ࡱ> ` Fbjbj 3=0 0 0 0 0 0 0 D ===8=D>D Y>>4??????5Y7Y7Y7Y7Y7Y7Y$Zh ][Y0 A??AA[Y0 0 ??pYLLLAX0 ?0 ?5YLA5YLLrT0 0 W?> pq=1BHW5YY0YW]yI]W]0 Wd?L?@6Lu@,@8???[Y[YwLd???YAAAAD D D D2=D D D =D D D 0 0 0 0 0 0  Chapter 8: Networking and telecommunication Multiple Choice: A basic computer network can be described as: a minimum of five computers linked together. computer and cables that link the network together. two or more computers that are linked together. the use of satellites linking computers together. Answer: C Reference: Basic Network Anatomy Difficulty: Easy The three essential components of every computer system include all EXCEPT: software. hardware. people or users. cables. Answer: D Reference: Basic Network Anatomy Difficulty: Easy Which statement is FALSE about wireless networks? Wireless networks are convenient. Wireless networks are slower than wired LANs. Wireless networks use radio transmitters. Wireless networks are faster than wired networks. Answer: D Reference: Networks Near and Far Difficulty: Moderate LAN stands for: local area nodes. logical arrangement of networks. local area network. linked-area network. Answer: C Reference: Networks Near and Far Difficulty: Moderate The primary difference between a LAN and a WAN is: the number of software programs available. distance. the variety of hardware devices. the number of hardware devices. Answer: B Reference: Networks Near and Far Difficulty: Moderate Each individual computer and component attached to a network is a: node. connection point. switch. hub. Answer: A Reference: Networks Near and Far Difficulty: Moderate In a traditional LAN, each node on the network is connected through: cables. satellites. microwaves. wireless transmission. Answer: A Reference: Networks Near and Far Difficulty: Moderate MAN stands for: metropolitan area network. marked area network. metropolitan arranged network. manufactured arrangement of networks. Answer: A Reference: Networks Near and Far Difficulty: Easy The common pathways on a WAN are known as: nodes. hubs. the backbone. routers. Answer: C Reference: Networks Near and Far Difficulty: Challenging Crossing from one LAN to another LAN or a WAN is done over: bridges and gateways. routers. backbones. MANs. Answer: A Reference: Networks Near and Far Difficulty: Moderate The hardware device or software program that sends messages between networks is known as a: bridge. router. backbone. gateway. Answer: B Reference: Networks Near and Far Difficulty: Moderate The system of satellites that circle the earth and can determine any position is known as a: GPS. LAN. receiver. MAN. Answer: A Reference: Specialized Networks: From GPS to Financial Systems Difficulty: Easy Remote access means that: a computer is linked directly to a network. you can access the Internet from anywhere. you connect to a network through a phone line, television cable, or satellite. your Internet connection is through a satellite rather than phone lines. Answer: C Reference: The Network Interface Difficulty: Moderate A port is a: socket that enables information to move through a system. hardware device that allows connection to the Internet. peripheral device attached to a computer. space located in the front of a computer to install additional drives. Answer: A Reference: The Network Interface Difficulty: Moderate Older printers were typically connected to computers through a: serial port. NIC card. parallel port. jack. Answer: C Reference: The Network Interface Difficulty: Moderate A modem is typically connected to a computer through a: serial port. NIC card. parallel port. jack. Answer: A Reference: The Network Interface Difficulty: Moderate What port is a fast connection that is more flexible than traditional serial and parallel ports? Serial USB Parallel Ethernet Answer: B Reference: The Network Interface Difficulty: Moderate NIC stands for: network internal card. newer industrial computer. networking Internet connection. network interface card. Answer: D Reference: The Network Interface Difficulty: Moderate A NIC allows direct connection to: the Internet. a network. a printer. a modem. Answer: B Reference: The Network Interface Difficulty: Easy The NIC controls the flow of data between the computers RAM and the: network cable. Internet. hard drive. CD drive. Answer: A Reference: The Network Interface Difficulty: Easy Computer bits must be ___________ to travel over phone lines. analog signals digital signals modem signals converted to bytes Answer: A Reference: Communication la Modem Difficulty: Moderate Prior to computer bits entering a modem, the bits are: stored in the hard drive. bitmapped. digital. analog. Answer: C Reference: Communication la Modem Difficulty: Moderate Modems use ____________ cable to connect to a telephone network through a modular phone jack. phone coaxial digital analog Answer: A Reference: Communication la Modem Difficulty: Moderate Modem speed is measured in: bits per second. bytes per second. bits per millisecond. bytes per minute. Answer: A Reference: Communication la Modem Difficulty: Challenging What is the term for the amount of information transmitted through a communication medium in a certain amount of time? DPI BPS Bandwidth Baud rate Answer: C Reference: Broadband Connections Difficulty: Moderate Broadband connections include all EXCEPT: cable modems. DSL. wireless. phone modems. Answer: D Reference: Broadband Connections Difficulty: Moderate What type of cable uses light waves to carry information at high speed? Cable modems fiber-optic cables Wireless cables Phone lines Answer: B Reference: Fiber-Optic Connections Difficulty: Moderate Which type of media has the longest maximum distance? Twisted pair Wireless Coaxial cable Fiber-optic Answer: B Reference: Basic Network Anatomy Difficulty: Challenging Palm users often connect through: cable modems. fiber optic cables. infrared wireless. phone lines. Answer: C Reference: Wireless Network Technology Difficulty: Moderate The next generation of wireless technology is known as: G4. modem wireless. 3G. NIC wireless. Answer: C Reference: Wireless Network Technology Difficulty: Challenging The rules for exchanging data between a terminal and one or more computers is known as a(n): protocol. algorithm. procedure. set of laws. Answer: A Reference: Communication Software Difficulty: Moderate What is a LAN that has one or more dedicated computers and all others act as recipients? Peer-to-peer model P-to-p model Ring network Client/server model Answer: D Reference: Communication Software Difficulty: Moderate A ____________ is a high-speed, high-end computer with data and other resources to be shared with client computers. server super computer client PDA Answer: A Reference: Communication Software Difficulty: Moderate In a client/server environment, most or all of the network operating system resides on the: client machine. CD. server computer. mainframe. Answer: C Reference: Communication Software Difficulty: Easy The network configuration that allows every computer to act as both a client and a server is a: client/server model. host system. server network. peer-to-peer network. Answer: D Reference: Communication Software Difficulty: Easy The computer that accepts, prioritizes, and processes print jobs is known as the: print client. printer file server. print server. mainframe. Answer: C Reference: The Network Advantage Difficulty: Moderate The ____________ stores data and software that are to be shared by several users. file server mainframe print server client Answer: A Reference: The Network Advantage Difficulty: Moderate When you are using a PC and copy software or data from a server, it is known as: uploading. terminal emulation. downloading. server sharing. Answer: C Reference: The Network Advantage Difficulty: Moderate When a business can legally copy software to all of the computers that they own, the company has a(n): site license. upload license. file server license. groupware license. Answer: A Reference: The Network Advantage Difficulty: Moderate What is code embedded as one-pixel graphics files in Web pages or email messages called? Web dot Web bug A cookie A virus Answer: B Reference: The Many Faces of Email Difficulty: Moderate A(n) ____________ enables a user to participate in email discussion groups on topics of particular interest to the user. subscriber list mailing list news list email list Answer: B Reference: Mailing Lists Difficulty: Easy A newsgroup is different from a mailing list in that: the newsgroup is email and the mailing list is not. a newsgroup is only accessible on a LAN and a mailing list can be on the Internet. a newsgroup is a public discussion and a mailing list is information sent to your email. a newsgroup is private and a mailing list is not. Answer: C Reference: Network News Difficulty: Moderate Asynchronous communication is when the sender and recipient: are online at the same time. do not use the same operating system. do not have to be online at the same time. use different software but are able to communicate through the Internet. Answer: C Reference: Instant Messaging and Teleconferencing Difficulty: Moderate An IM session stands for: internal messaging. instant messaging. instantaneous market. instantaneous messages. Answer: B Reference: Instant Messaging and Teleconferencing Difficulty: Easy ___________ software and hardware allows a PC to function similar to a telephone. Telephony Instant messaging Video conferencing Avatars Answer: A Reference: Computer Telephony Difficulty: Moderate Unwanted junk email is known as: IM. telephony. spam. avatars. Answer: C Reference: Online Issues Difficulty: Easy Following the rules of correct behavior of the Internet is known as: netiquette. FAQs. emoticons. netmanners. Answer: A Reference: Working Wisdom: Netiquette and Text Messaging Difficulty: Easy FAQ stands for: frequently asked questions. frequent assistance for questions. frequently assisted query. frequently asked queries. Answer: A Reference: Working Wisdom: Netiquette and Text Messaging Difficulty: Easy Text-based graphical substitutes for body language