Chapter 8: Networking And Digital Communication

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sherleyann11
S
Sherleyann11
Community Contributor
Quizzes Created: 3 | Total Attempts: 963
| Attempts: 629 | Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. Local area network

Explanation

LAN stands for Local Area Network. It is a network that connects computers and devices within a limited area such as a home, office, or building. LANs are typically used for sharing resources, such as printers and files, and for facilitating communication between connected devices. The given options LANT and LLAN are not valid acronyms or terms commonly used in the context of computer networking. Therefore, the correct answer is LAN.

Submit
Please wait...
About This Quiz
Chapter 8: Networking And Digital Communication - Quiz

In the world today almost all businesses are computerized and one has to get some knowledge on computers, their network and how to effectively communicate with one another... see morethrough the internet. Computers are able to communicate with each other through formation of networks. Test your understanding on chapter 8 on networking and digital communication by taking this quiz. see less

2. WAN

Explanation

The correct answer is "Wide area network". A wide area network (WAN) is a type of computer network that covers a large geographical area, typically spanning multiple cities or even countries. It is used to connect different local area networks (LANs) together, allowing for communication and data transfer between them. WANs are commonly used by businesses and organizations to connect their branches or offices located in different locations.

Submit
3. Junk email

Explanation

not-available-via-ai

Submit
4. Metropolitan area network

Explanation

A Metropolitan Area Network (MAN) refers to a network that covers a larger geographical area, such as a city or a town. It is designed to connect multiple Local Area Networks (LANs) together, providing a high-speed and reliable communication infrastructure for organizations and individuals within the metropolitan area. MANs typically use fiber optic cables or wireless technology to connect various LANs and facilitate the exchange of data, voice, and video. Therefore, the correct answer is MAN.

Submit
5. Uses light waves to carry information at blinding speeds

Explanation

Fiber-optic cables are made of thin strands of glass or plastic that use light waves to transmit data. These cables are capable of carrying large amounts of information at extremely high speeds, making them ideal for broadband connections. Unlike traditional copper cables, fiber-optic cables have a much greater bandwidth, allowing for faster and more efficient data transfer. The use of light waves instead of electrical signals also reduces signal degradation and interference, resulting in a more reliable and faster internet connection. Therefore, the correct answer is fiber-optic cable.

Submit
6. Rules for the exchange of data between a terminal and a computer or two omputer

Explanation

A protocol refers to a set of rules and guidelines that define how data is exchanged between a terminal and a computer or between two computers. It specifies the format, timing, sequencing, and error control for data transmission. By following a protocol, devices can communicate effectively and ensure that data is transmitted accurately and reliably.

Submit
7. VPN means

Explanation

VPN stands for virtual private network. It is a technology that allows users to create a secure and encrypted connection over a public network, such as the internet. By using a VPN, individuals can access the internet privately and securely, as the VPN encrypts their data and hides their IP address. This helps to protect sensitive information, maintain privacy, and bypass censorship or restrictions imposed by governments or internet service providers. Overall, a virtual private network provides a secure means of connecting to the internet and ensures that online activities remain private and anonymous.

Submit
8. A public Web log updaated at frequent intervals

Explanation

A blog is a public web log that is updated at frequent intervals. It is a platform where individuals or organizations can share their thoughts, ideas, and experiences on various topics. Blogs often consist of written content, but they can also include multimedia elements such as images, videos, and audio. Users can interact with blogs by leaving comments or sharing the content on social media platforms.

Submit
9. The quantity of data that can be transmitted through a communication medium in a given amount of time

Explanation

Bandwidth refers to the amount of data that can be transmitted through a communication medium in a given amount of time. It represents the capacity or speed of data transfer. The higher the bandwidth, the more data can be transmitted simultaneously, resulting in faster and more efficient communication. Band rate, broadband connection, and fiber-optic cables are related terms or technologies that can contribute to achieving higher bandwidth.

Submit
10. NIC

Explanation

NIC stands for Network Interface Card, which is a hardware component that allows a computer to connect to a network. It enables the computer to send and receive data over the network by providing a physical connection between the computer and the network. Therefore, the correct answer is "Network interface card."

Submit
11. Enables every computer on the network to be both client and server

Explanation

The correct answer is peer-to-peer. This term refers to a network architecture where every computer on the network can act as both a client and a server. In a peer-to-peer network, there is no centralized server, and each computer can share resources and communicate directly with other computers on the network. This allows for decentralized file sharing, printing, and other services without the need for a dedicated server.

Submit
12. A connection with much greater bandwidth than modems have

Explanation

A broadband connection refers to an internet connection that has a much greater bandwidth compared to modems. It allows for faster data transfer rates, enabling users to upload and download large files, stream high-definition videos, and have a smooth online experience. This type of connection is typically achieved through technologies like DSL, cable, or fiber-optic cables, which can handle higher data transmission speeds. Baud rate, on the other hand, refers to the number of signal changes per second in a communication channel, while band rate is not a recognized term in the context of internet connections.

Submit
13. Web sites designed to capture credit card numbers and other sensitive financial information

Explanation

Phishing refers to the fraudulent practice of sending emails or creating websites that appear to be from reputable sources in order to deceive individuals into providing sensitive information such as credit card numbers. These websites are specifically designed to capture such information without the user's knowledge or consent. Therefore, the correct answer for this question is phishing.

