Module 3 Content
The speed and quality of Internet connections vary. For email and browsing the Web, speeds of _____ Mbps are acceptable, whereas Skype video calls require 1.5 Mbps connections.
.5
The current rollout of mobile _______ service uses LTE technology.
4g
The Internet is based on a U.S. government project called _____.
ARPA
Another file sharing protocol called _______ distributes the role of a file server across a collection of dispersed computers.
BitTorrent
_______ Internet service offers dependable connections over coaxial and fiber cables.
Cable
Modems and routers are examples of _______ that control the flow of data within a network and act as a gateway from one network to another. (Hint: Use the acronym.)
DCE (data communication equipment)
By activating ______, the router will be able to assign IP addresses to each device that joins the network.
DCPD
Addresses are assigned by ________ servers.
DHCP
The most popular wired technology is ______.
Ethernet
One technology used for this purpose is _____, which provides a way to transfer files over any TCP/IP network.
FTP
________ client software, such as FileZilla, provides a way to upload and download files from an Internet-based server to a computer on a LAN.
FTP
The fastest offering that uses the telephone network is _____.
FTTH (fiber to the home)
A limited-access _____ network can be created for visitors to use.
Guest
The Internet's supply of ____ addresses ran out in 2011
IPv4
_______ addresses are 32 bits long, whereas ______ addresses are 128 bits long, providing billions and billions of possible addresses.
IPv4, IPv6
Networks that form the Internet are maintained by _______ that offer access to consumers.
ISPs
ZigBee, Z-Wave, and RFID are low-power wireless technologies that transport data on ______ networks.
IoT
Networks can be classified by geographical scope as PANs, _______, and WANs.
LANs
Devices also have a physical _____ address, in addition to the IP addresses acquired from a DHCP server.
MAC
In addition to an IP address, devices on a LAN have a physical _____ address that uniquely identifies them.
MAC
______ Internet access is available from cellular services.
Mobile
You can use _____ to check the latency of an Internet connection.
Ping
______ access options include mobile satellite.
Portable
______ IP addresses are not routable over the Internet.
Private
_______ IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs.
Private
Next, create a(n) ______ that uniquely identifies the network by name.
SSID
You're expecting visitors who will be demanding Internet access. Before they arrive, you can activate a Guest network that has its own _____ and a different password from the one used with the network where you store all your files.
SSID
_______ and UDP are two of the main protocols used to transport data over the Internet.
TCP
Additional DCEs include hubs, switches, bridges, repeaters, and _______ access points.
WAP
The most popular wireless technology is _____, which can be configured as a(n) _____ or star topology.
Wi-Fi, mesh
The Internet ______ is a system of high-capacity routers and fiber-optic communication links.
backbone
The transmission capacity of a channel is referred to as ______.
bandwidth
Channels that are capable of moving at least 25 Mbps are classified as _______.
broadband
Networks that handle at least 25 Mbps are classified by the FCC as ______.
broadband
You're accustomed to using Dropbox to share files over the Internet; but at your new job, files are stored on an FTP server. This is not a problem. You know that you can access work files using a(n) _____ or FTP client software such as FileZilla.
browser
You're setting up an Ethernet wired network using a router. To access the router and its configuration software, you open your _____ and type the router's IP address.
browser
Your bandwidth _____ is the top speed allowed by your Internet access plan.
cap
A specification such as 10 Mbps that we commonly refer to as "connection speed" is technically a measurement of ________.
capacity
The cables and signals used to transport data from one network device to another are a communication _______.
channel
The communication ______ used for networks include copper cables, coaxial cables, radio signals, and microwaves.
channels
Wireless channels use RF signals and microwaves. Government agencies regulate some wireless ______.
channels
You have a small network in your house that uses a wireless router. For the past week, you've seen a black SUV parked outside and its occupant seems to be using a laptop computer. The first step you should take to discover if this person has hacked into your network is:
check your network connections
Wired channels include twisted pair wires, _____ cables used for cable television, and ______-optic cables used for high-capacity trunk lines.
coaxial, fiber
Data ______ equipment includes modems and routers.
communication
Devices that access LANs are equipped with a network interface _____ that contains circuitry for wireless or wired connections.
controller
Suppose you're connected to a Wi-Fi hotspot. When you use File Explorer, you see the names of other computers listed under Network. Oops! You must have network _____ turned on.
discovery
To access files on a network, network _____ allows your computer to see other devices and permits other devices to see your computer.
discovery
When network ______ is on, your computer can see other devices that are connected to a LAN.
discovery
Because it is difficult to remember IP addresses, the _______ name system allocates easy-to-remember domain names. _______-level domains include .com and .edu.
domain, top
You're shopping for a new router and are attracted by the advertising for a 600N model. Upon examining the specifications, you see that the router transmits 300+300, so you know it is using ______ broadcast channels.
dual
IP addresses that are temporarily assigned are called ________ addresses, whereas permanent ones are called _______ addresses.
dynamic, static
It is also important to activate wireless _____ to prevent wireless signals from being intercepted during transmission.
encryption
Technologies such as WEP, WPA, and PSK are examples of _______ that can be used on wireless networks.
encryption
The dominant standard for wired LANs is _______.
ethernet
Options for _____ Internet access include cable, DSL, ISDN, satellite, and fiber- to-the-home.
fixed
Mobile broadband services offered by cell phone companies usually entail separate fees for talk, texting, and data. Public Wi-Fi ______ offer yet another Internet access
hotspots
Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) _______ topology.
infrastructure, mesh
An Internet connection can be fast and have an acceptable ping rate but still have poor quality due to excessive _____ and packet loss.
jitter
You can use online tools to check for packet loss and ______, which is the variability in packet latency.
jitter
To connect to a secure LAN that is protected by encryption, an encryption _____, or password, is required.
key
Satellite Internet service is available in remote areas but suffers from high rates of _____.
latency
The problem with satellite Internet service is excessive ______.
latency
Technologies such as RFID, NFC, Bluetooth Smart, ZigBee, and Z-Wave offer _____-power links, essential for battery-powered devices that can't expend excess amounts of energy transmitting data.
low
Torrents exchange segments of files over a distributed network using a logical _______ topology.
mesh
Any device in a network is referred to as a(n) _____.
node
The Internet uses ______ switching technology to route data from many different messages over a single communication channel.
packet
Before data travels over the Internet, it is divided into ______ by a protocol called _______, which also reassembles the data when it reaches its destination.
packets, TCP
The first step is to change the standard ______ to one that is secure.
password
Sharing the files on your computer poses a security risk, but it is possible to specify ____ for how your shared files can be used.
permissions
A(n) ______ area network connects smart sensors and digital devices within a range of about 30 feet.
personal
Communication _____ set standards for physical channels, transporting data, and correcting errors.
protocols
Networks use physical, transport, and arrival communication _______ to set the rules for efficiently transmitting data and handling errors.
protocols
Today, the Internet is a collection of networks, tied together by common ______.
protocols
You've got class notes and you don't mind sharing them with your roommates, but you'd prefer that they don't change them. You can keep your notes intact if you assign _______ permission to those files.
read
The key device at the center of a LAN is a(n) ________.
router
File ______ has to be turned on before any files on your computer can be accessed by other devices on a network.
sharing
Data ______ equipment includes computers.
terminal
Networks can be configured in various _______, such as star, mesh, point-to-point, or bus.
topologies
A utility called _____ reports the path of packets over the Internet.
traceroute
Another utility called _____ reports the path that your data takes to reach its destination.
traceroute
Read and _______ permission allows a shared file to be opened, viewed, modified, and deleted.
write