Module 3 Content

¡Supera tus tareas y exámenes ahora con Quizwiz!

The speed and quality of Internet connections vary. For email and browsing the Web, speeds of _____ Mbps are acceptable, whereas Skype video calls require 1.5 Mbps connections.

.5

The current rollout of mobile _______ service uses LTE technology.

4g

The Internet is based on a U.S. government project called _____.

ARPA

Another file sharing protocol called _______ distributes the role of a file server across a collection of dispersed computers.

BitTorrent

_______ Internet service offers dependable connections over coaxial and fiber cables.

Cable

Modems and routers are examples of _______ that control the flow of data within a network and act as a gateway from one network to another. (Hint: Use the acronym.)

DCE (data communication equipment)

By activating ______, the router will be able to assign IP addresses to each device that joins the network.

DCPD

Addresses are assigned by ________ servers.

DHCP

The most popular wired technology is ______.

Ethernet

One technology used for this purpose is _____, which provides a way to transfer files over any TCP/IP network.

FTP

________ client software, such as FileZilla, provides a way to upload and download files from an Internet-based server to a computer on a LAN.

FTP

The fastest offering that uses the telephone network is _____.

FTTH (fiber to the home)

A limited-access _____ network can be created for visitors to use.

Guest

The Internet's supply of ____ addresses ran out in 2011

IPv4

_______ addresses are 32 bits long, whereas ______ addresses are 128 bits long, providing billions and billions of possible addresses.

IPv4, IPv6

Networks that form the Internet are maintained by _______ that offer access to consumers.

ISPs

ZigBee, Z-Wave, and RFID are low-power wireless technologies that transport data on ______ networks.

IoT

Networks can be classified by geographical scope as PANs, _______, and WANs.

LANs

Devices also have a physical _____ address, in addition to the IP addresses acquired from a DHCP server.

MAC

In addition to an IP address, devices on a LAN have a physical _____ address that uniquely identifies them.

MAC

______ Internet access is available from cellular services.

Mobile

You can use _____ to check the latency of an Internet connection.

Ping

______ access options include mobile satellite.

Portable

______ IP addresses are not routable over the Internet.

Private

_______ IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs.

Private

Next, create a(n) ______ that uniquely identifies the network by name.

SSID

You're expecting visitors who will be demanding Internet access. Before they arrive, you can activate a Guest network that has its own _____ and a different password from the one used with the network where you store all your files.

SSID

_______ and UDP are two of the main protocols used to transport data over the Internet.

TCP

Additional DCEs include hubs, switches, bridges, repeaters, and _______ access points.

WAP

The most popular wireless technology is _____, which can be configured as a(n) _____ or star topology.

Wi-Fi, mesh

The Internet ______ is a system of high-capacity routers and fiber-optic communication links.

backbone

The transmission capacity of a channel is referred to as ______.

bandwidth

Channels that are capable of moving at least 25 Mbps are classified as _______.

broadband

Networks that handle at least 25 Mbps are classified by the FCC as ______.

broadband

You're accustomed to using Dropbox to share files over the Internet; but at your new job, files are stored on an FTP server. This is not a problem. You know that you can access work files using a(n) _____ or FTP client software such as FileZilla.

browser

You're setting up an Ethernet wired network using a router. To access the router and its configuration software, you open your _____ and type the router's IP address.

browser

Your bandwidth _____ is the top speed allowed by your Internet access plan.

cap

A specification such as 10 Mbps that we commonly refer to as "connection speed" is technically a measurement of ________.

capacity

The cables and signals used to transport data from one network device to another are a communication _______.

channel

The communication ______ used for networks include copper cables, coaxial cables, radio signals, and microwaves.

channels

Wireless channels use RF signals and microwaves. Government agencies regulate some wireless ______.

channels

You have a small network in your house that uses a wireless router. For the past week, you've seen a black SUV parked outside and its occupant seems to be using a laptop computer. The first step you should take to discover if this person has hacked into your network is:

check your network connections

Wired channels include twisted pair wires, _____ cables used for cable television, and ______-optic cables used for high-capacity trunk lines.

