DOC PREVIEW
WU BU 309 - Study Notes

This preview shows page 1-2-3-4-5 out of 14 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Name: __________________________ Date: _____________1. _____________ refers to having users who access the same data files, exchange information via electronic mail, or search the Internet for information.A) Resource sharingB) User groupingC) User profilingD) Information sharingE) Data pirating2. ____________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.A) Software meteringB) Information sharingC) Resource sharingD) Software piratingE) Network routing3. A dedicated server LAN:A) can only use simple LAN softwareB) is limited to handling small databasesC) has one or more permanently assigned servers that can enable users to share files, for exampleD) can not connect with other networksE) is limited to handling small files4. Which of the following is not a critical software component in a dedicated server LAN?A) application software on server computersB) network operating system in the dedicated serverC) network communication software on the clientPage 1D) LAN metering softwareE) application software on client computers5. A(n) _____________ is not a common type of dedicated server.A) file serverB) print serverC) database serverD) collision serverE) remote access server6. A(n) ____________ can permit users calling into a LAN remotely to retrieve their email, for example.A) print serverB) database serverC) file serverD) piconet serverE) remote access server7. A peer-to-peer LAN:A) has more capability than a dedicated serverB) supports a higher number of computers than a dedicated serverC) is generally cheaper in hardware and software than a dedicated serverD) is not appropriate for sharing resources in a small LANE) is often much faster than dedicated server networks8. Which of the following is not a basic LAN component?A) clientB) PADPage 2C) serverD) network interface cardE) network operating system9. Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?A) cost (relative to fiber)B) thickness (relative to coax)C) weight (relative to coax)D) flexibility (relative to coax)E) security (relative to fiber)10. Of the following, which is not true about fiber optic cable?A) it is thinner than unshielded twisted pair cableB) it is lighter than unshielded twisted pair cableC) it has a very low capacityD) it is more expensive than CAT5 unshielded twisted pair cableE) it is a type of guided media11. Which of the following is not a purpose for using hubs in a network?A) to act as a communications serverB) to connect network cablesC) to prevent attenuationD) to act as a junction boxE) none of the above12. Which of the following type of media is most commonly used in backbone networks because of its high capacity?A) fiberPage 3B) infrared frequenciesC) coax cableD) unshielded twisted pairE) shielded twisted pair13. Hubs:A) usually incorporate repeaters or amplifiersB) have connection points called handlesC) limit the distance of a network to a few meters in lengthD) are a difficult method to connect network cablesE) operate at the application layer14. __________ is not true with respect to network hubs.A) Each port in a hub has a unique number.B) A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expandC) Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizesD) Many hubs act as repeaters or amplifiersE) Hubs provide a complicated way to connect network cables15. _____________ is the software that controls the network.A) Network Operating SystemB) Client Operating SystemC) Embedded Operating SystemD) Network Control SystemE) Network Software System16. The server version of the Network Operating System does not:A) provide the software that performs the functions associated with the physical layerPage 4B) provide the software that performs the functions associated with the data link layerC) provide the software that performs the functions associated with the application layerD) provide the software that performs the functions associated with the network layerE) usually provide the software that performs the functions associated with the computer's own operating system17. _____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.A) Network ServicesB) Directory ServicesC) Client ServicesD) Computing ServicesE) Remote Access Services18. A _________ is a group of related resources.A) workgroupB) domainC) serverD) clientE) sharepoint19. A hierarchical tree of domains within one organization that are linked to other trees in the organization is called a ___________.A) ADSB) domainC) forestD) treeE) NDSPage 520. A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.A) user profileB) user access logC) network profileD) network operating systemE) server allocation list21. The cheapest time to install network cabling is:A) during the construction of the buildingB) as soon as the building is completedC) as soon as the building is occupiedD) about five years after the building is occupied so that the exact office locations for each network computer is knownE) any time that a network needs to be installed22. Ethernet LAN was developed by:A) IBMB) ARPANETC) DEC, Xerox, and IntelD) University of MinnesotaE) CERN laboratory in Geneva23. ___________ is how the network works conceptually.A) Physical topologyB) Logical topologyC) Network topologyD) EthernetE) Media access controlPage 624. The type of logical topology that Ethernet uses is a:A) ringB) busC) starD) meshE) interconnected25. A logical bus topology:A) is always used by token ring protocol LANsB) has all computers connected to each other in point-to-point connectionsC) is limited to short distances since devices like a hub or repeater cannot be used with this type of topologyD) permits every message to be received by every computer on the bus, even when those messages are intended for other computersE) has a central control device, such as a mainframe26. Media access control refers to:A) the price of fiber optic cableB) security over floppy disks in a user environmentC) the ability for a user to use multimedia equipment in a LAND) controlling access to a media by more than one computer in a LANE) the control over coax cable installed by a


View Full Document

WU BU 309 - Study Notes

Documents in this Course
Load more
Download Study Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?