1,288
4
Essay, 2 pages (350 words)

Chapter 6

BluetoothWhich of the following wired broadband connections does NOT require a modem?

Dial-UpWhich is the slowest method of connecting to the internet?

DSLWhich broadband connection method uses a phone line shared between voice and data transfer?

Dial-upWhich of the following is NOT a broadband connection to the Internet?

It transmits data using light. What makes fiber-optic a unique broadband option?

It is available in rural areas, even when other broadband connections are not. Which of the following is an advantage of a satellite connection to the internet?

WifiFor a fee, Boingo offers ______ service.

Fiber-opticWhich connection provides the fastest transfer speeds when you connect to the Internet?

It requires a modemWhich one of the following statements about a cable internet connection is TRUE?

mobile3G and 4G refer to ________ broadband connections

EthernetMost home networks use the ______ protocol

802. 11acWhich of the following is currently the fastest wireless protocol?

RouterTo share an Internet connection with multiple devices on a home network, you need to connect a _____ to your cable/DSL modem

broadband modem, router, computers, and TV’sWhen setting up a network, which of the following is the suggested order for turning on the equipment?

cableCategory 6 is an example of a _________ used to connect wired network devices

switchIf your router does not have enough wired ports to add more devices, you can install a _______ to add extra ports to your network

Cables are not requiredWhich of the following is TRUE about a wireless network?

connect to a wireless network without the owner’s permissionPiggybackers are those who ______

break into computer systems creating mischief or stealing informationHackers are those who ________

MACA(n) ________ address is a specific/unique number for each network adapter

FirewallA _____ is hardware or software that protects a wired network form intruders

protocol that use encryption to protect wireless transmissionsWEP and WPA are examples of __________

Changing the default router passwordWhat is an important safety precaution for preventing unauthorized access to your router?

Activating packet switchingWhich of the following is NOT used to protect a wireless network?

Limiting wireless signal rangeWhich of the following helps to protect a wireless network?

You can connect to any wireless network your computer detectsWhich of the following is FALSE?

Router firmware should be kept up to dateWhich of the following statements is TRUE?

ONCHAPTER 6 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Chapter 6. Page 1
Chapter 6. Page 2
Chapter 6. Page 3
Chapter 6. Page 4

This work, titled "Chapter 6" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Chapter 6'. 4 October.

Reference

AssignBuster. (2022, October 4). Chapter 6. Retrieved from https://assignbuster.com/chapter-6-3/

References

AssignBuster. 2022. "Chapter 6." October 4, 2022. https://assignbuster.com/chapter-6-3/.

1. AssignBuster. "Chapter 6." October 4, 2022. https://assignbuster.com/chapter-6-3/.


Bibliography


AssignBuster. "Chapter 6." October 4, 2022. https://assignbuster.com/chapter-6-3/.

Work Cited

"Chapter 6." AssignBuster, 4 Oct. 2022, assignbuster.com/chapter-6-3/.

Get in Touch

Please, let us know if you have any ideas on improving Chapter 6, or our service. We will be happy to hear what you think: [email protected]