BluetoothWhich of the following wired broadband connections does NOT require a modem?
Dial-UpWhich is the slowest method of connecting to the internet?
DSLWhich broadband connection method uses a phone line shared between voice and data transfer?
Dial-upWhich of the following is NOT a broadband connection to the Internet?
It transmits data using light. What makes fiber-optic a unique broadband option?
It is available in rural areas, even when other broadband connections are not. Which of the following is an advantage of a satellite connection to the internet?
WifiFor a fee, Boingo offers ______ service.
Fiber-opticWhich connection provides the fastest transfer speeds when you connect to the Internet?
It requires a modemWhich one of the following statements about a cable internet connection is TRUE?
mobile3G and 4G refer to ________ broadband connections
EthernetMost home networks use the ______ protocol
802. 11acWhich of the following is currently the fastest wireless protocol?
RouterTo share an Internet connection with multiple devices on a home network, you need to connect a _____ to your cable/DSL modem
broadband modem, router, computers, and TV’sWhen setting up a network, which of the following is the suggested order for turning on the equipment?
cableCategory 6 is an example of a _________ used to connect wired network devices
switchIf your router does not have enough wired ports to add more devices, you can install a _______ to add extra ports to your network
Cables are not requiredWhich of the following is TRUE about a wireless network?
connect to a wireless network without the owner’s permissionPiggybackers are those who ______
break into computer systems creating mischief or stealing informationHackers are those who ________
MACA(n) ________ address is a specific/unique number for each network adapter
FirewallA _____ is hardware or software that protects a wired network form intruders
protocol that use encryption to protect wireless transmissionsWEP and WPA are examples of __________
Changing the default router passwordWhat is an important safety precaution for preventing unauthorized access to your router?
Activating packet switchingWhich of the following is NOT used to protect a wireless network?
Limiting wireless signal rangeWhich of the following helps to protect a wireless network?
You can connect to any wireless network your computer detectsWhich of the following is FALSE?
Router firmware should be kept up to dateWhich of the following statements is TRUE?
ONCHAPTER 6 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now