Default settings on a wireless router

Assignment Help Basic Computer Science
Reference no: EM131086079

1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood?

  • Dial-up
  • DSL
  • Cable Broadband
  • ISDN

2. For which of these items should you always change the default settings on a wireless router?

  • SSID and Administrative Password
  • IP Address
  • Channel
  • Frequency (2.4/5.0 GHz)

3. When utilizing IPv4, each network node has a ____-bit IP address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

  • 16
  • 32
  • 48
  • 64

4. Which of the following is the default class A subnet mask?

  • 255.255.255.0
  • 255.240.0.0
  • 255.0.0.0
  • 255.255.0.0

5. A _______ is an administrative grouping of network resources such as computers, printers, and network devices.

  • container
  • class
  • range
  • domain

6. A(n)_________ cable is the most frequently used network cable because it is relatively inexpensive and easy to install.

  • Shielded twisted-pair
  • Unshielded twisted-pair
  • Thin coax
  • Thick coax

7. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Tree
  • Star

8. Which standards organization developed the OSI Model?

  • IEEE
  • Department of Defense
  • OSI
  • ISO

9. A network computer that shares resources with and responds to requests from other computers in known as a ________.

  • Client
  • Host
  • Terminal
  • Server

10. A DHCP server is a server that uses software and DHCP to automatically assign a(n) ______ address from a pool of possible addresses.

  • MAC
  • LAA
  • IP
  • BIA

11. Which Internet access method uses existing TV coaxial cables?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

12. Which Internet access method uses existing telephone lines and regular phone service?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

13. Which of the following types of media are used in LANs?

  • Twisted Pair
  • Coaxial Cable
  • Radio Waves
  • All of the selection are valid

14. Which of the following is a class B address?

  • 126.4.27.19
  • 127.276.2.15
  • 177.125.3.17
  • 221.34.2.17

15. Which of the following network related informational items is not needed in order to install an Operating System on a PC that will be connected to the internet?

  • Default Gateway
  • IP address
  • Subnet mask
  • Switch number

16. A ________ server isolates internal clients from the servers by downloading and storing files on behalf of the clients.

  • DNS
  • DHCP
  • NTP
  • Proxy

17. In which layer of the TCPIP Model do routers belong?

  • Physical
  • Internetwork
  • Application
  • Transport

18. Which of the following is considered a base 10 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

19. Use the ________ utility as the first step in diagnosing connectivity problems.

  • Tracert
  • Nstat
  • Net view
  • Ping

20. Which of the following is a class C address?

  • 169.254.27.19
  • 10.276.2.15
  • 172.22.3.17
  • 221.34.2.17

21. Which of the following is the default class B subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

22. Which of the following is a drawback of Broadband technology, compared to ADSL?

  • Its standards are less developed
  • Its installation is more difficult
  • Multiple subscribers must share a fixed amount of bandwidth
  • Cable is an asymmetrical technology, while ADSL is symmetrical

23. Which of these wireless encryption standards is the most secure?

  • WPA
  • WEP
  • WPA2
  • WEP2

24. Which standards organization developed the 802 series of standards?

  • IEEE
  • ITU
  • OSI
  • ISO

25. Which of the following is a class A address?

  • 126.4.27.19
  • 128.276.2.15
  • 172.22.3.17
  • 192.168.2.17

26. Users on a particular floor can't access the Internet, but can log onto the local network. What should they check first?

  • TCP/IP properties
  • Is switch turned on?
  • Are users on other floors having the same issue?
  • Call their ISP

27. The OSI model consists of ______ distinct layers stacked on one another.

  • two
  • three
  • four
  • seven

28. A computer that acts as both a client and a server is known as a _________.

  • Server
  • Client
  • Host
  • Peer

29. At what layer of the TCP model is the User Datagram Protocol (UDP) found?

  • Host to Host
  • Application
  • Network
  • Internet

30. Which of the following is considered a base 2 numbering system?

  • Hexadecimal
  • Decimal
  • Binary
  • Octal

31. The new IPv6 is better than IPv4 for all the following reasons except:

  • More addresses
  • Less bits in the address
  • Better security
  • Compatibility with IPv4

