Module 1 Homework Assignment ISY101: Introduction to Computer Systems Studentâ??s Name Instructorâ??

Module 1
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M1HW-FL.doc

Homework
Assignment 1
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click to
view an example.
1. Name 5 keys on a computer
keyboard and describe each of their functions.
2. What role does digital
technology play in freedom of speech and democracy?
3. Discuss whether or not
handheld devices are computers.Module 2
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M2HW-FL.doc

Homework
Assignment 2
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. Discuss where a computer
stores its basic hardware settings, why it does so, and what some of those
settings are.
2. Compare storage devices
using four criteria: versatility, durability, speed, and capacity.Module 3
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M3HW-FL.doc

Homework
Assignment 3
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. Discuss the advantages
and disadvantages of spreadsheet software as number-crunching software.
2. What are the advantages
and disadvantages of purchasing a software suite?Module 4
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M4HW-FL.doc

Homework
Assignment 4
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. List and describe the
events that take place during the boot process.
2. A file management utility
provides tools and procedures to help you keep track of your program and data
files. These tools are most useful when
you have a logical plan for organizing your files and when you need to follow
some basic file guidelines. List and
discuss those guidelines.Module 5
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M5HW-FL.doc

Homework
Assignment 5
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. What are the limitations
of powerline networks?
2. Discuss the disadvantages
of LANs.Module 6
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M6HW-FL.doc

Homework
Assignment 6
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. Explain the difference
between portable Internet access and mobile Internet access.
2. Explain what VoIP is and
how it works.Module 7
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M7HW-FL.doc

Homework
Assignment 7
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. Give two reasons why it
is important to upgrade your browser when a new version becomes available.
2. Compare and contrast POP
e-mail to Web-based e-mail systems in terms of control, security, and
accessibility.Module 8
Homework Assignment
ISY101: Introduction
to Computer Systems
Student’s Name
Instructor’s
Name
Date

2010-xx-xxxxxx-ISY101-M8HW-FL.doc

Homework
Assignment 8
ISY 101: Introduction to Computer
Systems
Directions:
Using Microsoft Word to save and submit your work, please complete the
following homework assignment. Please
include a title page with this assignment. Your title page should include the assignment
number, course, your name, your instructor, and the date submitted. Please click.allied.edu/uploadedfiles/Docs/9c1f6b96-24e1-4c40-ac00-efeca43fd88a.doc”>HERE to
view an example.
1. List and describe the
different file format types used for bitmap graphics.
2. There are a variety of
techniques used by content providers to provide digital media from unlicensed
duplication and use. Discuss Content
Scrambling System as a DVD DRM technology.discussionsDiscussion Board #1
Please make sure that you provide your initial response to ALL three
(3) questions by Wednesday in order to allow enough time in the week
for my feedback from other students. All grades are post by the first
of the following week.
In what ways does digital technology affects society?What are the characteristics of personal computers, servers, mainframes, and supercomputers?What are the main differences between data and information?
“Substantive posts†mean replying to another student’s posts or the
Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.Discussion Board #2

Please make sure that you provide your initial response to ALL three (3) questionsby
Wednesday in order to allow enough time in the week for my feedback
from other students. All grades are post by the first of the following
week.

1. What are the main differences between the components of a desktop computer and a laptop or mobile device?
2. What is RAM? How does it work? And how it differs from disk storage?
3. What are the main differences between magnetic storage and optical storage?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.

Be
sure to follow Discussion Board guidelines in your response. AAU’s
grading policy states–Points for participation will be awarded based on
the following criteria:
1. Comments
made in the Discussion Board should be substantive (e.g. having a firm
basis in reality and being therefore important, meaningful, or
considerable) and should be substantiated and persuasively presented,
whether it is the first original posting, acknowledging faculty’s
feedback, or asking for further clarifications. Comments like “well
done,” “oh I see,” “wow,” etc. are NOT considered substantive.
2. Posted
comments from students should reflect understanding of the course
objectives and original thought and reflection on the course topic and
concepts.
3. Comments
should extend the thoughts and ideas offered by your instructor and/or
your classmates (if the course includes multiple students). The best
contributions will reflect not only excellent preparation but
interpretive and integrative thinking as well.
4. Comments should show evidence of thorough reading and analysis of the material being studied and discussed.
5. Student comments should show a willingness to test new ideas and risk comments that are not mainstream and “safe.”Posted by Deborah Colon-mateo at 03/31/12 09:43 PM
Discussion Board #3

Please make sure that you provide your initial response to ALL three (3) questions by
Wednesday in order to allow enough time in the week for my feedback
from other students. All grades are post by the first of the following
week.

