A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. networkWhich transmission medium transmits data the fastest? Fiber-optic cableNormal telephone cable is a type of ________. twisted-pair cableA client/server network is an example of ________ administrationcentralA peer-to-peer (P2P) network is an example of ________ administration. localThe fastest version of wireless Ethernet is ________. 802. 11 acWhich of the following is NOT a type of cable used in wired networks? Unshielded coaxialWhich of the following is NOT a type of UTP cable you would use in a wired Ethernet network? Cat 7BThe most popular transmission media option for wired home Ethernet networks is ________ cable. unshielded twisted-pair UTPWireless network devices use ________ to communicate with each other. radio wavesFor the nodes on a network to communicate with each other and access the network, each node needs a ________. network adapterA ________ is a device connected to a network such as a printer or a game console. nodeOn a network, a(n) ________ helps prevent data packets from colliding with each other. switchSophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? Routers and switchesTo transfer data packets between two or more networks, a ________ is used. routerData are sent through a network in bundles called ________. packetsAll of the following operating systems support P2P networking EXCEPT ________. UnixClient/server networks are controlled by a central server that runs specialized software called a(n) ________. network operating system (NOS)Which of the following is NOT a wired broadband Internet connection option? Dial-upA(n) ________ device facilitates file sharing and data backup. NASUsing a network without the network owner’s permission is known as ________. piggybackingAll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. enable SSID broadcast________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. ThroughputThe unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. MACAll of the following are tasks for network administration of a large organization EXCEPT ________. purchasing initial equipment for the networkWhich of the following is NOT used to classify network architectures? Speed of the networkA printer connected to a wireless network is considered to be a node on that network. TrueSharing files is a benefit of a network. TrueIn a peer-to-peer network, one computer acts as the central computer. FalseP2P networks are most commonly used in home networks. True________ is the maximum speed at which data can be transferred between two nodes. BandwidthThe Internet is a WAN. TrueCurrent wired Ethernet networks in the United States are based on the IEEE 802. 11ac standard. FalseEthernet networks are always connected using twisted-pair cable technology. FalseWireless network connections are slower than wired broadband connections. TrueThe most popular transmission media option for wired Ethernet networks is UTP cable. TrueMost computers today come with Ethernet adapters already installed. TrueA router acts like a traffic signal on a network. FalseA P2P network needs network operating system software installed on every node. FalseWireless networks are more vulnerable to attack than wired networks. TrueWEP is a stronger form of security than WPA. FalseA ________ is a network located in your residence that connects to all your digital devices. HANLimiting your signal range does not help increase wireless network security. FalseA network that spans a large physical distance is called a ________. WANA large network designed to provide access to a specific geographic area, such as a large city, is a ________. MAN ONCHAPTER 7- COMPUTER CONCEPTS SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now
This work, titled "Chapter 7- computer concepts" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.
If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.
Request RemovalReferences
AssignBuster. (2022) 'Chapter 7- computer concepts'. 26 September.
Reference
AssignBuster. (2022, September 26). Chapter 7- computer concepts. Retrieved from https://assignbuster.com/chapter-7-computer-concepts/
References
AssignBuster. 2022. "Chapter 7- computer concepts." September 26, 2022. https://assignbuster.com/chapter-7-computer-concepts/.
1. AssignBuster. "Chapter 7- computer concepts." September 26, 2022. https://assignbuster.com/chapter-7-computer-concepts/.
Bibliography
AssignBuster. "Chapter 7- computer concepts." September 26, 2022. https://assignbuster.com/chapter-7-computer-concepts/.
Work Cited
"Chapter 7- computer concepts." AssignBuster, 26 Sept. 2022, assignbuster.com/chapter-7-computer-concepts/.
Please, let us know if you have any ideas on improving Chapter 7- computer concepts, or our service. We will be happy to hear what you think: [email protected]