Hardware Reference
In-Depth Information
Answers to Review Questions
1.
B. Inkjet printers use liquid ink. Laser printers use dry toner. Daisywheel and dot matrix
printers, now long obsolete, used an inked ribbon.
2.
A. A laser printer writes the page image to a drum and then transfers it onto paper.
3.
C. Most printers employ a USB interface today. Parallel (which is the same as LPT) was an
older technology for a printer interface and is now obsolete. FireWire could theoretically be
used for a printer interface, but it is not traditionally used for one.
4.
A. VGA is an analog connector, still used for some monitors. However, digital connectors
such as DVI and HDMI are becoming more common. HTTP is an Internet protocol, not a
connector.
5.
D. A charge-coupled device (CCD) is the optical technology used in both digital cameras
and scanners.
6.
B. Optical zoom is “real” zoom, with a real lens. Digital zoom is a simulation of zooming
by adding extra pixels (interpolating).
7.
D. A local area network (LAN) is a network where the computers are co-located.
A WAN is a wide area network. A MAN is a metropolitan area network. SAN is a storage
technology, not a physical network type.
8.
A. A peer to peer (P2P) network requires no servers. A client/server network requires at
least one server. The Internet has many servers. Ethernet is a technology that supports both
P2P and client/server networks.
9.
A. A network interface card (NIC) is a network adapter in an individual computer or other
device.
10. C. A router enables one Internet connection to be shared among multiple PCs.
11. D. Parallel Cat5e is an unshielded twisted pair (UTP) type of cable.
12. C. RJ-45 connectors are used for Ethernet. RJ-11 and RJ-14 cables are telephone cables.
13. B. HomePlug, also called Powerline Ethernet, uses the existing electrical wiring in a
building to carry network signals.
14. A. 802.11n is the fastest and newest wireless standard. 802.11a, b, and g are all older
standards.
15. C. Half-duplex communication is bidirectional, but only one direction at a time.
16. A. The service set identifi er (SSID) appears as the network's name.
17. D. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are types of
wireless security encryption.
Search WWH ::




Custom Search