Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only A$47.99/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (45)
This device enables connectivity between two LANS or a LAN and a larger network
Network gateway
Organizations use the following to allow suppliers and others limited access to their networks
Intranets
Extranets
Firewalls
Proxy
servers
Extranets
The capacity of a communication channel is measured in ____
bandwidth
bit capacity
band rate
data flow
bandwidth
A network gateway can be used to connect the LAN of one office group to the LAN of another office group T/F
True
A service that uses existing phone lines to provide high-speed connections is called ____________
DSL
In a network environment, a client provides resources for the servers T/F
False
Network operation systems (NOS) control and coordinate the activities of all computers and other devices on a network T/F
True
Remote users can connect to an organization's network through this type of secure private connection
VPN
The ________ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes
client
server
switch
gateway
switch
With respect to peer-to-peer network, there is an abundant amount of powerful management software that monitors the network activities T/F
False
_______________ is the process of breaking down information sent or transmitted across the internet into small parts
Packetization
Fiber-optic cable transmits data as pulses of light through tiny tubes of glass T/F
True
WiMax stands for _____
Wide-area Access for Maximum Reach
Wide-area Range to Maximize Access
Worldwide Interoperability for Microwave Access
Worldwide Access to Maximize Interoperability
Worldwide Interoperability for Microwave Access
The client/server network strategy can handle very large networks efficiently T/F
True
In a communication system, which among the following convert messages into packets that can travel across the communication channel?
Connection devices
Standard telephone lines use coaxial cables T/F
False
Intrusion detection systems can recognize signs of a network attack and disable access before an intruder can do damage T/F
True
Every computer on the Internet has a unique numeric address called a(n) _________
domain address
protocol address
IP address
Web address
IP address
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet
DNS
TCP/IP
FTP
HTTPs
TCP/IP
This type of network topology does not use a specific physical layout
Mesh
A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university
Hotspot
NIC
Blindspot
Gateway
Hotspot
TCP/IP protocol involves identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet T/F
True
All communications between a company's internal networks and the outside world pass through this server
Base station
Node
Supercomputer
Proxy
Proxy
WANs are widely used by organizations to link personal computers and to share printers and other resources T/F
False
A MAN is a network that is frequently used as links between office buildings that are located throughout a city
True
In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host T/F
False
A network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other subordinate nodes
Star
Bus
Mesh
Tree
Tree
Modulation is the name of the process of converting from digital to analog T/F
True
Microwave communication uses high-frequency _________
radio waves
infrared
satellite communications
optic fibers
radio waves
Which among the following is considered a line-of-sight communication medium?
Microwave
In a computer network, this node that requests and uses resources available from other nodes
Client
Server
Directory server
Host
Client
Cellular services use _____ to provide wireless connectivity to the Internet.
ADSL
T1 and T3 cellular networks
DSL
3G and 4G cellular networks
3G and 4G cellular networks
Packetization refers to breaking information into small parts for transmission across the Internet T/F
True
In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?
Sending and receiving devices
Which physical connection is the fastest?
Fiber-optic cable
The most common standard in LANs is called Ethernet T/F
True
The GPS device in an automobile uses which communication channel?
Infrared
Radio Frequency (RF)
Microwave
Satellite
Satellite
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer
Broadband
A firewall is a specialized technology designed to protect an organization's network against external threats T/F
True
__________ is a term relating to sending data to a satellite
Uplink
A prototype is a set of communication rules for the exchange of information T/F
False
One of the most dramatic changes in connectivity and communications in the past few years has been ______________
widespread use of mobile devices with wireless
Internet connectivity
chat rooms
satellite uplinks
running programs on remote computers
widespread use of mobile devices with wireless internet connectivity
Connection devices are the actual connecting or transmission medium that carries the message T/F
False
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network
Peer-to-peer
Client/server
BitTorrent
Personal Area Network
Client/server
Network architecture describes how a computer network is configured and what topologies and strategies are employed T/F
True
Sets with similar termsCh 8
30 terms
castaneda97
intro to computer ch 8
26 terms
Genavieve_Alapi
Quiz 9, Comms
26 terms
lina_m__rico
Chapter 8: Communications and Networks
45 terms
emtimms
Sets found in the same folderComputer Essentials 5
50 terms
d_1pp
Computer Essentials 4
45 terms
Sanam_Malik
chapter 7
41 terms
bluefish22
Computer Essentials 1
46 terms
arlenehaig
Other sets by this creatorCIS3050 Ch 10
31 terms
shirleydauz
CIS 3050 CH 1-2
37 terms
shirleydauz
CIS 3500 Ch 21-30
160 terms
shirleydauz
CIS 3500 CH 11-20
159 terms
shirleydauz
Verified questions
COMPUTER SCIENCE
Prove that every diagonal element of a symmetric positive-definite matrix is positive.
Verified answer
COMPUTER SCIENCE
What manages caching in Windows? How is the cache managed?
Verified answer
COMPUTER SCIENCE
Computers can only execute programs that are written in __________. a. Java b. assembly language c. machine language d. Python
Verified answer
COMPUTER SCIENCE
In a mixed-type expression involving ints and floats, Python will convert a) floats to ints b) ints to strings c) floats and ints to strings d) ints to floats
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Other Quizlet setsAdult DMV Test #2 ✅
36 terms
phanni3
AP European History General Review
83 terms
wesker2924
Core 5/6 It's Your World Vocab. Ch. 3 & 8
34 terms
pdflashcardfactory
Chapter 2.1: Sensation vs. Perception
21 terms
KimberToTheTop
Related questionsQUESTION
As a service characteristic, heterogeneity refers to:
11 answers
QUESTION
15: What does it mean to CRUD your data?
2 answers
QUESTION
Once a bluetooth establishes a connection that connection is called?
5 answers
QUESTION
You configured a CloudWatch alarm to monitor CPU utilization for an EC2 instance. The alarm began in the INSUFFICIENT_DATA state and then entered the ALARM state. What can you conclude from this?
2 answers