Chapter 12 Multiple Choice and True/False Answer Keys for Parts 1 and 2
Check Your Understanding
For a quick review to see what you've learned so far, answer the following
to check your answers.
Which of the following is an advantage of installing a client/server network in a bus
centralization of network adapters
centralization of network security protectio
decentralization of files and data
decentralization of peripherals
Why are P2P networks not usually installed in businesses?
Security is stronger on client/server networks.
They require dedicated servers.
They are more scalable
than client/server networks.
Client/server networks are cheaper to install.
To manage connections with outside networks, which server would a client/server
type of network topology is most popular?
private network set up by a business that is used exclusively by a select group of
employees and suppliers is known as a(n):
_____ 1. Client/server networks are less difficult to administer than P2P networks.
_____ 2. A file server is used to host websites on a client/server network.
Part 1: Critical Thinking
Use Internet Policies
have drafted acceptable
use policies for computers and Internet a
cess to inform students and employees of the approved uses of college computing
assets. Consider the following areas of a potential college policy:
Should employees be allowed to use their
computers and Internet access for
personal tasks (such as checking personal e
mail or accessing Facebook)? If
so, how much time per day is reasonable for employees to spend on personal
Should student computer and Internet usage be monitored to ensur
ance with the personal use policies? Should the college inform students that
they’re being monitored? What should the penalties be for violating these po
Most students will agree that employees should be permitted to use their emplo
puter for personal reasons during breaks and lunch hours as long as they
do not violate the
use policy. Students should debate
whether colleges have the right to monitor computer activity and whether co
puter users should be made a
ware of any monitoring software in use. Students
might discuss how grades should not be impacted due to computer activity b
cause grades are based on academics.
If you’re going to open a business, such as a sandwich shop or beauty salon,
need to decide if customers should be provided with Internet access. Consider the
Should Internet access be free? If access is not to be free, how much should
How long should the average period of access be (and should there b
e a li
Student responses may vary, but most will probably be in favor of free Internet
access. Students may argue that many businesses already provide free, unlimited
access and that this is becoming the norm. However, students should also
acknowledge that such a
policy may result in direct or hidden costs to the bus
ness. Direct costs may include the actual usage costs, while hidden costs may i
clude lost sales since customers may linger longer but not spend more money and
take seats away from new paying customer
s. The decision to provide free access
may also depend upon the type of business
sandwich and coffee shops, autom
tive service centers, and similar business may be likely spots since customers may
spend a fair amount of time there, but other business may
not be able to acco
modate customers staying for longer amounts of time. How students answer this
question may also determine the decision to provide unlimited or time
Check Your Understanding
For a quick review to see what you've
learned so far, answer the following
to check your answers.
Which of the following is NOT necessary in every client/server net
optic cable most likely would be used in a business network when
saving money is more important than speed.
electrical or magnetic interference is present.
very short cable runs are required.
the installation budget is very limited.
NOS software is needed
on all computers in a client/server network.
only on the servers in a client/server network.
only if a communications server is depl
oyed on a client/server network.
only when configuring a network in a star topology.
On client/server networks, bridges
transfer data between two networks.
route data between two collision domains on a single network.
move data efficient
ly from node to node on the internal network.
are necessary only in networks using the ring topology.
Providing adequate security on a corporate network involves all of the following i
restricting access to serve
proprietary software lockout.
limiting network access by requiring passwords.
_____ 1. Routers are used to route data between two different networks.
_____ 2. Two different types of network operating software cannot be deployed on the
Part 2 Critical Thinking
Biometric Access to Networks
Biometric security devices are still expensive. But there are usually parts of any
organization that need to be more secure than others, and you can often justify the
cost of these devices for certain areas. Consider the following organizations and
a paper discussing which areas of the following businesses could most
benefit from installing biometric security devices:
Financial institution (bank)
Public university that conducts scientific research
Students should explore
each of these types of organizations would require
enhanced security procedures. Would the same level of security be appropriate
for every area of the organization? Which areas might need enhanced security
procedures? If circumstances allow, students would
benefit from class present
tions and discussion of these topics. Critical thinking abilities will be enhanced by
asking students to respond to all three examples, rather than just one of the
choices. Students could be asked why some level of security proc
edures would be
appropriate for just about
type of business organization.
Monitoring Computer Usage in the Workplace
Software tools for monitoring computer usage are readily available on the Inte
net, often for free (such as Best Free Keylogger). In
most jurisdictions, it’s legal
for employers to install monitoring software on computer equipment they provide
to employees. It’s usually illegal for employees to install monitoring software on
computers owned by their employers for purposes of monitoring
of coworkers or bosses. Do you think this double standard is fair? What circu
stances do you think would justify an employee monitoring other employees’
computer usage? Should whistleblowers have the right to conduct computer
g? Fully explain your answers.
Students should agree that employers have the right to monitor employee use of
employer resources. A discussion about proper professional conduct and business
ethics could be beneficial for students. The question about getting approval before
installing monitoring equipment could be broadened to include what reason
would an employee give for making such a request? What protection is needed for
e viewpoints of students could be expanded by considering
these questions from both an employee perspective and a management perspe
tive. These issues are frequently in the news, and any recent topics could be i
cluded in classroom discussions.