Premium Essay

C White Data Communication, Chapter 8 Quiz

In:

Submitted By elenaq13
Words 3578
Pages 15
Chapter 8: Local Area Networks: Software and Support Systems

TRUE/FALSE

1. Network operating systems are essential if the network is going to allow multiple users to share resources.

ANS: T

2. Users cannot interact directly with the operating system through a shell.

ANS: F

3. In reality, a multitasking operating system runs only one program at a time.

ANS: T

4. The resources that a network operating system must manage typically include one or more network servers.

ANS: T

5. A network operating system does not perform network support functions.

ANS: F

6. Microsoft Windows 7 is an example of a desktop operating system.

ANS: T

7. NetWare 6 was the last version of Novell’s network operating system.

ANS: T

8. A bindery contains the data that pertains only to the server it resides in.

ANS: T

9. The design of a tree should ideally be similar to a pyramid.

ANS: T

10. NetWare 5 dropped the NDS distributed database of network resources.

ANS: F

11. Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing.

ANS: T 12. It is not possible to create a network with multiple domains.

ANS: F

13. Unlike NetWare’s NDS, Active Directory creates a hierarchical structure of resources.

ANS: F

14. Unix is most often found with a text-based interface, although graphical user interfaces are available.

ANS: T

15. Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language.

ANS: F

16. Unix runs on the widest variety of hardware of any network operating system.

ANS: T

17. Linux shares many of the same advantages and disadvantages of Unix.

ANS: T

18. Linux software cannot support e-mail servers, Web servers, FTP

Similar Documents

Premium Essay

Crj 320 Wk 10 Quiz 10 Chapter 17 and 21

...CRJ 320 WK 10 QUIZ 10 CHAPTER 17 AND 21 To purchase this visit here: http://www.activitymode.com/product/crj-320-wk-10-quiz-10-chapter-17-and-21/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 320 WK 10 QUIZ 10 CHAPTER 17 AND 21 CRJ 320 WK 10 Quiz 10 Chapter 17,21 MULTIPLE CHOICE 1. What type of material should not be used when packaging electronic evidence? a. waxed paper c. plastic materials b. cardboard d. paper bags 2. A zombie is a a. certain type of computer virus. b. computer that has been rendered immobile by a virus. c. computer used by hackers to copy other computer programs. d. computer that has been taken over by another computer. 3. A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a a. shadow bomb. c. super-program. b. logic bomb. d. turtle. 4. A virus attack may replace or destroy data on the computer’s hard drive and a. identify bank accounts and financial records. b. leave a “back door” open for later entry. c. obtain one’s access codes. d. defraud the end user. 5. Port scanning is a. looking for access into a computer. b. scanning for a portable computer that is using a wireless system. c. removing data. d. linking access codes. 6. Which of the following is not one of the three general categories of cybercriminals? a. crackers c. criminals b. vandals d. IT professionals 7. Which of the following statements about reshipper schemes is correct...

Words: 1901 - Pages: 8

Premium Essay

Assignment 2 Technical Writing

...Chapter 1 Quiz Indicate whether statements 1–5 are TRUE or FALSE by writing T or F in the blank. 1. _______ Most workplace documents are created by individuals working alone. 2. _______ Technical documents are almost always designed for expert readers. 3. _______ Effective communicators “let the data speak for themselves.” 4. _______ The more you advance in your profession the more your ability to communicate is likely to become essential. 5. _______ Direct, straightforward communication is valued by all cultures. 6. _______ Electronic communication is replacing paper documents in the workplace. Complete the following statement. 7. A computer can transmit data, but it cannot give ___________________ to the information. In items 8–10, choose the letter of the expression that best completes each statement. 8. _______ A technical document focuses on (a) the needs of the audience, (b) the writer’s feelings, (c) both the needs of the audience and the writer’s feelings, (d) marketing, or (e) none of these. 9. _______ An effective technical document is based on (a) intuition, (b) usable information, (c) the writer’s deepest impressions, (d) inspiration, or (e) none of these. 10. _______ The information in a technical document must be (a) entertaining, (b) accessible, (c) confidently judgmental, (d) prosaic, or (e) none of these. Chapter 2 Quiz Indicate whether statements 1–7 are TRUE or FALSE by writing T or F in the blank. 1. _______...

