Chapter 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You chose to use a separate ISP for the guest Internet line as for the POS network. This ensures that your internal systems are safe from accidental or overt access by users of the wireless network you provide for customers. The bookstore owners are pleased with your progress towards their goals for the IT improvements. You've stayed within the budget, and prioritized security concerns, while providing significant improvements to the guest experience. After a month, sales are up due to the increased store traffic and time customers spend browsing.

100%

Which wireless technology will you use for the guest network?

802.11n

While upgrading the Web site, Amari downloads some music files from the Internet to play in the background while a visitor browses the site. However, the playback isn't working right and she keeps getting permissions errors. What technology is likely interfering with music playback?

DRM

MAN

Davis connects his smartphone to city-funded Wi-Fi as he walks through the downtown area visiting various shops.

JavaScript, VBA Script, HTML, CSS, and Ajax are server-side programming languages, while PHP, C++, Java, Python, and Ruby on Rails are client-side programming languages. True or False?

False

______ is a standard page description language for Web pages that tells the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. It uses tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text.

HTML

___________ are specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content.

Hyperlinks

___________ specifies how to address and route each packet to make sure it reaches the desired destination.

IP

Intern: I see the lights here showing the device is on. How else can we test it? You: One way to test the connection is to see if my computer can communicate with any devices outside our network. We've already tried Web site addresses, which didn't work. But we can also try to connect with a Web server by its ___________ .

IP Address

A 64-bit number that uniquely identifies a computer on the Internet is a(n) __________

IP address

LAN

Kora has a printer, file server, and three laptops connected through Wi-Fi to her home router.

A 5G network will have the following advantages over a 4G network:

Lower latency, greater bandwidth, and ability to support more devices.

WAN

Michele connects her home router to her ISP's modem.

CEO: What kind of software can do all that? You: Different vendors call it different things, but generally we use a controller or ________ for this purpose.

NOS

You decided to maximize security by using WPA2 for Wi-Fi security. Although this option requires much more processing power in order to run its security algorithms, occasionally causing network slowdowns, it's much safer. You plan to post signs in the seating areas informing customers that, although your network is secure, you recommend techniques they should use to keep their data and devices safe when using any Wi-Fi network. You've already got a service contract with an Internet service provider (ISP) for the POS (point of sale) network the cash registers and inventory system will use. The representative from the ISP hears of your plans, and tells you that you can run the same line for the POS and the wireless network. You do some research before you get back to them with an answer.

Next

You selected 802.11n, which is not the newest Wi-Fi standard, but it offers extensive compatibility with a wide range of wireless devices. You ask customers to fill out an online survey to help you determine their preferences for network security. Many customers use their devices to play games and check their social media feeds. A few report that they will need to log into their company's network while using the wireless network. You also ask about the types of devices customers are using. This information helps you determine which security option to choose.

Next

You've been hired as an IT consultant by a company that runs a moderately sized bookstore chain in a tri-state area. The owners want to upgrade their information systems at all six store locations to improve inventory tracking between stores. They also want to add some new IT-related services for employees and customers. The owners are doing additional, moderate building renovations to increase the space available for seating areas as well as adding a small coffee shop to four of the stores. They want to make the environment more inviting for customers to linger while improving the overall customer experience. Your first target for improvements is to upgrade the networking infrastructure at each store, and you need to make some decisions about how to design the guest network portion for customers to use.

Next

You've decided to go with a wireless guest network, which will be easy for customers to connect to throughout the bookstore's seating areas. Wireless networking has long been a request of customers, and you're excited to offer it to them. That decision was easy, but now you need to decide the technical details when setting up the wireless router. The router offers two Wi-Fi options: 802.11g and 802.11n.

Next

________ is a wireless network that connects information technology devices close to one person.

Personal area network

Where can Logan reserve a domain name for the charity's Web site?

Registrar

Intern: Well, this device is connected to our ISP's equipment, which goes out to the Internet. Is this the problem? You: That's a good guess—it's called a ___________ and it connects our network to the outside world. Let's test your theory to see if this device is the problem.

Router

CEO: What does this mean, that we'll be "abstracting network control?" You: It's called ___________, which means that we'll be able to control all of our network hardware, like switches and routers, from software accessed through a single computer.

SDN

What changes can Amari make to the Web site to generate more traffic from visitors who find the site through online searches?

SEO

PAN

Scott has a printer, keyboard, and mouse connected through Bluetooth to his laptop.

When a site visitor accesses the Web site, which computer will do the work of interpreting the code to display each Web page?

The site visitor's client computer

Many Web sites use Cascading Style Sheets (CSS) to define the design and layout of Web pages, and Extensible Markup Language (XML) to define the content, and hypertext mark-up language to join the content with the design. True or False?

True

The _______________ is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.

URL

What information does Logan need to advertise in order for volunteers and donators to most easily find the charity's Web site?

URL

A network that connects large geographic regions is a ____

WAN

What security technique will you use for the guest Wi-Fi network?

WPA2 or better for maximum security

To begin, will the guest network be wired or wireless?

Wireless

Web client software used to view Web pages is called _______________.

browser

A networking approach wherein many clients (end user computing devices) request and receive services from servers (host computers) on the network is ___________

client/server

The _______________ maps the name people use to locate a Web site to the IP address that a computer uses to locate a Web site.

domain name system

a(n) _________ is a means to offer limited network access to people external to the organization such as selected customers and suppliers.

extranet

A(n) ____________ is an internal corporate network built using Internet and World Wide Web standards and products.

intranet

The purpose of client-side programming is to ____________

provide an interface to allow the client computer to request services of the server computer

A network device that directs data packets to other networks until each packet reaches its destination is a ________

router

Will you use the same ISP for the guest network, or contract with a different ISP for the guest network?

separate ISP

A network topology in which all network devices connect to one another through a single central device called the hub node is a_______________.

star network

Intern: All the computers in the office connect to this network device here. Could this be the problem? You :That's a _____________ , which connects all the computers and printers to the network. I don't think that's the problem, though, because we're only seeing the problem when trying to connect to Web servers outside our network. Everything on the inside is working fine. For example, this computer can successfully send a document to that printer.

switch

Three advantages associated with a software-defined network include _________

the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner


संबंधित स्टडी सेट्स

How to use statistics to describe quantitative data

View Set

Chapter 3 - Database System and Big Data - Principles of Information Technology

View Set

Professional Behaviors / Professionalism NUR103-PrepU

View Set

Pathophysiology Ch. 8 Infection and Defects in Mechanisms of Defense

View Set

Fundamentals VSIM FINAL (ALL pre and post Q)

View Set

F**K STUDYING (swearing and taboo language)

View Set

Language Arts - Parts of Speech and Types of Phrases assignment

View Set

ACC 312 - Managerial Accounting Chapters 1-3

View Set