Unite 3- network- review
To prevent hackers from accessing your personal information __________ transforms a message so that its contents are hidden from unauthorized readers.
Encryption
In order to access the Internet you must have an Internet Service Provider (ISP). Which of the following is not an ISP?
The process of accessing someone's personal information such as credit card account numbers, emails, or social security numbers without their permission is known as______.
Hacking
There are several types of networks. This network usually connects computers in a single Building.
LAN
The use of personal devices such as cellphones, tablets, or laptops is known as which type of network?
PAN
Most people in today's digital world have a computer network in their home. To set up your personal home network you must have which of the following components?
Printer, ISP, Computer/Laptop/Tablet, Router
Network devices can be arranged as a Star, Bus, or Ring this is known as ___.
Topology
A wireless network is more susceptible to unauthorized access and use than wired networks.
True
We use Bluetooth technology in our everyday lives to connect to our cellphones and electronic devices. A Bluetooth is a short range wireless system.
True
The symbol Wi- Fi is seen in facilities (e.g. restaurants, hotels, cafes, airports) that allow computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area. When first created Wi-Fi stood for ______________.
Wireless Fidelity