logo image

Chapter 12 notes

A ________ is a group of two or more computers, or nodes, configured to share information and resources.
Ease of maintenance and administration
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?
A ________ allows multiple users to connect to the Internet through one connection.
________ networks contain servers as well as computers that individual users access
and use.
In a(n) ________ network, each node connected to the network communicates directly with every other node.
P2P networks become difficult to manage when they are expanded beyond ________ users
A ________ is a network used by one person connected via wireless media.
A ________ uses the public Internet communications infrastructure to build a secure, private network.
A(n) ________ is used exclusively within a corporation or organization.
A(n) ________ server tracks who is logging on to the network as well as which
services on the network are available to each user.
All networks require at least two servers
Which of the following is FALSE about servers?
A(n) ________ server is a server that stores and manages files for network users.
A print server uses a print ________ as a software holding area for printing jobs
When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer.
Which of the following is NOT a common network topology?
A ________ is a set of rules for how information and communication are exchanged.
Ring networks use the ________ method to avoid data collisions
The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is
not reflected back onto parts of the network that have already received the signal.
Which of the following networks is most known for data collisions?
A _____ is passed from computer to computer around the ring of a ring topology network.
Which of the following is the most commonly used client/server network topology?
The star topology uses a central ________ to connect all network nodes.
If fair allocation of network access is a major requirement of the network, choose a(n)
________ topology.
A method used to avoid data collisions
What is CSMA/CD?
In a network that uses the star topology, the signal that is sent to indicate a signal collision is
called a ________ signal.
A ________ topology is created when more than one topology is used to build a network.
Which of the following networks has high scalability?
For business networks, which of the following is NOT a main cable type?
Cable diameter
Which of the following is NOT a factor to consider when selecting network
Which of the following causes interference when a cable is exposed to strong electromagnetic fields?
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection.
Fiber optic
Which cable type is the most costly to install?
________ interference is a type of signal interference in wired transmission
media that can be caused by fluorescent lights or machinery with motors or transformers.
HyperText transfer protocol
Which is NOT a networking protocol?
Network operating system
A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
(It verifies that all information transmitted from the computer is correctly received by the)
Which of the following is something a network adapter does NOT do?
The standard communications protocol used on most client/server networks is ______.
Media access control
What is another name for the physical address assigned to each
network adapter?
A(n) ________ address is the address external entities use to communicate with your network.
Which of the following devices sends data from one collision domain to another?
________ are devices used to send data between two networks.
A ________ keeps your computer safe by confirming who is trying to access it.
________ are often equipped to act as hardware firewalls.
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
Bastion host
A(n) ________ server is a heavily secured server located on a special perimeter network between a company’s secure internal network and its firewall.
Facial recognition is an example of ________ authentication.

Need essay sample on "Chapter 12 notes"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy