A company wants to create a network that its employees can use to collaborate securely. Which of the following statements should guide the company’s decision-making?

(1 point)
Responses

Anybody who has the correct password can log in to an intranet.

Anybody who has the correct password can log in to an intranet.

The World Wide Web can connect to Wi-Fi but not to telepresence.

The World Wide Web can connect to Wi-Fi but not to telepresence.

Files on an extranet can be downloaded by outside users.

Files on an extranet can be downloaded by outside users.

You can’t access an intranet from the World Wide Web.

You can’t access an intranet from the World Wide Web.

What is the difference between a client-server network and a peer-to-peer network?

(1 point)
Responses

The client-server model has a central server.

The client-server model has a central server.

The peer-to-peer has a central server.

The peer-to-peer has a central server.

The client-server is wireless; the peer-to-peer is wired.

The client-server is wireless; the peer-to-peer is wired.

The peer-to-peer is wireless; the client-server is wired.

Which topology is the most popular way to set up a LAN?

(1 point)
Responses

bus

bus

star

star

ring

ring

mesh

A restaurant owner is considering putting the computers and tablets that they use to run their store on a network. What is the most important concern for them to be aware of?

(1 point)
Responses

Networked devices are more at risk from hacking.

Networked devices are more at risk from hacking.

Networked tablets are easier to steal.

Networked tablets are easier to steal.

Networked tablets break more easily.

Networked tablets break more easily.

Networked computers become out of date more quickly.

Which is larger—a WAN or a LAN?

(1 point)
Responses

WAN

WAN

LAN

LAN

They are the same size.

They are the same size.

It depends on whether they are on a Mac or PC.

Which of these is NOT a benefit of networking computers?

(1 point)
Responses

sharing peripherals

sharing peripherals

sharing software

sharing software

sharing viruses

sharing viruses

sharing data

sharing data

Which network model is predominantly used by the web?

(1 point)
Responses

peer-to-peer

peer-to-peer

client server

client server

wired connection

wired connection

wireless connection

wireless connection\
Who owns the internet?

(1 point)
Responses

Everybody—it’s on each person’s individual device.

Everybody—it’s on each person’s individual device.

Bill Gates—it’s part of his worldwide software model.

Bill Gates—it’s part of his worldwide software model.

Nobody—it’s a cooperative collection of networks from all over the world.

Nobody—it’s a cooperative collection of networks from all over the world.

The United States government—it developed the internet through the Department of Defense.

1 answer

Here are the answers to your questions based on the given responses:

  1. A company wants to create a network that its employees can use to collaborate securely. Which of the following statements should guide the company’s decision-making?

    • You can’t access an intranet from the World Wide Web.
  2. What is the difference between a client-server network and a peer-to-peer network?

    • The client-server model has a central server.
  3. Which topology is the most popular way to set up a LAN?

    • star
  4. A restaurant owner is considering putting the computers and tablets that they use to run their store on a network. What is the most important concern for them to be aware of?

    • Networked devices are more at risk from hacking.
  5. Which is larger—a WAN or a LAN?

    • WAN
  6. Which of these is NOT a benefit of networking computers?

    • sharing viruses
  7. Which network model is predominantly used by the web?

    • client server
  8. Who owns the internet?

    • Nobody—it’s a cooperative collection of networks from all over the world.

If you need further explanations or have any more questions, feel free to ask!