1. What is one advantage of using a star topology?
2. "A set of rules that govern how devices communicate" is the definition of a …
3. What does the term POP stand for?
4. What is the difference between HTTP and HTTPS?
5. Data is transmitted across a network in packets. Items that each data packet will contain include:
6. What is one of the disadvantages of the star network?
7. Which of the following topologies is likely to be the most expensive due to the cabling?
8. In a star network it is very difficult to add or remove a node as doing so will adversely affect the network
9. The robustness of a mesh network allows for some interesting uses and applications including:
10. The advantage of using circuit switching is that it provides for …………………. associated with packets, making maximal use of available bandwidth for that communication
11. In circuit switching, a route and its associated bandwidth is reserved from source to destination, making circuit switching relatively ……
12. Fill in the blanks for the following excerpt on packet switching
13. For sending data the IP rules or protocols include adding the destination address to each data packet and….
14. For receiving data packets IP protocols (rules) include accepting data packets that have its own address attached and…
15. Both TCP and UDP are both protocols used for sending bits of data — known as packets — over the Internet. TCP isn't the only protocol!
16. UDP stands for User Datagram Protocol — a datagram is the same thing as a packet of information. It works…
17. When using UDP, packets are just sent to the recipient. The sender will not wait to make sure the recipient received the packet — it will just continue sending the next packets.
18. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)
19. Wireless access technologies are commonly divided into categories, based on speed and distance
20. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels
21. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………
22. An example is: The TCP in layer 3 could only communicate with….
23. Which of the following are the names of layers in the four layer model?
Names of layers in the four layer model?
7.Network / Data Link Access Layer
24. The protocols in this layer provide access to email files, and websites across an IP network
25. The TCP part of the TCP/IP protocol resides in this layer.
26. The IP part of the TCP/IP protocol resides in this layer. It is responsible for managing the address of source and destination locations
27. Protocols on this layer (1) are Ethernet and WI-FI.
28. Protocols on this layer are FTP, HTTP, POP, IMAP and SMTP
29. The benefits of using layers include:
30. What does SMTP stand for?
31. Which of the following is not a real IP address?
32. Rules of Network Protocol include guidelines that regulate the following: network access method, allowed physical topologies and _____________
33. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where …
34. This protocol is used to retrieve emails
35. 14. What difference us a user likely to experience when upgrading from a b series router to an n series router?