Sei sulla pagina 1di 127

Module E

Network Basics

Multiple Choice Questions

1. A(n) _____ is two or more computers connected so that they can communicate with
each other and share information, software, peripheral devices, and/or processing
power.

A. OLED

B. computer system

C. network

D. DS3
2. Which of the following is a basic principle that applies to all networks, large or
small?

A. At least one computer on a network must have a network interface that


provides the doorway for all computers for information exchange.

B. One of the computers on the network must act as a connecting device that ties
the other computers together.

C. There must be communications media like cables or radio waves connecting


network hardware devices.

D. At least one computer on the network must have software supporting the
movement of information in and out of the network.

3. Which of the following is NOT typically a component of a home network?

A. An Ethernet network card for each computer on the network

B. Network cables or wireless devices to transmit signals

C. A router that passes messages and information to each computer

D. A computer dedicated to being a database server


4. A _____ is an expansion card for a desktop computer or a PC card for a notebook
computer that connects your computer to a network and provides the doorway for
information to flow in and out.

A. network interface card

B. wireless tether

C. storage card

D. flash memory card

5. Which of the following is the most common type of a network interface card
(NIC)?

A. WAP

B. Cat 5

C. Broadband router

D. Ethernet card

6. An Ethernet card has a(n) _____ jack into which a network or crossover cable can be
plugged.

A. BS 6312

B. FireWire

C. RJ-45

D. USB
7. Which of the following allows you to plug your computer straight into another
computer or printer?

A. Coaxial cable

B. Cat2 cable

C. Crossover cable

D. Straight through cable

8. The _____ cable is a better-constructed version of the phone twisted-pair cable.

A. USB

B. crossover

C. Cat 5

D. optical fiber

9. Which of the following devices allows a computer to use radio waves to access a
network?

A. WAP

B. Cat 5

C. Optical fiber

D. DSL modem
10. Which of the following devices transmits and receives a bidirectional flow of
information through its antenna?

A. Cat 5

B. Dielectric wireless receiver

C. Data server

D. Wireless access point

11. Can your wireless access point connect to a network the same way wired
computers do?

A. Yes, it connects with a cable to the hub or switch

B. Yes, as long as the network hub or switch has an Ethernet card

C. No, not unless the network supports dedicated high speed lines such as T1 or
DS3

D. No, it connects through wireless media

12. If you wanted to wirelessly connect more than one computer to share a cable
Internet service in your home, what would you need?

A. A local home-based server

B. Crossover cables

C. A broadband router

D. A multilayer switch
13. What Windows option do you need to activate to make the files on your computer
available to the other computers on your home network?

A. VPN

B. File-sharing

C. Windows firewall

D. Peer-to-peer networking

14. What network device connects computers together and passes messages by
repeating each computer's transmissions only to the intended recipients?

A. Modem

B. Broadband router

C. Switch

D. Hub

15. What does a switch enable a network to do?

A. Listen to each other's transmissions

B. Repeat messages to other computers so that the messages are not lost

C. Allow computers to have different conversations at the same time

D. Create direct links between separate networks or subnets


16. Which network device sends information privately over the network?

A. Hub

B. Switch

C. Router

D. Virtual connector

17. Which network device connects together separate networks of computers?

A. Hubs

B. Switches

C. Routers

D. Virtual connectors

18. Which network device passes network traffic between smaller subnets of a larger
network?

A. A modem

B. WAP

C. A switch

D. A router
19. While connecting to a larger network, in addition to a router, what network device
do you need to plug a computer into?

A. A jammer

B. A repeater

C. A switch

D. A firewall

20. Which of the following is true of home networks and network components?

A. They do not require a switch.

B. They require at least two routers.

C. They have both a router and a switch.

D. They require a router only if they are wireless.

21. Before you can connect a computer with a router to a network, what must you
do?

A. Connect the router to a hub.

B. Give each computer the router's address.

C. Give the router the address of each computer on the subnets.

D. Replace all Cat 5 cables with crossover cables.


22. Which type of network covers a contiguous geographic area, such as a group of
buildings in close proximity to each other?

A. MAN

B. LAN

C. WAN

D. VPN

23. Which type of network covers a large geographic distance, such as a state, a
country, or even the entire world?

A. WAN

B. MAN

C. VPN

D. LAN

24. Which type of network requires an organization to use some sort of commercial
communications provider?

A. WLAN

B. WAN

C. LAN

D. Intranet
25. _____ is a set of connected networks all within the same city or metropolitan area,
but not in immediate proximity to each other.

A. LAN

B. MAN

C. WAN

D. VPN

26. What is the difference between the terms internet (lower case i) and Internet
(upper case I)?

A. There is no difference, the words are used interchangeably.

B. The term internet is a generic term for a network of networks; Internet refers to
the largest internet.

C. The term internet refers to a network external to an organization; Internet refers


to internal networks.

D. The term internet refers to a network connected by different organizations; the


term Internet refers to the network connected by different individuals.
27. When a local router on the Internet does not recognize a sender of a message as
being attached to one of its LAN, MAN, or WAN connections, it sends the message
over the connection to its ____.

A. main server

B. Internet service provider

C. intrusion detection system

D. virtual private network

28. Computers and routers refer to each other using ____.

A. VPN

B. router IDs

C. network sites

D. IP addresses

29. Where would a computer look up the site location for a computer it needs to send
information to?

A. Yellow Pages

B. VPN directory assistance

C. POP3 server

D. Domain Name System


30. Which of the following terms refers to the capacity of a communications medium
to transfer information in a given amount of time?

A. Bandwidth

B. Transmission size

C. Routing capacity

D. Communication speed

31. A _____ is the smallest possible amount of data.

A. cache

B. byte

C. bit

D. gigabyte

32. A single symbol or letter of text is stored using _____ byte(s).

A. eight

B. one

C. four

D. six
33. How many bits would be required to store the word "bit"?

A. One

B. Three

C. Sixteen

D. Twenty-four

34. How is bandwidth measured?

A. Revolutions per minute (RPM)

B. Megahertz (MHz)

C. Bytes per second (BPS)

D. Bits per second (BPS)

35. How long would it take to transfer a document containing 125,000 characters using
a communications medium with a bandwidth of 2Mbps?

