IT101-8 Quiz Chapter 10
Communicating Digital Content: Wired and Wireless Networks and Devices
Multiple Choice
1. Transmission Media on which the data, instructions, or information travel that can be wired or wireless.
2. Metropolitan Area Network (MAN) is a high-speed network that connects local area networks in a metropolitan
area, such as a city or town, and handles the bulk of communications activity across that region.
3. Which of the following does not describe Communications Software? It does not allow users to exchange files
and text, audio, and video messages via the cloud.
4. Ethernet is a network standard that specifies no central computer or device on the network (nodes) should
control when data can be transmitted.
5. FTTP uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical permanent
location.
6. What is the best way to strengthen your wireless signal? Position the wireless router or wireless access point in
a central location of your home and away from appliances or other electronic devices that may degrade the
signal.
7. It occurs when cyberthieves tap into home routers or cable modems or other Internet access points to intercept
a paid Internet service IP Hijacking.
8. It is the amount of data, instructions, and information that can travel over transmission media Bandwidth.
9. A single copper wire is surrounded by an insulating material, a woven or braided metal, and a plastic outer
coating Coaxial Cable.
10. Receives microwave signals from an earth-based station, amplifies the signals, and broadcasts the signals back
over a wide area to any number of earth-based stations Communications Satellite.
11. To enable a computer or device that does not have built-in networking capability, use an NIC.
12. Transmission from an earth-based station to a satellite is an uplink.
13. You have taken a new job as a network administrator. Although you have been an IT professional within your
organization for a number of years, this particular responsibility is a new one for you, so you have been studying
network standards and protocols. You learn that all of the following are true about token ring networks EXCEPT:
More than one token can exist on a token ring network.
14. Which of the following best defines throttling? When a network reduces upload and download speeds of high-
data users at peak times.
15. Microwave transmission often is called fixed wireless.
16. A VAN is a third-party business that provides network services.
17. Which of the following is most likely to be used for mobile phone payments? NFC
18. The Internet is the world’s largest WAN.
19. A home or school likely uses a LAN.
20. Which of the following is another term for transmission media? Communications channel
21. Net neutrality is the concept of open Internet, accessible to all users, without interference from ISPs or other
third-parties.
22. A standard that outlines characteristics of how two devices communicate on a network is called a protocol.
23. WiMAX and UMB are competing standards for LTE.
24. Noise is an electrical disturbance that can degrade network communications.
25. A server controls access to hardware, software and other resources on a network.
26. A network is a collection of computers and devices connected together via communications devices and
transmission media.
27. A receiving device accepts the transmission of data, instructions, or information.
True or False
1. Some types of computers and mobile devices serve as sending and receiving devices in a communication system.
False
2. Computers and devices on different floors can access the same LAN in an office building. True
3. Email is best for sharing longer, detailed messages while for shorter messages, consider using the following
forms of immediate communications. True
4. Mbps is one million bits per second, and Gbps is one billion bits per second. True
5. Fiber to the Building provides home users with Internet access via fiber-optic cable. False
6. A dial-up modem is a communications device that converts digital signals to analog signals and analog signals to
digital signals so that data can travel along an analog phone line. True
7. Wireless home network speeds and ranges vary as the strength of the wireless signal affects the range of the
network. True
8. Capping is a practice ISPs use that provides a certain amount of data usage at the optimal speed. True
9. CATV network wiring often uses twisted-pair cables because it can be cabled over longer distances than coaxial
cables. False
10. Transmission from an earth-based station to a satellite is a downlink. False
11. The main difference between network classifications is the number of computers and devices connected to it.
False
12. Coaxial cable is capable of carrying significantly more signals than fiber-optic cables. False
13. Sometimes communication devices are preprogrammed to accomplish communication tasks. True
14. Because they are assigned randomly, you cannot use an IP address to determine a computer or device’s
location. False
15. Which of the following is NOT true about NFC? For successful communication, the devices must not touch or
come within 6 inches of each other.
16. Files on an intranet generally are also accessible from the Internet. False
17. Bluetooth devices need to within the same line of sight. False
18. With MMS, users can send and receive photos, videos, and audio files. True
Case Study
1. You are just casually browsing the internet and watching videos while suddenly, the video buffers and the
websites load very slow. You check the modem and it seems to be fine, what are the ways that you can
improve slow internet speeds at your home?
The first thing I have to do is to test my current Internet speed, usually modems and routers are affected over time and
will need to be rebooted. If it is still slow, there may be apps running in the background that consume broadband greatly
and so I can end their processes or uninstall unnecessary apps. In the same light, there may be ransomware installed on
my computer or mobile device and so I must find, terminate, uninstall and clean up my system. To follow, I can use an
online antivirus software besides my firewall of which scans for viruses and malware on a regular basis. Lastly, I can
inquire on my internet issues or negotiate with my internet service provider if I can upgrade my plan, otherwise I can
find an alternative ISP of which is more reliable and affordable.
2. You just decided to switch Internet Service Providers because the service of the previous ISP provided for you
is not enough for what you pay them. To not make the same mistake again, what are the factors to consider
when choosing a plan that the ISPs provided in which there is a balance between performance and value?
I have decided to switch ISPS, therefore I must consider factors before choosing a plan from another ISP. Before I figure
out what kind of internet best suits my needs, I need to know what options are available in my location and the
reputation of the ISPs. Part of reviewing reviews of the ISPs is customer support which assists me with technical support
and inquiries pre- and post-installation, responsiveness is important as time is money. ISPs can charge me with a wide
range of prices for their services and so I need to make a budget based on my needs (download/upload speed,
connection type, security, and equipment) in terms of the contract with its proper conditions. It is essentially doing
research into these factors when choosing an internet service provider that is cost-effective and reliable.
3. ISPs track their customers’ online footprint by getting data from your online traffic for the purpose of selling
that data to advertisers, getting bandwidth measurements, and more. How can you make sure that your data
is secured and safe from your devices or online in terms of being unable to be tracked by them?
Cybersecurity not only focuses on protecting computer systems from malicious attacks, at its core it’s protection against
criminal or unauthorized use of data. Applications that access the Internet with the access and retrieval of data and
information related to me is utilized by companies and persons who violate online privacy. To make sure my data is
secured and safe I must regularly clear my browsing history as I am tracked via my IP address by cookies which leave logs
of my internet activity such as login details. As tedious as it is, I must read privacy policies and terms of services about
data collection especially before signing up to websites and applications to know how my information is being used. In
another light, I can use search engines that won’t track my digital footprint or VPNs so ISPs do not track me. I can also
avoid third-party downloadable and unreviewed sites or apps which may keep records of my identity and online activity.