Which is a collection of computers that allows sharing of information and resources?

Recommended textbook solutions

Which is a collection of computers that allows sharing of information and resources?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which is a collection of computers that allows sharing of information and resources?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Which is a collection of computers that allows sharing of information and resources?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which is a collection of computers that allows sharing of information and resources?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which of the following statements is true of computer networks?

- Computer networks are not useful unless they are connected to the internet.

- Computer networks allow individuals to share hardware such as printers, but not software.

- Computer networks allow individuals to share many types of resources.

- Computer Networks are inherently secure.

- Computer networks allow individuals to share many types of resources.

Which of the following describes a local computer?

- It is a computer that is accessed over the network.

- It is a computer that a person is physically at.

- Servers are often this type of computer.

- It is often part of a computer network.

- It is a computer that a person is physically at.

Which of the following is the best definition of a computer network?

- A computer network consists of one computer connected wirelessly to a printer.

- A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software.

- A computer network consists of a number of computers connected via a device that allows them to connect to the Internet.

- A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

- A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

What is the most common type of local, physical network connection in use today?

- Fiber optic cable and radio towers

- Fiber optic and UTP

- Coaxial and radio towers

- Radio towers and satellite

- Fiber optic and UTP

Which of the following type of transmission is paired correctly with the given media?

- Fiber optic cable - Electricity

- Fiber optic cable - Light impulses

- Coaxial cable - Light impulses

- Coaxial cable - Radio waves

- Fiber optic cable - Light impulses

Why would it be desirable to use a switch as opposed to a hub in a network?

- Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is more than that of a hub.

- Because a switch is a more powerful device, it can be used over longer distances compared to a hub.

- Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub.

- Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub.

Which of the following devices is used to connect one network to another network?

- Switch

- Hub

- Router

- Router

Which of the following communication system hardware devices is commonly used as a wireless access point?

- Switch

- Hub

- Radio waves

- Router

- Router

Which of the following are characteristics of a packet-switched network?

A. The path exists during the entire transmission, allowing communication in either direction to occur simultaneously.

B. The choice of pathway is based on network availability and amount of message traffic.

C. The route is established one branch at a time.

D. A and B

E. B and C

E. B and C

How do a router and switch differ when handling a message?

- The switch will purposefully drop messages if message traffic exceeds its capacity.

- Both a router and a switch use the message's destination address to select the line to route the incoming message to.

- There is no difference in how a router and a switch handle messages.

- The router will purposefully drop messages if message traffic exceeds its capacity.

- The router will purposefully drop messages if message traffic exceeds its capacity.

In a client-server network, what is the role of the server?

- The role of the server is to take requests from the client and send back the requested information.

- The role of the server is the same as the role of the client because all of the computers on this type of network are equal.

- The role of the server is to send out requests for information.

- The role of the server is to maintain connections to remote servers.

- The role of the server is to take requests from the client and send back the requested information.

How do virtual machines support a business computing ecosystem?

- A virtual machine (VM) is a server that users can log into and use different OSs and applications associated with the different OSs.

- A virtual machine (VM) is a broadcasting device that facilitates communication across a network, thus supporting a business computing ecosystem.

- A virtual machine (VM) is made available by software and permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.

- A virtual machine (VM) is a whole separate physical computer that provides users access to an OS different from their primary computer. Being able to have access to a computer with a different OS facilitates collaboration in the business ecosystem.

- A virtual machine (VM) is made available by software and permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.

Which of the following servers responds to HTTP requests on the Internet?

- FTP server

- Print server

- File server

- Web server

- Web server

Which of the following servers monitors requests, but doesn't send files in return?

- FTP server

- File server

- Web server

- Print server

- Print server

Which of the following servers can generate reports from client queries?

- Mail server

- Database server

- Web server

- File server

- Database server

Which of the following best describes the benefits of a star network topology?

- In a star network, every device has a point-to-point connection with every other device in the network. This allows any device to communicate with any other device.

- It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal.

- A star network requires a dedicated device (server, hub, or switch) which makes communication more efficient.

- All devices in a star network have a single point-to-point connection with the neighboring computers in the network.

- It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal.

Which of the following is NOT a characteristic of a bus network topology?

- All messages travel along a single cable.

- Is one of the more simple types of network topographies.

- Is a very reliable form of network.

- Expensive compared to other topologies.

- Expensive compared to other topologies.

