MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Size: px
Start display at page:

Download "MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question."

Transcription

1 CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a network, is usually A) more than the data transfer rate. B) the same as the data transfer rate. C) dependent on the cable's bend radius. D) less than the data transfer rate. 1) 2) One can thwart most hacking problems by installing a A) security policy. B) firewall. C) hub. D) network. 2) 3) All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT A) you are experiencing interference with a wireless Ethernet network. B) you don't need to run new wires with a power-line network. C) power-line networks cost less. D) power-line networks can be easier to install. 3) 4) The most likely method a hacker would use to access a computer is A) entering through the Internet. B) entering through a company intranet. C) sitting down at a computer and installing hacking software. D) overhearing your password and/or log-on information. 4) 5) A network that has ten or more nodes is usually configured as a A) peer-to-peer network. B) client/server network. C) WAN. D) home network. 5) 6) Most allow you to connect wireless and wired computers to the same network. A) servers B) transceivers C) wireless routers D) modems 6) 7) Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) social networking B) hacking C) phishing D) cybercrime 7) 8) If you frequently transfer large data files between nodes on a network, which of the following networks would be the best choice? A) dial-up B) wireless C) Ethernet D) power-line 8) 9) What is the best thing a company can do to prevent its electronic data from being stolen? A) disconnect employees' computers from the Internet B) install hidden cameras C) establish detailed security policies D) shut off access on computers to flash drives 9) 1

2 10) Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network? A) network interface cards (NICs) B) firewalls C) routers and switches D) USB ports 10) 11) How many viruses and virus variants exist today? A) thousands B) hundreds C) tens D) millions 11) 12) A computer network is defined as two or more computers connected with so that they can communicate with each other. A) software and hardware B) the Internet C) hardware D) software 12) 13) In a client/server network, there are usually many more than. A) servers, clients B) printers, computers C) clients, computers D) clients, servers 13) 14) A(n) allows sharing of a broadband Internet connection. A) adapter B) hub C) router D) phone cord 14) 15) Network adapters A) are built into the motherboard on each node. B) enable nodes in a network to communicate with each other. C) are always Ethernet NICs. D) are necessary only on servers in a client/server network. 15) 16) Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background? A) a Trojan horse B) a virus C) a zombie D) a worm 16) 17) Which of the following is NOT an example of a network node? A) an NOS B) a computer C) a modem D) a printer 17) 18) Networks allow users to share A) flash drives. B) phones. C) peripherals. D) paper. 18) 19) Due to the expansion of media files on home computers, options are now being marketed; however, they are not as full featured as their business-world counterparts. A) external hard drive B) mega flash drives C) home server D) online storage 19) 20) Most computers today contain network adapters installed inside as expansion cards. Such adapters are referred to as A) ethernet cards. B) network expansion cards. C) network adapter cards. D) network interface cards. 20) 2

3 21) The purpose of Network Address Translation is to A) hide user IP addresses from the Internet. B) dynamically assign IP addresses via an ISP. C) convert logical ports to physical port configurations. D) translate IP addresses from the Internet. 21) 22) Maximum cable run (length) for Ethernet networks using UTP cable is approximately: A) 50 feet. B) 1,100 feet. C) 550 feet. D) 328 feet. 22) 23) Distributed denial of service (DDoS) attacks have been associated with A) theft of financial data at the IRS. B) attacks on famous blogs, ebay, and Amazon.com. C) identity theft. D) misuse of credit card information. 23) 24) A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT A) use your debit card information to purchase items illegally. B) launch a denial of service (DoS) attack on your computer. C) assume your identity. D) steal your logon and passwords for various accounts. 24) 25) Which of the following devices translates electronic data into radio waves? A) a transceiver B) a receiver C) a fiber-optic cable D) a modem 25) 26) Which transmission medium is able to transmit data the fastest? A) wireless B) twisted-pair cable C) fiber-optic cable D) coaxial cable 26) 27) Manufacturers such as Linksys, D-Link, and Netgear make which of the following devices that can double as firewalls? A) networks B) modems C) NICs D) routers 27) 28) Rules for creating passwords include all of the following EXCEPT A) keep your password written down, and put it in your wallet. B) create a hard-to-guess password, with a combination of letters and numbers. C) change your password frequently. D) keep your password a secret. 28) 29) Network architectures are classified according to A) the bandwidth supplied by the connection. B) the speed at which the processor runs. C) the way they are controlled and the distance between their nodes. D) the distance between the hub and the router. 29) 30) makes broadband users more vulnerable to attacks.. A) IP addressing B) Dynamic addressing C) Greater bandwidth D) Static addressing 30) 3

