98%(55)54 out of 55 people found this document helpful
This preview shows page 1 - 4 out of 9 pages.
1Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.Which computer addiction symptom is Chip experiencing?Lack of controlDownplayingUncomfortable feelingsNeglectRATIONALEChip is experiencing the downplaying symptom of computer addiction because he attempts to justify his unreasonable interest in surfing the net.CONCEPTComputer Addiction2Which of the following is the basic functionality of network software?Ethernet developmentUser managementAutomation managementInternet speedRATIONALEOut of this list, the correct basic functionality of network software is user management. Network software allows administrators to add or remove users from the network.CONCEPT
Computer Network Components3Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.Which network type is Marco using?WANPANLANMANRATIONALEA personal area network (PAN) is a computer network used for sharing data between personal devices that are physically close to each other. In this example, Marco is using a PAN because he connects his personal devices within a close range, and does not connect to larger networks, such as a LAN(local area network) or WAN (wide area network).CONCEPTComputer Network Types4Select the true statement about network protocols.A protocol determines how it will be executed on every networked device.A protocol determines how the sending computer notifies the receiving computer about the presence of compressed data.A protocol is not required for all data transmissions.A protocol determines how the sending device notifies the receiving device that there is data to be sent.
RATIONALEA protocol is a system of rules that enables two or more elements (computer devices) in a communications system to send and receive information. Together, the guidelines related to how a sending device notifies a receiving device that there is data to be sent form a valid protocol rule. CONCEPTIntroduction to Computer Networks5Select the true statement about the history of the Internet.As a way to spy on the Soviet Union, ARPA was preceded by the creation of the DARPA agency in the late 1950s.