1. _____________ use IP addresses to direct data packets to the correct destination
2. IP addresses are used to ..
3. Packet switching is fool proof. Packets never arrive at the receicing device in the wrong order.
4. A layer of network protocols is a group of protocols with….
5. Layers allow developers to…..
6. "A set of rules that govern how devices communicate" is the definition of a …
7. What does the term POP stand for?
8. What is the difference between HTTP and HTTPS?
9. Data is transmitted across a network in packets. Items that each data packet will contain include:
10. What is one of the disadvantages of the star network?
11. Which of the following topologies is likely to be the most expensive due to the cabling?
12. In a star network it is very difficult to add or remove a node as doing so will adversely affect the network
13. The robustness of a mesh network allows for some interesting uses and applications including:
14. The advantage of using circuit switching is that it provides for …………………. associated with packets, making maximal use of available bandwidth for that communication
15. In circuit switching, a route and its associated bandwidth is reserved from source to destination, making circuit switching relatively ……
16. Fill in the blanks for the following excerpt on packet switching
17. For sending data the IP rules or protocols include adding the destination address to each data packet and….
18. For receiving data packets IP protocols (rules) include accepting data packets that have its own address attached and…
19. Both TCP and UDP are both protocols used for sending bits of data — known as packets — over the Internet. TCP isn't the only protocol!
20. UDP stands for User Datagram Protocol — a datagram is the same thing as a packet of information. It works…
21. When using UDP, packets are just sent to the recipient. The sender will not wait to make sure the recipient received the packet — it will just continue sending the next packets.
22. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)
23. Wireless access technologies are commonly divided into categories, based on speed and distance
24. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels
25. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………
26. An example is: The TCP in layer 3 could only communicate with….
27. Which of the following are the names of layers in the four layer model?
Names of layers in the four layer model?
7.Network / Data Link Access Layer
28. The protocols in this layer provide access to email files, and websites across an IP network
29. The TCP part of the TCP/IP protocol resides in this layer.
30. The IP part of the TCP/IP protocol resides in this layer. It is responsible for managing the address of source and destination locations
31. Protocols on this layer (1) are Ethernet and WI-FI.
32. Protocols on this layer are FTP, HTTP, POP, IMAP and SMTP
33. The benefits of using layers include:
34. What does SMTP stand for?
35. Which of the following is not a real IP address?
36. Rules of Network Protocol include guidelines that regulate the following: network access method, allowed physical topologies and _____________
37. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where …
38. This protocol is used to retrieve emails
39. 14. What difference us a user likely to experience when upgrading from a b series router to an n series router?
40. The purpose of the HTTP protocol is to make the transfer of webpages from the servers to the user's device