Write your text here!
Modules 8 and 9:
Networking and security
1.A basic computer network can be described as:
A.A minimum of five Computers linked together.
B.Computer and cables That link the network together.
C.Two or more Computers that are linked together.
D.The use of Satellites linking computers together.
2. LAN stands For:
A.Local area nodes.
B.Logical Arrangement of networks.
C.Local area Network.
3.The primary Difference between a LAN and a WAN is:
A.The number of Software programs available.
C.The variety of hardware devices.
D.The number of Hardware devices.
4.Each Individual computer and component attached to a network is a:
5.In a traditional LAN, each node on the network is connected through:
MAN Stands for:
A.Metropolitan Area network.
B.Marked area Network.
C.Metropolitan Arranged network.
D.Manufactured Arrangement of networks.
7.The hardware Device or software program that sends messages between networks is known as a:
8.NIC stands For:
A.Network internal Card.
B.Newer industrial Computer.
C.Networking Internet connection.
D.Network Interface card.
9.Computer bits must Be ___________ to travel over phone lines.
D.Converted to bytes
10.Modem speed is Measured in:
A.Bits per second.
B.Bytes per second.
C.Bits per Millisecond.
D.Bytes per minute.
11.What is the Term for the amount of information transmitted through a communication medium In a certain amount of time?
12.What type of cable uses light waves to carry information at high speed?
13.What helps Block unauthorized access and data transfer?
14.A program that Performs a useful task while simultaneously allowing destructive acts is a:
15.An Intentionally disruptive program that spreads from program to program or from Disk to disk is known as a:
D.Time-related bomb Sequence.
16.What type of Virus uses computer hosts to reproduce itself?
17.When customers Of a Web site are unable to access it due to a bombardment of fake traffic, it Is known as:
B.A Trojan horse.
D.A denial of Service attack
18.The scrambling Of code is known as:
1.Information Security is the practice of defending information from unauthorized Access. T
2.A Computer worm is a standalone malware computer program that replicates itself In order to spread to other computers. T
3.Hoax Viruses flood a targeted computer with so many requests that it cripples Functionality. F
4.The Most complex type of firewall is the application Proxy firewall. T
5.A Router is a hardware component Used to interconnect networks. T