Chapter 4 : Networking and Immersive Reality (ALA)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which three of the following items are needed to install a home Wi-Fi network? - An Internet signal - A modem - A Bluetooth - A router

- An Internet signal - A modem - A router

Which three of the following statements are true about troubleshooting a home network? - Check to make sure the cables are not damaged and that all cables are properly connected. - A poor signal can be an indicator that the hardware is outdated or improperly positioned. - A device that is not positioned properly can cause weak signals and system issues. - Rebooting electronics has no effect on their performance.

- Check to make sure the cables are not damaged and that all cables are properly connected. - A poor signal can be an indicator that the hardware is outdated or improperly positioned. - A device that is not positioned properly can cause weak signals and system issues.

Which of the following are examples of EFT transaction? - Writing a paper check to pay your utility bill - Direct deposit of your paycheck - Using your debit card to purchase gas - Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket

- Direct deposit of your paycheck - Using your debit card to purchase gas - Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket

Which of the following are the expenses found on a typical cell phone bill? - Frequency charges - Line charges - Taxes and surcharges - Data plan charges

- Line charges - Taxes and surcharges - Data plan charges

Which two of the following sites offer Internet speed test services? - Speedtest.net - TestMy.net - Wikipedia.com - Reddit.com

- Speedtest.net - TestMy.net

If you receive both a modem and a wireless router from your ISP, place the following steps in the correct order if you wished to setup a Wi-Fi network. - Turn on your computer and connect to the Wi-Fi signal - Using Ethernet cable, connect the modem to the wireless router - Using either coaxial (for a cable modem), or twisted pair (for a DSL modem), connect the modem to the appropriate outlet

- Using either coaxial (for a cable modem), or twisted pair (for a DSL modem), connect the modem to the appropriate outlet - Using Ethernet cable, connect the modem to the wireless router - Turn on your computer and connect to the Wi-Fi signal

Which two of the following are true regarding IP addresses? - When you purchase your Internet service from an ISP you receive the right to use their block of assigned addresses. - IP Addresses are assigned by the Internet Corporation for Assigned Names and Numbers (ICANN). - Most individuals create their own IP address. - Most people purchase their personal, permanent IP address.

- When you purchase your Internet service from an ISP you receive the right to use their block of assigned addresses. - IP Addresses are assigned by the Internet Corporation for Assigned Names and Numbers (ICANN).

Which three of the following are the common reasons for purchasing broadband Internet service? - You have several devices online at the same time. - You want to stream music or video. - You want to use Office 2019. - You need relatively high-speed Internet service.

- You have several devices online at the same time. - You want to stream music or video. - You need relatively high-speed Internet service.

Which of the following symbols indicate an available hotspot?

- a, b, c

The volume of data that can be carried on an Internet transmission media in an amount of time is called __. - bandwidth - broadband - baseband - latency

- bandwidth

An Internet connection that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ connection.

- broadband

When choosing a cell phone provider, factors to consider include: - network size/coverage - pricing - number of frequencies - service speed

- network size/coverage - pricing - service speed

Parent company: Cricket Wireless

AT&T

Parent company: TracFone

American Movil

Remote access connections must be secured using authentication and encryption software. ___ software confirms the identity of the user or computer system.

Authentication

Of following, ___ has the most bandwidth.

CAT 7 cable *the higher the category number the higher the bandwidth*

Often IP addresses are structured and assigned by a service called a(an) _____ or by a network administrator.

DHCP

The technical term for electronic or online banking. ___ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

The most popular network transmission media standard (the cable used) for LANs is ___.

Ethernet

Installing the printer is the third step in setting up a Wi-FI network at home.

False

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ___ Transfer.

Funds

An IP address is determined by the network on which it is ___.

Hosted

When you request information from a website such as Wikipedia, the way its server knows which router to send the requested information to is because your router is identified by its ___ address.

IP or Internet protocol

Servers identify your router by its ___ address.

Internet Protocol (IP)

A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a ___.

