Default settings on a wireless router

Assignment Help Basic Computer Science
Reference no: EM131086079

1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood?

  • Dial-up
  • DSL
  • Cable Broadband
  • ISDN

2. For which of these items should you always change the default settings on a wireless router?

  • SSID and Administrative Password
  • IP Address
  • Channel
  • Frequency (2.4/5.0 GHz)

3. When utilizing IPv4, each network node has a ____-bit IP address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

  • 16
  • 32
  • 48
  • 64

4. Which of the following is the default class A subnet mask?

  • 255.255.255.0
  • 255.240.0.0
  • 255.0.0.0
  • 255.255.0.0

5. A _______ is an administrative grouping of network resources such as computers, printers, and network devices.

  • container
  • class
  • range
  • domain

6. A(n)_________ cable is the most frequently used network cable because it is relatively inexpensive and easy to install.

  • Shielded twisted-pair
  • Unshielded twisted-pair
  • Thin coax
  • Thick coax

7. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Tree
  • Star

8. Which standards organization developed the OSI Model?

  • IEEE
  • Department of Defense
  • OSI
  • ISO

9. A network computer that shares resources with and responds to requests from other computers in known as a ________.

  • Client
  • Host
  • Terminal
  • Server

10. A DHCP server is a server that uses software and DHCP to automatically assign a(n) ______ address from a pool of possible addresses.

  • MAC
  • LAA
  • IP
  • BIA

11. Which Internet access method uses existing TV coaxial cables?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

12. Which Internet access method uses existing telephone lines and regular phone service?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

13. Which of the following types of media are used in LANs?

  • Twisted Pair
  • Coaxial Cable
  • Radio Waves
  • All of the selection are valid

14. Which of the following is a class B address?

  • 126.4.27.19
  • 127.276.2.15
  • 177.125.3.17
  • 221.34.2.17

15. Which of the following network related informational items is not needed in order to install an Operating System on a PC that will be connected to the internet?

  • Default Gateway
  • IP address
  • Subnet mask
  • Switch number

16. A ________ server isolates internal clients from the servers by downloading and storing files on behalf of the clients.

  • DNS
  • DHCP
  • NTP
  • Proxy

17. In which layer of the TCPIP Model do routers belong?

  • Physical
  • Internetwork
  • Application
  • Transport

18. Which of the following is considered a base 10 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

19. Use the ________ utility as the first step in diagnosing connectivity problems.

  • Tracert
  • Nstat
  • Net view
  • Ping

20. Which of the following is a class C address?

  • 169.254.27.19
  • 10.276.2.15
  • 172.22.3.17
  • 221.34.2.17

21. Which of the following is the default class B subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

22. Which of the following is a drawback of Broadband technology, compared to ADSL?

  • Its standards are less developed
  • Its installation is more difficult
  • Multiple subscribers must share a fixed amount of bandwidth
  • Cable is an asymmetrical technology, while ADSL is symmetrical

23. Which of these wireless encryption standards is the most secure?

  • WPA
  • WEP
  • WPA2
  • WEP2

24. Which standards organization developed the 802 series of standards?

  • IEEE
  • ITU
  • OSI
  • ISO

25. Which of the following is a class A address?

  • 126.4.27.19
  • 128.276.2.15
  • 172.22.3.17
  • 192.168.2.17

26. Users on a particular floor can't access the Internet, but can log onto the local network. What should they check first?

  • TCP/IP properties
  • Is switch turned on?
  • Are users on other floors having the same issue?
  • Call their ISP

27. The OSI model consists of ______ distinct layers stacked on one another.

  • two
  • three
  • four
  • seven

28. A computer that acts as both a client and a server is known as a _________.

  • Server
  • Client
  • Host
  • Peer

29. At what layer of the TCP model is the User Datagram Protocol (UDP) found?

  • Host to Host
  • Application
  • Network
  • Internet

30. Which of the following is considered a base 2 numbering system?

  • Hexadecimal
  • Decimal
  • Binary
  • Octal

31. The new IPv6 is better than IPv4 for all the following reasons except:

  • More addresses
  • Less bits in the address
  • Better security
  • Compatibility with IPv4

32. A ________ transmission sends a message to all points on a specific network.

  • multicast
  • unicast
  • simulcast
  • broadcast

33. In which type of wired network is it easier to add multiple new nodes?

  • Bus
  • Star
  • Ring
  • Mesh

34. A ________ is the place where a telephone company terminates lines and switches at a client location.

  • telco office
  • central office
  • central switching facility
  • demarcation point

35. What is the primary difference between LANs and WANs?

  • The use of an external provider due to distance they span
  • The type of DHCP servers they use
  • The type of data they transmit
  • All of the above

36. The _________ layer of the TCP model is responsible for logical addressing.

  • Internetwork
  • Host to Host
  • Logical
  • Session

37. A ______ consists of interconnected computers, printers, and other computer equipment in close physical proximity.

  • WAN
  • MAN
  • WWAN
  • LAN

38. Which of the following is considered a base 16 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

39. Which of the following is the default class C subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

40. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Point to Point
  • Mesh

41. A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology.

  • bus
  • mesh
  • ring
  • star

42. Which of the following is a cryptographic technique for that converts plain data into coded data?

  • Encryption
  • PKA
  • KPA
  • RXStenography

Reference no: EM131086079

Questions Cloud

Calculate and display the bill : Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.
The new rule fully in effect-value of consumer surplus : Assume that the market for beef in a small and isolated community is described by the following two equations: Q = -150 +150*P and Q = 600, where Q represents quantity and P is price. Similarly, assume that the market for beef is described by the fol..
According the criteria for the final project : Extend Project 1 to use advanced data structures and support sorting on various keys. The project will be graded according the criteria for the final project - see below.
Default settings on a wireless router : 1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood? 2. For which of these items should you always change the default settings on a wireless router?
Examine the demand for videocassette recorders : Let's examine the demand for videocassette recorders (VCRs), which can be affected by their own price as well as the income of consumers and the price of a competing good, the DVD player.
Which process is now economically efficient-alpha or beta : Process alpha / process beta labour 625/ 250 capital ... Question process alpha / process beta labour 625/ 250 capital 45/125 A firm plans to produce 500 units per day of good Z. The firm’s production engineer finds two technically efficient processe..
Indifference curve involving two goods identifies : An indifference curve involving two goods identifies the:
Computer memory device : Jersey Imports, Inc., markets electronic devices imported from Thai producers. The company recently introduced an innovative and enormously successful 5 GB Joystick (computer memory device), but a flood of competitor entry and downward pressure on bo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd