ࡱ> xzw%` b(bjbjNN >,,nnnnnnn---8-$"/dd://(///0009999999$Z;h= :n00000 :nn//:'9'9'90dn/n/9'909'9'9nn'9// @홇?-0'994:0d:'9L>3>L>'9L>n'900'900000 : :8X000d:0000D(--nnnnnn BCIS 1305 BUSINESS COMPUTER APPLICATIONS Homework 8 Part I True/False 1. A firewall consists of both software and/or hardware and protects a computer or network from intruders. a) True b) False 2. A virtual private network uses services offered by only one telephone company. a) True b) False 3. A switch is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. a) True b) False 4. A client/server network is a network in which one computer is a client and provides services to the other computers, which are called servers. a) True b) False 5. Bluetooth technology provides entirely wireless connections for cell phone and PDA to a computer. a) True b) False 6. Routers are powerful devices and those used by consumers normally include a hub or switch. a) True b) False 7. A broadband connection is a high-capacity telecommunications pipeline capable of providing high-speed Internet service. a) True b) False 8. A satellite is a type of wired communications media. a) True b) False 9. Infrared is a wireless communications medium that uses light waves to transmit signals or information. a) True b) False 10. A repeater is a device that receives a radio signal, strengthens it, and sends it on. a) True b) False 11. A virtual private network establishes a dedicated network connection between two ore more networks. a) True b) False 12. Bandwidth refers to the capacity, or the amount of information, that can be transferred through a communications line in a given time. a) True b) False 13. You cannot talk on the telephone while using a DSL Internet connection. a) True b) False 14. WiFi is a wireless communication technology that uses red light to send and receive information. a) True b) False 15. An Ethernet card uses a standard telephone jack to connect the computer to a network. a) True b) False 16. A DS3 is a high-speed business network circuit and is about the same speed as a T1 line. a) True b) False 17. In a small office, a broadband router is often used to connect several computers to a DSL network. a) True b) False 18. A WAN covers a large geographic distance, such as a state, a country, or even the entire world. a) True b) False 19. A shared network uses one central computer to send and receive messages for the connected computers. a) True b) False 20. Computers on a switched network are more efficient than a shared network because each computer only receives messages meant for them. a) True b) False Part II Multiple Choice 21. What is a network interface card (NIC)? a) A device that allows a computer to use radio waves to access a network b) A device that connects several computers together to share Internet access c) An expansion card for a desktop or notebook computer that connects your computer to a network d) A crossover cable that allows you to plug straight into another computer or printer 22. What is the most common type of network interface card (NIC)? a) WAP b) Cat 5 c) Broadband router d) Ethernet card 23. Which of the following allows you to plug your computer straight into another computer or printer? a) Ethernet cable b) Router c) Crossover cable d) Hub 24. What is the most common transmission medium for a home network? a) Internet Explorer b) Network switch c) Broadband router d) Cat 5 cable 25. Which of the following is not a common Internet connection at home? a) DSL b) Cable Internet c) T1 and DS3 d) DSL, cable Internet, T1 and DS3 are common for home computer needs 26. If you wanted to connect more than one computer to your home Internet service, what would you need? a) Hub b) Switch c) Broadband router d) Cat 5 27. What Windows option do you need to activate so that you can share files on your home network? a) VPN b) File-sharing c) FTP d) Internet options 28. Which network device connects computers and passes messages by repeating each computer's transmission only to the intended recipient? a) Hub b) Broadband router c) Router d) Switch 29. What does a switch enable a network to do? a) Listen to each other's transmissions b) Repeat messages to other computers so that the messages are not lost or dropped c) Allow computers to have different conversation at the same time d) Create direct links between separate networks or subnets 30. How do computers and routers know where to find other computers and routers? a) VPN b) Router ID c) Network site d) IP address 31. How is bandwidth measured? a) Revolutions per minute (RPM) b) Transmissions per second (TPS) c) Bytes per second (BPS) d) Bits per second (BPS) Difficulty: Easy Learning Objective: 3 32. Which type of high-speed Internet connection works similarly to traditional modems and allows you to use the telephone at the same time you're using the Internet? a) Dial-up b) Satellite modem c) DSL d) Router Difficulty: Easy Learning Objective: 4 33. How does DSL work? a) By sending high frequency signals that are inaudible to humans over existing telephone lines b) By connecting computers with peripheral devices c) By connecting many home computer devices over one line so that each one can share the Internet connection d) By transmitting radio signals from one computer device to the Internet connection 34. Which type of Internet connection slows down when more customers or computers are using it? a) Dial-up b) DSL c) Cable d) Dial-up, DSL, and Cable all slow up when the number of users in a neighbor increases 35. Which type of Internet connection is limited to the distance between you and your phone company; generally about 3 miles? a) Dial-up b) DSL c) Cable d) Satellite 36. Which of the following communication mediums is a type of radio transmission? a) Cat 3 b) Optical fiber c) Infrared d) Microwave 37. What type of network security applications watches the current network traffic, matching it against lists with characteristics of known attacks? a) Firewall b) Intrusion detection system c) Denial-of-service d) Authenticity 38. What type of security threat is it when a Web server is flooded with requests from thousands of users at once and causing it to become unavailable? a) Firewall b) Intrusion detection system c) Denial-of-service d) Availability 39. What network technology allows you to send voice calls over the Internet and avoid toll charges? a) Wireless access point b) Voice over IP c) Voice access point d) Bluetooth 40. What term describes a network in which one or more computers are servers and provide services to other computers? a) Client/server network b) Peer-to-peer c) Internet d) Star network     Appendix B - Network Basics Page  PAGE 3 of  NUMPAGES 6 234GHIJLM}hVh}hE hG?6CJOJQJ]^JaJ#hM4B*CJOJQJ^JaJph)hSChG?B*CJOJQJ^JaJph#hG?B*CJOJQJ^JaJphhG?CJOJQJ^JaJh,aCJOJQJ^JaJ ht~hWCJOJQJ^JaJhWCJOJQJ^JaJ&h]hW5CJOJQJ^JaJhhW5CJOJQJ^JaJ#h]hW5CJOJQJ^JaJ)45<GHI? N O  ! T U V gd,agd< gdG?gdW$a$gdW'a(> D M N O S T x y   ! % & J K T U X Y Z  Ӿ{{{{jᾬ hG?6CJOJQJ]^JaJ ht~h,aCJOJQJ^JaJh,aCJOJQJ^JaJ#hM4B*CJOJQJ^JaJph#h< B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJphh< CJOJQJ^JaJhG?CJOJQJ^JaJ ht~hG?CJOJQJ^JaJ) % & ' x  2 3 f g h ! " ] ^ gdWgd< gdG?  % & ' ) * + w }  " 1 2 3 7 8 \ ] f h j k l   ! " $ Ƕ؈ضǨǨǨ؈Ǩ؈ضzhlCJOJQJ^JaJ#h< B*CJOJQJ^JaJphh< CJOJQJ^JaJhG?CJOJQJ^JaJ ht~hWCJOJQJ^JaJ ht~hG?CJOJQJ^JaJ)hSCh< B*CJOJQJ^JaJph#hM4B*CJOJQJ^JaJph0$ % & \ ] ^ b c   019:;=>?ӬwӬ)hSCh|BNB*CJOJQJ^JaJphhlCJOJQJ^JaJ#hM4B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJph#h< B*CJOJQJ^JaJphh< CJOJQJ^JaJh|vCJOJQJ^JaJ ht~hWCJOJQJ^JaJ) :;&CDwxy  @ABgdlgd< gdW%+BCDHImnwxy{|}   67@ABCDEF­x­j\\hY9CJOJQJ^JaJhlCJOJQJ^JaJ ht~h,CJOJQJ^JaJ#hM4B*CJOJQJ^JaJph#h< B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJphh< CJOJQJ^JaJ ht~hWCJOJQJ^JaJh|vCJOJQJ^JaJ ht~h|vCJOJQJ^JaJ$23489]^ghiklmQϽϫϚxjxxϽϫxxjxxϽϫxjxxhlCJOJQJ^JaJ ht~hWCJOJQJ^JaJ ht~hlCJOJQJ^JaJ ht~h< CJOJQJ^JaJ#hM4B*CJOJQJ^JaJph#h< B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJphh< CJOJQJ^JaJhY9CJOJQJ^JaJ)34ghiRfg  ?@Agd,gd< gdWQWegkl   56?@ABӾ򬾚xgU#h,B*CJOJQJ^JaJph h,h< CJOJQJ^JaJ h,hWCJOJQJ^JaJ ht~hY9CJOJQJ^JaJ#hM4B*CJOJQJ^JaJph#h< B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJphhY9CJOJQJ^JaJ ht~hWCJOJQJ^JaJh< CJOJQJ^JaJBCEF28QRSWX|}ƱƱꎀrƱar ht~hM4CJOJQJ^JaJh< CJOJQJ^JaJhfoCJOJQJ^JaJ ht~hWCJOJQJ^JaJ#hM4B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJph#h< B*CJOJQJ^JaJph#h,B*CJOJQJ^JaJph)h,h,B*CJOJQJ^JaJph&3RSNOPXhi4Cgdt~$a$gdW$a$gdW1$gdWgd< gdWgd, DENOPTUVWX`ahį̺̔}ododQ@2@2hWCJOJQJ^JaJ hwhWCJOJQJ^JaJ$hwhWB*OJQJ^JhphhW5OJQJ^JhwhW5OJQJ^J,hxwhfoB*CJOJQJ^JaJhph&hWB*CJOJQJ^JaJhph#h< B*CJOJQJ^JaJph#hM4B*CJOJQJ^JaJph)hSCh< B*CJOJQJ^JaJphhfoCJOJQJ^JaJ ht~hWCJOJQJ^JaJiklmnrsuvwx  !#$)*23<BCh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhcCJOJQJ^JaJGCGHKMNWX\]`abcjkmnvw ͼͼͼͼͼͼͼͼͼͼͼͼͼͼͼͮͼͼͼͼͼͼͼͼͼͼͼͼͼͮh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJA]^jx0?Wcde   / gd wgdt~"#%&)*./56:;=>EFOPTU[\]firuvwпппппппппппбпбпбпбпппhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhcCJOJQJ^JaJ ht~hcCJOJQJ^JaJ8   !)*/8>?CDGPQV_cdeghijnoqruvz° ht~hcCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJhcCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ8z{   '(°ސނނh5CJOJQJ^JaJ ht~h wCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJhcCJOJQJ^JaJ ht~h;PCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ3  VWcz%HIy3?XYZ gdt~(*+./0178@AKLNOTUV_bkpqyz~ǶǶǶǶǶǶǨǶyǶǶǶǶǶǶǶǶhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJh5CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ&ht~ht~6CJOJQJ]^JaJ&ht~h;P6CJOJQJ]^JaJ/$()1267<=@AFGHQTjrxyͿ޿hM4CJOJQJ^JaJh wCJOJQJ^JaJh5CJOJQJ^JaJ ht~h5CJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ:y}~ͼͮͼ͒͒ͼͼͼͼͼͼͼͼͼͼͼͼͼͼ͒ͼͼͼh5CJOJQJ^JaJh wCJOJQJ^JaJhM4CJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJ9"#&2;>GOPXYZ\]^_delmst|}  h5CJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ? $%(/0123456:;?@ABHIOPQRYZ\]`abkqrtuyz ht~ht~CJOJQJ^JaJh5CJOJQJ^JaJ ht~h5CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ8 /01bc9z{|9:_gdt~   '(*+./348AGHNOTU\]efnoqrz{|оh*CJOJQJ^JaJ ht~h wCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ7|~  ´ᴢ ht~h wCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJh*CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh!bCJOJQJ^JaJ3 !#$-.789BMNQRXY^gtuxy° hG?6CJOJQJ]^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJh!bCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ2  )*/09:<=HMNTUXY_`cǶإxgxgxgxgxgxgxgxgxgxgxgxgxgxgx ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh!bCJOJQJ^JaJh wCJOJQJ^JaJ h;P6CJOJQJ]^JaJ hG?6CJOJQJ]^JaJ h w6CJOJQJ]^JaJ&ht~h;P6CJOJQJ]^JaJ&ht~ht~6CJOJQJ]^JaJ(I " # $ < = 4!^!!!!! "+","gdt~cdfgjknoxy{| ´޴޴޴ނ hG?6CJOJQJ]^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJh2nCJOJQJ^JaJh!bCJOJQJ^JaJ ht~h;PCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ+     ! " # $ & ' ( + , 0 1 4 5 : ; < ǶإxgVgVgVgVgVHh2nCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh2?CJOJQJ^JaJ ht~h2nCJOJQJ^JaJh wCJOJQJ^JaJ h;P6CJOJQJ]^JaJ hG?6CJOJQJ]^JaJ h w6CJOJQJ]^JaJ&ht~h;P6CJOJQJ]^JaJ&ht~ht~6CJOJQJ]^JaJ< = A B E G H O P T U ^ _ f g k l o p y z | } !! ! !!!!!!!!!ݽh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJ h w>*CJOJQJ\^JaJ>!!"!$!%!)!*!.!/!2!3!h wCJOJQJ\^JaJh wCJOJQJ^JaJh2nCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ<,"<"H"V"""""#D#E#U#a#o########$$%$&$'$t$$$$gdt~"""""""""""""""""""""""""### # ###### #!#)#*#3#4#9#:#;#<#B#C#M#T#U#Y#Z#]#`#i#n#w#ппппппппппппппппппппбббhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh2?CJOJQJ^JaJ ht~h wCJOJQJ^JaJ8w#########################################$ $$$$$$%$&$'$ﴣᑂhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJ ht~ht~CJOJQJ^JaJhK CJOJQJ^JaJh2?CJOJQJ^JaJ ht~hK CJOJQJ^JaJh wCJOJQJ^JaJ ht~h;PCJOJQJ^JaJ2'$)$*$+$,$0$1$5$6$8$9$@$A$I$J$V$W$^$_$b$c$j$k$r$s$y$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$%%%(%°hM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh5CJOJQJ^JaJ=$$%(%)%*%u%%%%%&&4&5&6&7&&&&&&&'''[''''gdt~(%)%*%,%-%.