over the Internet is known as: netiquette. FAQs. emoticons. netmanners. Answer: C Reference: Working Wisdom: Netiquette and Text Messaging Difficulty: Easy What helps block unauthorized access and data transfer? A bridge A VPN A WEP A firewall Answer: D Reference: Wireless Issues: Access, Security, and Privacy Difficulty: Moderate Fill in the Blank: A(n) ____________ is a network of networked computers that are physically located far apart from one another. Answer: WAN or wide area network Reference: Networks Near and Far Difficulty: Easy The most common cabling for a LAN is ____________. Answer: twisted pair Reference: Networks Near and Far Difficulty: Challenging A(n) ____________ is a computer or peripheral device attached to a network. Answer: node Reference: Networks Near and Far Difficulty: Moderate A(n)____________ network connects computers through radio transmitters connected to the network port. Answer: wireless Reference: Networks Near and Far Difficulty: Moderate A(n)____________ includes 24 satellites that circle the Earth. Answer: GPS Reference: Specialized Networks: From GPS to Financial Systems Difficulty: Moderate A(n) ____________ connection to a network means that cabling from the computer is cabled to the network. Answer: direct Reference: The Network Interface Difficulty: Moderate A computer communicates with a network through a(n) ____________. Answer: port Reference: The Network Interface Difficulty: Moderate A port that bits pass through one at a time is a(n) ____________ port. Answer: serial Reference: The Network Interface Difficulty: Moderate A port that bits pass through in groups of 8, 16, or 32 is a(n) ____________ port. Answer: parallel Reference: The Network Interface Difficulty: Moderate Modern Macs and PCs have ____________ ports that are faster and more flexible than traditional ports. Answer: USB or FireWire Reference: The Network Interface Difficulty: Challenging A(n) ____________ is designed specifically for a direct network connection. Answer: NIC, network interface card Reference: The Network Interface Difficulty: Challenging If a computer has a(n) ____________ port, it does not need a NIC. Answer: Ethernet Reference: The Network Interface Difficulty: Challenging A continual wave of bits transmitted through a device is known as a(n) ____________ signal. Answer: analog Reference: Communication la Modem Difficulty: Moderate The transferring of transmission from a computer over phone lines is done through a(n) ____________. Answer: modem Reference: Communication la Modem Difficulty: Moderate Bps stands for ____________. Answer: bits per second Reference: Communication la Modem Difficulty: Easy When using multimedia or downloading huge files from the Internet, the bigger the ____________, the better. Answer: bandwidth Reference: Broadband Connections Difficulty: Moderate Bandwidth is measured in kilobits or ____________. Answer: megabits Reference: Broadband Connections Difficulty: Moderate ____________ cables are faster than DSL or cable modems. Answer: Fiber-optic Reference: Fiber-Optic Connections Difficulty: Moderate Many laptops and handheld computer have ____________ ports that can send and receive digital information short distances. Line-of-sight is a limitation. Answer: infrared Reference: Wireless Network Technology Difficulty: Moderate To communicate with each other, two