A. Sixty seconds

B. Thirty seconds

C. Half a second

D. One second
36. What type of Internet connection uses an ordinary telephone line and a modem?

A. DSL

B. Cable modem

C. Dedicated high-speed line

D. Dial-up circuit

37. Which of the following communications medium is NOT classified as a broadband


connection?

A. Dial-up

B. DSL

C. Cable modem

D. Dedicated lines

38. What communications device connects your computer to a phone line so that you
can access another computer or network?

A. Conversion box

B. Modem

C. Transmitter

D. Repeater
39. What does a modem do?

A. Transmits infrared signals over a communication channel

B. Transmits, receives, and converts analog signals into digital signals

C. Receives and boosts (strengthens) radio signals

D. Enables private transmissions by encrypting your information before sending it


to the Internet

40. Which type of high-speed Internet circuit is generally used by businesses?

A. T1 and DS3

B. Cable

C. Dial-up

D. DSL

41. Which type of high-speed Internet connection works in a fashion similar to dial-up
modems but allows you to use the telephone at the same time you are using the
Internet?

A. Cable modem

B. Satellite modem

C. DSL

D. T1 or DS3 lines
42. Which type of Internet connection is limited to the distance between you and your
phone company, generally about 3 miles?

A. Dial-up

B. DSL

C. Cable

D. Satellite

43. Which type of Internet connection slows down when more customers or
computers are using it?

A. Dial-up

B. DSL

C. Cable

D. Dedicated high-speed lines

44. Which network technology allows you to send voice calls over the Internet and
avoid toll charges?

A. Wireless access point

B. Voice over IP

C. Voice access point

D. Bluetooth
45. Which type of media transmits information over a closed, connected path?

A. Wireless encrypted communications media

B. Wired communications media

C. Wireless unsecured communications media

D. Satellite transmission media

46. Which of the following is an example of a wired communications medium?

A. Infrared

B. Microwave

C. Optical fiber

D. Satellite

47. Which of the following is an example of a wireless communications medium?

A. Twisted-pair cable

B. Infrared

C. Coaxial cable

D. Optical fiber
48. What type of twisted-pair cabling provides a slow, reliable path for information at
up to 10 Mbps?

A. Cat 3

B. Cat 2

C. Cat 1

D. Cat 1a

49. Which of the following is the most widely used category of twisted-pair cabling
systems for data transfer in today's LANs?

A. Cat 5

B. Cat 4

C. Cat 3

D. Cat 3b

50. Which of the following types of cabling has one central wire surrounded by
insulation, a metallic shield, and a final case of insulating material?

A. Cat 1

B. Optical fiber

C. Twisted-pair

D. Coax
51. Which of the following communications media uses a very thin and flexible glass or
plastic fiber through which pulses of light travel?

A. Cat 5

B. Optical fiber

C. Twisted-pair

D. Coax

52. Which of the following communications media is a type of radio transmission?

A. Cat 3

B. Optical fiber

C. Infrared

D. Microwave

53. Which of the following communications devices receives a radio signal,


strengthens it, and then sends it on?

A. Wi-Fi transmitter

B. Router

C. Repeater

D. Bridge mode
54. What are repeaters that are located in space called?

A. Wi-Fi hotspots

B. Remote repeaters

C. Cat 5

D. Communication satellites

55. _____ means that information can be obtained only by those authorized to access
it.

A. Confidentiality

B. Authenticity

C. Integrity

D. Availability
56. Which of the following is a threat posed to the authenticity of information available
on a network?

A. Network transmissions that can be captured or monitored by unauthorized


individuals

B. Web sites registered at names that are common misspellings of popular sites

C. Network transmissions that can be forged or taken over by unauthorized


individuals

D. Poorly written server software that stops working when presented with unusual
inputs

57. A network failure which makes an e-commerce Web site inaccessible is a threat to
____.

A. confidentiality

B. authenticity

C. integrity

D. availability
58. What software and/or hardware device protects a computer or a network from
intruders?

A. Router

B. Firewall

C. Switch

D. Cookie monitor

59. Which of the following types of network security applications watches the current
network traffic, matching it against lists with characteristics of known attacks?

A. Firewall

B. Intrusion prevention system

C. Real-time adaptive security

D. Proxy server

60. _____ is a security technology that encrypts each network conversation—between


one network client and one server—individually.

A. Secure sockets layer

B. Virtual private network

C. Firewall

D. Modulator-demodulator
61. A(n) _____ uses encryption to protect the confidentiality of all network
transmissions between two endpoints.

A. SSL

B. TLS

C. VAN

D. VPN

62. Which of the following is NOT a type of malware?

A. Firewall

B. Worm

C. Virus

D. Spyware

63. In the context of malware, _____ are programs designed to be controlled by an


attacker to perform unauthorized work over a period of time.

A. bots

B. unauthorized servers

C. routers

D. repeaters
True / False Questions

64. A computer network consists of a minimum of five computers connected to one


another.

True False

65. A network interface card (NIC) is an expansion card that connects your computer
to a network and provides the doorway for information to flow in and out.

True False

66. An Ethernet card uses a standard telephone jack to connect the computer to a
network.

True False

67. A wireless access point is a device that allows computers to access a wired network
using radio waves.

True False

68. A direct link with a satellite is required for setting up a wireless network.

True False
69. In a small office, a broadband router is often used to connect several computers to
a DSL network.

True False

70. Information transferred over switches is generally public unless specified by the
host computer.

True False

71. A switch is a device that connects multiple computers into a network in which
multiple communications links can be in operation simultaneously.

True False

72. A switch can have hundred or more ports to connect computers.

True False

73. Home routers that run your Internet connection usually incorporate both a router
and a switch in the same box.

True False
74. A WAN covers a large geographic distance, such as a state, a country, or even the
entire world.

True False

75. A MAN covers a contiguous geographic area, such as an office, building, or a


group of buildings in close proximity to each other.

True False

76. Bandwidth refers to the capacity, or the amount of information, that can be
transferred through a communications line in a given time.

True False

77. A broadband connection is a high-capacity telecommunications pipeline capable


of providing high-speed Internet service.

True False

78. A dial-up Internet connection is considered a broadband connection with high


bandwidth.

True False
79. A telephone modem is a device that connects your computer to your phone line
so that you can access another computer or network.

True False

80. A DS3 is a dedicated high-speed line which runs on a separate circuit and is
generally used for business connections.

