Podcast
Questions and Answers
Physical topology refers to how software controls access to network resources.
Physical topology refers to how software controls access to network resources.
False
Logical topology includes how users and software initially gain access to the network.
Logical topology includes how users and software initially gain access to the network.
True
A network operating system (NOS) is not required by client-server models.
A network operating system (NOS) is not required by client-server models.
False
In a peer-to-peer (P2P) network model, there is centralized control.
In a peer-to-peer (P2P) network model, there is centralized control.
Signup and view all the answers
Peer-to-peer network models are scalable.
Peer-to-peer network models are scalable.
Signup and view all the answers
Peer-to-peer network models are practical for large installations.
Peer-to-peer network models are practical for large installations.
Signup and view all the answers
Network and computer technicians need to know how to protect themselves but do not need to protect sensitive electronic components.
Network and computer technicians need to know how to protect themselves but do not need to protect sensitive electronic components.
Signup and view all the answers
The best escape route or emergency exit should not be known by individuals in case of an emergency.
The best escape route or emergency exit should not be known by individuals in case of an emergency.
Signup and view all the answers
The fire suppression system in the data center should include an emergency alert system and portable fire extinguishers.
The fire suppression system in the data center should include an emergency alert system and portable fire extinguishers.
Signup and view all the answers
An SDS (safety data sheet) provides information on handling chemical solvents but does not include first-aid measures.
An SDS (safety data sheet) provides information on handling chemical solvents but does not include first-aid measures.
Signup and view all the answers
The security system allows access during a failure (fail open) but does not deny access during the failure (fail close).
The security system allows access during a failure (fail open) but does not deny access during the failure (fail close).
Signup and view all the answers
Network and computer technicians do not need to pay attention to physical and chemical properties of substances.
Network and computer technicians do not need to pay attention to physical and chemical properties of substances.
Signup and view all the answers
The safety procedures and policies can be scanned, copied, duplicated, or posted to a publicly accessible website.
The safety procedures and policies can be scanned, copied, duplicated, or posted to a publicly accessible website.
Signup and view all the answers
The copyright of the text belongs to Cengage and it may be freely copied or duplicated for commercial use.
The copyright of the text belongs to Cengage and it may be freely copied or duplicated for commercial use.
Signup and view all the answers
The application layer describes the interface between two applications on separate computers.
The application layer describes the interface between two applications on separate computers.
Signup and view all the answers
Layer 7 of the OSI model is responsible for reformatting, compressing, and encrypting data.
Layer 7 of the OSI model is responsible for reformatting, compressing, and encrypting data.
Signup and view all the answers
The payload refers to the data passed between applications or utility programs and the OS.
The payload refers to the data passed between applications or utility programs and the OS.
Signup and view all the answers
Layer 6 of the OSI model provides services to the user, such as a browser and web server.
Layer 6 of the OSI model provides services to the user, such as a browser and web server.
Signup and view all the answers
SNMP (Simple Network Management Protocol) programs that monitor and gather information about network traffic are categorized under Layer 7 protocols.
SNMP (Simple Network Management Protocol) programs that monitor and gather information about network traffic are categorized under Layer 7 protocols.
Signup and view all the answers
The presentation layer is responsible for the application-to-application communication and end-to-end connections.
The presentation layer is responsible for the application-to-application communication and end-to-end connections.
Signup and view all the answers