Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Engineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
C++ Programming: Program Design Including Data Structures
7th EditionD. S. Malik
867 solutions
Upgrade to remove ads
Only A$47.99/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (47)
Network
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
Ease of maintenance and administration
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?
Network
A ________ allows multiple users to connect to the Internet through one connection.
Client/server
________ networks contain servers as well as computers that individual users access
and use.
Peer-to-peer
In a(n) ________ network, each node connected to the network communicates directly with every other node.
10
P2P networks become difficult to manage when they are expanded beyond ________ users
Pan
A ________ is a network used by one person connected via wireless media.
Vpn
A ________ uses the public Internet communications infrastructure to build a secure, private network.
intranet
A(n) ________ is used exclusively within a corporation or organization.
authentication
A(n) ________ server tracks who is logging on to the network as well as which
services on the network
are available to each user.
All networks require at least two servers
Which of the following is FALSE about servers?
Files
A(n) ________ server is a server that stores and manages files for network users.
Queue
A print server uses a print ________ as a software holding area for printing jobs
Application
When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer.
Cluster
Which of the following is NOT a common network topology?
Protocol
A ________ is a set of rules for how information and communication are exchanged.
Token
Ring networks use the ________ method to avoid data collisions
Terminator
The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is
not
reflected back onto parts of the network that have already received the signal.
Bis
Which of the following networks is most known for data collisions?
Token
A _____ is passed from computer to computer around the ring of a ring topology network.
Star
Which of the following is the most commonly used client/server network topology?
Switch
The star topology uses a central ________ to connect all network nodes.
Ring
If fair allocation of network access is a major requirement of the network, choose a(n)
________ topology.
A method used to avoid data collisions
What is CSMA/CD?
Jam
In a network that uses the star topology, the signal that is sent to indicate a signal collision is
called a ________ signal.
Hybrid
A ________ topology is created when more than one topology is used to build a network.
Star
Which of the following networks has high scalability?
Duplex
For business networks, which of the following is NOT a main cable type?
Cable diameter
Which of the following is NOT a factor to consider when selecting network
cabling?
Emi
Which of the following causes interference when a cable is exposed to strong electromagnetic fields?
Fiber-optic
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Cladding
________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection.
Fiber optic
Which cable type is the most costly to install?
Electromagnetic
________ interference is a type of signal interference in wired transmission
media that can be caused by fluorescent lights or machinery with motors or
transformers.
HyperText transfer protocol
Which is NOT a networking protocol?
Network operating system
A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
(It verifies that all information transmitted from the computer is correctly received by the)
Which of the following is something a network adapter does NOT do?
Ethernet
The standard communications protocol used on most client/server networks is ______.
Media access control
What is another name for the physical
address assigned to each
network adapter?
IP
A(n) ________ address is the address external entities use to communicate with your network.
Bridge
Which of the following devices sends data from one collision domain to another?
Routers
________ are devices used to send data between two networks.
Firewall
A ________ keeps your computer safe by confirming who is trying to access it.
Routers
________ are often equipped to act as hardware firewalls.
Screening
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
Bastion host
A(n) ________ server is a heavily secured server located on a special perimeter network between a company's secure internal network and its firewall.
Biometric
Facial recognition is an example of ________ authentication.
Sets with similar termsIntro to computers Ch 12
47 terms
M_Shelton
TIA Chapter 12 Exam
44 terms
tseward
Ch 12
45 terms
kathrynoliva
MISY chapter 12
29 terms
jljacob
Sets found in the same folderCHAPTER 12
95 terms
coleen1347
CHAPTER 13
93 terms
coleen1347
Technology in Action Chapter 12
212 terms
sarah_koch2
tech 7
46 terms
kymdunca
Other sets by this creatorChapter 13
40 terms
novelhellsing
Chapter 11 (notes 1)
54 terms
novelhellsing
Verified questions
COMPUTER SCIENCE
Recall, in our discussion of the Church–Turing thesis, that we introduced the language $D=\{\langle p\rangle | p$ is a polynomial in several variables having an integral root}. We stated, but didn’t prove, that D is undecidable. In this problem, you are to prove a different property of D-namely, that D is NP-hard. A problem is NP-hard if all problems in NP are polynomial time reducible to it, even though it may not be in NP itself. So you must show that all problems in NP are polynomial time reducible to D.
Verified answer
COMPUTER SCIENCE
The RC 4000 system, among others, has defined a tree of processes (called a process tree) such that all the descendants of a process can be given resources (objects) and access rights by their ancestors only Thus, a descendant can never have the ability to do anything that its ancestors cannot do. The root of the tree is the operating system, which has the ability to do anything. Assume that the set of access rights is represented by an access matrix, A. A(x, y) defines the access rights of process x to object y. If x is a descendant of z, what is the relationship between A(x, y) and Z(z, y) for an arbitrary object y?
Verified answer
COMPUTER SCIENCE
Device that reads and writes on a hard disk
Verified answer
COMPUTER SCIENCE
True/False: Python does not allow the input of multiple values with a single statement.
Verified answer
Recommended textbook solutions
Engineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Fundamentals of Database Systems
6th EditionRamez Elmasri, Shamkant B. Navathe
596 solutions
C Programming: A Modern Approach
2nd EditionK N King
495 solutions
C++ Programming: From Problem Analysis to Program Design
7th EditionD. S. Malik
835 solutions
Other Quizlet setsUnit 3 Review - Bio
208 terms
kkondelis20
NUR 125 Maternity and Newborn Medications
50 terms
bchu224
OT Midterm
58 terms
kayleenvd
Economics Exam Module 3
11 terms
erindempsey06
Related questionsQUESTION
An aggregation switch can be placed between a router and multiple switches on the network if a router doesn't have sufficient number of physical ports to establish communication links with all the switches used on the network.
15 answers
QUESTION
In PGP, confidentiality procedures are applied first, then authentication procedures. (T or F)
3 answers
QUESTION
Printer, IP phone, Server, tablet computer. End devices form the interface between users and the underlying communication network.
2 answers
QUESTION
List the characteristics of a projector
2 answers