Chapter 1
TRUE/FALSE
1. File and printer sharing for Microsoft networks is an example of a network protocol.
ANS: F PTS: 1 REF: Page 16
2. A network that has locations in different countries is considered a WAN.
ANS: T PTS: 1 REF: Page 28
3. In order to find out your MAC address, you should open a command prompt and type ipconfig
/all.
ANS: T PTS: 1 REF: Page 23
4. What makes a computer a “server” is the fact that it has a server operating system installed on it.
ANS: T PTS: 1 REF: Page 33
5. Each component of a computer is designed to perform only one specific task—either input,
processing, or output.
ANS: F PTS: 1 REF: Page 2
MULTIPLE CHOICE
,1. The XYZ company has two offices, one downtown, and a brand new office in the newer section
of town. To connect the two offices, they will need a dedicated line, probably leased from the
local phone company. What type of network will they be implementing to connect their two
offices?
a. LAN
b. internetwork
c. MAN
d. SAN
ANS: C PTS: 1 REF: Page 28
2. Airwaves are an example of what type of network component?
a. Network Interface Card
b. network medium
c. interconnecting device
d. network protocol
ANS: B PTS: 1 REF: Page 15
3. Windows 7, Windows Vista, and Windows XP are all examples of which of the following?
a. network protocols
b. client operating systems
c. server software
d. server operating systems
ANS: B PTS: 1 REF: Page 33
,4. What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
a. more difficult to setup and install
b. more expensive
c. higher administration costs
d. limited security
ANS: D PTS: 1 REF: Page 35
5. What command would you issue from a command prompt to see a listing of the computers in
your workgroup?
a. arp -a
b. net view
c. ipconfig /all
d. ping
ANS: B PTS: 1 REF: Page 39
6. What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
a. additional costs
b. decentralized data access
c. difficult to expand
d. less secure
ANS: A PTS: 1 REF: Page 37
7. For any device to communicate with the computer, either through input or output, it must have
what special software installed?
, a. client
b. network interface
c. network protocol
d. device driver
ANS: D PTS: 1 REF: Page 13
8. When data is being prepared for transmission onto the network, it is broken into small pieces and
a header and trailer are added to each piece to help identify it. What is this process called?
a. multitasking
b. verification
c. encapsulation
d. application
ANS: C PTS: 1 REF: Page 32
9. Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value.
What is this address called?
a. IP address
b. subnet mask
c. MAC address
d. default gateway
ANS: C PTS: 1 REF: Page 23
10. What was the primary reason to create a network?