Describe the two types of rf amplifiers

Assignment Help Basic Computer Science
Reference no: EM13995129

Page: 1

1. Question: (TCO A) An access point has a(n) _____ interface that allows it to connect to a wired network.

2. Question: (TCO A) Waves that are continuous with no breaks represent a(n) _____ signal.

3. Question: (TCO C) In order to accommodate additional wireless users over a wider area, which configuration should be used?

4. Question: (TCO C) Each of the following is a wireless modulation scheme used in IEEE WLANs except

5. Question: (TCO D) Each of the following are times that a site survey should be performed except

6. Question: (TCO D) A device that converts direct current from a battery to alternating current is a(n)

7. Question: (TCO E) After the security flaws in WEP were publicized, the IEEE TGi task group released a new proposed implementation known as what?

8. Question: (TCO E) Which of the following is not a layer that protects information security?

Page: 2

1. Question: (TCO A) Give a brief summary of the characteristics of IEEE 802.11b, 802.11a, and 802.11g wireless networks.

2. Question: (TCO A) Explain how an antenna functions.

3. Question: (TCO C) Explain how power management functions on an infrastructure network.

4. Question: (TCO C) Explain why Carrier Sense Multiple Access/Collision Detection cannot be used on a WLAN.

5. Question: (TCO D) Describe two types of antennas that should be used on an AP when conducting a site survey.

6. Question: (TCO E) List two ways in which a denial of service (DoS) attack can be launched against a WLAN.

NETW 563 Week 8 Final Exam
Multiple Choice: 8

Essay: 8

Page: 1 Multiple Choice

1. Question: (TCO A) A wireless client network interface card performs each of the following tasks except

2. Question: (TCO A) A _____ is a million hertz.

3. Question: (TCO B) Cellular networks employ multiple ______ power transmitters.

4. Question: (TCO C) _____ is a group of wireless devices that is served by a single access point (AP).

5. Question: (TCO D) _____ is the expression often used to describe a work environment in which an employee can have continual access to the data that is needed for making decisions.

6. Question: (TCO E) Guarding the availability of information is achieved by

7. Question: (TCO F) Which type of statistic is measured by the GoS?

8. Question: (TCO G) _____ provides users the freedom to roam beyond their home subnets while still maintaining their home IP addresses.

Page: 2 Essay

1. Question: (TCO A) What is polarization, and why is it important to WLANs?

2. Question: (TCO B) Explain how an IEEE 802.15.1 (Bluetooth) piconet functions.

3. Question: (TCO C) Explain how power management functions on an infrastructure network.

4. Question: (TCO D) What are the three considerations when installing and configuring an ad hoc network?

Page: 3 Essay

1. Question: (TCO E) Explain how WEP violates the "cardinal rule" of cryptography.

2. Question: (TCO E) What is a dictionary attack?

3. Question: (TCO F) Blocked calls can be handled in two ways. Describe the two methods of handling blocked calls.

4. Question: (TCO G) Describe the two types of RF amplifiers.

Reference no: EM13995129

Questions Cloud

What is the height h of the sheet : An opaque sheet is placed over the bottom of the mirror. When the camera views the reflection of the stick, the top 0.8 m of the stick can be seen (that is y = 0 m to y = 1.2 m is hidden because of the sheet). What is the height h of the sheet?
Particular artifact portrays crime : Choose one contemporary media artifact having to do with crime. This can be a single episode of a television show, a film, a bestselling book, a video game or a news report in any medium and write analysis of how this particular artifact portrays ..
Preparing this year''s tax return : In preparing this year's tax return, you notice a sizeable mistake on last year's tax return. The client legitimately owes the government substantially more money. Review the SSTS' (Statements of Standards for Tax Services) and Circular 230, then wri..
Would a liability be accrued under united state gaap : Would a liability be accrued under U.S. GAAP? Under IFRS? If a liability were accrued, what amount would be accrued under U.S. GAAP? Under IFRS?
Describe the two types of rf amplifiers : What are the three considerations when installing and configuring an ad hoc network?
How should it be aligned to max the amount of light : If you have a vertical and horizontal polarizer in series , no ligh passes through both . Where can I place a third polarizer such that some light passes through all three ? how should it be aligned to max the amount of light that can pass through..
Agency and for the approval of the senior : Remember that you are writing from the point-of-view of a mid-level manager in an agency and for the approval of the senior management of that agency. You are to present a problem area that involves a department/agency issue that is significant to..
Calculate taxable income : Your client provides you with information (as detailed below) on various transactions between 1 July 2014 and 30 June 2015. Your client seeks advice as to what amount(s)
Calculate the average acceleration for the time interval : Write an equation describing the stretch of the steel elevator calbe assuming the cable has a diameter of 8.00mm. Suppose the elevator and ocupants have a combined mass of 450kg.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  From the e-activity

From the e-Activity, devise a scenario where a user in a business environment is unable to print a document to a printer connected to a Windows Server 2012 print server. Determine at least two (2) troubleshooting steps an IT support technician should..

  Ssl web security and system architecture

Discuss the task and write a report. Introduction,SSL Web Security,Background of topic and solutions,Project Requirement,System Architecture,System Design,Client Side implementation.

  Useful principle about it management

The novel is generally about what IT Development and Operations (Dev-Ops) has to learn from manufacturing. Summarize as a list, what these recommendations are. For each recommendation, list a page in the novel where the recommendation is made or r..

  Perform in-depth research and provide an explanation

You will perform in-depth research and provide an explanation of how an issue associated with your selected topic relates to the consumption of digital media.

  What is the difference between intrinsic and acquired value

What is the difference between intrinsic value and acquired value?

  Create a website that would allow users to enter

Create a Website that would allow users to enter and submit survey (to store in the database) and display survey results of total entered surveyed.

  Provide an explanation of hash tables

Provide an explanation of hash tables, including a description of a realistic scenario that could be solved with the application of a hash table.

  What are search methods

What are search methods? Do you feel search methods are relevant to topics in artificial intelligence ? If yes, please explain why and how. Specifically, describe how search methods would be used for rule-based systems, expert systems, resolu..

  Computer the value of the given number

Prompt the user for a number and an exponent. Computer the value of the given number (the base) raised to the power of the exponent.

  How does windows and macintosh breakthroughs

How does windows and Macintosh breakthroughs influenced the way operating systems manages, enhance and impact applications and resources?

  Security professionals to find information about threats

Analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals.

  A common element of international conflict

Cyber attacks are now a common element of international conflict, both on their own and in conjunction with broader military operations. Targets have included government networks, media outlets, banking services, and critical infrastructure. The effe..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd