Computers Module 10
The network connection is probably not secure.
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
modem
To access the Internet, a router must be connected to a _____.
false
4G and 5G networks provide slower data transmission speeds than 3G networks. (true or false)
peer-to-peer
A network administrator is usually not required on a _____ network.
false
A router is a system of two or more devices linked by wires or cables. (true or false)
Encrypt the data in the report.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
personal
Devices on a _____ area network are connected via Bluetooth.
intranet
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
star
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
mobile hotspot
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
false
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. (true or false)
firewall
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
copper telephone wiring
What does a DSL modem use to send and receive digital data?
router
What hardware is essential to creating a home Wi-Fi network?
network interface card
What internal device does a computer use to connect to a wired or a wireless network?
A telecommunications company that sells Internet access.
What is an ISP?
social engineering
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
To release rules surrounding Internet access
What is the U.S. Federal Communication Commission's role in regard to Internet access?
wireless network
What type of network sends signals through airwaves and usually does not require cables?
laptop
When describing a client/server network, which of the following would be considered a client?
bluetooth
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Customers cannot view the website on their device because the page will not load.
Which of the following could indicate a DoS attack on your company server?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Which of the following describes an evil twin?
The inability to access your files if you lose your Internet connection.
Which of the following is a disadvantage of using cloud computing to share files?
true
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots. (true or false)
LTE
Which of the following network standards applies to cellular networks?
many public networks are not secure
Which of the following statements is true about public networks?
to access shared resources
Why would you want to connect your computer to a network?
Wbcm2!4!820!
Which of the following would be considered a strong password?
My Verizon VPN
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?