%/%3%4%8%9%;%<%D%E%K%L%N%O%Q%R%V%W%X%Y%\%]%c%d%f%g%n%o%s%t%z%%%%%%%%%%%%%%%%%%%%%%%%%%%%%пппп ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh5CJOJQJ^JaJ ht~h5CJOJQJ^JaJ h w6CJOJQJ]^JaJ?%%%%%%%%&& & & &&'&4&5&6&9&:&;&<&@&A&H&I&S&T&Z&[&^&_&a&b&f&g&l&m&r&s&w&x&{&|&&&&&&&&&&&&&&򾯾АААh5CJOJQJ^JaJ ht~hM4CJOJQJ^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJh wCJOJQJ^JaJ8&&&&&&&&&&&&&&&&&&&&&&''' ' ' ' ''''' '!'"'#'*'+'-'.'3'4'7'8':';'?'@'I'J'оh5CJOJQJ^JaJ ht~h5CJOJQJ^JaJ h w6CJOJQJ]^JaJhM4CJOJQJ\^JaJ#h [>h wCJOJQJ\^JaJh wCJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ2J'M'N'U'V'Y'Z'`'g'h'p'q's't'y'z''''''''''''''''''''''''''''п|tptptptphcpjhcpU ht~h wCJOJQJ^JaJh wCJOJQJ^JaJ#hM4hM4CJOJQJ\^JaJ#hM4h wCJOJQJ\^JaJ h w>*CJOJQJ\^JaJh5CJOJQJ^JaJ ht~ht~CJOJQJ^JaJ ht~h;PCJOJQJ^JaJ*'''''''''''''_(`(a(b(gd< gdt~'''(.(A(B(H(I(J(K(O(P([(\(](^(_(`(a(b(ﵢﵢ~ ht~h wCJOJQJ^JaJhcphmhFhFCJaJ%h|BNCJOJQJ^JaJmHnHu)jhWhWCJOJQJU^JaJhWCJOJQJ^JaJ,hWhWB*CJOJQJ\^JaJph hWhWCJOJQJ^JaJ<001NP:p,a/ =!"#$% 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH666666666666666666666666666666666666666666666666666666666666666666@@@ NormalCJ_HaJmH sH tH N@N W Heading 1$1$7$8$@&5B*\phDA@D 0Default Paragraph FontRiR 0 Table Normal4 l4a (k( 0No List 4@4 F0Header  !66 0 Char Char1CJaJ4 @4 F0Footer  !4!4 0 Char CharCJaJHO2H :` No SpacingCJ_HaJmH sH tH VOAV W Char Char2'5B*CJ\_HaJmH phsH tH b )45<GHI?NO!TUV%&'x23fgh !"]^:;&CDwxy  @AB 3 4 g h i  R f g ? @ A 3 R S   N O P X h i 4C]^jx0?Wcde   VWcz%HIy3?XYZ /01bc9z{|9:_I"#$<=4^ +,<HVDEUao%&'t()*u4567[_ ` c 08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000Y0Y0Y0Y0Y0Y00Y0Y0Y00Y0Y0Y0Y0Y0Y000Y0Y0Y0Y0Y0Y00Y00Y0Y0Y0Y0Y0Y000Y0Y0Y0Y0Y00Y0Y00Y0Y0Y0000Y0Y0Y00Y0Y00Y0Y0Y0Y0Y0Y0Y000Y0Y0Y0Y0Y0Y00Y00Y0Y0Y0Y0Y0Y000Y0Y0Y0Y0Y0Y00Y0Y0Y0Y0Y0Y0Y0Y0Y0Y0Y00Y0Y0Y0Y0Y0Y0Y0Y00Y0Y0Y0Y0Y0Y00Y0Y0Y0Y0Y0Y00Y0Y00Y0Y0Y0Y0Y00Y0Y00Y0Y0Y0Y0Y0Y0Y000Y0Y0Y0Y0Y00Y0Y00Y0Y0Y0Y0Y0Y0Y00Y000Y0Y0Y0Y0Y00Y0Y00Y0Y0Y0Y00Y0Y00X00%X00X00%X00X00%X00X00%X00@0X00X00  $ QBiCz(y|c < !!!"w#'$(%%&J''b( !#$%'()+,-./12346789:<=>@ABCE   ,"$'b("&*05;?Da(`ginz|!8@0(  B S  ?` c DK}"%:;+. $ W Y 8 ; <B  )0=HNT<?kryosz`g` c 33333333333333333333333333333333333333333333333HHxy%&TT%%\]gg!!  9:;;mnxxAA] ^ h h   @ @ | }  N N GHCDcc  ~Tj}~"#XX$%//zzABLMYZ%%((  45A K O ^ c ` c $!)Y9K c|M4\7 [>2?F|BN;PW:`,a2n|v wxt~cp [*fomG?,5l~m|< !bk}Dzc @::`1::b @@UnknownGz Times New Roman5Symbol3& z Arial?5 z Courier New"hU:fѦn99!9x2Q$P|2Appendix B Network Basicsdeepika.ramesh Fred KumiOh+'0  , L X dpxAppendix B Network Basicsdeepika.ramesh Normal.dot Fred Kumi19Microsoft Office Word@]@p@V?՜.+,0  hp  Hurix System9' Appendix B Network Basics Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefhijklmnpqrstuvyRoot Entry F ̇?{1TableGL>WordDocument>SummaryInformation(gDocumentSummaryInformation8oCompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q