coaxial, fiber

Data ______ equipment includes modems and routers.

communication

Devices that access LANs are equipped with a network interface _____ that contains circuitry for wireless or wired connections.

controller

Suppose you're connected to a Wi-Fi hotspot. When you use File Explorer, you see the names of other computers listed under Network. Oops! You must have network _____ turned on.

discovery

To access files on a network, network _____ allows your computer to see other devices and permits other devices to see your computer.

discovery

When network ______ is on, your computer can see other devices that are connected to a LAN.

discovery

Because it is difficult to remember IP addresses, the _______ name system allocates easy-to-remember domain names. _______-level domains include .com and .edu.

domain, top

You're shopping for a new router and are attracted by the advertising for a 600N model. Upon examining the specifications, you see that the router transmits 300+300, so you know it is using ______ broadcast channels.

dual

IP addresses that are temporarily assigned are called ________ addresses, whereas permanent ones are called _______ addresses.

dynamic, static

It is also important to activate wireless _____ to prevent wireless signals from being intercepted during transmission.

encryption

Technologies such as WEP, WPA, and PSK are examples of _______ that can be used on wireless networks.

encryption

The dominant standard for wired LANs is _______.

ethernet

Options for _____ Internet access include cable, DSL, ISDN, satellite, and fiber- to-the-home.

fixed

Mobile broadband services offered by cell phone companies usually entail separate fees for talk, texting, and data. Public Wi-Fi ______ offer yet another Internet access

hotspots

Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) _______ topology.

infrastructure, mesh

An Internet connection can be fast and have an acceptable ping rate but still have poor quality due to excessive _____ and packet loss.

jitter

You can use online tools to check for packet loss and ______, which is the variability in packet latency.

jitter

To connect to a secure LAN that is protected by encryption, an encryption _____, or password, is required.

key

Satellite Internet service is available in remote areas but suffers from high rates of _____.

latency

The problem with satellite Internet service is excessive ______.

latency

Technologies such as RFID, NFC, Bluetooth Smart, ZigBee, and Z-Wave offer _____-power links, essential for battery-powered devices that can't expend excess amounts of energy transmitting data.

low

Torrents exchange segments of files over a distributed network using a logical _______ topology.

mesh

Any device in a network is referred to as a(n) _____.

node

The Internet uses ______ switching technology to route data from many different messages over a single communication channel.

packet

Before data travels over the Internet, it is divided into ______ by a protocol called _______, which also reassembles the data when it reaches its destination.

packets, TCP

The first step is to change the standard ______ to one that is secure.

password

Sharing the files on your computer poses a security risk, but it is possible to specify ____ for how your shared files can be used.

permissions

A(n) ______ area network connects smart sensors and digital devices within a range of about 30 feet.

personal

Communication _____ set standards for physical channels, transporting data, and correcting errors.

protocols

Networks use physical, transport, and arrival communication _______ to set the rules for efficiently transmitting data and handling errors.

protocols

Today, the Internet is a collection of networks, tied together by common ______.

protocols

You've got class notes and you don't mind sharing them with your roommates, but you'd prefer that they don't change them. You can keep your notes intact if you assign _______ permission to those files.

read

The key device at the center of a LAN is a(n) ________.

router

File ______ has to be turned on before any files on your computer can be accessed by other devices on a network.

sharing

Data ______ equipment includes computers.

terminal

Networks can be configured in various _______, such as star, mesh, point-to-point, or bus.

topologies

A utility called _____ reports the path of packets over the Internet.

traceroute

Another utility called _____ reports the path that your data takes to reach its destination.

traceroute

Read and _______ permission allows a shared file to be opened, viewed, modified, and deleted.

write


Conjuntos de estudio relacionados

Sherpath: Disorders of the Red Blood Cells

View Set

BCIS1305: internet basics & information literacy

View Set

Ch 8-1 Vocabulary 1960's America Pages 845-894

View Set