問題一覧
1
links computers for shared resources through the internet. Networking requires computers to access multiple networks and share their resources for computer operations, including web browsing, sending and retrieving emails, sharing files and images, and downloading music.
Computer Networking
2
This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.
Metropolitan Area Network (MAN)
3
liable for end-to-end delivery between devices. It deals with message integrity between source and destination and segmenting and reassembling packets.
Transport Layer
4
accepts and structures the messages for an application by converting the message from one code to another. It also processes data compression and encryption.
Presentation layer
5
interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.
Hub
6
provide resources, data, services, and programs to other computers or clients over a network. It is tasked to handle complex operations such as databases, emails, and shared files.
Servers
7
a security device that monitors and secures incoming and outgoing network traffic based on established security policies. It is essentially the barrier between a private internal network and the public Internet.
Firewall
8
combines the functionality of a modem and a router, thus making it a convenient source for Internet connectivity.
Wi-fi Modem
9
the most common networking topology in LANs today, where all the devices connect to a central switch or hub.
Star
10
deals with the fundamental human rights of a person's privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.
Internet Privacy
11
It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.
Intrusion Detection System (IDS)
12
Puts operations and transactions on hold
Revenue Loss
13
is the best way to ensure network reliability, as well as an occasional internet check-up and monitoring.
Proper Cable Management
14
Internet and network failure significantly affect productivity as tasks heavily rely on the internet. Employees will remain stagnant until the downtime is fixed.
Lesser Productivity
15
Failures in operations and transactions mean failure to meet agreed-upon outputs and deliverables on time. Especially when crucial outputs are at risk.
Legal Repercussions
16
The smallest type of network with a limited span interconnects compatible personal devices. Examples include wireless earphones-to-smartphone and computer-to-printer connections.
Personal Area Network (PAN)
17
This is used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.
Local Area Network (LAN)
18
This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.
Metropolitan Area Network (MAN)
19
liable for end-to-end delivery between devices It deals with message integrity between source and destination and segmenting and reassembling packets.
Transport Layer
20
accepts and structures the messages for an application by converting the message from one code to another. It also processes data compression and encryption.
Presentation Layer
21
using a coaxial cable, preventing data transmission from being extremely bandwidth efficient.
Bus
22
Each connected device can see the computer's data traffic to the printer. The other devices wait for pauses or halts before establishing their transmissions.
Bus
23
It is one of the reasons why bus topologies are rarely used in modern computer networks.
Bus
24
The most common networking tropology in LANs today, where all the devices connect to a central seitch or hub.
Star
25
But a hub is a multiport repeater that broadcasts and displays the data it receives to the devices connected.
Star
26
Network Type: Wired, Select the correct advantages
Faster network data transfer speed, Not susceptible to outside interference, Inexpensive setup
27
Network Type: Wireless, Select the correct DISADVANTAGES.
Security Issues, Slower Data Transfer
28
It relies on machine learning to develop a model of trusted activity then compares it to the current activity
Intrusion Detection System (IDS)
29
Never trust links from suspicious emails, sketchy websites, and advertisements. Double-check the URL to see if it has the correct format before clicking.
Double-checking Unfamiliar Links
30
Better check reviews and read about their security features before using a web browser.
Securing Web Browser
31
bad management and maintenance
Damaged Reputation
32
The best way to prevent this is by alerting every concerned party as soon as failure happens to lay down plans of recovery without compromising the quality and the demand of the clients.
Legal Repercussions
33
Using a Virtual Private Network (VPN)
best way to have Internet privacy , personal information stay secure and private from snoopers
34
Network devices for replacement.
Maintenance Cost