Words: 909 - Pages: 4

Premium Essay

Nt 1210

...Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the...

Words: 4400 - Pages: 18

Premium Essay

Student

...| Course | Sec Design In Netwk Serv Envir | Test | Week 2 Quiz | Started | 7/28/13 3:17 PM | Submitted | 7/28/13 4:16 PM | Status | Completed | Attempt Score | 30 out of 40 points   | Time Elapsed | 59 minutes out of 1 hour. | Instructions | Quiz 1 consisits of multiple choice questions from chapters 1-4. You will have 1 hour to complete it. Good Luck! | * Question 1 2 out of 2 points | | | Regarding a disaster recovery plan, which of the following take the least amount of switchover time?Answer | | | | | Selected Answer: |   Hot site | Correct Answer: |   Hot site | | | | | * Question 2 0 out of 2 points | | | Instructions for responding to the following would be included in an organization's BCP but not a DRP.Answer | | | | | Selected Answer: |   None of the above | Correct Answer: |   A water main break floods the front parking lot | | | | | * Question 3 2 out of 2 points | | | Which of the following is not a type of disaster recovery plan test?Answer | | | | | Selected Answer: |   Desktop | Correct Answer: |   Desktop | | | | | * Question 4 2 out of 2 points | | | Which tool helps you ensure your organization is satisfying its security policies?Answer | | | | | Selected Answer: |   Gap analysis | Correct Answer: |   Gap analysis | | | | | * Question 5 0 out of 2 points | | | Which of the following terms refers to the likelihood of exposure to...

Words: 680 - Pages: 3

Premium Essay

Jhkjkiklj

...UNIT 2 Answer Key CHAPTER 5 IV. Section 4: Party Organization A. Structure Federalism, nominating B. Organization at the National Level 1. convention 2. chairperson C. State and Local Organization 1. election, caucuses 2. wards Prereading and Vocabulary 2 1. should cut back on expensive government programs Sample definition: Conservatives believe in cutting costs and government programs. 2. came to vote Sample definition: The electorate is the group of people who are allowed to vote. 3. voted at the polling place, elementary school Sample definition: A precinct is a small area from which all the residents report to vote at one location. 4. wards 5. bipartisan 6. nominate 7. Liberals 8. resign CHAPTER 5 Section 1 Reading Comprehension 3 1. Answers for rankings will vary. Historical basis: The two-party system is rooted in the beginnings of the U.S., when the ratification of the Constitution gave rise to the first two parties. Tradition: Most Americans accept the idea of a two-party system simply because there has always been one. Electoral system: Since only one winner per office comes out of each election, voters have only two viable choices—the candidate of the party holding office or the candidate with the best chance of replacing the current officeholder. Voters tend to think of a vote for a minor party candidate as a wasted vote. Republicans and Democrats work together in a bipartisan way to write election laws to make...

Words: 24569 - Pages: 99

Free Essay

Sdafwefwa

.... UNIVERSITY OF DETROIT MERCY College of Business Administration Foundations of Management – 10047 - 01 MBA 5140 – 01 3.0 Credit Hours Fall Term I 2014-2015 Prerequisite : Completion of the MBA Core Meeting Day, Time and Place: Mondays from 6:40- 9:10 PM Room C & F 228 Day One = August 25, 2014 Instructor Information : Instructor: Dr. Thomas Mawhinney, Ph.D. Office: C & F Room 217 Office Hours: Class meeting days 4:00 to 6:00 p.m. & by appointment at other times Phone (text enabled cell): 313 205-7590 Email: Thomas.Mawhinney@udmercy.edu College of Business Information : Emergency Phone: 313 993-1200 Ask for Wendy FAX (U of D, running most of the time): 313 993-1673 UD Mercy Bookstore Textbook Information & Online Purchase Options Follow either link below, first is bookstore “in general” second is for our specific text book: CAUTION and ADVICE : DO NOT use an “international edition” of this text book or any other edition unless it is THIS text in paperback or electronic format. The campus bookstore will have the exact text we will use in class. There is a good chance that if you use a different edition, e.g., international edition, it will differ in some important ways from the text described above. Please use the following: Title: Organizations: Behavior, Structure, Processes Fourteenth Edition Authors: James L. Gibson, John M. Ivancevich, James H. Donnelly, Jr., Robert Konopaske Publisher: Published by McGraw - Hill, Copyright © 2012 ISBN 978-0-07- 811266 -9 (...