LAN

Every computer connected to a network has a network interface card that contains a unique ___ address, allowing the switch to identify it.

MAC

A switch tracks which device within a network sent a request based on the device's ___ address.

MAC or media access control

Broadband is usually measured in ___.

Mbps

Converts analog signals into digital signals, and digital signals into analog signals

Modem

Connects two networks

Router

A signal transmitted every few seconds by a wireless router so that user's computers can find identify the Wi-Fi hotspot is called a(n):

SSID

Connects devices within a network

Switch

Parent company: MetroPCS

T-Mobile

The specific means by which your Internet signal is carried is called its __ media. Examples include fiber optic cable, coaxial (television) cable, twisted-pair (telephone) wire, and Ethernet cable. - Transmission media - Media access controller - Bit connector - Packet switcher

Transmission media

Many 4G and 5G cellular Internet Service Providers offer a device that serves as a hotspot for your home and includes an integrated modem and router. (T/F)

True

Sprint/T-Mobile, AT&T, and ___ are the major national cell phone providers in the United States.

Verizon

When two or more LANs have been connected using a public network a ___ is created.

WAN

The original protocol (standard) for Wi-Fi security that was widely introduced in 1999 but replaced in 2003 was known as ___.

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced due to vulnerabilities was ___.

WPA

The standard for wireless network privacy and protection is known as ___.

WPA2

WPA2 stands for Wi-Fi Protected ___ Version 2.

access

Cricket Wireless is owned by ___.

att, ATT, AT and T, AT&T, at&t, at & t, or at and t

The capacity of a particular transmission medium is called its ___.

bandwidth

An Internet connection capable of supporting multiple devices at once is called a ___ connection.

broadband

A computer that requests resources such as a web page, spreadsheet, image file, or services from another computer on a network is called a ___.

client

Being able to surf the Web, watch videos, and listen to streaming audio is why cell service with a(n) ___ plan is extremely popular in the United States.

data

The bandwidth required by streaming video offered by companies such as Hulu and Netflix made unlimited ___ plans relatively expensive.

data

A wireless router that transmits Wi-Fi signals on two separate frequencies is a ___ - band router.

dual

The transmission media with the largest bandwidth is ___.

fiber-optic cable

A Wi-Fi connection is often referred to as a ___ .

hotspot

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

large

The device in a network that coverts analog (wave) signals into binary (digital) signals and vice-versa is a ___.

modem

Fiber-optic cable is ___ to install than coaxial (television) cable.

more expensive

A virtual private ___ (VPN) creates a secure connection between two computers. VPNs allow for encrypted communications using the Internet as the pathway for data transmission and communication.

network

The network portion of an IP address which is also called the ___ identifier is indicated by a certain number of bits, starting with the left-most bit.

network

IP Addresses are assigned by the Internet Corporation for Assigned Names and ___ (ICANN).

numbers

If you just need a phone for emergencies, you might consider which of the following?

prepaid phone

IT professionals spend a lot of time protecting networks from unauthorized connections from outside into a LAN. However, there are times when it is necessary to allow outside connections to a LAN. This is referred to as ___ access.

remote

The device that connects two networks and often provides firewall protection is a ___.

router

The device in a network that keeps track of connected devices' MAC addresses and is usually incorporated in a router is the ___.

switch

The device that allows several computers to use your home network with just one Internet connection is called a ___.

switch

A cell phone tower is connected to a base ___ station that transmits weak microwave signals through the tower's antennae to create "cells" of coverage.

transceiver

The specific means by which your Internet signal is carried is called its ___ media.

transmission

Telephone wire is also called ___ pair wire.

twisted

Which two of the following are characteristics of fiber-optic lines? - Made of one or thousands of fibers - High-speed transmission - Susceptible to electromagnetic interference - Inexpensive to install

- Made of one or thousands of fibers - High-speed transmission

WEP stands for ___ equivalent privacy. WEP has been replaced by the far more secure WPA2 protocol.

wired

Which three of the following statements are true regarding how IP addresses are determined? - An IP address is determined by the network on which it is hosted. - All hosts on the same network share the same established network address, but are assigned a unique host number. - Often IP addresses are structured and assigned by a service called a Dynamic Host Configuration Protocol (DHCP). - A home Wi-Fi network will typically have the same IP address assigned to it every time someone logs on.