True False

81. You cannot talk on the telephone and surf the Internet simultaneously while using
a DSL connection.

True False

82. A modem is not required while using a cable Internet connection.

True False

83. Wireless communications media transmits information over a closed, connected


path.

True False
84. Coaxial cable has one central wire surrounded by insulation, a metallic shield, and
a final case of insulating material.

True False

85. Infrared is a wireless communications medium that uses light waves to transmit
signals or information.

True False

86. Infrared communications can penetrate walls, buildings, and other structures.

True False

87. Bluetooth is a standard for transmitting information in the form of long-range


radio waves.

True False

88. Wi-Fi is a wireless communication technology that uses red light to send and
receive information.

True False

89. A repeater is a device that receives a radio signal, strengthens it, and sends it on.

True False
90. A firewall consists of both software and/or hardware and protects a computer or
network from intruders.

True False

91. A virtual private network establishes a dedicated network connection between two
or more networks.

True False

92. A virtual private network uses encryption to protect the confidentiality of all
network transmissions between two endpoints.

True False

93. A padlock icon on a Web site tells you that information on the Web site is being
routed through a VPN.

True False

94. A worm is a type of virus.

True False

Fill in the Blank Questions


95. A _____ consists of two or more computers connected so that they can
communicate with each other and share information, software, peripheral devices,
and/or processing power.

________________________________________

96. A _____ must be installed in each computer on the network in order to connect it
to a network.

________________________________________

97. The most common type of network interface card is a(n) ____.

________________________________________

98. A _____ cable is a better-constructed version of the phone twisted-pair cable.

________________________________________

99. A _____ has a transmitter and a receiver for the bidirectional flow of information.

________________________________________
100.A _____ is a network device that connects computers and passes messages by
repeating each computer's transmissions only to the intended recipient, not to all
the connected computers.

________________________________________

101.A _____ is a device that passes network traffic between smaller subnetworks of a
larger network.

________________________________________

102.A network that covers a contiguous geographic area is called a ____.

________________________________________

103.A network that covers a large geographic area where buildings are not in
immediate proximity to each other is called a ____.

________________________________________

104.A network that covers an urban area is called a ____.

________________________________________
105.____, or capacity of the communications medium, is the amount of information
that a communications medium can transfer in a given amount of time.

________________________________________

106.A _____ connection is a high-capacity telecommunications pipeline capable of


providing high-speed Internet service.

________________________________________

107._____ is a high-speed Internet connection using phone lines, which allows you to
use your phone for voice communications at the same time.

________________________________________

108._____ allows you to access the Internet through your cable connection.

________________________________________

109._____ allows you to send voice communications over the Internet and avoid the toll
charges that you would normally receive from your long-distance carrier.

________________________________________

110.A _____ transmits information over a closed, connected path.

________________________________________
111. A _____ is a bundle of copper wires used for transmitting voice or data
communications.

________________________________________

112.A _____ has one central wire surrounded by insulation, a metallic shield, and a final
case of insulating material.

________________________________________

113._____ uses a very thin glass or plastic fiber through which pulses of light travel.

________________________________________

114._____ communications radiate information into the air, either very narrowly
beamed or in many directions.

________________________________________

115._____ uses red light to send and receive information.

________________________________________

116.A typical speed of an infrared connection is ____.

________________________________________
117.Wi-Fi (wireless fidelity, 802.11 b or g) uses _____ transmissions.

________________________________________

118._____ is a short-distance wireless communication that is omnidirectional or all


directions.

________________________________________

119._____ are used to send large amounts of data to remote locations especially if there
are a number of receiving sites.

________________________________________

120.A(n) _____ is a microwave repeater located in space.

________________________________________

121.Restricting payroll information to only authorized payroll employees is ensuring


_____ of the information.

________________________________________

122.Fraudulent e-mail messages claiming to be from your bank is an example of a


threat to ____.

________________________________________
123.A(n) _____ can protect availability of a network and prevent denial-of-service
attacks.

________________________________________

124.A virtual private network uses _____ to establish a secure channel for transmitting
data.

________________________________________

125.Spyware, viruses, and worms are examples of ____.

________________________________________
Module E Network Basics Answer Key

Multiple Choice Questions

1. A(n) _____ is two or more computers connected so that they can communicate
with each other and share information, software, peripheral devices, and/or
processing power.

A. OLED

B. computer system

C. network

D. DS3

A computer network is two or more computers connected so that they can


communicate with each other and share information, software, peripheral
devices, and/or processing power.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Introduction
2. Which of the following is a basic principle that applies to all networks, large or
small?

A. At least one computer on a network must have a network interface that


provides the doorway for all computers for information exchange.

B. One of the computers on the network must act as a connecting device that
ties the other computers together.

C. There must be communications media like cables or radio waves connecting


network hardware devices.

D. At least one computer on the network must have software supporting the
movement of information in and out of the network.

There must be communications media like cables or radio waves connecting


network hardware devices. The communications media transport information
around the network between computers and the connecting device(s).

AACSB: Technology
Blooms: Understand
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Introduction
3. Which of the following is NOT typically a component of a home network?

A. An Ethernet network card for each computer on the network

B. Network cables or wireless devices to transmit signals

C. A router that passes messages and information to each computer

D. A computer dedicated to being a database server

A home computer dedicated to being a database server is not an essential


requirement on a home network.

AACSB: Technology
Blooms: Understand
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks
4. A _____ is an expansion card for a desktop computer or a PC card for a
notebook computer that connects your computer to a network and provides the
doorway for information to flow in and out.

A. network interface card

B. wireless tether

C. storage card

D. flash memory card

A network interface card (NIC) is an expansion card for a desktop computer or a


PC card for a notebook computer that connects your computer to a network
and provides the doorway for information to flow in and out.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
5. Which of the following is the most common type of a network interface card
(NIC)?

A. WAP

B. Cat 5

C. Broadband router

D. Ethernet card

An Ethernet card is the most common type of network interface card.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
6. An Ethernet card has a(n) _____ jack into which a network or crossover cable can
be plugged.

A. BS 6312

B. FireWire

C. RJ-45

D. USB

An Ethernet card has an RJ-45 jack into which a network or crossover cable can
be plugged.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
7. Which of the following allows you to plug your computer straight into another
computer or printer?

A. Coaxial cable

B. Cat2 cable

C. Crossover cable

D. Straight through cable

A crossover cable allows you to plug straight into another computer or printer if
you have only two devices to connect.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
8. The _____ cable is a better-constructed version of the phone twisted-pair cable.

A. USB

B. crossover

C. Cat 5

D. optical fiber

Cat 5, or Category 5, cable is a better-constructed version of the phone twisted-


pair cable.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
9. Which of the following devices allows a computer to use radio waves to access a
network?

A. WAP

B. Cat 5

C. Optical fiber

D. DSL modem

A wireless access point (WAP) is a device that allows a computer to use radio
waves to access a network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
10. Which of the following devices transmits and receives a bidirectional flow of
information through its antenna?

A. Cat 5

B. Dielectric wireless receiver

C. Data server

D. Wireless access point

A wireless access point has a transmitter and a receiver for the bidirectional flow
of information. It also has an antenna to capture the radio waves out of the air.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks
11. Can your wireless access point connect to a network the same way wired
computers do?

A. Yes, it connects with a cable to the hub or switch

B. Yes, as long as the network hub or switch has an Ethernet card

C. No, not unless the network supports dedicated high speed lines such as T1 or
DS3

D. No, it connects through wireless media

If a wireless access point is a separate device, it connects to a wired network


with a cable to the hub or switch the same way wired computers do.

AACSB: Technology
Blooms: Understand
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 3 Hard
Topic: Home Networks
12. If you wanted to wirelessly connect more than one computer to share a cable
Internet service in your home, what would you need?

A. A local home-based server

B. Crossover cables

C. A broadband router

D. A multilayer switch

A broadband router or home router is a device to connect several computers


together to share a DSL or cable Internet connection in a home or small office.

AACSB: Technology
Blooms: Understand
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks
13. What Windows option do you need to activate to make the files on your
computer available to the other computers on your home network?

A. VPN

B. File-sharing

C. Windows firewall

D. Peer-to-peer networking

To make the files on your computer available to the other computers on the
network, you have to turn on the file-sharing option in Windows and indicate
which drives, directories, or files to share.

AACSB: Technology
Blooms: Understand
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks
14. What network device connects computers together and passes messages by
repeating each computer's transmissions only to the intended recipients?

A. Modem

B. Broadband router

C. Switch

D. Hub

A switch is a network device that connects computers and passes messages by


repeating each computer's transmissions only to the intended recipient, not to
all the computers connected.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components
15. What does a switch enable a network to do?

A. Listen to each other's transmissions

B. Repeat messages to other computers so that the messages are not lost

C. Allow computers to have different conversations at the same time

D. Create direct links between separate networks or subnets

Several computers can have different conversations at the same time through a
switch.

AACSB: Technology
Blooms: Understand
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 2 Medium
Topic: Network Components
16. Which network device sends information privately over the network?

A. Hub

B. Switch

C. Router

D. Virtual connector

Information transmitted over switches is generally private, unless it is specifically


meant to be broadcast to all the computers on the network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components
17. Which network device connects together separate networks of computers?

A. Hubs

B. Switches

C. Routers

D. Virtual connectors

Routers connect together separate networks of computers, unlike switches that


connect individual computers.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components
18. Which network device passes network traffic between smaller subnets of a larger
network?

A. A modem

B. WAP

C. A switch

D. A router

A router is a device that passes network traffic between smaller subnetworks (or
subnets) of a larger network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 2 Medium
Topic: Network Components
19. While connecting to a larger network, in addition to a router, what network
device do you need to plug a computer into?

A. A jammer

B. A repeater

C. A switch

D. A firewall

Even though a computer is connected to a router, it still needs to be plugged


into a switch.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Network Components
20. Which of the following is true of home networks and network components?

A. They do not require a switch.

B. They require at least two routers.

C. They have both a router and a switch.

D. They require a router only if they are wireless.

Home networks require a router and a switch.

AACSB: Technology
Blooms: Understand
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 2 Medium
Topic: Network Components
21. Before you can connect a computer with a router to a network, what must you
do?

A. Connect the router to a hub.

B. Give each computer the router's address.

C. Give the router the address of each computer on the subnets.

D. Replace all Cat 5 cables with crossover cables.

Routers need to be programmed with information about which computer


addresses are on which subnets.

AACSB: Technology
Blooms: Understand
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 2 Medium
Topic: Network Components
22. Which type of network covers a contiguous geographic area, such as a group of
buildings in close proximity to each other?

A. MAN

B. LAN

C. WAN

D. VPN

A local area network (LAN) is a network that covers a building or buildings in


close proximity, such as one campus of a university or corporation. The defining
characteristic of a LAN is not the actual size, but rather that the geographic area
it serves is continuous.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
23. Which type of network covers a large geographic distance, such as a state, a
country, or even the entire world?

A. WAN

B. MAN

C. VPN

D. LAN

WANs may connect networks at different locations around a city, or in different


cities across a state, a country, or even the entire world.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
24. Which type of network requires an organization to use some sort of commercial
communications provider?

A. WLAN

B. WAN

C. LAN

D. Intranet

Because WANs connect areas that are some distance apart, organizations do
not usually own the communications lines that WANs run over. Instead, the lines
are usually leased, often from a telephone or cable television company, or other
commercial communications provider.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
25. _____ is a set of connected networks all within the same city or metropolitan
area, but not in immediate proximity to each other.

A. LAN

B. MAN

C. WAN

D. VPN

A metropolitan area network or municipal area network (MAN) is a set of


connected networks all within the same city or metropolitan area, but not in
immediate proximity to each other.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
26. What is the difference between the terms internet (lower case i) and Internet
(upper case I)?

A. There is no difference, the words are used interchangeably.

B. The term internet is a generic term for a network of networks; Internet refers
to the largest internet.

C. The term internet refers to a network external to an organization; Internet


refers to internal networks.

D. The term internet refers to a network connected by different organizations;


the term Internet refers to the network connected by different individuals.

An internet, with a lowercase i, comes from the word internetworking, and is a


network of networks, connecting networks managed by different organizations.
The largest internet of all is the Internet (with a capital I) which is a vast network
of computers that connects millions of people all over the world.