machines must follow the same ____________ which are the rules for the exchange of data. Answer: protocols Reference: Communication Software Difficulty: Moderate ____________ software sends requests from the user to the server. Answer: Client Reference: Communication Software Difficulty: Moderate When many computers are able to print to one printer, the computers are probably connected to a(n) ____________. Answer: print server Reference: The Network Advantage Difficulty: Moderate Copying software or data files from a client computer to a server is known as ____________. Answer: uploading Reference: The Network Advantage Difficulty: Easy Microsoft ____________ is the most popular groupware software. Answer: Exchange Reference: The Network Advantage Difficulty: Challenging Software designed to allow several networked users to work on the same document at the same time is known as ____________. Answer: groupware Reference: The Network Advantage Difficulty: Moderate When a Word document or picture file is included along with an email message, it is known as a(n) ____________. Answer: attachment Reference: The Many Faces of Email Difficulty: Easy A(n) ____________ is a public discussion on a particular subject. Answer: newsgroup Reference: Network News Difficulty: Easy Publicly accessible wireless access points are known as ___________. Answer: hot spots Reference: Wireless Issues Difficulty: Easy Matching: Match the following terms to their meanings: I. twisted pair A. medium cost, LANs, 600-2,500 feet II. coaxial cable B. high cost, network backbones and WANS, up to 25 miles III. fiber-optic C. high cost, connects things that move, variable distances possible IV. wireless/infrared D. low cost, LAN use, up to 300 feet V. wireless/radio E. medium cost, LANs, line-of-sight up to 1,000 feet Answers: D, A, B, E, C Reference: Basic Network Anatomy Difficulty: Moderate Match the following terms to their meanings: I. modem A. continuous wave of bits II. bandwidth B. modulator/demodulator III. Bps C. stream of bits IV. broadband D. measured in kilobits or megabits per second V. analog signal E. how modems measure the transmission speed of a modem VI. digital signal connection F. DSL, cable modem, high-speed wireless, satellite VII. NIC G. a card inserted into a slot that is designed for direct connection to a network Answers: B, D, E, F, A, C, G Reference: Multiple locations Difficulty: Moderate     Chapter 8: Networking and Telecommunication PAGE  PAGE 17 Copyright Prentice-Hall. All rights reserved. PAGE 1 Copyright Prentice-Hall. All rights reserved.   >AG/ 0 8 9 E [ f k l   ! R S t u    ) * 5 6 > ? @ P Z a b I J S T t u h,h$h= h.F5h3h hl%h.Fh.FCJaJh.FT  ->?m0 l ! S u ? P $  a$ & FgdU & Fgdl%gdl%gdl%gdl%E~FP b  J T u   0 8 = } 9J & Fgd65 & Fgd! $  a$ & Fgd & FgdU   / 0 6 7 8 = D F R h s | } $/89:deyz *+,-1236@ACEGHJQS_uh1h,hhhNh65 hl%h.Fh= h.F h.F5RJez&-3AJ9W\a & Fgd! $  a$ & FgdU$/89W[\`ajkpwy:; YZ  .9BCh| h!h.Fh h.F5 hl%h.Fhh.Fh= h|Takp; ZC(5?NT & Fgd! $  a$ & FgdU45>?MNT[]i  (>IRSz{ >?IJTU^egs%;FhC/hS=h}.8h&l%h= h.F5h.F hl%h.FWT Sd{1?JU^L & Fgd & FgdU & Fgd! $  a$FKLMZp  46B]^hiqrz!"*+23;BDP^_it}~   +,Kh|h ahS=h6bh/ h.F5 hl%h.FhtJh= h.FTL D^irz"+3;~, $  a$ & FgdU & Fgd!T[]i~  !-23EPYZ[ipr~ ">Iʽݽh-qhhW h 95h 9hv* hUhS=h= hUh.FhS=h1 h.F5 hl%h.Fh.FhtJI)7<FT Z'5 $  a$gd 9 & Fgd 9 & Fgd! $  a$ & FgdU5I\i V! { q!x!!! & Fgd! $  a$ & FgdUIJUV  ! " , / 8 E O y z { | /!3!q!w!!!!!!!!!!!!!""T"]"_"f"h"t"""""""D#K#M#Y#p#{####$$$%$ h!h.Fh1hIh@q hUhpChpCh h.F5 hUh.Fh= h|h.FN!!!/"?"C"T"_"""##.#D#####$$P$$$$$$ % & Fgd! $  a$ & FgdU%$;$F$O$P$$$$$$$$% % %%%%%%%%%;&>&&&&&&&&&&A'H'J'V'n'y'''''.(5(7(C(Q(\(a(b())))))))*****+++%+&+˿h h|hOAh@%7 h!h.F hK>~5hK>~hW hUh.h@qh.F0J5B*aJph hUh.Fh= h.F5h.FE %]%h%|%%%%@&N&^&s&&& '('0'9'A''' ((#(.(b( $  a$gdK>~ & FgdK>~ $  a$ & FgdU & Fgd!b((()x)))*;*a***&+A+U+h+~+++7,A,S,f,n, & Fgd!\ & Fgd!\ & Fgd!\ $  a$ & FgdU & Fgd!&+'++++++++++ , ,,,,,,6,7,8,A,B,S,T,f,m,n,u,w,,,,,,,,,,,- - ----------------../.e.l.n.z........4/;/=/I/v/w/// hUhOAh|h= h.F h.F5 hUh.Fhzh h!\ h!\5 hUh!\hWNn,,,,,,,-c-o-u----- .0.K.e.. ///(/4/// & FgdU & Fgd! $  a$//////$0/090:0M0N0O0R000000 111B1J1W1b1x111111111111 222 2!2$2128292T2U2V2e2f222222222222 3ĽݹݹЮ hcUh.F hUhcU hUh.Fh h[d h uhhhWh|h u h.F5hcU h uh.Fh.F hWh.Fh h!\5h!\hOA?/////90:0M0N001B111 222 3m3 gdcU & FgdcU gd u gd $ a$gd u & Fgd u$a$gdW $  a$gd!\ & Fgd!\ 3 333#3.3/3A3V3W3X3c3l3m3n3q33333333333344444L4O4P4_4g4l4w444444444455$5-5.5j5m555555555.666F6G6R6h6s6t66666666h|h hcUh&l%h&l% hcUhcU hcUh.FhcUh h|h.F h.F5 hUh.FMm334_444.555.666)7k778Y889#9p99%: @ gdcU $ a$gdcU @ gdcU gdUj gdcU & FgdcU666777(7)7@7Q7c7k7s7|777777788 8+898:8D8O8X8Y888888888889999#9+9;9F9T9U9_9j9o9p9u9z999999:::$:%:I:X:`:h:i:t::::::::hv*h1htJ hcUhh h hcUh.Fhh|h.F h.F5hcUN%:X:::%;; <<<=[==>s>>>A??@u@@@9A gd @ gd @ gdcU @ gdcU gdcU & FgdcU:::::::::::;;$;%;;;;;;< < <M<Y<c<h<<<<<<<<<<<<==="=#=$=/=F=Q=Z=[=======> >>>s>{>>>>>>>>>>>>>???)?4?5?@?A?C?h h1hI hUh.FhcUh.F h.F5 hcUh.Fhv* hcUhv*QC?I?V?[?????????@@@g@s@u@}@@@@@@@@@@@@@AAA(A3A9A~AAAAAAAAAAAAAABBB B+B.B/B0B=B?B@BABvBzB{B|BBBŽ䱵乵乵乵䭱hv*hgEhw`hlh.FCJaJ hl%h.Fh= h!\5h!\ hUh.FhK>~h hcUh.F h.F5 hcUh.FhID9A~AAAAA+BvBBCNCCCCC$ & F x^a$gdW & Fgdg$ & F 8xdha$gdo*$ & F 8xdh^a$gdo* & FgdUgdl% $ a$gd!\ & Fgd!\BBBBBBBBBBBBC C CCCCCMCNCVC]C^C`CaCdCeCfCqCCCCCCCCCCCCCCCCCCCCDDDD D$D%D2D3D7D8D@DDDEDqDtDuDDDDDDȹչ h?he h?h?h?h)Dhehkg hW5hW hWhWh1h|h|5h|hlh hgEhw`FCD3DqDD ElEEEEEEEEEEEE  p@ gdg$ & F x^a$gdkg$ & F x^a$gdW$ & F xdh^a$gdd1DDDD EEEEEkEuEvEyE|EEEEEEEEEEEEEEEEEEEEEEEEEFFF F F F FF@FAFGFHFIFJFKF}F~FF켸h 0J mHnHu h 0J jh 0J UhjhU hkghkg hkg5hkghw`5hkghkg5hkghW5hw`h.Fheh?hkgh 7EFFFF?F@FKF|F}F~FF  p@ gdg &`#$gd 1 0:p[/ =!8"8#8$8% !F@F l%Normal $a$CJ_HmH sH tH J@J l% Heading 1$@&5;CJKHL@L l% Heading 2$ $<@&5^@^ Heading 3$ & F<@&5CJOJQJ\^JaJR@R Heading 4$ & F<@&5CJ\aJT@T Heading 5 & F<@&56CJ\]aJN@N Heading 6 & F<@&5CJ\aJH@H Heading 7 & F<@&CJaJN@N Heading 8 & F<@&6CJ]aJT @T Heading 9 & F<@&CJOJQJ^JaJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List JOJ l% Chapter Title $ha$ 5;CJ 0O0 l% Book title<O< l%Chapter Number\O"\ l%Chapter Outline# & F @h^`8OA28 l%Document titleD>@BD l%Title$<@&a$ 5CJ$KHJ0@RJ l% List Bullet & F^`:1@b: l% List Number  & FB'qB Comment ReferenceCJaJ8@8  Comment TextCJHH #9} Balloon TextCJOJQJ^JaJROR Beekman-keyword5@B*OJQJaJph3fPOP Beekman-glossary56B*OJQJph3f@j@ Comment Subject5\@O@ ! Char CharCJ_HmH sH tH 4@4 [Header  !4 @4 [Footer  !.)@. [ Page Number> ->?m0l!Su?PbJTu08=}9Jez&-3AJ9W \ a k p  ;  Z  C ( 5 ? N T  Sd{1?JU^L D^irz"+3;~,)7<FT Z'5I\i V!{qx/?CT_.DP ]h|@N^s (09A  # . b !x!!!";"a"""&#A#U#h#~###7$A$S$f$n$$$$$$$%c%o%u%%%%% &0&K&e&& '''('4'''''''9(:(M(N(()B))) *** +m++,_,,,.---....)/k//0Y001#1p11%2X222%33 4445[556s666A778u88899~99999+:v::;N;;;;;<3<q<< =l============>>>?