- An IP address is determined by the network on which it is hosted. - All hosts on the same network share the same established network address, but are assigned a unique host number. - Often IP addresses are structured and assigned by a service called a Dynamic Host Configuration Protocol (DHCP).

The word "modem" stands for: - Mode Emulator - Modulator-Demodulator - Monitor Device - Modulator-Demonstrator

- Modulator-Demodulator

Three common servers include: - web servers - file servers - e-mail servers - OS servers

- web servers - file servers - e-mail servers

The fastest growing Internet Service Provider media is __.

cellular Internet service

In a server-based network the individual computers and devices (or software) that make requests are called _____.

clients

Television cable is also known as ___ cable.

coaxial

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic ___ interchange.

data

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

data interchange

The cable that is most commonly used within a network is called ___ cable and is sold by category (CAT-7, for example).

ethernet

A ___ is a security system separating two networks or even computers on the same network.

firewall

The cell tower's base transmission station is connected to a mobile ___ station.

switching

Which three of the following statements are true regarding dual-band routers? - Can transmit Wi-Fi signals in the 2.4 GHz frequency range - Can transmit Wi-Fi signals in the 5.0 GHz frequency range - Can minimize the Wi-Fi signal's interference from microwave ovens and car alarms - Usually less expensive than single band routers

- Can transmit Wi-Fi signals in the 2.4 GHz frequency range - Can transmit Wi-Fi signals in the 5.0 GHz frequency range - Can minimize the Wi-Fi signal's interference from microwave ovens and car alarms

Which three of the following are characteristics of microwaves? - Capable of transmitting Internet signals over long distances. - Used to transmit Internet signals to and from satellites. - Used to transmit Internet signals where wires may be impractical. - Do not require towers, dishes, or radar receivers.

- Capable of transmitting Internet signals over long distances. - Used to transmit Internet signals to and from satellites. - Used to transmit Internet signals where wires may be impractical.

Which of the following are the functions of a mobile switching station? - Changes the cell and base station your transmissions go through as you travel - Sends your call to the receiver's MSS. - Assigns frequencies to your calls - Located at the base of each cell phone antenna

- Changes the cell and base station your transmissions go through as you travel - Sends your call to the receiver's MSS. - Assigns frequencies to your calls

Which three of the following are commonly used Internet transmission media? - Coaxial cable - Ethernet cable - Fiber optic cable - Electrical cable

- Coaxial cable - Ethernet cable - Fiber optic cable

Which three of the following are commonly used Internet transmission media? - Coaxial cable - Ethernet cable - Fiber- Coaxial cable - Ethernet cable - Fiber optic cable - Electrical cable optic cable - Electrical cable

- Coaxial cable - Fiber optic cable - Electrical cable

Which three of the following are characteristics of a router? - Connects networks - Provides hardware firewall protection - Usually incorporates switches - Designed to convert analog signals into digital signals

- Connects networks - Provides hardware firewall protection - Usually incorporates switches

Which three of the following are the characteristics of cellular service? - Fastest-growing means of accessing the Internet - Allows mobile devices to access the Internet - Many smartphones can convert cellular signals into Wi-Fi signals - Provides broadband Internet service in all areas

- Fastest-growing means of accessing the Internet - Allows mobile devices to access the Internet - Many smartphones can convert cellular signals into Wi-Fi signals

Which three of the following statements are true regarding troubleshooting network hardware issues? - If your network is not working it is a good idea to check the status of the indicator lights. - Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device. - A device that is not positioned properly can cause weak signals and system issues. - Most network hardware issues will be resolved over time. There is no need to try and troubleshoot.