32. A ________ transmission sends a message to all points on a specific network.

  • multicast
  • unicast
  • simulcast
  • broadcast

33. In which type of wired network is it easier to add multiple new nodes?

  • Bus
  • Star
  • Ring
  • Mesh

34. A ________ is the place where a telephone company terminates lines and switches at a client location.

  • telco office
  • central office
  • central switching facility
  • demarcation point

35. What is the primary difference between LANs and WANs?

  • The use of an external provider due to distance they span
  • The type of DHCP servers they use
  • The type of data they transmit
  • All of the above

36. The _________ layer of the TCP model is responsible for logical addressing.

  • Internetwork
  • Host to Host
  • Logical
  • Session

37. A ______ consists of interconnected computers, printers, and other computer equipment in close physical proximity.

  • WAN
  • MAN
  • WWAN
  • LAN

38. Which of the following is considered a base 16 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

39. Which of the following is the default class C subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

40. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Point to Point
  • Mesh

41. A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology.

  • bus
  • mesh
  • ring
  • star

42. Which of the following is a cryptographic technique for that converts plain data into coded data?

  • Encryption
  • PKA
  • KPA
  • RXStenography

Reference no: EM131086079

Questions Cloud

Calculate and display the bill : Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.
The new rule fully in effect-value of consumer surplus : Assume that the market for beef in a small and isolated community is described by the following two equations: Q = -150 +150*P and Q = 600, where Q represents quantity and P is price. Similarly, assume that the market for beef is described by the fol..
According the criteria for the final project : Extend Project 1 to use advanced data structures and support sorting on various keys. The project will be graded according the criteria for the final project - see below.
Default settings on a wireless router : 1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood? 2. For which of these items should you always change the default settings on a wireless router?
Examine the demand for videocassette recorders : Let's examine the demand for videocassette recorders (VCRs), which can be affected by their own price as well as the income of consumers and the price of a competing good, the DVD player.
Which process is now economically efficient-alpha or beta : Process alpha / process beta labour 625/ 250 capital ... Question process alpha / process beta labour 625/ 250 capital 45/125 A firm plans to produce 500 units per day of good Z. The firm’s production engineer finds two technically efficient processe..
Indifference curve involving two goods identifies : An indifference curve involving two goods identifies the:
Computer memory device : Jersey Imports, Inc., markets electronic devices imported from Thai producers. The company recently introduced an innovative and enormously successful 5 GB Joystick (computer memory device), but a flood of competitor entry and downward pressure on bo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Recognize each dependency by type using code

Recognize each dependency by type; write the two instructions involved; recognize which instruction is dependent; and name storage location involved.

  Applications in an imperative programming language

There are a range of issues to consider when developing multi-threaded applications in an imperative programming language such as Ada, C++ or Java.

  What technologies should be used to secure these areas

On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

  Data for making intelligent business decisions

Businesses today are extremely reliant on large amounts of data for making intelligent business decisions. Likewise, the data warehouses are often structured in a manner that optimizes processing large amounts of data.

  Evaluate the user dialog strategies used by a menu-driven

Suggest alternatives for menu-driven interface design and explain how these alternatives can be designed to eventually replace all menu-driven interfaces.

  Define a method hello

Define a method hello(name) which takes in a string representing a name and prints out "Hello, " followed by the name.

  Explaining laws dealing with computer crimes

Write and explain three recent laws dealing with computer crimes.

  Write a program that displays a text field

Write a program that displays a text field and two buttons labeled "uppercase" and "lowercase." When the user clicks on the uppercase button, the text changes to uppercase. When the user clicks on the lowercase button, the text then changes to lowerc..

  Research how media providers use cloud services

Please write a short paper on ONE of the investigation topics listed below. Your paper should be between one and two pages in length (single-spaced, Times New Roman, 12 point font) not counting the references. Please list all sources used for your in..

  Convert the star schema to a snowflake schema

Using these principals, convert the star schema to a snowflake schema. What impact (if any) does this have on the size of the fact table for this problem?

  Develop a class average program

Develop a class average program similar to (1-a) that process grades for an arbitrary number of students each time it is run

  The federal reserve web site

In current business publications or on the Federal Reserve Web site (www.federalreserve.gov), find the press release from the most recent meeting of the FOMC. What is the targeted federal funds rate? How does the FOMC evaluate the balance of risks be..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd