暗記メーカー
ログイン
ITC
  • Mike

  • 問題数 34 • 11/19/2024

    記憶度

    完璧

    5

    覚えた

    14

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    links computers for shared resources through the internet. Networking requires computers to access multiple networks and share their resources for computer operations, including web browsing, sending and retrieving emails, sharing files and images, and downloading music.

    Computer Networking

  • 2

    This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.

    Metropolitan Area Network (MAN)

  • 3

    liable for end-to-end delivery between devices. It deals with message integrity between source and destination and segmenting and reassembling packets.

    Transport Layer

  • 4

    accepts and structures the messages for an application by converting the message from one code to another. It also processes data compression and encryption.

    Presentation layer

  • 5

    interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.

    Hub

  • 6

    provide resources, data, services, and programs to other computers or clients over a network. It is tasked to handle complex operations such as databases, emails, and shared files.

    Servers

  • 7

    a security device that monitors and secures incoming and outgoing network traffic based on established security policies. It is essentially the barrier between a private internal network and the public Internet.

    Firewall

  • 8

    combines the functionality of a modem and a router, thus making it a convenient source for Internet connectivity.

    Wi-fi Modem

  • 9

    the most common networking topology in LANs today, where all the devices connect to a central switch or hub.

    Star

  • 10

    deals with the fundamental human rights of a person's privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

    Internet Privacy

  • 11

    It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

    Intrusion Detection System (IDS)

  • 12

    Puts operations and transactions on hold

    Revenue Loss

  • 13

    is the best way to ensure network reliability, as well as an occasional internet check-up and monitoring.

    Proper Cable Management

  • 14

    Internet and network failure significantly affect productivity as tasks heavily rely on the internet. Employees will remain stagnant until the downtime is fixed.

    Lesser Productivity

  • 15

    Failures in operations and transactions mean failure to meet agreed-upon outputs and deliverables on time. Especially when crucial outputs are at risk.

    Legal Repercussions

  • 16

    The smallest type of network with a limited span interconnects compatible personal devices. Examples include wireless earphones-to-smartphone and computer-to-printer connections.

    Personal Area Network (PAN)

  • 17

    This is used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.

    Local Area Network (LAN)

  • 18

    This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.

    Metropolitan Area Network (MAN)

  • 19

    liable for end-to-end delivery between devices It deals with message integrity between source and destination and segmenting and reassembling packets.

    Transport Layer

  • 20

    accepts and structures the messages for an application by converting the message from one code to another. It also processes data compression and encryption.

    Presentation Layer

  • 21

    using a coaxial cable, preventing data transmission from being extremely bandwidth efficient.

    Bus

  • 22

    Each connected device can see the computer's data traffic to the printer. The other devices wait for pauses or halts before establishing their transmissions.

    Bus

  • 23

    It is one of the reasons why bus topologies are rarely used in modern computer networks.

    Bus

  • 24

    The most common networking tropology in LANs today, where all the devices connect to a central seitch or hub.

    Star

  • 25

    But a hub is a multiport repeater that broadcasts and displays the data it receives to the devices connected.

    Star

  • 26

    Network Type: Wired, Select the correct advantages

    Faster network data transfer speed, Not susceptible to outside interference, Inexpensive setup

  • 27

    Network Type: Wireless, Select the correct DISADVANTAGES.

    Security Issues, Slower Data Transfer

  • 28

    It relies on machine learning to develop a model of trusted activity then compares it to the current activity

    Intrusion Detection System (IDS)

  • 29

    Never trust links from suspicious emails, sketchy websites, and advertisements. Double-check the URL to see if it has the correct format before clicking.

    Double-checking Unfamiliar Links

  • 30

    Better check reviews and read about their security features before using a web browser.

    Securing Web Browser

  • 31

    bad management and maintenance

    Damaged Reputation

  • 32

    The best way to prevent this is by alerting every concerned party as soon as failure happens to lay down plans of recovery without compromising the quality and the demand of the clients.

    Legal Repercussions

  • 33

    Using a Virtual Private Network (VPN)

    best way to have Internet privacy , personal information stay secure and private from snoopers

  • 34

    Network devices for replacement.

    Maintenance Cost