- If your network is not working it is a good idea to check the status of the indicator lights. - Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device. - A device that is not positioned properly can cause weak signals and system issues.

Which three of the following statements are true about WANs? - Large organizations with many offices located across the globe often have individual LANs in each location that need to be connected in order to share data and information. - When two or more LANs have been connected using a public network a WAN or Wide Area Network is created. - The largest WAN on earth is the Internet. - There are only a few WANs across the globe.

- Large organizations with many offices located across the globe often have individual LANs in each location that need to be connected in order to share data and information. - When two or more LANs have been connected using a public network a WAN or Wide Area Network is created. - The largest WAN on earth is the Internet.

Which 3 of the following are true regarding Wi-Fi? - Multiple devices can be connected to one signal. - Transmit Internet signals via radio waves. - Transmission connections are known as hotspots. - Are always secure from intruders.

- Multiple devices can be connected to one signal. - Transmit Internet signals via radio waves. - Transmission connections are known as hotspots.

Which of the following are the reasons to purchase a prepaid phone? - No long-term contracts - Useful if you just need a phone for emergencies - Useful if you just need a phone for calling or texting - Less expensive for video streaming

- No long-term contracts - Useful if you just need a phone for emergencies - Useful if you just need a phone for calling or texting

Which three of the following are the characteristics of networks? - Provide the ability to share files and information - Allow users to share resources which saves money and time - Allow users to access other networks and the Internet - Only accessible to large corporations and governments

- Provide the ability to share files and information - Allow users to share resources which saves money and time - Allow users to access other networks and the Internet

Which three of the following statements are true about client/server networks? - Server-based models are popular because they provide more security than a peer-to-peer network. - In this type of network when a client requests information or access to the - Internet the request is controlled by the server. - Server-based networks are designed to have individual computers and devices connected to the network interact through a central server computer. - Server-based networks uses a peer-to-peer design structure.

- Server-based models are popular because they provide more security than a peer-to-peer network. - In this type of network when a client requests information or access to the - Internet the request is controlled by the server. - Server-based networks are designed to have individual computers and devices connected to the network interact through a central server computer.

Identifies a device within a network

MAC address

Your home network's Wi-Fi name is its ___, and is transmitted by your wireless router every few seconds unless you turn it off.

SSID or service set identifier

The ___ portion of an IP address is indicated by the remaining bits that are present after the network identifier and identify the host of the network.

host

Capable of sending Internet signals tens of thousands of miles in a straight line, ___ are used with satellites.

microwaves

A ___ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers.

network

WPA stands for Wi-Fi ___ access.

protected

If your Internet download or upload speeds are lower than advertised, contact your Internet Service ___.

provider

Sometimes called "cell phone carriers" or "mobile network operators," cell phone ___ sell subscriptions for cellular service.

providers

Which three of the following statements are true about VPNs? - A virtual private network (VPN) creates a secure connection between two computers. - VPNs allow for encrypted communications using the Internet as the pathway for data transmission and communication. - VPNs utilize a peer-to-peer network structure. - People within the organization use VPN software to login to the VPN.

- A virtual private network (VPN) creates a secure connection between two computers. - VPNs allow for encrypted communications using the Internet as the pathway for data transmission and communication. - People within the organization use VPN software to login to the VPN.

Which 3 of the following are commonly used Internet transmission media? - Coaxial (TV) cable - Telephone wire - Electrical (power) lines - Wi-Fi radio waves

- Coaxial (TV) cable - Telephone wire - Wi-Fi radio waves


Set pelajaran terkait

Ethics in Forensic Science Final Study Guide

View Set

Unit 7: Ch 12 Teaching Diverse Learners

View Set

Mental Health Practice Part B with NGN

View Set

Exam 2 Pharmacology Study Guide Part two 48,49,54,55

View Set

Organizational Behavior - Chapter 9

View Set

Pre-Lab #5: Introduction to Friction

View Set