Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Chapter 9 TRUE/FALSE 1)A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources

Chapter 9 TRUE/FALSE 1)A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources

Computer Science

Chapter 9

TRUE/FALSE

1)A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources.

 

 

     2.   LANs often connect WANs over a long distance such as between cities, states, or countries.

 

 

     3.   A large file is broken into hundreds of small data units called packets and each data unit is transmitted across the network.

 

 

     4.   The transmission control method used by Ethernet is called collision sense multiple access with carrier detection (CSMA/CD)..

 

 

     5.   TCP establishes communication sessions among applications on two communicating computers.

 

 

MULTIPLE CHOICE

 

     1.   Which of the following is NOT a typical function of a client operating system?

a.

enables a workstation to run applications

c.

authenticates clients to access the network

b.

processes information locally

d.

communicates with other computers over the network

 

 

 

     2.   Which of the following accurately describes a function of a LAN?

a.

offers networking services over a long distance

c.

uses a modem to connect to an ISP

b.

connects office networks in two different cities

d.

uses switches to connect computers

 

 

 

     3.   You have been hired to design a small office network that will have 10 workstations and two servers.  You want to use a network topology that is flexible for future growth and performance enhancements.  Which topology should you choose?

a.

ring

c.

bus

b.

star

d.

mesh

 

 

 

     4.   A colleague has asked you where the media access control address of his computer is located?  What do you tell him?

a.

NIC

c.

BIOS

b.

switch

d.

hub

 

 

 

     5.   You are trying to decide which media you should use to connect the computers in a small business network that will have 15 computers.  You want media that works well with LANs, is reasonably priced and is fairly flexible to aid installation. After reading about the various media available, what should you use?

a.

coax

c.

UTP

b.

HFC

d.

STP

 

 

 

     6.   You need to connect two groups of about 20 computer each that are located on different floors of a building.  Which media type will work best for this scenario?

a.

coax

c.

fiber-optic

b.

UTP

d.

HFC

 

 

 

     7.   You are called in to a business that just expanded its network onto another floor of the building.  There are 30 stations on each floor.  You have been told that the two groups of computers must be able to communicate but for security reasons, there must be a way to filter communication between the two networks.  What device do you recommend?

a.

hub

c.

wireless access point

b.

router

d.

bridge

 

 

 

     8.   You have been told by a colleague that the type of network in use at a new client site uses fixed-length payloads and has information in the header that allows the data unit to be routed according to the type of data carried within the unit.  What type of data unit is in use?

a.

packet

c.

segment

b.

frame

d.

cell

 

 

 

     9.   Which of the following is NOT a common function of a network protocol?

a.

schedule network applications to run

c.

coordinate transport of packets

b.

enable communications over the Internet

d.

enable remote access to networks

 

 

 

   10.   Which of the following is true of Ethernet?

a.

uses CSMA/CA

c.

defined by the 802.11 standard

b.

usually implemented in a ring topology

d.

Fast Ethernet is 100 Mbps

 

 

 

   11.   You are setting up a wireless network.  The environment in which this network will run has several other devices such as cordless phones that run in the 2.4 GHz frequency range.  You want to avoid conflicts with other devices.  Which wireless standard should you consider?

a.

802.11a

c.

802.11g

b.

802.11b

d.

802.11i

 

 

 

   12.   Which of the following is NOT a likely consideration when purchasing a NIC?

a.

the cable interface matches the cabling used on the network

c.

the MAC address of the NIC

b.

there is a driver available for the OS

d.

the NIC bus interface matches an available expansion slot

 

 

 

   13.   Which of the following is a task typically performed by TCP?

a.

packet addressing

c.

handles packet routing

b.

closes communication session

d.

fragments packets as needed

 

 

 

   14.   You are troubleshooting a problem with a network that is composed of several subnets connected by routers.  You have determined that the problem lies with the packet routing function.  Which of the following is most responsible for this function?

a.

TCP

c.

IP

b.

FTP

d.

SMTP

 

 

 

   15.   You are designing a new network that will use TCP/IP.  You are trying to decide which class of IP address you should use.  There will be several thousand nodes on the network and you want to use an address class suitable for medium-sized networks.  What address class should you use?

a.

class A

c.

class C

b.

class B

d.

class D

 

 

 

   16.   You are diagnosing a network communication problem on a computer that uses the TCP/IP protocol.  What address can you use to test network services without actually accessing the network?

a.

10.0.0.1

c.

127.0.0.1

b.

1.0.0.0

d.

0.0.0.0

 

 

 

   17.   Which of the following is true of IPv6 addresses?

a.

they are 128 bits in length

c.

IPv6 follows IPv5 which used 48-bit addresses

b.

Windows Server 2008 does not support them

d.

they cannot be used for voice and video applications

 

 

 

   18.   Which protocol enables routers to build tables of routing information?

a.

SMTP

c.

TCP

b.

RIP

d.

PPP

 

 

 

   19.   Which of the following enables the NIC to format data for a protocol and identify the most efficient methods for transporting it?

a.

installing

c.

binding

b.

configuring

d.

subnetting

 

 

 

   20.   You have a server on your network that your users frequently access.  You don’t want the server’s address to change.  What type of addressing method should you use?

a.

APIPA

c.

DHCP

b.

static

d.

unicast

 

 

 

COMPLETION

 

     1.   A _____________ OS enables a workstation to run applications and access shared resources, but is usually not involved in authentication or sharing resources.

 

 

 

     2.   _________ runs on Windows Server 2008 and is used to install client OSs on a mass scale.

 

 

 

     3.   A _____________ is the physical design of the network, or the path data takes when it goes from one computer to another.

 

 

 

     4.   The __________ is the software logic on a NIC that consists of one or more programs residing in a programmable chip on the card.

 

 

 

     5.   The _________ address is used for diagnostics and uses the IPv6 address of 0:0:0:0:0:0:0:1.

 

 

 

MATCHING

 

 

a.

binding

f.

frame

b.

bridge

g.

CIDR

c.

terminal

h.

multicast

d.

backbone

i.

APIPA

e.

payload

j.

Ethernet

 

 

     1.   a device that has a keyboard and monitor but no CPU or storage

 

     2.   an IP address in the range 169.254.0.1 to 169.254.255.254 that is automatically assigned.

 

     3.   a way to ignore IPv4 address class designation by using addressing that puts a slash (/) after the dotted decimal notation

 

     4.   a network transport protocol that uses CSMA/CD communications

 

     5.   a main connecting link or highway between networks, such as between floors in a building or between buildings

 

     6.   a transmission method in which a server divides recipients of an application,

such as a multimedia application, into groups

 

     7.   a network device that connects two or more segments into one, or extends an existing segment

 

     8.   that portion of a frame, packet, or cell that contains the actual data

 

     9.   a process that enables the NIC to format data for a protocol, and identify the

most efficient methods for transporting it

 

   10.   a data unit sent over a network that contains source and destination, control, and error-detection information, as well as the data

 

       

       

 

SHORT ANSWER

 

     1.   Briefly describe a network.

 

 

 

     2.   List three networking services typically provided by a Windows server OS that is not provided by a Windows client OS.

 

 

     3.   Describe the difference between a LAN and a WAN.

 

 

 

     4.   Describe the difference between a hub and a switch.

 

 

 

     5.   Describe the function of a router.

 

 

 

     6.   List three types of network communications for which network protocols are used.

 

 

 

     7.   List three functions performed by TCP.

 

 

 

     8.   Aside from TCP and IP, list three protocols used in the TCP/IP suite of protocols and a brief explanation of their purpose.

 

 

 

     9.   What is the purpose of protocol binding?

 

 

 

   10.   Why do you need to configure a default gateway in a computer’s IP configuration?

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

3.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 6 times

Completion Status 100%

Sitejabber (5.0)

BBC (5.0)

Trustpilot (4.8)

Google (5.0)