Describe a geosynchronous earth orbit

Assignment Help Computer Networking
Reference no: EM13777185

Part 1

Question 1. _____ generates the highest level of reflection.

Marble
Bulletproof glass
Paper
Metal

Question 2. When an RF signal moves from one medium to another of a different density, the signal actually bends instead of traveling in a straight line. This is known as _____.

reflection
absorption
refraction
scattering

Question 3. Which is the lowest frequency commonly used for unlicensed radio frequency connections?

700 GHz
800 Hz
800 GHz
700 MHz

Question 4. Which is the only part the user of a radio can typically change?

The amplifier
The mixer
The switch
The antenna

Question 5. Which is a problem with standards-based solutions?

Standards require all parts come from the same manufacturer.
Standards are slow to be produced.
Standards are required by Part 15 of Title 47 of the CFR.
Standards are proprietary.

Question 6. In an infrastructure network, the beacon interval is normally set to _____ ms, although it can be modified.

1
10
100
1,000

Question 7. Which is the shape of a Fresnel zone?

Circular
Rectangular
Ellipsoidal
Elliptical

Question 8. Most industry experts recommend one access point for no more than _____ users if they are performing basic e-mail, light web surfing, and occasionally transferring medium-sized files.

10
30
50
100

Question 9. A _____ VPN is a user-to-LAN connection used by remote users.

remote-access
site-to-site
peer-to-peer
remote-to-LAN

Question 10. MAC address filtering is vulnerable because there are programs available that allow users to _____ a MAC address.

spoof
break
modify
disable

Part 2

Question 1. Which is a disadvantage of thin access points?

It has complicated network management.

Hand-off time is increased.

It is very expensive.

All thin access points and switches are proprietary.

Question 2. Which is an application of RFID technology?

Cards with embedded RFID chips are widely used as electronic cash in casinos.

Major retailers are requiring that cases and pallets of merchandise shipped to their warehouses from large vendors have an RFID tag affixed.

Beginning in 2005, U.S. passports will have an RFID tag embedded in the document.

All of the above

Question 3. With _____ broadband, also known as WiMax, the signal is transmitted between the antennas of the buildings at speeds up to 75 Mbps and at distances up to 53 kilometers (35 miles).

fixed

bridges

point-to-multipoint

mesh

Question 4. Access points are typically mounted on a(n) _____ to reduce interference from surrounding objects.

ceiling

ROI

bandwidth

hotspots

Question 5. In a _____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key and then using each newly generated key to decrypt a message.

brute force

temporal key integrity protocol (TKIP)

social

probe request

Question 6. _____ involves dividing the data to be transmitted from one large frame into several smaller ones.

Fragmentation

Agent

Spectrum analyzer

None of the above

Question 7. A _____ transmission means that a frame is sent from one sender to multiple receivers with a single transmit operation.

decibels

noise level

multicast

None of the above

Question 8. Following authentication, if the access point accepts the wireless device, it reserves memory space in the AP and establishes a(n) _____ ID for it.

association

device

member

authentication

Question 9. When an AP accepts or rejects a wireless device, it sends a(n) _____ frame.

association request

association response

disassociation

reassociation

Question 10. How does OFDM work?

Signals are broken up and the parts are sent in parallel.

The same signal is sent on multiple channels.

One signal is sent twice on the same channel.

A signal is sent over a wired network at the same time as the wireless network.

Part 3

Question 1. There are several advantages of digital modulation over analog modulation. What are they?

Question 2. Explain the advantages and the disadvantages of 2.4 GHz versus 5 GHz.

Question 3. What is an RF amplifier?

Question 4. Lst at least three advantages of standards for wireless technology.

Question 5. CSMA/CA reduces collisions by using explicit frame acknowledgment. Describe how frame acknowledgment works.

Part 4

Question 1. Describe a geosynchronous earth orbit.

Question 2. When should an 802.11a network be installed instead of an 802.11g network?

Question 3. What is a dictionary attack?

Question 4. What is the difference between radio frequency identification (RFID) and a barcode?

Question 5. What is a spectrum analyzer?

Reference no: EM13777185

Questions Cloud

Ethical and one legal question : In a single document, summarize each of the three areas in two paragraphs per case (total 6 par.), and why you would like to explore them. Ask one ethical and one legal question that might be present within the realm of each topic
Describe problems encountered regarding meetings in detail : Write an informal report to Mrs. Chen describing problems encountered regarding the meetings in detail. Be specific about how the problems affected the group-performance, progress, team members, and so on.
Tenet healthcare corporation issues : How do both of these variables impact the organization's profit margin?
Characteristics of a professional mathematics teacher : Explain how the concepts learned in this course are relevant to the characteristics of a professional mathematics teacher. Determine how the course concepts have influenced your own ideas and philosophy of teaching.
Describe a geosynchronous earth orbit : Describe a geosynchronous earth orbit. When should an 802.11a network be installed instead of an 802.11g network
Understanding of the values for the bsn student : Writea 30- to 50-word response in each box on the form that describes your understanding of the values for the BSN student. Your response must:
Write paper on addressing police and corrections corruption : Write paper on addressing Police and Corrections Corruption
Nursing theorists grid on the materials : Resource: Nursing Theorists Grid on the Materials page of the student website. Complete the Nursing Theorists Grid for the theorist.
Describe at least two personnel safety issues : Question 1: In a minimum of 250 - 300 words, describe at least two personnel safety issues faced by September 11th first responders (World Trade Center or Pentagon). Provide two suggestions for how government agencies (local, state, and or federal) c..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd