Module 11 Study Questions
Technology in Action (6th Ed.)
Pages 577 to 611

  1. Be able to define the following key terms:
    1. Biometric access devices
    2. Data collisions
    3. Intranet
    4. MAC (Media Access Control) address
    5. Network topology
    6. OSI (Open Systems Interconnect) model
    7. Print queue
    8. Protocol
    9. SAN (storage area network)
    10. Scalable network

  2. What are six advantages networks provide businesses?

  3. What does a network administrator do?

NOTE: The descriptions of the responsibilities of a network administrator and network engineer presented in the book sound very similar. While both professions are involved with the implementation of a new network, the network engineer has more training and a bigger salary because he/she makes the final decision on network topology, hardware and media types. While the network administrator is involved and has input, his/her primary responsibility is to maintain the network once it is up and running.
  1. Identify eight types of servers.

NOTE: It is better to think of a server as software rather than a piece of hardware. One computer can simultaneously run different server software, for example, act as a print server and file server at the same time. Figures like 12.6 on page 585 are misleading when they picture servers as dedicated to one computer.
  1. How does using an application server make upgrading software easier?

  2. Identify and be able to draw the three basic network topologies.

  3. Why don't peer-to-peer networks need special network operating system (NOS) software?

  4. How is NOS software different from operating system software used by personal computers?

  5. Why are most NICs installed inside the computer rather then externally connected?

  6. What is the standard communications protocol used by most network adapters (NICs)?

  7. Do NICs and other network adapters require special software?

  8. What is the difference between a MAC address and an IP address?

  9. How are radio frequency identification (RFID) tags used?

  10. How does the college handle authentication on our network?

  11. What did you find interesting in this week’s reading that was not part of a study guide question?


Syllabus Assignments Study Questions Competencies Dr. T.'s Homepage TTDK Homepage

Please send comments regarding this web page to: Tim.Trainor@ttdk.com