Exam 5: Local Area Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security. -The signal on Esteban's wireless network is weak.What is the best solution to this problem?

(Multiple Choice)
4.8/5
(36)

On an Ethernet,a ____ is broadcast to every device but is accepted only by the device to which it is addressed.

(Multiple Choice)
5.0/5
(41)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -The transmission capacity of a communications channel

(Multiple Choice)
4.9/5
(34)

To see a list of devices on your network,you can use your operating system's ____ utility.

(Multiple Choice)
4.9/5
(43)

On a home network,file ____ allows you to view and copy photos,for example,from your desktop computer to a tablet computer.

(Multiple Choice)
5.0/5
(26)

The best-known communications protocol is probably SMTP,which regulates Internet data transport._________________________

(True/False)
4.8/5
(36)

A transceiver is a combination of a transmitter and a receiver.

(True/False)
4.8/5
(37)

Legacy equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a(n)____.

(Multiple Choice)
4.9/5
(39)

Before using your network,you should adjust the configuration settings of the ____ to make sure your network is secure.

(Multiple Choice)
4.7/5
(38)

Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend. -Thomas's friend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it.What kind of permission should Thomas assign to this file?

(Multiple Choice)
4.9/5
(39)

A process called handshaking allows two communications devices on a network to negotiate their communications protocols.

(True/False)
4.8/5
(29)

The original wireless encryption was called ____.

(Multiple Choice)
4.8/5
(30)

A protocol known as ____ is designed to automatically distribute IP addresses.

(Multiple Choice)
4.8/5
(36)

A true statement about Bluetooth is ____.

(Multiple Choice)
4.8/5
(41)

The original Ethernet standard carried data over a coaxial cable bus topology at ____.

(Multiple Choice)
4.8/5
(34)

A(n)____________________ address is a series of numbers,such as 204.127.55.1,used to identify a network device.

(Short Answer)
4.9/5
(30)

Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.

(Multiple Choice)
4.9/5
(39)

If there are not unsecured networks in an area,networks with ____________________ encryption are the easiest to breach.

(Short Answer)
4.8/5
(33)

A cryptographic algorithm is a word,number,or phrase that must be known to encrypt or decrypt a message.

(True/False)
4.9/5
(39)

____ is NOT true.

(Multiple Choice)
4.7/5
(36)
Showing 81 - 100 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)