1. What are the main features and uses of word processing, spreadsheet, desktop publishing, and Web authoring software?
2. What types of software are available for graphics, video, music, education and reference, entertainment, and business?
3. How does antivirus software work?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.

Be
sure to follow Discussion Board guidelines in your response. AAU’s
grading policy states–Points for participation will be awarded based on
the following criteria:
1. Comments
made in the Discussion Board should be substantive (e.g. having a firm
basis in reality and being therefore important, meaningful, or
considerable) and should be substantiated and persuasively presented,
whether it is the first original posting, acknowledging faculty’s
feedback, or asking for further clarifications. Comments like “well
done,” “oh I see,” “wow,” etc. are NOT considered substantive.
2. Posted
comments from students should reflect understanding of the course
objectives and original thought and reflection on the course topic and
concepts.
3. Comments
should extend the thoughts and ideas offered by your instructor and/or
your classmates (if the course includes multiple students). The best
contributions will reflect not only excellent preparation but
interpretive and integrative thinking as well.
4. Comments should show evidence of thorough reading and analysis of the material being studied and discussed.
5. Student comments should show a willingness to test new ideas and risk comments that are not mainstream and “safe.”

NOTE: You
must post in the Module Discussion Board three times per week in order
to qualify for full credit. The first post should be your primary
response to the discussion topic/question. Subsequent posts should be
directed to comments made by your instructor and/or your classmates (if
the course includes multiple students). Please do your best to make
your primary post early in the week (at least by Wednesday)MOD 4 .allied.edu/Images/1×1.gif”> Posted by Deborah Colon-mateo at 03/31/12 09:44 PM
Discussion Board #4

Please
make sure that you provide your initial response to ALL three (3)
questions by Wednesday in order to allow enough time in the week for my
feedback from other students. All grades are post by the first of the following week.

1. What types ofoperating systems are used on today’s personal computers, mobile devices, and servers?
2. What are the six steps used when booting a PC?
3. Why is it important to have a recovery disk?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.

Be
sure to follow Discussion Board guidelines in your response. AAU’s
grading policy states–Points for participation will be awarded based on
the following criteria:MOD 5Please
make sure that you provide your initial response to ALL three (3)
questions by Wednesday in order to allow enough time in the week for my
feedback from other students. All grades are post by the first of the following week.

1. What are the differences between a LAN and a WAN?
2. What are the roles of communications protocols?
3. What are the security measures used for wired and wireless networks?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.

Be
sure to follow Discussion Board guidelines in your response. AAU’s
grading policy states–Points for participation will be awarded based on
the following criteria:MOD 6Please
make sure that you provide your initial response to ALL three (3)
questions by Wednesday in order to allow enough time in the week for my
feedback from other students. All grades are post by the first of the following week.

1. What are the two protocols used on the Internet? And what they are used for?
2. What are the main differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names?
3. What are the advantages and disadvantages of dial-up, cable, DSL, ISDN, satellite, and fixed wireless Internet services?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
MOD 7Posted by Deborah Colon-mateo at 03/31/12 09:47 PM
Discussion Board #7

Please
make sure that you provide your initial response to ALL three (3)
questions by Wednesday in order to allow enough time in the week for my
feedback from other students. All grades are post by the first of the following week.

1. What are the two Web page authoring tools?
2. Why is e-commerce becoming so popular with consumers and vendors?
3. What are the difference between a POP and Web-based e-mail?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.

Be
sure to follow Discussion Board guidelines in your response. AAU’s
grading policy states–Points for participation will be awarded based on
the following criteria:MOD 8 .allied.edu/Images/1×1.gif”> Posted by Deborah Colon-mateo at 03/31/12 09:47 PM
Discussion Board #8

Please
make sure that you provide your initial response to ALL three (3)
questions by Wednesday in order to allow enough time in the week for my
feedback from other students. All grades are post by the first of the following week.

1. What are some advantages, disadvantages, and uses for digital media?
2. What are the formats used for digital media?
3. What are the different digital video formats?

“Substantive
posts†mean replying to another student’s posts or the Professors posts
in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.

