Chapter 12 Multiple Choice and True/False Answer Keys for Parts 1 and 2 Check Your Understanding Part 1 For a quick review to see what you've learned so far, answer the following questions. Visit pearsonhighered.com/techinaction to check your answers. Multiple Choice 1. Which of the following is an advantage of installing a client/server network in a business? a. centralization of network adapters b. centralization of network security protection c. decentralization of files and data d. decentralization of peripherals 2. Why are P2P networks not usually installed in businesses? a. Security is stronger on client/server networks. b. They require dedicated servers. c. They are more scalable than client/server networks. d. Client/server networks are cheaper to install. 3. To manage connections with outside networks, which server would a client/server network include? a. Internet b. authentication c. communications d. application 4. Which type of network topology is most popular? a. bus b. Ethernet c. ring d. star 5. A private network set up by a business that is used exclusively by a select group of employees and suppliers is known as a(n): a. MAN b. intranet c. PAN d. vendor network True–False _____ 1. Client/server networks are less difficult to administer than P2P networks. (F) _____ 2. A file server is used to host websites on a client/server network. (F) Part 1: Critical Thinking 1. Acceptable-Use Internet Policies Most schools have drafted acceptable-use policies for computers and Internet access to inform students and employees of the approved uses of college computing assets. Consider the following areas of a potential college policy: a. Should employees be allowed to use their computers and Internet access for personal tasks (such as checking personal e-mail or accessing Facebook)? If so, how much time per day is reasonable for employees to spend on personal tasks? b. Should student computer and Internet usage be monitored to ensure compliance with the personal use policies? Should the college inform students that they’re being monitored? What should the penalties be for violating these policies? Most students will agree that employees should be permitted to use their employer’s computer for personal reasons during breaks and lunch hours as long as they do not violate the institution’s acceptable-use policy. Students should debate whether colleges have the right to monitor computer activity and whether computer users should be made aware of any monitoring software in use. Students might discuss how grades should not be impacted due to computer activity because grades are based on academics. 2. Wireless Access If you’re going to open a business, such as a sandwich shop or beauty salon, you need to decide if customers should be provided with Internet access. Consider the following: a. Should Internet access be free? If access is not to be free, how much should customers pay? b. How long should the average period of access be (and should there be a limit)? Student responses may vary, but most will probably be in favor of free Internet access. Students may argue that many businesses already provide free, unlimited access and that this is becoming the norm. However, students should also acknowledge that such a policy may result in direct or hidden costs to the business. Direct costs may include the actual usage costs, while hidden costs may include lost sales since customers may linger longer but not spend more money and take seats away from new paying customers. The decision to provide free access may also depend upon the type of business – sandwich and coffee shops, automotive service centers, and similar business may be likely spots since customers may spend a fair amount of time there, but other business may not be able to accommodate customers staying for longer amounts of time. How students answer this question may also determine the decision to provide unlimited or time-limited access. Check Your Understanding Part 2 For a quick review to see what you've learned so far, answer the following questions. Visit pearsonhighered.com/techinaction to check your answers. Multiple Choice 1. Which of the following is NOT necessary in every client/server network? a. bastion host b. network adapters c. transmission media d. NOS software 2. Fiber-optic cable most likely would be used in a business network when a. saving money is more important than speed. b. electrical or magnetic interference is present. c. very short cable runs are required. d. the installation budget is very limited. 3. NOS software is needed a. on all computers in a client/server network. b. only on the servers in a client/server network. c. only if a communications server is deployed on a client/server network. d. only when configuring a network in a star topology. 4. On client/server networks, bridges a. transfer data between two networks. b. route data between two collision domains on a single network. c. move data efficiently from node to node on the internal network. d. are necessary only in networks using the ring topology. 5. Providing adequate security on a corporate network involves all of the following issues, except a. authentication. b. restricting access to servers. c. proprietary software lockout. d. limiting network access by requiring passwords. True–False _____ 1. Routers are used to route data between two different networks. (T) _____ 2. Two different types of network operating software cannot be deployed on the same network. (F) Part 2 Critical Thinking 3. Biometric Access to Networks Biometric security devices are still expensive. But there are usually parts of any organization that need to be more secure than others, and you can often justify the cost of these devices for certain areas. Consider the following organizations and prepare a paper discussing which areas of the following businesses could most benefit from installing biometric security devices: a. Financial institution (bank) b. Public university that conducts scientific research c. Pharmaceutical company Students should explore why each of these types of organizations would require enhanced security procedures. Would the same level of security be appropriate for every area of the organization? Which areas might need enhanced security procedures? If circumstances allow, students would benefit from class presentations and discussion of these topics. Critical thinking abilities will be enhanced by asking students to respond to all three examples, rather than just one of the choices. Students could be asked why some level of security procedures would be appropriate for just about any type of business organization. 4. Monitoring Computer Usage in the Workplace Software tools for monitoring computer usage are readily available on the Internet, often for free (such as Best Free Keylogger). In most jurisdictions, it’s legal for employers to install monitoring software on computer equipment they provide to employees. It’s usually illegal for employees to install monitoring software on computers owned by their employers for purposes of monitoring computer usage of coworkers or bosses. Do you think this double standard is fair? What circumstances do you think would justify an employee monitoring other employees’ computer usage? Should whistleblowers have the right to conduct computer usage monitoring? Fully explain your answers. Students should agree that employers have the right to monitor employee use of employer resources. A discussion about proper professional conduct and business ethics could be beneficial for students. The question about getting approval before installing monitoring equipment could be broadened to include what reason would an employee give for making such a request? What protection is needed for whistleblowers? The viewpoints of students could be expanded by considering these questions from both an employee perspective and a management perspective. These issues are frequently in the news, and any recent topics could be included in classroom discussions.