ITEC Chapter 4
Select the statements that are true regarding a Wi-Fi's SSID
- An SSID is the Wi-Fi's name - Most routers transmit the SSID every few seconds so roaming devices can find the signal - In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary
Select what's true about troubleshooting a network
- Check to make sure the cables are not damaged and that all cables are plugged in properly - A poor signal can also be an indicator that the hardware may be old or improperly positioned - A device that isn't positioned properly can cause weak signals and system issues
Select what's true about troubleshooting network hardware issues
- If your network isn't working it is a good idea to check the status of the indicator lights. - Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device - A device that isn't positioned properly can cause weak signals and system issues
Select what's true about WANs
- Large organizations with many offices located across the globe often have individual LANs in each location that need to be connected in order to share data and information - When two or more LANs have been connected using a public network a WAN or Wide Area Network is created - The largest WAN on earth is the Internet
Select what's true about client/server networks
- Server-based models are popular because they provide more security than a peer-to-peer network - In this type of network when a client requests information or access to the Internet the request is controlled by the server - Server-based networks are designed to have individual computers and devices connected to the network interact through a central server computer
Select what's true about how circuit switching works when you make a traditional land line based phone call
- When you pick up the receiver which creates an open a connection to the local telephone switch - When you dial a number, then the switch connects to other switches along the PSTN. This forms a physical path between your phone and the person you are calling - When the call is received a circuit is established and will remain open for the entire length of your call. As long as the circuit remains open, no one else can use the telephone line
Select the expenses found on a typical cell phone bill
-Line charges -Data plan charges -Taxes and surcharges
Select the statements that are true regarding switches
-Switches connect computers and other devices within a network -Switches are usually integrated in the routers of home networks -Switches ensure that correct data is transferred to and from the appropriate devices in networks
What 3 items are needed to install a home WiFi network
-an Internet signal -a modem -a router
Select what's true regarding dual band routers
-can transmit Wi-Fi signals in the 2.4 GHz frequency range -can transmit Wi-Fi signals in the 5.0 GHz frequency range -minimizes the impact of interference from microwave ovens and car alarms
Select the characteristics of a router
-connects networks -provides hardware firewall protection -usually incorporates a switch
Select the characteristics of fiber optic lines
-made of 1 or thousands of fibers -high-speed transmission
Select the reasons to purchase a prepaid phone
-no long-term contracts -useful if you just need a phone for calling or texting -useful if you just need a phone for emergencies
Select the characteristics of a modem
-usually provided by the ISP -converts analog signals into digital signals -converts digital signals into analog signals
List in order the steps required to install a home Wi-Fi network
1. Connect the incoming Internet signal to the modem provided by your ISP 2. Plug in the modem's electrical cord and turn on the modem 3. Connect the modem to the router using a high-quality Ethernet cable (if required, some modems include integrated routers) 4. Plug in the router's electrical cord and turn on the router (if necessary) 5. Turn on your computer and locate your new Wi-Fi signal
Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system
Authentication
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
EDI
EDI stands for ___
Electronic Data Interchange
Which transmission media has the largest bandwidth
Fiber optic
A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a _____
LAN
A switch distinguishes between various devices within a network by their __ addresses
MAC
Broadband is measured in _____
Mbps
Match the item with its function
Modem-converts analog signals into digital signals and digital signals into analog signals Router-connects 2 networks MAC address-identifies a device within a network Switch-connects devices within a network
Transmission media can be either wired or wireless
True
Select the methods of connecting a Smartphone to the Internet
Using a cellular data plan
Sprint, T-Mobile, ATT & ___ are the major national cell phone providers in the U.S
Verizon
Select the major U.S. cell phone providers
Verizon, ATT, T-Mobile, and Sprint
When two or more LANs have been connected using a public network a _____ is created.
WAN
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___
WPA
In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected
WPA2
The capacity of a particular transmission medium is called its _____
bandwidth
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____
bandwidth
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal
broadband
A computer that requests resources such as a web page, spreadsheet, image file, or services from another computer on a network is called a _____
client
In a server-based network the individual computers and devices are called _____
clients
Being able to surf the Web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the United States
data
Routers that can send Internet signals over 2 distinct frequencies are called _____ routers
dual band
A security system separating 2 networks or even computers on the same network is called a ___
firewall
When determining how much cell phone data you need it is important to consider
how much data you currently use
The word modem stands for ____
modulator-demodulator
Fiber optic cable is _____ expensive than coaxial cable to install
more
A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers
network
Unlike circuit switching, data transfer with ___ doesn't rely on a dedicated physical path
packet switching
If you just need a phone for emergencies, you might consider a ___ phone
prepaid
A virtual _____ network (VPN) creates a secure connection between 2 computers.
private
The device that connects 2 networks is a _____
router
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet
router
Because of their popularity and bandwidth demands of video streaming, _____ data plans are more expensive than they were in the past
unlimited