answersLogoWhite

0

Computer Networking

User Avatar

Nelda Waters

Lvl 10
∙ 3y ago
4.2
☆★☆★☆★☆★☆★
5 Reviews
Add a rating

Rate this Study Guide:

☆★☆★☆★☆★☆★
Cards in this guide (19)
The definition of a boolean operator

what is boolean operator

What does the owner of a restaurant do

eat whatever they want, when ever they want

Which device helps Ethernet networks communicating at different speeds understand each other

autosensing mechanism

Which of the following events happened last

the meeting of the first Continental Congress

A business has been using a notebook to track sales and count how many pieces of each item it has in stock. As a business analyst you have been called in to help increase efficiency in this business.

add information systems

What would be used by a business to assess how the business is working within its organization goals

management plan

What would be one duty of a network administrator

designing the computer network

Which piece of network hardware converts analog signals to digital and digital signals to analog

a modem

As an intern in a marketing department Rachel uses her laptop to get data off her company's computer network and then uses the data to create a report about weekly sales. She wants to ask a question a

server

The accounting offices of Anna and Elsa Ice are linked in a network that allows employees to choose who they will send information to within the network without sending it to everyone on the network.

a network switch

An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this type of network

there are many separate points of access that pose a security risk

When troubleshooting internal networks what should you do next after you make sure everything is plugged in and the power is on

locate the problem

Which of the following is used to track and gather information without knowledge or authorization

spyware

Which of the following is a system that helps maintain the proper function of a wireless token ring

beaconing

When troubleshooting corrupted work files that appear to be infected what would you want to look for

malware

As an IT specialist you are asked to troubleshoot a problem with two computers on a network. All plugs are plugged in and power is on. What would be the most important question to ask the users of the

have they downloaded anything recently

An employee has been working on his homework during his breaks at work. He brings his flash drive in with his current assignment on it and plugs it into his computer. The company operates on an intran

if the employee's assignment file from home has a virus, it can infect the company computer when it is opened at work

A page-ranking algorithm ranks web pages according to what

the number of other web pages that link to them

What are the two parts of a uniform resource

xx

Related study guides