AACSB: Technology
Blooms: Understand
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
27. When a local router on the Internet does not recognize a sender of a message
as being attached to one of its LAN, MAN, or WAN connections, it sends the
message over the connection to its ____.

A. main server

B. Internet service provider

C. intrusion detection system

D. virtual private network

If the router does not recognize the recipient as being attached to one of its
LAN, MAN, or WAN connections, it sends the message over the connection to
its Internet Service Provider (ISP).

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
28. Computers and routers refer to each other using ____.

A. VPN

B. router IDs

C. network sites

D. IP addresses

Computers and routers refer to each other using network addresses, commonly
Internet Protocol (IP) addresses.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
29. Where would a computer look up the site location for a computer it needs to
send information to?

A. Yellow Pages

B. VPN directory assistance

C. POP3 server

D. Domain Name System

Your computer looks up the receiving computer's address for you in a directory
called the Domain Name System, or DNS.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
30. Which of the following terms refers to the capacity of a communications
medium to transfer information in a given amount of time?

A. Bandwidth

B. Transmission size

C. Routing capacity

D. Communication speed

Bandwidth, or capacity of the communications medium, is the amount of


information that a communications medium can transfer in a given amount of
time.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
31. A _____ is the smallest possible amount of data.

A. cache

B. byte

C. bit

D. gigabyte

A bit is the smallest possible amount of data, representing a single 1 or 0, and is


abbreviated as the letter "b."

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet

32. A single symbol or letter of text is stored using _____ byte(s).

A. eight

B. one

C. four

D. six

A byte is eight bits, and is used to store one letter or symbol of text.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet

33. How many bits would be required to store the word "bit"?

A. One

B. Three

C. Sixteen

D. Twenty-four

A byte is eight bits, and is used to store one letter or symbol of text, so the
number of bits divided by eight gives you the approximate number of text
characters.

AACSB: Technology
Blooms: Apply
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
34. How is bandwidth measured?

A. Revolutions per minute (RPM)

B. Megahertz (MHz)

C. Bytes per second (BPS)

D. Bits per second (BPS)

Bandwidth is sometimes represented in bits per second, abbreviated bps.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
35. How long would it take to transfer a document containing 125,000 characters
using a communications medium with a bandwidth of 2Mbps?

A. Sixty seconds

B. Thirty seconds

C. Half a second

D. One second

125,000 characters is equal to 1,000,000 bits. A communication channel


transferring 2 million bits per second (2Mbps) could transfer this information in
half a second.

AACSB: Technology
Blooms: Apply
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 3 Hard
Topic: Internet
36. What type of Internet connection uses an ordinary telephone line and a
modem?

A. DSL

B. Cable modem

C. Dedicated high-speed line

D. Dial-up circuit

Dial-up circuits are Internet circuits using an ordinary telephone line and a
modem.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
37. Which of the following communications medium is NOT classified as a
broadband connection?

A. Dial-up

B. DSL

C. Cable modem

D. Dedicated lines

A broadband connection is a high-bandwidth (high-capacity)


telecommunications line capable of providing high-speed Internet service. DSL,
cable modem, and dedicated lines are classified as broadband connections.

AACSB: Technology
Blooms: Understand
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
38. What communications device connects your computer to a phone line so that
you can access another computer or network?

A. Conversion box

B. Modem

C. Transmitter

D. Repeater

A telephone modem (modem) is a device that connects a computer to your


phone line so that you can access another computer or network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
39. What does a modem do?

A. Transmits infrared signals over a communication channel

B. Transmits, receives, and converts analog signals into digital signals

C. Receives and boosts (strengthens) radio signals

D. Enables private transmissions by encrypting your information before sending


it to the Internet

A modem converts the digital signals from your computer into an analog form
(by modulating the signal) that can be transmitted over a phone line, and then
converts the analog signal back to digital signals at the receiving computer's
end.

AACSB: Technology
Blooms: Understand
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
40. Which type of high-speed Internet circuit is generally used by businesses?

A. T1 and DS3

B. Cable

C. Dial-up

D. DSL

Dedicated high-speed lines such as T1 and DS3 run on separate circuits and are
generally used for business connections.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
41. Which type of high-speed Internet connection works in a fashion similar to dial-
up modems but allows you to use the telephone at the same time you are using
the Internet?

A. Cable modem

B. Satellite modem

C. DSL

D. T1 or DS3 lines

A Digital Subscriber Line (DSL) is a high-speed Internet connection using phone


lines, which allows you to use your telephone for voice communication at the
same time. DSL works similarly to a traditional modem, modulating and
demodulating the computer's digital signal into an analog form for transmission
over the telephone line.

AACSB: Technology
Blooms: Understand
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
42. Which type of Internet connection is limited to the distance between you and
your phone company, generally about 3 miles?

A. Dial-up

B. DSL

C. Cable

D. Satellite

Because the high frequencies used by DSL are outside the range that telephone
lines were originally designed to carry, only telephone lines that meet certain
criteria can deliver DSL service. You need to live within about three miles of the
phone company.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
43. Which type of Internet connection slows down when more customers or
computers are using it?

A. Dial-up

B. DSL

C. Cable

D. Dedicated high-speed lines

The speed of a cable Internet connection depends on how many users are
online, because the connection to the cable company is shared throughout a
neighborhood.

AACSB: Technology
Blooms: Understand
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
44. Which network technology allows you to send voice calls over the Internet and
avoid toll charges?

A. Wireless access point

B. Voice over IP

C. Voice access point

D. Bluetooth

Voice over IP (VoIP) allows you to send voice communications over the Internet
and avoid the toll charges that you would normally receive from your long-
distance carrier.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
45. Which type of media transmits information over a closed, connected path?

A. Wireless encrypted communications media

B. Wired communications media

C. Wireless unsecured communications media

D. Satellite transmission media

Wired communications media transmit information over a closed, connected


path.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

46. Which of the following is an example of a wired communications medium?

A. Infrared

B. Microwave

C. Optical fiber

D. Satellite

Wired communications media transmit information over a closed, connected


path. Optical fiber cables are an example of wired communication media.

AACSB: Technology
Blooms: Apply
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media

47. Which of the following is an example of a wireless communications medium?

A. Twisted-pair cable

B. Infrared

C. Coaxial cable

D. Optical fiber

Wireless communications media transmit information through the air. Infrared is


a form of wireless communications media.

AACSB: Technology
Blooms: Apply
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media
48. What type of twisted-pair cabling provides a slow, reliable path for information
at up to 10 Mbps?

A. Cat 3

B. Cat 2

C. Cat 1

D. Cat 1a

A Cat 3 cable is a type of twisted-pair cabling that provides a slow, reliable path
for information at up to 10 Mbps.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media
49. Which of the following is the most widely used category of twisted-pair cabling
systems for data transfer in today's LANs?

A. Cat 5

B. Cat 4

C. Cat 3

D. Cat 3b

Cat 5 provides a much higher bandwidth than ordinary phone cable. Cat 5 is
relatively inexpensive and is fairly easy to install and maintain. Because of these
advantages, it is the most widely used cabling for data transfer in today's LANs.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
50. Which of the following types of cabling has one central wire surrounded by
insulation, a metallic shield, and a final case of insulating material?

A. Cat 1

B. Optical fiber

C. Twisted-pair

D. Coax

A coaxial cable (coax) has one central wire surrounded by insulation, a metallic
shield, and a final case of insulating material.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media
51. Which of the following communications media uses a very thin and flexible glass
or plastic fiber through which pulses of light travel?

A. Cat 5

B. Optical fiber

C. Twisted-pair

D. Coax

An optical fiber is a communications medium which uses a very thin and flexible
glass or plastic fiber through which pulses of light travel.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media
52. Which of the following communications media is a type of radio transmission?

A. Cat 3

B. Optical fiber

C. Infrared

D. Microwave

A method of short-distance wireless communications is omnidirectional (all


directions) microwave transmission. Microwave transmission is a type of radio
transmission.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media
53. Which of the following communications devices receives a radio signal,
strengthens it, and then sends it on?

A. Wi-Fi transmitter

B. Router

C. Repeater

D. Bridge mode

A repeater is a device that receives a radio signal, strengthens it, and sends it
on.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
54. What are repeaters that are located in space called?

A. Wi-Fi hotspots

B. Remote repeaters

C. Cat 5

D. Communication satellites

A repeater is a device that receives a radio signal, strengthens it, and sends it
on. Communications satellites are microwave repeaters in space.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
55. _____ means that information can be obtained only by those authorized to
access it.

A. Confidentiality

B. Authenticity

C. Integrity

D. Availability

Confidentiality means that information can be obtained only by those


authorized to access it. Confidential information includes things like bank
statements, business plans, credit card reports, and employee evaluations.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security
56. Which of the following is a threat posed to the authenticity of information
available on a network?

A. Network transmissions that can be captured or monitored by unauthorized


individuals

B. Web sites registered at names that are common misspellings of popular sites

C. Network transmissions that can be forged or taken over by unauthorized


individuals

D. Poorly written server software that stops working when presented with
unusual inputs

Authenticity means that information really comes from the source it claims to
come from. Threats to authenticity include fraudulent e-mail messages claiming
to be from your bank, Web sites registered at names that are common
misspellings of popular sites, and Web browsers that can be manipulated into
making it look as though you are at a different site than you really are.

AACSB: Technology
Blooms: Understand
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
57. A network failure which makes an e-commerce Web site inaccessible is a threat
to ____.

A. confidentiality

B. authenticity

C. integrity

D. availability

Availability means simply that a service or resource is available when it is


supposed to be. Threats to availability include unintentional network failures,
poorly written server software that stops working when presented with unusual
inputs, and deliberate attempts to send so much traffic to a company's network
that legitimate communications are unable to get through.

AACSB: Technology
Blooms: Understand
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
58. What software and/or hardware device protects a computer or a network from
intruders?

A. Router

B. Firewall

C. Switch

D. Cookie monitor

A firewall is software and/or hardware that protects a computer or network from


intruders.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security
59. Which of the following types of network security applications watches the
current network traffic, matching it against lists with characteristics of known
attacks?

A. Firewall

B. Intrusion prevention system

C. Real-time adaptive security

D. Proxy server

Intrusion detection and prevention systems work by having information about


many different types of network attacks and matching the current network
traffic against their lists of attack characteristics.

AACSB: Technology
Blooms: Understand
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
60. _____ is a security technology that encrypts each network conversation—
between one network client and one server—individually.

A. Secure sockets layer

B. Virtual private network

C. Firewall

D. Modulator-demodulator

Secure sockets layer is a security technology that encrypts each network


conversation—between one network client and one server—individually.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security
61. A(n) _____ uses encryption to protect the confidentiality of all network
transmissions between two endpoints.

A. SSL

B. TLS

C. VAN

D. VPN

A virtual private network (VPN) uses encryption to protect the confidentiality of


all network transmissions between two endpoints.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security
62. Which of the following is NOT a type of malware?

A. Firewall

B. Worm

C. Virus

D. Spyware

Malware refers to software designed to harm your computer or computer


security. Viruses, worms, and spyware are all types of malware. A firewall is
software and/or hardware that protects a computer or network from intruders.

AACSB: Technology
Blooms: Understand
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
63. In the context of malware, _____ are programs designed to be controlled by an
attacker to perform unauthorized work over a period of time.

A. bots

B. unauthorized servers

C. routers

D. repeaters

Bots are programs designed to be controlled by an attacker to perform


unauthorized work over a period of time.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security

True / False Questions


64. A computer network consists of a minimum of five computers connected to one
another.

FALSE

A computer network is two or more computers connected so that they can


communicate with each other and share information.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Introduction

65. A network interface card (NIC) is an expansion card that connects your
computer to a network and provides the doorway for information to flow in and
out.

TRUE

A network interface card (NIC) is an expansion card or a PC Card that connects


your computer to a network and provides the doorway for information to flow
in and out.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
66. An Ethernet card uses a standard telephone jack to connect the computer to a
network.

FALSE

An Ethernet card uses a RJ-45 jack to connect the computer to a network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks

67. A wireless access point is a device that allows computers to access a wired
network using radio waves.

TRUE

A wireless access point is a device that allows computers to access a wired


network using radio waves.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
68. A direct link with a satellite is required for setting up a wireless network.

FALSE

To set up a wireless network, one requires a wireless access point and wireless
adapters for each computer.

AACSB: Technology
Blooms: Understand
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks

69. In a small office, a broadband router is often used to connect several computers
to a DSL network.

TRUE

In a small office, a broadband router is often used to connect several computers


to a DSL network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
70. Information transferred over switches is generally public unless specified by the
host computer.

FALSE

Information transmitted over switches is generally private, unless it is specifically


meant to be broadcast to all the computers on the network.

AACSB: Technology
Blooms: Understand
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 2 Medium
Topic: Network Components

71. A switch is a device that connects multiple computers into a network in which
multiple communications links can be in operation simultaneously.

TRUE

A switch is a device that connects multiple computers into a network in which


multiple communications links can be in operation simultaneously.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components
72. A switch can have hundred or more ports to connect computers.

TRUE

Switches range in size from four-and eight-port models (connecting four or


eight computers or printers) in home networks, to 24-and 48-port models
(connecting 24 or 48 devices) common in business networks, to very large
switches with hundreds of ports used to connect large call centers.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components

73. Home routers that run your Internet connection usually incorporate both a
router and a switch in the same box.

TRUE

Home routers that run your Internet connection usually incorporate both a
router and a switch in the same box.

AACSB: Technology
Blooms: Understand
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 2 Medium
Topic: Network Components
74. A WAN covers a large geographic distance, such as a state, a country, or even
the entire world.

TRUE

WANs may connect networks at different locations around a city, or in different


cities across a state, a country, or even the entire world.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance

75. A MAN covers a contiguous geographic area, such as an office, building, or a


group of buildings in close proximity to each other.

FALSE

A metropolitan area network or municipal area network (MAN) is a set of


connected networks all within the same city or metropolitan area, but not in
immediate proximity to each other.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
76. Bandwidth refers to the capacity, or the amount of information, that can be
transferred through a communications line in a given time.

TRUE

Bandwidth refers to the capacity, or the amount of information, that can be


transferred through a communications line in a given time.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet

77. A broadband connection is a high-capacity telecommunications pipeline


capable of providing high-speed Internet service.

TRUE

A broadband connection is a high-capacity telecommunications pipeline


capable of providing high-speed Internet service.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Internet
78. A dial-up Internet connection is considered a broadband connection with high
bandwidth.

FALSE

A broadband connection must have an upstream and downstream capacity of


200 Kbps. A dial-up connection offers a maximum capacity of 64 Kbps.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet

79. A telephone modem is a device that connects your computer to your phone line
so that you can access another computer or network.

TRUE

A telephone modem is a device that connects your computer to your phone line
so that you can access another computer or network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
80. A DS3 is a dedicated high-speed line which runs on a separate circuit and is
generally used for business connections.

TRUE

A DS3 is a dedicated high-speed line which runs on a separate circuit and is


generally used for business connections.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet

81. You cannot talk on the telephone and surf the Internet simultaneously while
using a DSL connection.

FALSE

Digital Subscriber Line (DSL) is a high-speed Internet connection using phone


lines, which allows you to use your telephone for voice communication at the
same time.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 2 Medium
Topic: Internet
82. A modem is not required while using a cable Internet connection.

FALSE

A cable modem is a device that uses your TV cable to deliver an Internet


connection.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet

83. Wireless communications media transmits information over a closed, connected


path.

FALSE

Wireless communications media transmit information through the air.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
84. Coaxial cable has one central wire surrounded by insulation, a metallic shield,
and a final case of insulating material.

TRUE

Coaxial cable (coax) has one central wire surrounded by insulation, a metallic
shield, and a final case of insulating material.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

85. Infrared is a wireless communications medium that uses light waves to transmit
signals or information.

TRUE

Infrared uses red light to send and receive information.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
86. Infrared communications can penetrate walls, buildings, and other structures.

TRUE

Infrared communication is totally line-of-sight, meaning that you cannot have


anything blocking the path of the signal, or it will not work.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

87. Bluetooth is a standard for transmitting information in the form of long-range


radio waves.

FALSE

Bluetooth is a standard for transmitting information in the form of short-range


radio waves.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 2 Medium
Topic: Network Communications Media
88. Wi-Fi is a wireless communication technology that uses red light to send and
receive information.

FALSE

Wi-Fi (wireless fidelity) is a standard for transmitting information in the form of


radio waves over distances 100 feet or so.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

89. A repeater is a device that receives a radio signal, strengthens it, and sends it
on.

TRUE

A repeater is a device that receives a radio signal, strengthens it, and sends it
on.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
90. A firewall consists of both software and/or hardware and protects a computer or
network from intruders.

TRUE

A firewall consists of both software and/or hardware and protects a computer or


network from intruders.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security

91. A virtual private network establishes a dedicated network connection between


two or more networks.

FALSE

All network communications between two locations are routed through the VPN
to be encrypted. This makes it look as though they have a dedicated network
connection between them, even though they may really be communicating over
public network links.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
92. A virtual private network uses encryption to protect the confidentiality of all
network transmissions between two endpoints.

TRUE

A virtual private network uses encryption to protect the confidentiality of all


network transmissions between two endpoints.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security

93. A padlock icon on a Web site tells you that information on the Web site is being
routed through a VPN.

FALSE

When you browse to a secure Web site and see the padlock icon, it is telling you
that your browser is using SSL/TLS to encrypt your communications with the
Web server.

AACSB: Technology
Blooms: Understand
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
94. A worm is a type of virus.

TRUE

A virus is software that is written with malicious intent to cause annoyance or


damage. A worm is a type of virus.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 1 Easy
Topic: Network Security

Fill in the Blank Questions


95. A _____ consists of two or more computers connected so that they can
communicate with each other and share information, software, peripheral
devices, and/or processing power.

computer network

A computer network consists of two or more computers connected so that they


can communicate with each other and share information, software, peripheral
devices, and/or processing power.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Introduction

96. A _____ must be installed in each computer on the network in order to connect it
to a network.

network interface card (NIC)

A network interface card (NIC) must be installed in each computer on the


network in order to connect it to a network.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
97. The most common type of network interface card is a(n) ____.

Ethernet card

The most common type of network interface card is an Ethernet card.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks

98. A _____ cable is a better-constructed version of the phone twisted-pair cable.

Category 5

A Category 5 cable is a better-constructed version of the phone twisted-pair


cable.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 1 Easy
Topic: Home Networks
99. A _____ has a transmitter and a receiver for the bidirectional flow of information.

wireless access point

A wireless access point has a transmitter and a receiver for the bidirectional flow
of information.

AACSB: Technology
Blooms: Remember
Learning Objective: E-01 Identify and describe the four basic concepts on which networks are built and describe what is needed to
set up a small peer-to-peer network at home.
Level of Difficulty: 2 Medium
Topic: Home Networks

100. A _____ is a network device that connects computers and passes messages by
repeating each computer's transmissions only to the intended recipient, not to
all the connected computers.

switch

A switch is a network device that connects computers and passes messages by


repeating each computer's transmissions only to the intended recipient, not to
all the connected computers.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components
101. A _____ is a device that passes network traffic between smaller subnetworks of a
larger network.

router

A router is a device that passes network traffic between networks or subnets.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Network Components

102. A network that covers a contiguous geographic area is called a ____.

local area network (LAN)

A local area network (LAN) is a network that covers a building or buildings in


close proximity, such as one campus of a university or corporation. The defining
characteristic of a LAN is not the actual size, but rather that the geographic area
it serves is continuous.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
103. A network that covers a large geographic area where buildings are not in
immediate proximity to each other is called a ____.

wide area network (WAN)

A network that covers a large geographic area where buildings are not in
immediate proximity to each other is called a wide area network (WAN).

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance

104. A network that covers an urban area is called a ____.

metropolitan area network (MAN)

A metropolitan area network or municipal area network (MAN) is a set of


connected networks all within the same city or metropolitan area, but not in
immediate proximity to each other.

AACSB: Technology
Blooms: Remember
Learning Objective: E-02 Describe the components used to build large business networks and define and compare local area
networks (LANs); wide area networks (WANs); and metropolitan area networks (MANs).
Level of Difficulty: 1 Easy
Topic: Classifying Networks by Distance
105. ____, or capacity of the communications medium, is the amount of information
that a communications medium can transfer in a given amount of time.

Bandwidth

Bandwidth, or capacity of the communications medium, is the amount of


information that a communications medium can transfer in a given amount of
time.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet

106. A _____ connection is a high-capacity telecommunications pipeline capable of


providing high-speed Internet service.

broadband

A broadband connection is a high-capacity telecommunications pipeline


capable of providing high-speed Internet service.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
107. _____ is a high-speed Internet connection using phone lines, which allows you to
use your phone for voice communications at the same time.

Digital Subscriber Line (DSL)

Digital subscriber line (DSL) is a high-speed Internet connection using phone


lines, which allows you to use your phone for voice communications at the same
time.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet

108. _____ allows you to access the Internet through your cable connection.

Cable modem

Cable modem allows you to access the Internet through your cable connection.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet
109. _____ allows you to send voice communications over the Internet and avoid the
toll charges that you would normally receive from your long-distance carrier.

Voice over IP (VoIP)

Voice over IP (VoIP) allows you to send voice communications over the Internet
and avoid the toll charges that you would normally receive from your long-
distance carrier.

AACSB: Technology
Blooms: Remember
Learning Objective: E-03 Compare and contrast the various Internet connection possibilities.
Level of Difficulty: 1 Easy
Topic: Internet

110. A _____ transmits information over a closed, connected path.

wired communications media

A wired communications media transmits information over a closed, connected


path.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
111. A _____ is a bundle of copper wires used for transmitting voice or data
communications.

twisted-pair cable

A twisted-pair cable is a bundle of copper wires used for transmitting voice or


data communications.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

112. A _____ has one central wire surrounded by insulation, a metallic shield, and a
final case of insulating material.

coaxial cable

A coaxial cable has one central wire surrounded by insulation, a metallic shield,
and a final case of insulating material.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
113. _____ uses a very thin glass or plastic fiber through which pulses of light travel.

Optical fiber

Optical fiber uses a very thin glass or plastic fiber through which pulses of light
travel.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

114. _____ communications radiate information into the air, either very narrowly
beamed or in many directions.

Wireless

Wireless communications radiate information into the air, either very narrowly
beamed or in many directions.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
115. _____ uses red light to send and receive information.

Infrared

Infrared uses red light to send and receive information.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

116. A typical speed of an infrared connection is ____.

1 Mbps

A typical speed of an infrared connection is 1 Mbps.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

117. Wi-Fi (wireless fidelity, 802.11 b or g) uses _____ transmissions.

microwave

Wi-Fi (wireless fidelity, 802.11 b or g) uses microwave transmissions.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

118. _____ is a short-distance wireless communication that is omnidirectional or all


directions.

Microwave transmission

Microwave transmission is a short-distance wireless communication that is


omnidirectional or all directions.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

119. _____ are used to send large amounts of data to remote locations especially if
there are a number of receiving sites.

Communications satellites

Communications satellites are used to send large amounts of data to remote


locations especially if there are a number of receiving sites.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media
120. A(n) _____ is a microwave repeater located in space.

communications satellite

A communications satellite is a microwave repeater located in space.

AACSB: Technology
Blooms: Remember
Learning Objective: E-04 Compare and contrast the types of communications media.
Level of Difficulty: 1 Easy
Topic: Network Communications Media

121. Restricting payroll information to only authorized payroll employees is ensuring


_____ of the information.

confidentiality

Restricting payroll information to only authorized payroll employees is ensuring


confidentiality of the information.

AACSB: Technology
Blooms: Apply
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
122. Fraudulent e-mail messages claiming to be from your bank is an example of a
threat to ____.

authenticity

Fraudulent e-mail messages claiming to be from your bank is an example of a


threat to authenticity.

AACSB: Technology
Blooms: Apply
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security

123. A(n) _____ can protect availability of a network and prevent denial-of-service
attacks.

intrusion detection system

An intrusion detection system can protect availability of a network and prevent


denial-of-service attacks.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security
124. A virtual private network uses _____ to establish a secure channel for transmitting
data.

encryption

A virtual private network uses encryption to establish a secure channel for


transmitting data.

AACSB: Technology
Blooms: Remember
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security

125. Spyware, viruses, and worms are examples of ____.

malware

Spyware, viruses, and worms are examples of malware.

AACSB: Technology
Blooms: Apply
Learning Objective: E-05 State the four principles of computer security and describe how different network security devices reflect
those principles.
Level of Difficulty: 2 Medium
Topic: Network Security

Potrebbero piacerti anche