Submit
14. A networking architecture  developed in the 1970s Xerox

Explanation

Ethernet is a networking architecture developed in the 1970s by Xerox. It is a widely used technology for connecting devices in a local area network (LAN). Ethernet allows for the transmission of data packets between devices through a wired connection, using a set of protocols and standards. It provides a reliable and efficient way to connect computers, servers, printers, and other network devices, enabling them to communicate and share resources. Ethernet has evolved over the years and has become the de facto standard for wired LAN connections.

Submit
15. A hierarchical model in which one or more computers

Explanation

A client/server model is a hierarchical structure where one or more computers (servers) provide services or resources to another computer (client). In this model, the client requests information or services from the server, which then processes the request and sends the response back to the client. This model is commonly used in networked environments, such as an intranet, where multiple clients can access shared resources or services provided by the server.

Submit
16. Which ones are types of beoadband connection

Explanation

DSL (Digital Subscriber Line) is a type of broadband connection that uses existing telephone lines to transmit data. It provides high-speed internet access and allows for simultaneous use of phone and internet services. DSL is a popular choice for residential and small business users due to its availability and affordability. It offers faster speeds than traditional dial-up connections and is more reliable than wireless options in areas with poor cellular coverage. DSL technology utilizes different frequencies to separate voice and data signals, ensuring efficient and uninterrupted internet connectivity.

Submit
17. Electronic "tunnel" through Internet that uses encryption and other security measures to keep out unwanted users

Explanation

A VPN, or Virtual Private Network, is an electronic "tunnel" through the Internet that uses encryption and other security measures to keep out unwanted users. It allows users to securely access a private network from a remote location, ensuring that their data is protected and their online activities are anonymous. VPNs are commonly used by individuals and organizations to ensure privacy and security while browsing the internet or accessing sensitive information.

Submit
18. What does WEP mean

Explanation

WEP stands for Wired Equivalent Privacy. It is a security protocol used to protect wireless networks. The term "wired equivalent" implies that the level of security provided by WEP is comparable to that of a wired network. WEP encrypts data transmitted over a wireless network to prevent unauthorized access and protect the privacy of the information being transmitted. Despite its initial popularity, WEP has been found to have significant security vulnerabilities and is no longer considered a secure option for wireless network encryption.

Submit
19. Encryption scheme, improves the security of wireless network by making your data secure

Explanation

WEP (Wired Equivalent Privacy) is an encryption scheme that improves the security of a wireless network by making data transmitted over the network more secure. It provides a level of privacy and protection against unauthorized access by encrypting the data packets being transmitted between devices on the network. This helps to prevent eavesdropping and unauthorized access to the network, enhancing the overall security of the wireless network.

Submit
20. A system built around the open standards and protocols of the Internet

Explanation

An intranet is a private network that uses the same protocols and standards as the internet, but is only accessible to a specific group of people, such as employees within a company. This system allows for the sharing of information, collaboration, and communication within the organization, while still maintaining a level of security and privacy. Unlike the internet, which is accessible to anyone, an intranet is restricted to authorized users, making it a suitable answer in this context.

Submit
21. Insecure network

Explanation

A firewall is a security system that is designed to protect a computer network from unauthorized access. It acts as a barrier between a trusted internal network and an external network, such as the internet. It monitors incoming and outgoing network traffic, allowing or blocking specific connections based on predetermined security rules. By implementing a firewall, organizations can prevent unauthorized access to their network and protect sensitive data from potential threats.

Submit
22. What are the types of wireless connection

Explanation

The correct answer includes two types of wireless connections, which are Wi-Fi and Bluetooth. Wi-Fi is a wireless networking technology that allows devices to connect to the internet or communicate with each other wirelessly. Bluetooth, on the other hand, is a wireless technology that enables short-range communication between devices such as smartphones, tablets, and computers. Both Wi-Fi and Bluetooth are widely used in various devices to provide wireless connectivity and facilitate data transfer.

Submit
23. Is carried over the Inernet rather than the telephone and requires broadband internet connection.

Explanation

Internet telephony, also known as VoIP (Voice over Internet Protocol), is a communication technology that allows voice calls to be transmitted over the internet instead of traditional telephone lines. It requires a broadband internet connection to ensure a smooth and high-quality call. This technology has revolutionized the way people communicate, providing cost-effective and efficient voice communication worldwide. Voice mail and avatars are not directly related to internet telephony or VoIP, hence they are not the correct answers.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 10, 2008
    Quiz Created by
    Sherleyann11
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Local area network
WAN
Junk email
Metropolitan area network
Uses light waves to carry information at blinding speeds
Rules for the exchange of data between a terminal and a computer or...
VPN means
A public Web log updaated at frequent intervals
The quantity of data that can be transmitted through a communication...
NIC
Enables every computer on the network to be both client and server
A connection with much greater bandwidth than modems have
Web sites designed to capture credit card numbers and other sensitive...
A networking architecture  developed in the 1970s Xerox
A hierarchical model in which one or more computers
Which ones are types of beoadband connection
Electronic "tunnel" through Internet that uses encryption and other...
What does WEP mean
Encryption scheme, improves the security of wireless network by making...
A system built around the open standards and protocols of the Internet
Insecure network
What are the types of wireless connection
Is carried over the Inernet rather than the telephone and requires...
Alert!

Advertisement