True: A network links two or more computers together to communicate and share resources., Backend refers to a user at one computer using a program on another computer to process and store information., Frontend refers to a user's computer where data entry and minor processing functions are performed., A PAN (Personal Area Network) is temporarily formed by joining Bluetooth devices., A city and its major suburbs are often covered by a single MAN (metropolitan area network)., A dedicated server is used for one specific function., A Network Interface Card (NIC) is an expansion card that enables a computer to connect to a network., A company uses a site license to allow multiple users to access software from a file server., Client-server Resource Model is the only choice for large networks., A centralized server responsible for security is a domain controller., Topology refers to the physical layout of computers on a network., Bus topology is cheap but a single break disrupts the entire network., Star topology branches each network device off a hub or switch., Hybrid topology takes the best features from the other topologies., Protocol refers to the common language computers use to communicate with each other., The sever layers of the OSI model are physical, data link, network, transport, session, presentation and application., False: A LAN and a WAN cover approximately the same physical area., Centralized processing divides processing between a few centralized servers., File locking prevents anyone and everyone from accessing a file., There are always 8 piconets in a scatternet., A SAN (Storage Area Network) is comprised entirely of block storage., Primary network components are servers, clients or workstations, resources and printers., A workstation may or may not connect to a network, Client software allow a guest to log onto a company's internal network., Network resources refers exclusively to computer hardware like servers, computers and peripherals., Peer to peer networks have centralized organization., Ring topology is also known as hub and spoke., Data flows both ways in ring topology., Mesh topology provides good fault tolerance and is logistically simple., The Open System Interconnection (OSI) model determines network security., A session is comprised of multiple frames., CSMA/CD stands for Competition Sensitive Access with Collision Denial.,
0%
Understanding Networking Principles (220-1101, Unit 5.1)
Share
Share
Share
by
Jacaceres
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
True or false
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?