Which of the following types of networks has each device in the network connected in a single point-to-point connection with a central HUB?

- Bus network

- Ring network

- Mesh network

- Star network

- Star network

Which device permits packet switching so that a message can be routed to the next link in a network?

- IP Address

- DNS

- Router

- LAN

- Router

In order to translate from an IP alias to an IP address, which of the following is used?

- URL

- DNS

- Routers

- Packet switching

- DNS

Which of the following best describes the Internet?

- The Internet is an isolated computer network.

- The Internet uses circuit switching.

- In order to communicate over the Internet, a host does not need to run the IP network protocol.

- The Internet is a global network of networks.

- The Internet is a global network of networks.

Which is part of the definition of Domain Name?

- Reflects the set of rules by which a resource is transmitted.

- Indicates the name of the file or document being accessed.

- Identifies the server on which a web page can be found.

- Indicates the location of a document on the server.

- Identifies the server on which a web page can be found.

All of the following are parts of a URL except for:

- TLD

- LAN

- Protocol

- Host name

- LAN

The abbreviation "URL" indicates:

- United Rendering Lists

- Undetermined Resource Location

- Unified Reader Link

- Uniform Resource Locator

- Uniform Resource Locator

Which of the following statements is not part of the path a message takes from one computer to another?

- A message is divided into one or more packets.

- All packets of the same message are combined together as they arrive.

- All messages require a response from the destination machine to the sending device.

- The packet(s) are given the final destination address.

- All messages require a response from the destination machine to the sending device.

_________________ is computed from other data contained within an IP packet and stored as part of the IP packet.

- A checksum

- A gateway

- A DNS server table

- A Network Address Translation

- A checksum

Your site's Internet point of presence is called a:

- DNS server table

- Router

- IP packet

- Gateway

- Gateway

The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an example of

- confidentiality.

- integrity.

- availability.

- confidentiality.

Entering data into the system accurately is an example of

- confidentiality.

- integrity.

- availability.

- integrity.

Ensuring that data is accessible and information is available when needed is an example of

- integrity.

- availability.

- confidentiality.

- availability.

Which of the following types of information present a threat to someone's privacy?

- Secret business plans

- Student ID and credit card numbers

- Phone numbers and e-mail addresses

- Names and addresses in the phone book

- Student ID and credit card numbers

Which of the following will find vulnerabilities and fix or protect against them?

- Phishing

- White-hat hacking

- Packet sniffing

- Social engineering

- White-hat hacking

What is required to verify authenticity of the recipient? Select three that apply.

- Digital signatures

- Certificates

- Encryption

- Anti-viral software

- Digital signatures

- Certificates

- Encryption

In strategic risk analysis, what is the first step?

- Identify vulnerabilities

- Determine threats

- Identify information assets

- Prioritize risks

- Identify information assets

In strategic risk analysis, which is the last step among the ones listed here?

- Identify vulnerabilities

- Identify information assets

- Determine threats

- Prioritize risks

- Prioritize risks

Learning about social engineering and how to protect passwords is an example of ___.

- education

- authentication

- access control

- education

All of the following are authentication except

- password.

- phishing.

- key card.

- fingerprint.

- phishing.

Access rights

- may be provided by biometrics.

- are a password to log in.

- will include files that the user can access.

- will prove who you are.

- will include files that the user can access.

A local area network (LAN)

- allows hardware sharing between two offices.

- allows hardware sharing within one office.

- allows software sharing between two offices.

- allows hardware sharing within one office.

How does a wide area network (WAN) enhance the business ecosystem? Select two that apply.

- Employees in different locations can share software.

- Team members can review files on the shared drive synchronously.

- The network ensures privacy of customer information.

- The network provides greater security.

- Employees in different locations can share software.

- Team members can review files on the shared drive synchronously.

Which of the following connects computers to share information and resources?

LAN (local area network): A LAN connects computers over a relatively short distance, allowing them to share data, files, and resources.

What is sharing of resources in computer?

In computing, a shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network. It is a device or piece of information on a computer that can be remotely accessed from another computer transparently as if it were a resource in the local machine.

Which of the following is a collection of computers that are connected to share information?

The correct answer is Internet. The collection of computers and servers that are connected to each other using routers and switches around the world is known as the Internet.

What is a collection of computer network called?

A collection of interconnected network is Internetwork. A network is a collection of computers or others types of hardware, which is connected by communication channels that allow sharing of resources and information.