1-17.
1-18.
1-19.
1-20.
The interface between the
telecommunications access
software and the application
programs is known by which
of the following terms?
1.
Network operating system
2.
Network system software
3.
Telecommunications
access software
4.
Teleprocessing monitor
Electronic mail is
classified as what type of
software program?
1.
Communications
2.
Utility
3.
Network access
4.
Network operating
Which of the following terms
describes the prevention of
files from being updated by
more than one user at a
time?
1.
Data integrity
2.
Data validity
3.
System access
4.
System security
The different levels of
access can be designated by
which of the following
terms?
1.
Private
2.
Public
3.
Shared
4.
Each of the above
1-21.
1-22.
1-23.
1-24.
Network software often
provides some type of
locking capability. This
locking feature prevents
which of the following
actions?
1.
Access to the file while
it is being worked on
2.
Logging onto more than
one workstation at a
time
3.
Security violations from
occurring
4.
Unauthorized users from
logging onto the network
Once the software is
installed on the network, it
must be tested.
1.
True
2.
False
How many methods are used to
provide service restoration
after system degradation?
1.
Five
2.
Two
3.
Three
4.
Four
Which of the following
factors does not contribute
to the flexibility of a
network?
1.
Cabling
2.
Protocol
3.
Topology
4.
Network system software
3