Download presentation
1
Network+ Guide to Networks, Fourth Edition
Chapter 1 & 2 Checkup
2
True or False A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system. Resource sharing is controlled by a central computer or authority. Clients on a client/server network share their resources directly with each other. Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible. Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. Every process that occurs during network communications can be associated with a layer of the OSI Model. Among the Session layer’s functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Addressing is a system for assigning unique identification numbers to devices on a network. Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.
3
True or False A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system. Resource sharing is controlled by a central computer or authority. Clients on a client/server network share their resources directly with each other. Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible. Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. Every process that occurs during network communications can be associated with a layer of the OSI Model. Among the Session layer’s functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Addressing is a system for assigning unique identification numbers to devices on a network. Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.
4
Multiple Choice 1. A(n) ____ is a group of computers and other devices that are connected by some type of transmission media. a. access server c. NOS b. network d. NIC 2. In a(n) ____ network, every computer can communicate directly with every other computer. a. LAN c. WAN b. client/server d. peer-to-peer 3. The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. a. NIC c. Web server b. network operating system d. WAN 4. A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address. a. host c. segment b. node d. connectivity device 5. The physical layout of a computer network is known as its ____. a. protocol c. connectivity b. topology d. addressing
5
Multiple Choice 6. The scheme used to assign a unique identifying number to every node on a network is known as ____. a. addressing c. security b. transmission d. protocol 7. Another term for a remote access server is ____. a. client/server c. data server b. mail server d. communications server 8. A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. a. Web server c. WAN b. node d. LAN 9. Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network. a. Session c. Data link b. Application d. Transport 10. ____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data. a. Flow control c. Segmentation b. Routing d. Virtual addressing
6
Multiple Choice 1. A(n) ____ is a group of computers and other devices that are connected by some type of transmission media. a. access server c. NOS b. network d. NIC 2. In a(n) ____ network, every computer can communicate directly with every other computer. a. LAN c. WAN b. client/server d. peer-to-peer 3. The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. a. NIC c. Web server b. network operating system d. WAN 4. A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address. a. host c. segment b. node d. connectivity device 5. The physical layout of a computer network is known as its ____. a. protocol c. connectivity b. topology d. addressing
7
Multiple Choice 6. The scheme used to assign a unique identifying number to every node on a network is known as ____. a. addressing c. security b. transmission d. protocol 7. Another term for a remote access server is ____. a. client/server c. data server b. mail server d. communications server 8. A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. a. Web server c. WAN b. node d. LAN 9. Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network. a. Session c. Data link b. Application d. Transport 10. ____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data. a. Flow control c. Segmentation b. Routing d. Virtual addressing
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.