In the early years of personal computers, networks were plentiful.
false

A WAN provides connectivity within a limited geographical area, often within a single building.
false

A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
true

MAC addresses are used for some low-level network functions and can also e employed to establish network security.
true

A packer always travels from the source directly to the destination, never traveling through intermediate routing devices.
false

IP addresses can be assigned by ISPs or system managers.
true

Microwaves cannot be aimed in a single direction and they have less carrying capacity than radio waves
false

A transceiver is a combination of a transmitter and a receiver.
true

Bluetooth is often used to connect workstations to a LAN.
false

A gateway joins two different types of networks.
true

WPA2 makes sure that packets have not been intercepted or tampered with in any way.
true

Most routers supply a WAN port designed for an internet connection.
true

Windows automatically senses nearby networks and displays their SSIDs.
true

A cryptographic algorithm is a word, number, or phrase that must be known to encrypt or decrypt a message.
false

The internet is the world's largest example of a(n) LAN.
false

A storage device that directly connects to a network is called network peripheral storage.
false

High-bandwidth communications systems, such as cable TV and DSL, are sometimes referred to as peakband.
false

The best-known communications protocol is probably SMTP, which regulates Internet data transport.
false

Data in a(n) wired network travels without the use of network cables.
false

Microwaves are electromagnetic signals that can be aimed in a single direction and have more carrying capacity than radio waves.
true

Wi-Fi signals cannot be disrupted by interference from devices such as microwave ovens, cordless telephones, and baby monitors.
false

A wireless ad hoc network uses a centralized broadcasting device, such as a wireless access point or router.
false

The process of converting ciphertext into plaintext is called encryption.
false

Public key encryption uses one key to encrypt a message and another key to decrypt it.
true

A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.
MAN

To connect to a LAN, a computer requires ____.
a network interface card

The most important network device is a ____.
router

A ____ is a physical path or a frequency used for signal transmissions.
communications channel

High-bandwidth communications systems are sometimes referred to as ____.
broadband

Dial-up Internet access is an example of a(n) ____ communications system.
narrowband

In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.
packet switching

A protocol known as ____ is designed to automatically distribute IP addresses.
DHCP

Which of the following is NOT an advantage of using a wired network?
unlimited mobility

Ethernet is a wired technology that is defined by ____ standards.
IEEE 802.3

Ethernet is easy to ____.
all of the above

On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
packet

Most wireless networks transport data as ____ signals.
RF (radio frequency)

____ is a disadvantage of using a wireless network when compared to a wired network.
all of the above

Wireless signal range can be limited by ____.
all of the above

The most popular wireless LAN technology is ____.
Wi-Fi

____ is a wireless MAN or WAN technology commonly used for fixed Internet access.
WiMAX

In ____ mode two Bluetooth devices can find each other and exchange passkeys.
discovery

A Wi-Fi device ____.
both a. and b.

To stay with the current Wi-Fi standard, make sure your device is compatible with ____.
802.11n

Legacy equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a(n) ____.
either a. or b.

Devices with one or more antennas use ____ technology to boost signals and spread them more evenly over the signal range.
MIMO

Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure.
router

The configuration settings are stored in the router's ____ memory.
EEPROM

To access your router's configuration utility, open a browser and enter the router ____.
address

In areas where there are overlapping wireless networks, such as in a city or on a college campus, ____ help you log in to the right network, rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.
SSIDs

Most routers ship with a(n) ____ predefined by the manufacturer.
SSID

A ____ is a network device that extends a wired network by adding additional ports.
hub

A ____ is a network device that connects two similar networks.
bridge

Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.
encryption

The original wireless encryption was called ____.
WEP

A(n) ____ is the basis for scrambling and unscrambling the data transmitted between wireless devices.
wireless encryption key

To connect a phone or other device to a network, make sure that ____ is enabled, then wait for the device to sense the network, and when asked, enter the encryption key.
Wi-Fi

On a home network, file ____ allows you to view and copy photos, for example, from your desktop computer to a tablet computer.
sharing

To see a list of devices on your network, you can use your operating system's ____ utility.
file management

A ____ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.
file

To configure a file server, open a browser from any workstation, enter the file server's ____ address, and provide the administrator ID and password.
IP

Symptoms of network problems include ____.
all of the above

A message that has not been encrypted is referred to as ____.
plaintext

An encrypted message is referred to as ____.
ciphertext

The process of converting ciphertext into plaintext is called ____.
decryption

A ____ is a procedure for encrypting or decrypting a message.
cryptographic algorithm

A ____ is a word, number, or phrase that must be known to encrypt or decrypt a message.
cryptographic key

In ____ key encryption, the key used to encrypt a message is also used to decrypt the message.
symmetric

____ encryption uses one key to encrypt a message but another key to decrypt the message.
public key

____ is a crucial technology for e-commerce and e-mail.
public key encryption

With PGP, you send the private key to ____.
no one

Thomas's friend has asked that the network be configured such that, if he has photos on his tablet computer and wants to transfer them to his desktop computer, he can do so easily. What capability is Thomas's friend looking for?
file sharing

Thomas's friend has a particular folder into which he wants to allow people to put files without allowing them to open, copy, or change any files in that folder. What kind of permission should Thomas assign to this folder?
write only

Thomas's friend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it. What kind of permission should Thomas assign to this file?
read

Esteban's router has no screen or keyboard of its own so the easiest way for him to access the router's configuration software is for him to make this connection with a(n) ____.
Ethernet cable

As part of your research, you find that the longer the key, the longer it will take a devious competitor to crack the code. You also find that most encryption today uses a ____ key, and so you decide to use an encryption key of that size.
128-bit

A(n) ____________________ is any device that contains network circuitry to directly connect to a network.
NETWORKED PERIPHERAL

A(n) ____________________ is a connection point on a network.
NODE

If a network interface card is not built into the main system board of a computer, it can be added to a slot in the system board or to a(n) ____________________ port.
USB

A communications ____________________, or link, is a physical path or a frequency used for signal transmission.
CHANNEL

High-bandwidth communications systems are sometimes referred to as ____________________.
BROADBAND

Transmission signals can be disrupted by interference called ____________________, which has the potential to corrupt data.
NOISE

A(n) ____________________ is a parcel of data that is sent across a computer network.
PACKET

____________________ switching essentially establishes a private link between one telephone and another for the duration of a call.
CIRCUIT

A(n) ____________________ address is a series of numbers, such as 204.127.55.1, used to identify a network device.
IP

Most wireless networks transport data using ____________________ signals.
RF

For a typical home network, all that's needed in terms of network equipment is a wireless ____________________ that includes an Ethernet switch and Internet gateway.
ROUTER

A(n) ____________________ is the name of a wireless network.
SSID

File ____________________ allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored.
SHARING

The wave on the bottom in the accompanying figure depicts a digital signal.
false

The wave on the top in the accompanying figure depicts an analog signal.
false

In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit.
false

In the accompanying figure, the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.
true

In the accompanying figure, the item on the left can be used with a laptop or desktop computer.
true

In the accompanying figure, the networks that don't have an icon of a lock next to them aren't secured, and are open targets for hackers to steal data, spread viruses, and create a launching pad for spam.
true

When network discovery is turned on in a wireless network, any Wi-Fi enabled device within range of your network, such as the one shown in the accompanying figure, can see its URL.
false

In the accompanying figure, the lock icon indicates a network secured with wired encryption.
false

In the accompanying figure, IWC-guest is a(n) secure network.
false

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
COMPUTER 5 SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE