OS Chapter 25 Answers

Chapter 25 Review Solutions

Key Term Quiz

1.      The time it takes for a packet to travel to its destination and back is called latency.

2.      Internet Explorer is a(n) Web browser.

3.      The most common method used to encrypt information, such as credit card numbers, on the Internet is HTTP over Secure Sockets Layer (HTTPS).

4.      A(n) proxy server is software that enables multiple connections to go to the Internet through one protected PC.

5.      Although some people use the term to refer to modem speed, baud actually means the number of cycles per second, while bps is a more accurate measurement of actual data throughput.

6.      By using an anonymous logon, file transfer protocol (FTP) allows you to send and receive files from a public site.

7.      Set by the International Telecommunication Union (ITU), V standards define the fastest data transfer speed a modem can handle.

8.      The service that provides the structure for the World Wide Web, allowing documents to be sent across the Web, is Hypertext Transfer Protocol (HTTP).

9.      Dial-up links to the Internet use a streaming hardware protocol called Point-to-Point Protocol (PPP).

10.  A(n) VPN enables you to access a remote network over the Internet securely.

Multiple-Choice Quiz

1.      Which statements about Integrated Services Digital Network (ISDN) are true? (Select three.)

A.    An ISDN connection uses either an internal or an external terminal adapter (TA).

B.     BRI has two B channels and one D channel for a throughput total of 128 Kbps.

C.     PRI has 23 B channels and 1 D channel for a total throughput of 1.5 Mbps.

D.    ISDN consists of end-to-end high-speed analog lines.

Answer: A, B, C.

2.      What is the name for the router that your PC uses to connect to your Internet service provider?

A.    Loopback address

B.     Backbone

C.     IP address

D.    Default gateway

Answer: D.

3.      To configure dial-up networks with Windows XP, which applet should you use?

A.    Network and Internet Connections

B.     Network Neighborhood

C.     Internet Connection Sharing

D.    Remote Assistance

Answer: A.

4.      A Virtual Private Network creates a _______________ through the Internet?

A.    Tunnel

B.     BRI

C.     Connection

D.    SSH session

Answer: A.

5.      To check to see if the Web server you are trying to reach is available or is down, which command-line utility should you use?

A.    PING

B.     ICS

C.     Telnet

D.    NNTP

Answer: A.

6.      Which of the following Internet connection methods enables you to watch television on your computer if you have a TV tuner card?

A.    DSL

B.     Satellite

C.     Cable

D.    ISDN

Answer: C.

7.      If your modem cannot connect to the Internet, which of the following can you eliminate as a cause of the problem?

A.    The phone line is dead.

B.     All lines on the Internet are busy.

C.     You dialed the wrong number.

D.    The modem is bad.

Answer: B.

8.      Which term describes hardware or software that protects your computer or network from probing or malicious users?

A.    Router

B.     Firewall

C.     Protocol

D.    Spyware

Answer: B.

9.      Liz can receive her e-mail, but she cannot send e-mail. Which of the following is most likely causing her problem?

A.    POP3

B.     SMTP

C.     IMAP

D.    UART

Answer: B. SMTP is the most likely cause of her problem. Remember SMTP is used to send, while POP3 and IMAP are used to receive e-mail.

10.  What is the name for the extremely fast networking connections through which Internet transmissions take place?

A.    Gateways

B.     Tier 1 providers

C.     Backbones

D.    ISPs

Answer: C.

11.  Which technology enables you to make voice calls over your computer network?

A.    Internet Voice Protocol

B.     Voice over IP

C.     Digital Telephony Subscriber Service

D.    Universal Asynchronous Receiver Transmitter

Answer: B.

12.  A user on Windows XP has asked you to teach her how to use a feature of Microsoft Word. What tool should you use?

A.    Remote Assistance

B.     Remote Desktop

C.     Telnet

D.    Secure Shell (SSH)

Answer: A.

13.  John walked up to a computer that couldn’t connect to the Internet and immediately opened a command-line window and typed ping 127.0.0.1. Why?

A.    He wanted to test the connection to the default gateway.

B.     He wanted to test the connection to the nearest Tier 2 router.

C.     He wanted to test the NIC on the local machine.

D.    He wanted to test the NIC on the default gateway.

Answer: C. Pinging 127.0.0.1 pings the local machine for a quick—though not thorough—NIC test.

14.  Where would you go first if you needed to configure a small Linksys router to use a static IP address?

A.    The router configuration applet in the Control Panel.

B.     The Router’s configuration Web page.

C.     Plug in a Yost cable and start PuTTY.

D.    There is no way to give the router a static IP.

Answer: B. Small home routers provide configuration Web pages that make it easy to set up a small network.

15.  A new client lives in a rural area, outside the connectivity radius of the local cable company and definitely more than 20,000 feet away from the nearest switching center for the phone company. Which Internet option offers the client the best performance?

A.    Cable

B.     Dial-up

C.     DSL

D.    Satellite

Answer: D. If the client lives outside the cable or DSL areas, neither of those technologies offers anything for him! The best choice here is satellite.

Essay Quiz

1.      With the rash of worms and viruses that attack computers connected to the Internet, how can you protect your computer?

Answer: Although a good portion of this question will get answered in Chapter 26, “Securing Computers,” what you should know after reading this chapter is that you should adjust the security settings in your Web browser. You should also use common sense about what you download and be cautious about opening e-mail attachments. In Chapter 26, the student will get the rest of the security story: Install a firewall and use an antivirus program that’s updated regularly.

2.      Andrew’s wife, Talena, collects pottery. Andrew found a shop on the Internet that has a piece she’s been wanting. He’d love to get it for her birthday next week, but the only way it can arrive by then is if he pays for it with his credit card. He’s a bit apprehensive about giving his credit card number over the Internet. He wants you to tell him whether you think the site is safe or not. How can you evaluate the site to determine whether it uses encryption for credit card numbers?

Answer: The most common method of encryption on the Web is HTTP over Secure Sockets Layer. If the Web site begins with HTTPS: rather than HTTP:, it is an encrypted site. Notice a little lock in the lower-right corner of the screen or on the right side of the Internet Explorer 7 address bar.

3.      Sean is planning to take some distance education courses next term. He currently uses a regular phone line and a modem to connect to the Internet. He’s consulted you to figure out what his options are for a faster connection. Review his options, explaining the advantages and disadvantages, along with any restrictions that may prevent his receiving the service.

Answer: A crucial consideration is where Sean lives. If he lives in a rural area, his choices will be limited. If he lives close to a city, he will have a wider range of choices. The options that Sean should consider are the following:

·         ISDN has a high initial cost for equipment and installation and is limited to an 18,000-foot radius of a central office. It will provide throughput up to 128 K.

·         DSL is also limited to about an 18,000-foot radius of a main phone service switching center. It provides upload speeds of about 384 Kbps and download speeds as fast as 2 Mbps. From a single phone line, he will be able to use voice and data simultaneously.

·         If Sean has cable TV, he will likely be able to get cable Internet service. Its cost and speed are similar to those of DSL.

·         If he is so far out in the country that he can’t get the other choices, he will be limited to satellite Internet service. Its speed is comparable to DSL and Cable, but the initial cost may be greater because he’ll have to purchase a satellite dish.

4.      With a child in high school and another at a local college, it’s always a struggle in Tom’s house about who gets to use the computer to do Internet research. It’s not feasible for Tom to have two DSL connections, but he does have a second computer. What solution can you offer to solve his problem?

Answer: Internet Connection Sharing is a perfect solution. It allows one computer to be connected directly to the Internet and serve as a host to share the connection with the client computers. And, the best thing is that the capability is included in Windows 98 and newer operating systems, so there won’t be any additional setup costs.

5.      You’ve become a regular columnist for your company’s monthly newsletter. Everybody in the company uses e-mail and browses the Web, but you’re convinced that the company would benefit if employees knew how to use some of the other Internet services. You’ve decided that this month’s article will highlight three other Internet services. Which three will you discuss and what will you include about each?

Answer: A good answer might discuss FTP, Telnet, and Newsgroups. FTP enables users to transfer files from public sites by using an anonymous login or to use a specific username and password for private sites. It is especially good for very large files that may exceed the size limitations of certain e-mail programs. Telnet enables a user to log on with a special user name and password to access a computer remotely. This would be great for employees who need to work from home. With a newsreader such as that included in Outlook Express, users can access a newsgroup to learn information and to share ideas.

Cross Check: Installing a PCI Modem

The keys with any installation of an expansion card are threefold. Disconnect the electricity from the computer. Make sure you don’t shock the expansion card or any other device when handling the card. And, finally, install the proper drivers.

Comments