>@>K>|>}>>0P0000- 0- 0?- 0?- 0?- 0?-0- 0- 0l- 0l- 0l- 0l-0- 0- 0!- 0!- 0!- 0!-0- 0- 0?- 0?- 0?- 0?-0- 0- 0- 0- 0- 0-0- 0- 0- 0- 0- 0-0- 0- 0}- 0}- 0}- 0}-0- 0- 09- 09- 09- 09-0- 0- 0- 0- 0- 0-0- 0 - 0- 0- 0- 0-0- 0 - 09- 09- 09- 09-0- 0 - 0- 0- 0- 0-0- 0 - 0 - 0 - 0 - 0 -0- 0 - 0 - 0 - 0 - 0 -0- 0- 0C - 0C - 0C - 0C -0- 0- 0 - 0 - 0 - 0 -0- 0- 0 - 0 - 0 - 0 -0- 0- 0S- 0S- 0S- 0S-0- 0- 0- 0- 0- 0-0- 0- 0- 0- 0- 0-0- 0- 0L- 0L- 0L- 0L-0- 0- 0 - 0 - 0 - 0 -0- 0- 0- 0- 0- 0-0- 0- 0~- 0~- 0~- 0~-0- 0- 0,- 0,- 0,- 0,-0- 0- 0- 0- 0- 0-0- 0- 0- 0- 0- 0-0- 0- 0Z- 0Z- 0Z- 0Z-0- 0- 0- 0- 0- 0-0- 0- 0- 0- 0- 0-0- 0- 0V- 0V- 0V- 0V-0- 0- 0!- 0!- 0!- 0!-0- 0 - 0- 0- 0- 0-0- 0!- 0- 0- 0- 0-0- 0"- 0- 0- 0- 0-0- 0#- 0- 0- 0- 0-0- 0$- 0P- 0P- 0P- 0P-0- 0%- 0 - 0 - 0 - 0 -0- 0&- 0- 0- 0- 0-0- 0'- 0- 0- 0- 0-0- 0(- 0- 0- 0- 0-0- 0)- 0b - 0b - 0b - 0b -0- 0*- 0!- 0!- 0!- 0!-0- 0+- 0&#- 0&#- 0&#- 0&#-0- 0,- 0#- 0#- 0#- 0#-0- 0-- 0$- 0$- 0$- 0$-0- 0.- 0%- 0%- 0%- 0%-0- 0/- 0%- 0%- 0%- 0%-0- 00- 0&- 0&- 0&- 0&-0- 01- 0'- 0'- 0'- 0'-0-000:( 02:(0:( 03:(0:( 04:(0:( 05:(0:( 06:(0:( 07:(0:( 08:(0:( 09:(0:( 0::(0:( 0;:(0:( 0<:(0:( 0=:(0:( 0>:(0:( 0?:(0:( 0@:(0:( 0A:(0:( 0B:(0:( 0C:(0:( 0D:(0:( 0E:(0:( 0F:(0:( 0G:(0:( 0H:(0:( 0I:(0:( 0J:(0:( 0K:(0:( 0L:(0:( 0M:(0:(009 0N909090909090909 0O900000000y00Xy00y00Xy00@0y00@0y00@0y0 0 dXy009y00lYX@0@0y004YX@0@ y00Xy00 9D FI%$&+/ 36:C?BDF$(*,.0358:<>@ACEP JaTL5! %b(n,/m3%:9ACEF%')+-/124679;=?BDF~F&9@DKN!!!8@0(  B S  ?A|* A* A) Al) Aь9:::;>9:::;>A*urn:schemas-microsoft-com:office:smarttags stocktickercaA*urn:schemas-microsoft-com:office:smarttags stocktickeruk?*urn:schemas-microsoft-com:office:smarttags stockticker9*urn:schemas-microsoft-com:office:smarttagsplace _============}>>6<mnPUbi"JRTWux(068;JVekz&+-136AHa i   ; > & Z b ( . ? G N R dk{14?@JKUVDJ^giprx).<DFK',5:IQ\a/5CIT] $.:]fhp|@DNT^bs| ! !x!y!"!";"="a"c"""A#I#U#\#h#u#~####$$$$$$c%m%u%~%%%%% &&0&:&K&U& '''&'('2'N(P()) *"***m+o+K,M,,,i-k-..;/=///00224455b8d888============}>>3333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333Su@JT=9&JW p  ( T S1^^z!"*+23:)T'i {q/_D]@ A. A##c$n$$$c%%%e& '4''':(N(1#13399=============>)>K>f>}>>============K>{>}>>haA#  V4)l@cj/ hh^h`OJQJo( ^`hH Article . 8^`hH Section . P^`PhH() `p`^``phH() P^`PhH) P^`PhH) ^`hH) P^`PhH. 0p0^0`phH.@@^@`56CJOJQJo(hH. ^`o(hH. pLp^p`Lo(hH. @ @ ^@ `o(hH. ^`o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. PLP^P`Lo(hH.@@^@`o(.x^`o(.H ^`o(.  ^ `o( ^ `o(P^P`o( ^ `o(X^`o((^`o(V4aA@c4cS V4V4V4aAcS @@^@`o(.cS!x^`o(.8dS"H ^`o(.dS#  ^ `o(dS$ ^ `o(DeS%P^P`o(eS& ^ `o(eS'X^`o(LfS((^`o(SR[dggEBpC!\hB !l%&l%)o*}*165@%7}.8 9S=OA)D.FtJ LJMcUW6bnfgkgUj-q@q uT{||#9}K>~cE)N.d1l[jFZjv*Lbe$f IC z?3w`gJ%C/sj@m= /\U, a@z=z=PSz=z=>`@UnknownGz Times New Roman5Symbol3& z Arial5& zaTahoma"1hU%ӌ 7 4p7 4p!4d== 2qHX?#9}2+Chaper 8: Networking and TelecommunicationsMichele Fitzpatrick-Somody    Oh+'0 $0 P \ h t,Chaper 8: Networking and TelecommunicationsNormalMichele Fitzpatrick-Somody7Microsoft Office Word@hx@@& /@q7 4՜.+,D՜.+,X hp|  p= ,Chaper 8: Networking and Telecommunications Title<@0_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_ReviewingToolsShownOnceCIYF TB Melissa_Edwards@prenhall.comEdwards, Melissa  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvxyz{|}~Root Entry F0Ɨq1TableH]WordDocument3SummaryInformation(wDocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q