Why would you want to connect your computer to a network Quizlet

As an IT technician, you arrive at a customer's home office to troubleshoot problems he's experiencing with his printer. While questioning the customer to get an understanding of his network, you find that he has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. He also has several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with?

Sets with similar terms

Recommended textbook solutions

Why would you want to connect your computer to a network Quizlet

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

Why would you want to connect your computer to a network Quizlet

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

Why would you want to connect your computer to a network Quizlet

Linear Systems and Signals

3rd EditionB. P Lathi

213 solutions

Why would you want to connect your computer to a network Quizlet

Unit Operations of Chemical Engineering

7th EditionJulian Smith, Peter Harriott, Warren McCabe

140 solutions

Recommended textbook solutions

Why would you want to connect your computer to a network Quizlet

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Why would you want to connect your computer to a network Quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Why would you want to connect your computer to a network Quizlet

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Why would you want to connect your computer to a network Quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Upgrade to remove ads

Only CA$44.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (45)

What type of network sends signals through airwaves and usually does not require cables?
a- Wireless Network
b- Wired Network
c- Intranet
d- Virtual Private Network

A

How can you secure data stored on a shared network?
a- Grant permissions by role
b- Store it on Flash drives
c- Password protect it
d- Encrypt it

NOT c and d *guessed

Why is a cable modem classified as a digital model?
a- it only sends digital data over a digital line
b- It uses copper wires to enable efficient digital data transfers
c- It sends and receives digital data over a digital line.
d- It only receives digital data over a digital line.

NOT a

Why does net neutrality affect Internet connections?
a- Because it selects websites by content, Internet services can be restricted by bandwidth.
b- Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth.
c- Because it is a global resource, Internet services can be restricted by content or bandwidth.
d- Because it selects websites by amount of bandwidth needed, Internet services can be restricted by content.

NOT a

What is an ISP?
a- A central point for cables in a network for data sharing,
b- A telecommunications company that sells Internet access.
c- A communications device that connects to a communications channel.
d- A system of two or more devices linked by wires, cables, or a telecommunications system.

B

In a connected network, how are hubs and switches similar to one another?
a- They transfer data to all devices.
b- They are interchangeable terms for the same hardware
c- They provide a central point for cables in a network.
d- They can only connect to a single device.

C

Which of the following is not a resource able to be shared in a network?
a- Files
b- Printers
c- Software
d- Motherboards

D

Devices on a _____ area network are connected via Bluetooth.
a- Personal
b- Local
c- Wide
d- Metropolitan

A

What internal device does a computer use to connect to a wired or a wireless network?
a- Network interface card
b- Motherboard
c- Switch
d-Hub

A

How will cellular networks challenge cable and DSL providers in the future?
a- Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services.
b- Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.
c- Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services.
d- Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.

NOT a

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
a- They overload the server with network traffic so webpages will not load.
b- They disguise the network as an evil twin.
c- They use adware filling your screen with unwanted advertisements until you click on one.
d- They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

NOT a

Which of the following statements is NOT true about a local firewall?
a- It is also called software firewall.
b- It is often built into a company's operating system.
c- It inspects data being transmitted to or from a network.
d- It is a physical device that acts as a protective barrier.

A

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
a- A zombie attack
b- Spyware
c- Social engineering
d- An evil twin

NOT b

After receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email?
a- The signature was consistent with other emails from your bank.
b- It was written in an overly formal tone.
c- It contained typos and other grammatical errors.
d- It did not include a promotional offer.

NOT a

What is a MAC address?
a- An IP address unique to Apple's MAC computers
b- The connection needed to access to a cellular network
c- A unique hardware address for your device
d- An alternate name Internet Protocol version 6

NOT a and b

In addition to choosing a strong password, which of the following would be the best authentication method(s) to keep your data safe?
a- Facial recognition
b- Body area network
c- Fingerprint scanner
d- Software firewall

NOT a and b

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages?
a- The company would have to use NFC to facilitate close-range communication.
b- The company would have to use RFID transmitted through radio signals.
c- The company would have to use an IrDA network protocol within close proximity.
d- The company would have to use a high-speed data transmission with access to high bandwidth.

C

Which of the following is true about broadband connections?
a- Broadband connections are "always-on" with devices connected to them.
b- Broadband connections require a wireless router in order to increase their speed.
c- Broadband connections turn off after lack of activity for a period of time, similar to when computers go to sleep.
d- Broadband connections are difficult to find as there are few of them around today.

A

A modem can also function as what other piece of hardware?
a- A switch
b- A router
c- A network interface card
d- A hub

B

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
a- Extranet
b- VPN
c- Wi-Fi
d- Intranet

A

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
a- ethernet
b- firewall
c- protocol
d- rootkit

B

What does a DSL modem use to send and receive digital data?
a- A wireless router
b- Copper telephone wiring
c- Cable TV connections
d- A network interface card

B

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
a- She has installed switches that interact with the installed app on her phone.
b- She uses a hub at her home that she connects to through the app.
c- She dialed into her home modem through the app and sent a command through the router.
d- She has a home network with smart home devices.

D

Which of the following are risks to a network?
a- Unwanted advertisements
b- Opening files from unknown senders
c- Granting administrator access to a non-administrator
d- Sending emails

NOT a and b

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
a- RFID
b- IrDA
c- Bluetooth
d- NFC

C

Which of the following would be considered a strong password?
a-Password123
b- Abc123456789
c- CatCatCatCat
d- Wbcm2!4!820!

D

In order for your router to access Internet connections, it must be connected to a _____.
a- hub
b- modem
c- network
d- switch

B

Which of the following statements is true about public networks?
a- Your home network is a public network.
b- All public networks are free.
c- Hackers cannot intercept data transmitted over public networks.
d-Many public networks are not secure.

D

Which of the following statements do supporters of net neutrality agree with?
a- The same level of service is provided to all websites, regardless of purpose.
b- Access to websites cannot be restricted based on content.
c- ISPs can charge more for high-bandwidth connections.
d- All Internet traffic should be treated equally.

NOT a and b

When using encryption from your home computer, how would you configure the router?
a- You can use the wireless router to intercept encrypted information and block it from entering the network.
b- You can use the wireless router to verify the security certificate of the encrypted data being sent.
c- You can use the wireless router to set the encryption key and type of encryption.
d- You can use the wireless router to encrypt and then decode the encryption on information sent and received.

C

You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened?
a- Because of FCC rules, ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided.
b- Because of FCC rules, content that requires more bandwidth is given preference over content that does not require as much bandwidth.
c- Because of net neutrality, your ISP provider has reduced its bandwidth to cut costs, slowing the Internet for you.
d- Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

D

As you consider the different methods of sharing files, which of the following is a disadvantage of cloud computing?
a- How long it will take to access a backup of files.
b- The inability to access your files if you lose your Internet connection.
c- The files you will lose if your computer crashes.
d-The amount of space that files will take up on your computer.

B

What is an evil twin in the computer world?
a- A device infected with malware that an attacker uses to control the device remotely.
b- An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
c- A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
d- A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.

C

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
a-Intranet
b- Wireless network
c- Virtual private network
d- Extranet

C

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
a- Wired network
b- Virtual private network
c- Extranet
d- Intranet

D

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?
a- You could encrypt the data and then use the company NAS device and assign permissions only to the president.
b- You could send the email and then forget to attach the report causing the president to call and ask you about it.
c- You could encrypt the data in the report that only you can decode.
d- You could send a flash drive with the report on it that you have password protected with the president's name.

C

Which of the following could indicate a DoS attack on your company server?
a- Customers are required to enter personal information as they complete an order form.
b- Customers cannot download the most recent newsletter.
c- Customers cannot view the website on their device because the page will not load.
d- Customers are receiving too many emails about special offers.

C

What hardware is essential to creating a home Wi-Fi network?
a- Router
b- Ethernet cord
c- Monitor
d- Printer

A

What is the U.S. Federal Communication Commission's role in regard to Internet access?
a- To release rules surrounding Internet access
b- To restrict Internet access by location and population
c- To regulate the bandwidth each website can have
d- To rate Internet sites similar to movie ratings

A

After purchasing a new wireless router to replace your old one, what steps should you take to ensure your devices are secure?
a- Enable encryption on the wireless network.
b- Retain the factory-supplied default Service Set Identifier (SSID).
c- Regularly update the network security key.
d- Place router securely to keep individuals from physically accessing it.

NOT a and d; maybe a

When it comes to secure data storage on a network, which of the following statements is true?
a- Encrypted files are not able to be saved on a network attached storage device.
b- Files stored on a network are accessible to all who can access that network.
c- Passwords are the safest method for protecting files on a network.
d- Roles can be granted to individuals to view files and make changes to files on a network.

D

When describing a client/server network, which of the following would be considered a client?
a- Desktop
b-External hard drive
c- Laptop
d- Printer

NOT c

How does a wireless network key work with an encrypted wireless network?
a- The wireless network key is your password for logging onto an Internet email system to receive files.
b- The sending and receiving devices must know the wireless network key to communicate.
c- The wireless key is the encryption code needed by the receiver to decode the file.
d- The wireless network needs the key to decode the data before sending.

B

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia NOT connect to?
a- Jenn's iPhone
b- My Verizon VPN
c- xfinitywifi
d- Starbucks Wi-Fi

NOT b

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
a- Mesh
b- Ring
c- Star
d- Bus

C

Sets with similar terms

CIS Ch.7

83 terms

lunarshot5

CGS2100 chapter 12

73 terms

TiffneyG

Chapter 7

48 terms

jenn4x

6.3.1.1-6.4.1.7

24 terms

Jason_Holcomb

Sets found in the same folder

Computer Concept Module 9

44 terms

MackMarr

Module 10 Computer Concepts Exam

51 terms

pariwils1

BCIS Exam 3 Review

78 terms

jillenderby

Module 4: Operating Systems & Management

40 terms

kooky_kitty

Other sets by this creator

Module 10

45 terms

Mike_Xcalibur

Module 3 test

17 terms

Mike_Xcalibur

Chem Polyatomic Ions

13 terms

Mike_Xcalibur

Biology semester exam

50 terms

Mike_Xcalibur

Recommended textbook solutions

Why would you want to connect your computer to a network Quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Why would you want to connect your computer to a network Quizlet

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Why would you want to connect your computer to a network Quizlet

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Why would you want to connect your computer to a network Quizlet

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Other Quizlet sets

CDC B Set

300 terms

Attentive9

Molecular Biology Exam 2

40 terms

brendamcarthur

Brcc Music Exam 3 Dr Houser

19 terms

jtc88

Chapter 18

15 terms

Boblay1233PLUS

Related questions

QUESTION

A Type of address translation in which a gateway has a pool of public IP Addresses that it is free to assign to a local host whenever the local host makes a request to access the internet.,

15 answers

QUESTION

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

15 answers

QUESTION

The Microsoft Exchange archive data file that stores public folder hierarchies and contents is:

4 answers

QUESTION

What is another name for RAID 1?

15 answers

Why would you want to connect your computer to a net work?

Explanation: Computer networks help users on the network to share the resources and in communication. ... File sharing: Networking of computers helps the network users to share data files. Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard drives etc.

What are computer networks used for quizlet?

A computer network is a set of computers connected together for the purpose of sharing resources. a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants.

What is a computer network quizlet?

Computer network. A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well as to communicate electronically with one another.

What is one way hackers can trick you into transmitting personal data over a public network without your knowledge?

One way is to try to obtain information directly from an Internet-connected device by installing spyware, which sends information from your device to others without your knowledge or consent. Hackers may install spyware by tricking you into opening spam email, or into “clicking” on attachments, images, and links in ...