Be
sure to follow Discussion Board guidelines in your response. AAU’s
grading policy states–Points for participation will be awarded based on
the following criteria:check your understandings1. The
“brain” of your computer is called the:
a. microchip.
b. microprocessor.
c. memory chip.
d. hard drive.
1
2. A
computer’s operating system is responsible for which of the following?
a. Running
application software
b. Manipulating files
on storage devices
c. Transferring data
to and from printers
d. All of the choices
apply
1
3. When the
computer is busy, the mouse pointer arrow shape turns into a(n):
a. hourglass.
b. square.
c. circle.
d. both a and c.
1
4. Which of
the following mouse actions allows you to manipulate on-screen objects?
a. Click
b. Double-click
c. Right-click
d. All of the choices
apply
1
5. Function
keys on the keyboard activate all of the following, except:
a. Save.
b. Help.
c. Print.
d. Delete.
0
6. Which of
the following keyboard keys displays previous screen information?
a. Page down key
b. End key
c. Page up key
d. Delete key
1
7. Which of
the following keyboard keys capitalizes all the letters you type when it is
engaged?
a. End key
b. Caps lock key
c. Tab key
d. Home key
1
8. Which of
the following is used to delete one character to the left of the insertion
point?
a. Esc key
b. Ctrl key
c. Backspace key
d. None of the
choices apply
1
9. The
__________ displays a series of tools for accomplishing various tasks.
a. scroll bar
b. toolbar
c. menu bar
d. title bar
1
10. Which of
the following shrinks the window to a button at the bottom of the screen?
a. Minimize button
b. Maximize button
c. Close button
d. None of the
choices apply
1
11. Which of
the following is needed to send and receive e-mail?
a. Internet
connection
b. E-mail account
c. Software
d. All of the choices
apply
1
12. To create
a secure password, do all of the following, except:
a. use at least five
characters, mixing numbers and letters.
b. use your family
name or name of family member.
c. do not use a word
from the dictionary.
d. do not forget your
password.
1
13. Another
name for computer virus is:
a. spyware.
b. shareware.
c. software.
d. malware.
1
14. Internet
scams in the form of spam messages try to get you to do all of the following,
except:
a. download a virus.
b. divulge your bank
account numbers.
c. subscribe to
weekly newsletters.
d. send in money for
products you will never receive.
1
15. An e-mail
scam that arrives in your e-mailbox looking like an official correspondence
from a major company is called:
a. phishing.
b. fishing.
c. flushing.
d. none of the
choices apply.
1
16. The
digital revolution became a significant factor in the 1980s but ended in the
1990s with the dot com bubble burst.
a. True
b. False
1
17. Digital
electronics use electronic __________ to represent data.
a. circuits
b. switches
c. transistors
d. components
1
18. __________
is the process of converting text, numbers, sound, photos, and video into data
that can be processed by digital devices.
a. Digitization
b. Digital conversion
c. Scanning
d. Rasterization
1
19. Symbols
that represent facts, objects, and ideas are:
a. data.
b. programming.
c. processing.
d. globalization.
1
20. A(n)
__________ is a microprocessor-based computing device designed to meet the
computing needs of an individual.
a. personal computer
b. mainframe
c. ALU
d. server
0
21. The
purpose of a server is to serve computers on a network.
a. True
b. False
1
22. A(n)
__________ is a large and expensive computer capable of simultaneously
processing data for hundreds or thousands of users.
a. mainframe
b. minicomputer
c. supercomputer
d. workstation
0
23. A
compute-intensive problem runs on a:
a. server.
b. mainframe.
c. supercomputer.
d. super PC
1
24. A
special-purpose microprocessor that is built into the machine it controls is
a(n):
a. supercomputer.
b. mainframe.
c. microcontroller.
d. workstation.
1
25. Data
becomes __________ when it is presented in a format that people can understand
and use.
a. information
b. processed
c. graphs
d. presentation
1
26. The type
of data where text, numbers, graphics, sound, and video have been converted
into discrete digits is:
a. information.
b. analog.
c. digital.
d. ASCII.
1
27. The type
of data that is represented using an infinite scale of values is:
a. information.
b. analog.
c. digital.
d. ASCII.
1
28. Data
transmission speeds are typically expressed as __________ and storage is
typically expressed as __________.
a. bits/bytes
b. bytes/hertz
c. hertz/bits
d. mites/bytes
1
29. 1,024
bytes is a __________; 1,048,576 bytes is a __________; and 1,073,741,824 bytes
is a __________.
a.
kilobyte/megabyte/gigabyte
b.
megabyte/gigabyte/kilobyte
c.
gigabyte/megabyte/terabyte
d.
terabyte/gigabyte/megabyte