Words: 5922 - Pages: 24

Premium Essay

Mcgraw-Hill - Marketing Demystified

...Marketing DeMystified A Self-Teaching Guide Donna Anselmo New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-173718-0 MHID: 0-07-173718-9 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-171391-7, MHID: 0-07-171391-3. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that neither the author nor the publisher is not engaged in rendering legal,...

Words: 128470 - Pages: 514

Premium Essay

Trying to Join Site

...computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections, protocols, and services used on the Internet. 8. Describe virtual computing and virtual networking concepts. 9. Describe fundamental cloud computing architectures and services. 10. Apply basic computer security measures by using authentication and access control. 11. Explain the basics of program algorithms and scripts used for software application development. 12. Apply...

Words: 12527 - Pages: 51

Premium Essay

Business Statistics Demystified

...BUSINESS STATISTICS DEMYSTIFIED Demystified Series Advanced Statistics Demystified Algebra Demystified Anatomy Demystified Astronomy Demystified Biology Demystified Business Statistics Demystified Calculus Demystified Chemistry Demystified College Algebra Demystified Earth Science Demystified Everyday Math Demystified Geometry Demystified Physics Demystified Physiology Demystified Pre-Algebra Demystified Project Management Demystified Statistics Demystified Trigonometry Demystified BUSINESS STATISTICS DEMYSTIFIED STEVEN M. KEMP, Ph.D SID KEMP, PMP McGRAW-HILL New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-147107-3 The material in this eBook also appears in the print version of this title: 0-07-144024-0. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been...

Words: 27869 - Pages: 112

Premium Essay

Purchasing Management

...Table of Contents Cover Title Page Copyright Learning System Table of Contents Chapter 1. Purchasing and Supply Management Chapter 2. Supply Strategy Chapter 3. Supply Organization Chapter 4. Supply Processes and Technology Chapter 5. Make or Buy, Insourcing, and Outsourcing Chapter 6. Need Identification and Specification Chapter 7. Quality Chapter 8. Quantity and Inventory Chapter 9. Delivery Chapter 10. Price Chapter 11. Cost Management Chapter 12. Supplier Selection Chapter 13. Supplier Evaluation and Supplier Relations Chapter 14. Global Supply Management Chapter 15. Legal and Ethics Chapter 16. Other Supply Responsibilities Chapter 17. Supply Function Evaluation and Trends Other Facts101 Titles 2 3 Title Textbook Outlines, Highlights, and Practice Quizzes Purchasing and Supply Management by P. Fraser Johnson, 14th Edition All "Just the Facts101" material written or prepared by Cram101 Publishing 4 Copyright Information Just the Facts101 ®, Cram101® Textbook Outlines, Cram101 e-StudyGuides and Cram101.com are Content Technologies Inc. publications and services. All notes, highlights, reviews, and practice tests are written and or prepared by Content Technologies, Inc. and Cram101 Publishing. Copyright © 2014 by Content Technologies, Inc. All rights reserved. eISBN 9781490281032 E-5 23479 www.Cram101.com 5 LearningSystem "Just the Facts101" is a Cram101 publication and tool designed to give you all the facts...

Words: 26956 - Pages: 108

Free Essay

Ink Out of Tea Bags

...CHAPTER 2 This chapter includes the review of related literature, review of related studies and review of other related Computer Assisted Instruction (CAI) which helped the researchers in designing and developing their own CAI that was used in this research. REVIEW OF RELATED LITERATURE The review includes discussion of technical terms like Computer-Assisted Instruction (CAI), multimedia, and review of software packages in mathematics, studies on development, evaluation and validation of CAI materials. Instruction and Learning Instruction is the arrangement of information and environment to facilitate learning. By environment, we mean not only where instruction takes place but also the methods, media and equipment needed to convey information and guide the learner’s study. Information and environment can be arranged on a continuum from very formal to very informal. The relationship between information and environment can change depending on the instructional goal. The arrangement of information and the environment is normally the responsibility of the instructor and the designers of media. The choice of the strategy of instruction determines the environment (the methods, media, equipment and facilities) and how the information is assembled and used. The method can range from teacher control to learner control. Learning is the development of new knowledge, skills, or attitudes when the individual interacts with information and environment. Learning takes place...

Words: 15415 - Pages: 62

Premium Essay

Management

...Electronic Commerce, Seventh Annual Edition 10-1 Chapter 10 Electronic Commerce Security At a Glance Instructor’s Manual Table of Contents • • • • • • • Chapter Overview Chapter Objectives Instructor Notes Quick Quizzes Discussion Questions Additional Resources Key Terms Electronic Commerce, Seventh Annual Edition 10-2 Lecture Notes Chapter Overview In this chapter, you will explore security policy issues with a focus on how they apply to electronic commerce in particular. The electronic commerce security topics in this chapter are organized to follow the transaction processing flow, beginning with the consumer and ending with the Web server (or servers) at the electronic commerce site. Each logical link in the process includes assets that must be protected to ensure security: client computers, the communication channel on which the messages travel, and the Web servers, including any other computers connected to the Web servers. Chapter Objectives In this chapter, you will learn about: • • • • • Online security issues Security for client computers Security for the communication channels between computers Security for server computers Organizations that promote computer, network, and Internet security Instructor Notes Online Security Issues Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction. There are two general types of security: physical and logical. Physical security includes tangible...

Words: 5468 - Pages: 22

Free Essay

Contemporary Business

...John Wiley & Sons, Inc. David L. Kurtz University of Arkansas Louis E. Boone University of South Alabama BUSINESS 14TH EDITION Contemporary . . . at the speed of business “The 14th edition of Contemporary Business is dedicated to Joseph S. Heider, who brought me to John Wiley & Sons. Thank you, Joe.” —Dave Vice President & Executive Publisher Acquisitions Editor Assistant Editor Production Manager Senior Production Editor Marketing Manager Creative Director Senior Designer Text Designer Cover Designer Production Management Services Senior Illustration Editor Photo Editor Photo Researcher Senior Editorial Assistant Executive Media Editor Media Editor George Hoffman Franny Kelly Maria Guarascio Dorothy Sinclair Valerie A. Vargas Karolina Zarychta Harry Nolan Madelyn Lesure 4 Design Group Wendy Lai Elm Street Publishing Services Anna Melhorn Hilary Newman Teri Stratford Emily McGee Allison Morris Elena Santa Maria This book was set in Janson TextLTStd-Roman 10/13 by MPS Limited, a Macmillan Company, Chennai, India and printed and bound by R. R. Donnelley & Sons. The cover was printed by R. R. Donnelley & Sons. This book is printed on acid free paper. ∞ Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live...

Words: 9095 - Pages: 37

Premium Essay

Mcgraw-Hill - Quality Management Demystified

...Algebra Demystified Anatomy Demystified asp.net Demystified Astronomy Demystified Biology Demystified Business Calculus Demystified Business Statistics Demystified C++ Demystified Calculus Demystified Chemistry Demystified College Algebra Demystified Data Structures Demystified Databases Demystified Differential Equations Demystified Digital Electronics Demystified Earth Science Demystified Electricity Demystified Electronics Demystified Environmental Science Demystified Everyday Math Demystified Genetics Demystified Geometry Demystified Home Networking Demystified Investing Demystified Java Demystified JavaScript Demystified Linear Algebra Demystified Macroeconomics Demystified Math Proofs Demystified Math Word Problems Demystified Medical Terminology Demystified Meteorology Demystified Microbiology Demystified OOP Demystified Options Demystified Organic Chemistry Demystified Personal Computing Demystified Pharmacology Demystified Physics Demystified Physiology Demystified Pre-Algebra Demystified Precalculus Demystified Probability Demystified Project Management Demystified Quality Management Demystified Quantum Mechanics Demystified Relativity Demystified Robotics Demystified Six Sigma Demystified sql Demystified Statistics Demystified Trigonometry Demystified uml Demystified Visual Basic 2005 Demystified Visual C# 2005 Demystified xml Demystified QUALITY MANAGEMENT DEMYSTIFIED SID KEMP, PMP McGRAW-HILL New York Chicago San Francisco Lisbon London Madrid Mexico City...

Words: 122414 - Pages: 490