4 31) When setting up a network, you should set up any computers running the Microsoft Vista operating system A) last. B) first. C) only before any computers running Linux. D) The order does not matter. 31) 32) Which of the following classifications of viruses changes its own code? A) worm B) stealth C) multipartite D) polymorphic 32) 33) To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT A) move your computer next to a cement wall. B) move the computers in the network closer together. C) add a wireless access point (WAP) to the network. D) reposition the computer you are using. 33) 34) The major difference in types of P2P networks is the by which the nodes are connected. A) network interface card B) transmission medium C) port D) software 34) 35) Quarantining with regard to computer protection is defined as A) repairing the infected file. B) deleting the infected file. C) placing a found virus in a secure area on the hard drive. D) updating your antivirus software. 35) 36) The most popular transmission medium option for wired Ethernet networks is A) coaxial cable. B) power-line cable. C) unshielded twisted-pair cable (UTP). D) fiber-optic cable. 36) 37) Which of the following is necessary to send data between a home network and the Internet? A) a cable B) a switch C) a hub D) a router 37) 38) Public places where you can wirelessly connect to the Internet are known as A) gateways. B) links. C) wired spots. D) hotspots. 38) 39) Ethernet networks are named for A) the type of transmission medium used. B) the type of NIC installed in every node. C) the type of operating system installed on every node. D) the protocol used. 39) 40) Which of the following devices is needed to share an Internet connection on a wireless network? A) a fiber-optic cable B) a modem C) a wireless router D) a wireless hub 40) 4

5 SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. 41) File Transfer Protocol uses port. 41) 42) All g devices work on a bandwidth of GHz. 42) 43) is a process used by firewalls to assign internal IP addresses on a network. 43) 44) The wireless standard is also known as. 44) 45) A(n) network uses radio waves as its transmission medium. 45) 46) cable is made up of copper wires twisted around each other and is used in telephone technology. 46) 47) In terms of networking, NOS stands for. 47) 48) Match the following terms to their definitions: 48) I. logic bomb A. a virus that executes based on specified conditions II. Trojan horse B. software that allows hackers to take control of a computer III. backdoor program C. transmits simultaneous requests from multiple zombie computers IV. DDoS D. a program that appears to do useful work but does harm in the background V. time bomb E. an infectious program that is triggered on a certain date 49) receive data packets and send them to the node for which they are intended. 49) 50) cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. 50) 51) Match the following terms to their definitions: 51) I. bandwidth A. handles data traffic between networks II. throughput B. handles data traffic between nodes on the same network III. router C. maximum speed at which data can be transmitted IV. switch D. network adapters V. NICs E. actual speed of data transfer 52) transfer data between two or more networks. 52) 53) FTP stands for. 53) 54) A(n) on a network can be a peripheral, such as a printer or scanner. 54) 5

6 55) A device can be connected directly to a router instead of connecting it to a computer on a network. 55) 56) devices, which are becoming popular for home use, provide centralized data storage and access for networks. 56) 57) The type of wireless network designed to provide access to city residents and visitors is typically a(n). 57) 58) Bundles of data sent over transmission media are called. 58) 59) Most notebook computers sold currently come with an g or a(n) network adapter built in. 59) 60) is the specific category of UTP cable that has the highest data transfer rate. 60) 61) Many cities in the United States are now deploying to provide Internet access to residents and convenience for tourists. 61) 62) Switches and routers are both network devices. 62) 63) NIC stands for. 63) 64) To provide an older computer with wireless capability, you need to use a(n). 64) 65) software identifies known viruses effectively. 65) 66) A(n) is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes. 66) 67) The maximum range of wireless devices under the g standard is about feet. 67) 68) are virtual communication paths that allow a computer to organize requests for information from other networks or computers. 68) 69) Young, amateur hackers are often referred to as. 69) 70) refers to the act of connecting to a wireless connection without the permission of the owner. 70) 71) If you install a device called a on your network, you can share a broadband Internet connection between several computers. 71) 6

7 72) Match the following terms to their definitions: 72) I. packet A. software that controls an installed hardware device II. Wi-Fi B. server-side software that controls network communications III. driver C. unit of data transmitted in a network IV. NOS D. programming that is inserted into programmable read-only memory V. firmware E. another name for the standard 73) Match the following terms to their definitions: 73) I. switch A. enables individual nodes to communicate in a network II. adapter B. converts digital signals to radio waves III. repeater C. facilitates data packet transmission IV. wireless transceiver D. sends data packets between networks V. router E. amplifies signals to prevent degradation on long cables 74) The term network refers to the design of a network. 74) 75) HTTPS uses port. 75) 76) Some network adapters take the form of external devices that plug into an available port. 76) 77) If you need to extend the length of an Ethernet network, you can use a(n) to do so. 77) 78) networks use the existing electrical wiring in your house. 78) 79) For security reasons, you should be extremely wary of opening such as Word files. 79) 80) Hackers who use their knowledge to destroy information are known as hackers. 80) 81) Normal telephone wire is composed of cable, which consists of copper wires wrapped around each other and covered in a plastic jacket. 81) 82) The Internet is a good example of a(n) network. 82) 83) HTTP uses port. 83) 7

8 84) Match the following terms to their definitions: 84) I. FTP A. provides Internet services to consumers II. CAT 5 B. a protocol used on the Internet for sending and receiving files III. ISP C. a malicious attack in which a multitude of compromised systems attack a single target IV. DDoS D. a type of cable V. WAN E. a network that covers a great distance 85) A(n) is composed of software programs known as robots or bots, which run automatically on zombie computers. 85) 86) There are three main types of P2P networks: wired, wireless, and. 86) 87) Match the following terms to their definitions: 87) I. worm A. a hacker that re-uses hacking tools written by someone else II. computer virus B. a program that renders your computer files unusable III. script kiddie C. a type of this virus, "Storm," infected millions of computers in 2007 IV. encryption virus D. a virus that changes its own code to avoid detection V. polymorphic virus E. a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files 88) A(n) network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network. 88) 89) Match the following terms to their definitions: 89) I. Wi-Fi A. retaining the same IP address for a long time II. packet sniffer B. assigning addresses out of an available pool of IP addresses III. static addressing C. also known as the wireless standard IV. dynamic addressing D. a computer controlled by a hacker V. zombie E. a program that looks at each packet as it travels over the network 90) As the distance between the nodes of a wireless network increases, throughput markedly. 90) TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 91) SMTP uses port ) 92) A single computer can function as both a client and a server, but performance will be degraded. 92) 93) In a peer-to-peer network, one computer acts as the server. 93) 8

9 94) The Master Boot Record executes every time a computer boots up. 94) 95) Switches receive data packets and send them to the node for which they are intended on the same network. 95) 96) Extreme G and Enhanced G standards were both based on g standards but used proprietary hardware and software tweaks to increase performance. 96) 97) One can have both wired and wireless nodes on a single P2P network. 97) 98) P2P networks are more commonly used in small businesses than in homes. 98) 99) Most desktop and notebook systems sold today are network ready. 99) 100) The cost of a P2P network is slightly greater than the cost of a client/server network. 100) 9

10 Answer Key Testname: CS CHAP 7 TEST 1) D 2) B 3) C 4) A 5) B 6) C 7) D 8) C 9) C 10) C 11) A 12) A 13) D 14) C 15) B 16) A 17) A 18) C 19) C 20) D 21) A 22) D 23) B 24) B 25) A 26) C 27) D 28) A 29) C 30) D 31) B 32) D 33) A 34) B 35) C 36) C 37) D 38) D 39) B 40) C 41) 21, twenty-one 42) ) Network Address Translation 44) Wi-Fi 45) wireless 46) Twisted-pair 47) network operating system 48) A,D,B,C,E 49) Switches 50) Coaxial 10