1
30. A
super-thin slice of semiconducting material packed with microscopic circuit
elements is a(n):
a. integrated
circuit.
b. computer chip.
c. microchip.
d. all of the choices
apply.
1 Question Points
1. The term
__________ designates equipment that might be added to a computer system to
enhance its functionality.
a. digital device
b. system add-on
c. disk pack
d. peripheral device
1
2. The main
component of a typical desktop computer is the __________, which houses the
processor, memory, some storage devices, and display and sound circuitry.
a. kiosk
b. system unit
c. form factor
d. platform
1
3. __________
are the form factor of choice for computer owners who might want to upgrade
components in the future because it is easy to get inside the case and swap out
parts.
a. Cube units
b. Base units
c. Tower units
d. Minicases
1
4. The term
__________ refers to the size and dimensions of a computer component.
a. form factor
b. system
specification
c. disk header
d. peripheral metric
1
5. A
__________ computer is a small, lightweight personal computer with screen,
keyboard, storage, and processing components integrated into a single unit.
a. tower
b. tablet
c. desktop
d. portable
1
6. Currently,
there are three personal computer platforms: PC, Mac, and Linux.
a. True
b. False
1
7. __________
is a temporary holding area for data, application program instructions, and the
operating system.
a. ROM
b. EEPROM
c. Disk storage
d. RAM
1
8. RAM can
be thought of as the __________ for the computer’s processor.
a. factory
b. operating room
c. waiting room
d. planning room
1
9. Unlike
disk storage most RAM is:
a. virtual.
b. integrated.
c. non-volatile.
d. volatile.
1
10. If the
system runs out of RAM, the operating system uses an area of the hard disk
called __________ to store parts of a program or data file until they are
needed.
a. volatile memory
b. capacitor memory
c. virtual memory
d. integrated memory
1
11. __________
is a type of memory circuitry that holds the computer’s startup routine.
a. RIM (Read initial
memory)
b. RAM (Random access
memory)
c. ROM (Read only
memory)
d. REM (Ready ever
memory)
1
12. Hard disk
storage technology can be classified as __________ storage.
a. optical
b. magnetic
c. fluid-state
d. pipelined
1
13. CD and DVD
storage technologies can be classified as __________ storage.
a. solid state
b. bubble
c. magnetic
d. optical
1
14. Which of
the following is an example of a rerecordable optical storage medium?
a. BD-RE
b. CD-RW
c. DVD+RW
d. All of the choices
apply
1
15. Also
called flash memory storage, solid state storage:
a. contains platters
made of aluminum or glass.
b. provides fairly
fast access to data.
c. includes moving
parts.
d. all of the choices
apply.1. System
software is designed t accomplish __________ tasks.
a. real-world
b. computer-centric
c. gaming
d. only operating
systems
1
2. Application
software is designed to accomplish __________ tasks and includes __________.
a.
real-world/statistical software
b. computer-centric
tasks/device drivers
c. gaming
tasks/utilities
d. only systems
tasks/Windows Vista
1
3. What are
two main categories of software?
a. System and
application
b. System and
methodical
c. Application and
processing
d. Authoring and
publishing
1
4. Software
most commonly associated with productivity software is:
a. the Windows Vista
operating system.
b. real-time players.
c. word processing
software.
d. browsers.
1
5. Productivity
software that provides you with the ability to create, spell-check, edit, and
format is considered __________ software.
a. word processing
b. desktop processing
c. Web authoring
d. spreadsheet
0
6. Productivity
software that has sophisticated features to help you produce professional
quality output is considered __________ software.
a. word processing
b. desktop publishing
c. Web authoring
d. spreadsheet
1
7. Spreadsheets
are particularly useful for:
a. what-if analysis.
b. use as a
calculator.
c. creating tables.
d. none of the
choices apply.
1
8. 3-D
graphics software provides a set of tools for creating __________ that
represents three-dimensional objects.
a. models
b. prototypes
c. wireframes
d. photos
1
9. Software
designed to generate unique musical compositions simply by selecting the
musical style, instrument, key, and tempo is:
a. ear training.
b. notation.
c. computer-aided
music.
d. MIDI.
1
10. A type of
software that provides a set of tools for transferring video footage from a
camcorder to a computer is __________ software.
a. role-playing
b. video editing
c. simulation
d. ear training
1
11. A
__________ is a legal contract that defines the ways in which you may use a
computer program.
a. software license
b. software agreement
c. software copyright
d. purchase agreement
1
12. Software
that is available without restriction is:
a. shareware.
b. open source.
c. public domain.
d. GPL.
1
13. When
installing software, you should:
a. always select the
full installation.
b. always select the
custom installation.
c. always select
minimum installation.
d. select custom when
you don’t need all the features.
1
14. To get rid
of software you no longer want, you:
a. delete the icon.
b. delete the files.
c. run an uninstall
routine.
d. none of the
choices apply.
1
15. Antivirus
software does not require any updates.
a. True
b. False
1Question Points
1. Most
personal computers today are sold with preinstalled operating systems including
all of the following, except:
a. Linux.
b. Windows.
c. Mac OS.
d. HP.
1
2. The most
obvious responsibility of your computer’s operating system is to:
a. provide an
environment for running software.
b. allow device
drivers to work.
c. provide a graphic
interface for your interactions with the computer.
d. allow you to use your
keyboard.
1
3. An
operating system’s __________ capability supports a division of labor among all
the processing units.
a. multitasking
b. multithreading
c. multiprocessing
d. multicomputing
1
4. The
combination of hardware and software that helps people and computers
communicate with each other is a user:
a. interface.
b. configuration.
c. database.
d. position.
1
5. The six
steps in the boot process are powering up, starting the boot program,
powering-on self-test, identifying peripheral devices, loading the operating
system, and checking configuration and customization.
a. True
b. False
1
6. The Palm
OS __________ is currently used for popular Palm brand PDAs and smartphones.
a. Garnet
b. Windows Mobile
c. iPhone
d. Symbian
1
7. Five
operating systems dominate the realm of handheld computers: Windows Mobile OS,
iPhone OS X, Symbian OS, Android OS, and Palm OS.
a. True
b. False
1
8. Current
versions of Windows support file names up to __________ characters long.
a. 125
b. 200
c. 255
d. unlimited
1
9. An
optional file identifier that is separated from a main file name by a period is
a:
a. file convention.
b. file extension.
c. file path.
d. file folder.
1
10. File
endings with .exe are __________ files.
a. executable
b. executive
c. exception
d. all of the choices
apply
1
11. A file
extension is always the same as a file format.
a. True
b. False
1
12. An
extension of .sys designated a __________ type of file.
a. configuration
b. support
c. sound
d. database
1
13. An
extension of .ocx designates a __________ type of file.
a. configuration
b. support
c. sound
d. database
1
14. An
extension of .wav designates a __________ type of file.
a. configuration
b. support
c. sound
d. database
1
15. A(n)
__________ disk is a bootable CD, DVD, or other media that contains a complete
copy of your computer’s hard disk as it existed when shipped from the
manufacturer.
a. boot
b. recovery
c. OS
d. complete
1Question Points
1. A WAN
provides connectivity within a limited geographical area often within a single
building.
a. True
b. False
1
2.
The type of network shown in the accompanying figure is
known as a:
a. LAN.
b. WAN.
c. MAN.
d. TAN.
1
3. Which of
the following can serve as a node on the network in a LAN?
a. Computer
b. Networked
peripheral
c. Network device
d. All of the choices
apply
1
4. Which of
the following is not a type of network device?
a. Hub
b. Switch
c. Workstation
d. Router
1
5. A
peer-to-peer network:
a. contains one or
more computers configured with server software.
b. contains one or
more computers configured with client software.
c. allows
workstations to share resources, such as files and applications.
d. has a computer
that provides a centralized repository for data.
1
6. A
__________ topology features a central connection point for all workstations
and peripherals.
a. mesh
b. star
c. bus
d. ring
1
7. The
physical arrangement of devices in a network is referred to as its physical:
a. topography.
b. logography.
c. logology.
d. topology.
1
8. In a
__________ topology, network nodes are connected in a closed circle.
a. circle
b. closed
c. ring
d. star
1
9. A tree
topology:
a. is a blend of star
and ring networks.
b. consists of
multiple star networks connected into a bus configuration by a backbone.
c. does not offer
flexibility for expansion.
d. is no longer used.
1
10. A bus
topology connects all devices to a common backbone, which functions as a shared
communications link.
a. True
b. False
1
11. Thomas has
been asked by a friend to overhaul an existing network so that it is more
robust. She wants each device on the network to connect to all of the other
devices on the network. Which network topology will Thomas most likely use?
a. Star topology
b. Bus topology
c. Mesh topology
d. Ring topology