![]() |
Главная Случайная страница Контакты | Мы поможем в написании вашей работы! | |
|
I. a) True or false? Read the sentences and give your arguments for and against.
1. Wireless Internet service providers (WISPs) provide connection speeds more than 30 times faster than dial-up connections – from 384 Kbps to2.0 Mbps.
2. Connecting to the Internet requires special devices – typically a cable or DSL modem linked to a computerusing an Ethernet cable.
3. Establishing and maintaining computer security is necessary to keep hardware, software, and data safe from harm or destruction.
4. The best way to protect data is to effectively control access to it.
5. Users may need a password to log onto a computer system or to specific parts of it.
6. A network is a group of two or more computers linked together.
7. A telephone network is similar in makes up to a computer network. The Public Switched Telephone Network (PSTN) supports telephone service, and it is the world’s largest collection of interconnected commercial and government- owned voice-oriented systems.
8. You can use a network for information sharing, hardware sharing, software sharing, and as a collaborative environment.
9. Networks are categorized according to size as local area networks (LANs) and wide area networks (WANs).
10. LANs connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as a office building, a school, or a home.
11. A WAN is made up of several connected local area networks.
12. In a client/server network, one or more computers on the network acts as a server. The server manages network resources.
13. In a peer-to-peer (P2P) network, all of the computers are equal. No computer is designated as the server. People on the network each determine what files on their computer they share with others on the network.
14. Data insecurity is a risk with many networks.
15. Some risks to computers are natural causes, some are accidents, and others are intentional.
16. The biggest network is the Internet.
17. E-mail always is private.
18. A WAN covers a large geographical area.
19. The best way to protect data is to effectively control access to it.
20. Networks are classified according to speed.
21. Communication languages used by computer devices are called network protocol.
22. Yet another way to classify computer networks is by the set of protocols they support.
23. Networks often implement multiple protocols with each supporting specific applications.
24. Popular protocols include TCP/IP, the most common protocol found on the Internet and in home networks.
b) Multiple Choice. Select the best response for the following statements:
1. A telephone network is similar in make up to a ___________ network.
a. Computer network b. Local area network c. Tiny area network d. Metropolitan area network
2. A ____________ server acts as an intermediary between a user and the Internet.
a. High-level b. Proxy c. Connected-level d. Biometric
3. The two broad categories of network architecture are _______ and peer-to-peer.
a. Intranet/extranet b. DSL c. Client/server d. Proxy/server
4. A(n) _____________ can carry both data and voice.
a. SLD b. Bridge c. WAN d. DSL
5. A ________________ is a variation of the LAN that use nophysical wires.
a. WLAN b. PSTN c. P2P d. WiMAX
Дата публикования: 2015-02-18; Прочитано: 339 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!