11 Answer Key Testname: CS CHAP 7 TEST 51) C,E,A,B,D 52) Routers 53) File Transfer Protocol 54) node 55) network-ready 56) Network attached storage, NAS 57) WAN 58) packets 59) draft-n 60) CAT 6 61) MANs, metropolitan area networks 62) navigation 63) network interface card 64) network adapter card 65) Antivirus 66) packet sniffer 67) ) Logical ports 69) script kiddies 70) Piggybacking 71) router 72) C,E,A,B,D 73) C,A,E,B,D 74) architecture (or topology) 75) 443, four hundred forty-three 76) USB 77) repeater 78) Power-line 79) attachments 80) black-hat 81) twisted-pair 82) client/server 83) 80, eighty 84) B,D,A,C,E 85) botnet 86) power-line 87) C,E,A,B,D 88) peer-to-peer (P2P) 89) C,E,A,B,D 90) decreases 91) TRUE 92) TRUE 93) FALSE 94) TRUE 95) TRUE 96) TRUE 97) TRUE 98) FALSE 99) TRUE 100) FALSE 11

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices Technology in Action Chapter 7 Networking: Connecting Computing Devices 1 2 Chapter Topics Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power-line

More information

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC Technology In Action, Complete, 14e (Evans et al.) Chapter 7 Networking: Connecting Computing Devices 1) A computer is two or more computers connected using software and hardware so that they can communicate

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 12 Behind the Scenes: Networking and Security 1 Networking Advantages Networks Increase productivity Enable the sharing of hardware resources Facilitate knowledge sharing Enable

More information

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Technology in Action Chapter 7 Networking: Connecting Computing Devices Eleventh Edition Copyright 2015 Pearson Education, Inc. Copyright

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal DATA PROCESSING NOTES FOR SS THREE FIRST TERM 2016/2017 SESSION SCHEME OF WORK Week 3 Week 4 Continuation of Spreadsheet(Practical) Computer Virus Types Of Computer Virus Sources Of Virus Virus Warning

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Getting to Know Your Network. Internet Speeds and Services

Getting to Know Your Network. Internet Speeds and Services Internet Speeds and Services The Internet is an integral part of our Extension Offices. Its uses are seemingly endless from updating travel, to loading 4-H registration forms on the county website, and

More information

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

What is a network and what are the advantages of setting up one? (p. 262)

What is a network and what are the advantages of setting up one? (p. 262) CHAPTER 7 OBJECTIVES After reading this chapter, you should be able to answer the following questions: What is a network and what are the advantages of setting up one? (p. 262) What is the difference between

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Network Fundamentals Networks o Links multiple computer systems and enables them to share data and resources o Types of computer networks: Local area network

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Introduction to Computers Chapter1

Introduction to Computers Chapter1 Introduction to Computers Chapter1 IS-IT-UOB 2013 Topics Covered Computer definition and main parts Computer Hardware Computer Software Computer Strengths Categories of Computers Computer Applications

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

The ULTIMATE GUIDE. to Buying Networking Equipment

The ULTIMATE GUIDE. to Buying Networking Equipment The ULTIMATE GUIDE to Buying Networking Equipment 1 Networks allow people to share information, resources and devices. Built with a combination of computer hardware and software,networks vary in their

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS) Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Networks. Computer Technology

Networks. Computer Technology Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication

More information

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Which one of the following terms describes the physical components of a computer system?

Which one of the following terms describes the physical components of a computer system? Exercise 23 1.1.1 Which one of the following terms describes the physical components of a computer system? a. Hardware. b. Freeware. c. Software. d. Courseware. 1.1.2 Which one of the following is a portable

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Computer Networks and Internet

Computer Networks and Internet Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

Chapter 8 Networking and Digital Communication

Chapter 8 Networking and Digital Communication Tomorrow s Technology and You 8/e George Beekman Michael J. Quinn Networking and Digital Communication 2008 Prentice-Hall, Inc. Slide 1 A computer network is any system of two or more computers that are

More information

Communications and Networks

Communications and Networks Information Technology Skills (DUT 122) CHAPTER 6: Communications and Networks Miss Wan Nor Ashiqin Wan Ali School of Human Development and Technocommunication Objectives Overview Discuss the purpose of

More information

Total Mark out of 35

Total Mark out of 35 University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:

More information

Secure Network Design Document

Secure Network Design Document Secure Network Design Document May 3, 2007 Authored by: Steven Puzio TABLE OF CONTENTS I. Overview... 3 II. Company Information... 5 III. Wiring Closet Cabling and Design... 6 IV. Network Electronics Selection...

More information

Introduction to Computers. Chapter1

Introduction to Computers. Chapter1 Introduction to Computers Chapter1 ITBIS105 IS-IT-UOB 2016 IS-IT-UOB 2016 Topics Covered Computer Computer Computer Computer Categories of Computers Computer Applications in Networks definition and main

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Chapter 8 Communications and Networks

Chapter 8 Communications and Networks Chapter 8 Communications and Networks Today Group work Review the 6 parts of the IT model Communications and networks Discussion Think about it Imagine a traveling business person. This person s company

More information

Copyright 2006 Prentice-Hall. All rights reserved. 1

Copyright 2006 Prentice-Hall. All rights reserved. 1 PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)

More information

Configuring your Home Wireless Network

Configuring your Home Wireless Network Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home

More information

Chapter 9. Introduction. Communications

Chapter 9. Introduction. Communications Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Introduction Page 247 Cell phones and other wireless technologies are allowing

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016 Chapter 9 Networks and Communications Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016 Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Discuss the purpose

More information

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved. Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL. Index Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright 2015 Pearson Education,

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Multi-Homing Broadband Router. User Manual

Multi-Homing Broadband Router. User Manual Multi-Homing Broadband Router User Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved. Unit 10 Networks Copyright 2005 Heathkit Company, Inc. All rights reserved. The basic components of a network: Connections (Physical Medium) Protocols (Common language) Services (Clients, Servers, and

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

and the Forensic Science CC Spring 2007 Prof. Nehru

and the Forensic Science CC Spring 2007 Prof. Nehru and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.

More information

CHAPTER 8 SECURING INFORMATION SYSTEMS

CHAPTER 8 SECURING INFORMATION SYSTEMS CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Abhijit Vitthal Sathe Modern Institute of Business Management, Shivajinagar, Pune 411 005 abhijit_sathe@hotmail.com

More information

Networking. Networking. How Home Networking Works

Networking. Networking. How Home Networking Works Networking Networking How Typical Home Networking Works Bandwidth - of a connection is the width of it or the amount of data that can fit through it. Broadband - is a term used today to describe almost

More information

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets. Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall STUDENT LEARNING OBJECTIVES What are the principal components

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Networking Jamie Tees

Networking Jamie Tees Ethernet is the main networking technology, UTP (Unshielded Twisted Pair) cabling is the main networking cable types, this cabling uses RJ-45 connectors either end. While UTP is the main type we have STP

More information

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012

More information

Introduction to Computer Science (I1100) Networks. Chapter 6

Introduction to Computer Science (I1100) Networks. Chapter 6 Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and

More information

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet

More information

CompTIA FC0-U51. CompTIA IT Fundamentals.

CompTIA FC0-U51. CompTIA IT Fundamentals. CompTIA FC0-U51 CompTIA IT Fundamentals http://killexams.com/exam-detail/fc0-u51 or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Chapter 4: Communication Technology. Solutions

Chapter 4: Communication Technology. Solutions Chapter 4: Communication Technology Solutions Summative Assessment Multiple-Choice Questions (MCQs) 1. Two examples of network are telephone and. a. Radio b. Transmission c. Globe d. All of the above 2.

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

COMPUTER NETWORKING. Terminology of Network:

COMPUTER NETWORKING. Terminology of Network: COMPUTER NETWORKING Network: A computer network is a collection of interconnected computers. Two computers are said to be interconnected if they are capable of sharing hardware, software and exchanging

More information