As an IT technician, you arrive at a customer's home office to troubleshoot problems he's experiencing with his printer. While questioning the customer to get an understanding of his network, you find that he has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. He also has several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with? Show Sets with similar termsRecommended textbook solutions
Chemistry for Engineering Students2nd EditionLawrence S. Brown, Thomas A. Holme 945 solutions
Fundamentals of Engineering Economic Analysis1st EditionDavid Besanko, Mark Shanley, Scott Schaefer 215 solutions
Linear Systems and Signals3rd EditionB. P Lathi 213 solutions Unit Operations of Chemical Engineering7th EditionJulian Smith, Peter Harriott, Warren McCabe 140 solutions Recommended textbook solutionsIntroduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Upgrade to remove ads Only CA$44.99/year
Terms in this set (45)What type of network sends signals through airwaves and usually does not require cables? A How can you secure data stored on a shared network? NOT c and d *guessed Why is a cable modem classified as a digital model? NOT a Why does net neutrality affect Internet connections? NOT a What is an ISP? B In a connected network, how are hubs and switches similar to one another? C Which of the following is not a resource able to be shared in a network? D Devices on a _____ area network are connected via Bluetooth. A What internal device does a computer use to connect to a wired or a wireless network? A How will cellular networks challenge cable and DSL providers in the future? NOT a What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? NOT a Which of the following statements is NOT true about a local firewall? A What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? NOT b After
receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email? NOT a What is a MAC address? NOT a and b In addition to choosing a strong password, which of the following would be the best authentication method(s) to keep your data safe? NOT a and b The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages? C Which of the following is true about broadband connections? A A modem can also function as what other piece of hardware? B As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? A To protect a computer or a server, a(n)
______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. B What does a DSL modem use to send and receive digital data? B
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? D Which of the following are risks to a network? NOT a and b Which network protocol allows devices to communicate with each other over a short range, usually less than
30 feet/9 meters? C Which of the following would be considered a strong password? D In order for your router to access Internet connections, it must be connected to a _____. B Which of the following statements is true about public networks? D Which of the following statements do supporters
of net neutrality agree with? NOT a and b When using encryption from your home computer, how would you configure the router? C You are
studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened? D As you consider the different methods of sharing
files, which of the following is a disadvantage of cloud computing? B What is an evil twin in the computer world? C To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? C If you want to share information with individuals who are internal to your organization, which type of network
would you want to use? D As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send
the report without worrying about someone else accessing it? C Which of the following could indicate a DoS attack on your company server? C What hardware is essential to creating a home Wi-Fi network? A What is the U.S. Federal Communication Commission's role in regard to Internet access? A After purchasing a new wireless router to replace your old one, what steps should you take to ensure your devices are secure? NOT a and d; maybe a When it comes to secure data storage on a network, which of the following statements is true? D When describing a client/server network, which of the following would be considered a client? NOT c How does a wireless network key work with an encrypted wireless network? B While waiting for her latte at Starbucks, Georgia decides to check
her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia NOT connect to? NOT b In a _____ network, each device on the network is attached to a central server. If the
server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. C Sets with similar termsCIS Ch.783 terms lunarshot5 CGS2100 chapter 1273 terms TiffneyG Chapter 748 terms jenn4x 6.3.1.1-6.4.1.724 terms Jason_Holcomb Sets found in the same folderComputer Concept Module 944 terms MackMarr Module 10 Computer Concepts Exam51 terms pariwils1 BCIS Exam 3 Review78 terms jillenderby Module 4: Operating Systems & Management40 terms kooky_kitty Other sets by this creatorModule 1045 terms Mike_Xcalibur Module 3 test17 terms Mike_Xcalibur Chem Polyatomic Ions13 terms Mike_Xcalibur Biology semester exam50 terms Mike_Xcalibur Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Other Quizlet setsCDC B Set300 terms Attentive9 Molecular Biology Exam 240 terms brendamcarthur Brcc Music Exam 3 Dr Houser19 terms jtc88 Chapter 1815 terms Boblay1233PLUS Related questionsQUESTION A Type of address translation in which a gateway has a pool of public IP Addresses that it is free to assign to a local host whenever the local host makes a request to access the internet., 15 answers QUESTION The type of security threat that uses computers or other networks to accept and pass on viruses is called: 15 answers QUESTION The Microsoft Exchange archive data file that stores public folder hierarchies and contents is: 4 answers QUESTION What is another name for RAID 1? 15 answers Why would you want to connect your computer to a net work?Explanation: Computer networks help users on the network to share the resources and in communication. ... File sharing: Networking of computers helps the network users to share data files. Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard drives etc.
What are computer networks used for quizlet?A computer network is a set of computers connected together for the purpose of sharing resources. a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants.
What is a computer network quizlet?Computer network. A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well as to communicate electronically with one another.
What is one way hackers can trick you into transmitting personal data over a public network without your knowledge?One way is to try to obtain information directly from an Internet-connected device by installing spyware, which sends information from your device to others without your knowledge or consent. Hackers may install spyware by tricking you into opening spam email, or into “clicking” on attachments, images, and links in ...
|