs

TCP/IP

This type of network topology does not use a specific physical layout

Mesh

A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university

Hotspot
NIC
Blindspot
Gateway

Hotspot

TCP/IP protocol involves identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet T/F

True

All communications between a company's internal networks and the outside world pass through this server

Base station
Node
Supercomputer
Proxy

Proxy

WANs are widely used by organizations to link personal computers and to share printers and other resources T/F

False

A MAN is a network that is frequently used as links between office buildings that are located throughout a city

True

In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host T/F

False

A network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other subordinate nodes

Star
Bus
Mesh
Tree

Tree

Modulation is the name of the process of converting from digital to analog T/F

True

Microwave communication uses high-frequency _________

radio waves
infrared
satellite communications
optic fibers

radio waves

Which among the following is considered a line-of-sight communication medium?

Microwave

In a computer network, this node that requests and uses resources available from other nodes

Client
Server
Directory server
Host

Client

Cellular services use _____ to provide wireless connectivity to the Internet.

ADSL
T1 and T3 cellular networks
DSL
3G and 4G cellular networks

3G and 4G cellular networks

Packetization refers to breaking information into small parts for transmission across the Internet T/F

True

In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?

Sending and receiving devices

Which physical connection is the fastest?

Fiber-optic cable

The most common standard in LANs is called Ethernet T/F

True

The GPS device in an automobile uses which communication channel?

Infrared
Radio Frequency (RF)
Microwave
Satellite

Satellite

Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer

Broadband

A firewall is a specialized technology designed to protect an organization's network against external threats T/F

True

__________ is a term relating to sending data to a satellite

Uplink

A prototype is a set of communication rules for the exchange of information T/F

False

One of the most dramatic changes in connectivity and communications in the past few years has been ______________

widespread use of mobile devices with wireless
Internet connectivity
chat rooms
satellite uplinks
running programs on remote computers

widespread use of mobile devices with wireless internet connectivity

Connection devices are the actual connecting or transmission medium that carries the message T/F

False

This type of network strategy uses central servers to coordinate and supply services to other nodes on the network

Peer-to-peer
Client/server
BitTorrent
Personal Area Network

Client/server

Network architecture describes how a computer network is configured and what topologies and strategies are employed T/F

True

Sets with similar terms

Ch 8

30 terms

castaneda97

intro to computer ch 8

26 terms

Genavieve_Alapi

Quiz 9, Comms

26 terms

lina_m__rico

Chapter 8: Communications and Networks

45 terms

emtimms

Sets found in the same folder

Computer Essentials 5

50 terms

d_1pp

Computer Essentials 4

45 terms

Sanam_Malik

chapter 7

41 terms

bluefish22

Computer Essentials 1

46 terms

arlenehaig

Other sets by this creator

CIS3050 Ch 10

31 terms

shirleydauz

CIS 3050 CH 1-2

37 terms

shirleydauz

CIS 3500 Ch 21-30

160 terms

shirleydauz

CIS 3500 CH 11-20

159 terms

shirleydauz

Verified questions

COMPUTER SCIENCE

Prove that every diagonal element of a symmetric positive-definite matrix is positive.

Verified answer

COMPUTER SCIENCE

What manages caching in Windows? How is the cache managed?

Verified answer

COMPUTER SCIENCE

Computers can only execute programs that are written in __________. a. Java b. assembly language c. machine language d. Python

Verified answer

COMPUTER SCIENCE

In a mixed-type expression involving ints and floats, Python will convert a) floats to ints b) ints to strings c) floats and ints to strings d) ints to floats

Verified answer

Recommended textbook solutions

Organizations use the following to allow suppliers and others limited access to their networks.

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Organizations use the following to allow suppliers and others limited access to their networks.

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Organizations use the following to allow suppliers and others limited access to their networks.

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Organizations use the following to allow suppliers and others limited access to their networks.

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

Adult DMV Test #2 ✅

36 terms

phanni3

AP European History General Review

83 terms

wesker2924

Core 5/6 It's Your World Vocab. Ch. 3 & 8

34 terms

pdflashcardfactory

Chapter 2.1: Sensation vs. Perception

21 terms

KimberToTheTop

Related questions

QUESTION

As a service characteristic, heterogeneity refers to:

11 answers

QUESTION

15: What does it mean to CRUD your data?

2 answers

QUESTION

Once a bluetooth establishes a connection that connection is called?

5 answers

QUESTION

You configured a CloudWatch alarm to monitor CPU utilization for an EC2 instance. The alarm began in the INSUFFICIENT_DATA state and then entered the ALARM state. What can you conclude from this?

2 answers

What provides access to resources and services in a client server network?

In client/server networks, users store their files on a central computer from which files are accessed directly. In the client/server network, the server is the central computer that stores the information, and the client is the computer (and user) that accesses the information from that central computer.

What network system uses central servers to coordinate and supply services to other nodes on the network?

A MAN is a network that is frequently used as links between office buildings that are located throughout a city. Standard telephone lines use coaxial cables. This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.

Is a private network within an organization?

An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees. An intranet can also be used for working in groups and teleconferences. Intranets encourage communication within an organization.

What do cellular services use to provide wireless connectivity to the Internet for smartphones?

WiFi uses radio waves to provide high-speed internet access to mobile devices and allows wireless communication between the connected devices. Cellular uses cell phone towers to enable mobile device communication and provide internet access but requires a data plan attached to the device.