logo Hurry, Grab up to 30% discount on the entire course
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Earle BirdsellBusiness
(5/5)

520 Answers

Hire Me
expert
Tanusree KunduMathematics
(/5)

855 Answers

Hire Me
expert
Joann DomettCriminology
(5/5)

951 Answers

Hire Me
expert
Rameshwar DassHistory
(5/5)

504 Answers

Hire Me
Computer Network

The increase in signal from 94.6 to 94.75, represents which concept in radio signaling

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

multiple-choice questions

The increase in signal from 94.6 to 94.75, represents which concept in radio signaling:

 

A.

Bandwidth

 

B.

Gain

 

C.

Bit rate

 

D.

802.11

 

E.

802.3

 

Which of the following is true about the antenna above?

 

A.

It focuses its signal in a narrow range

 

B.

It has rapid signal attenuation

 

C.

It does not need to be pointed at a reciever

 

D.

Signal spreads in all directions (omnidirectional)

 

E.

It is not used for radio communication

802.11’s 2.4GHz and 5GHz frequency bands are considered:

 

A.

Unlicensed radio bands

 

B.

Licensed radio bands

 

C.

FM

 

D.

AM

 

E.

UHF

Which network management command is the most dangerous in security terms?

 

A.

SET

 

B.

GET

 

C.

PUT

 

D.

PUSH

 

E.

PULL

An IPv4 mask is a 32-bit string of 1s and 0s. A /8 mask means:

 

A.

The last 32 bits of the IPv4 address are 0's

 

B.

The first 8 bits of the IPv4 address are 1's

 

C.

The first 8 bits of the IPv4 address are 0's

 

D.

The first 32 bits of the IPv4 address are 1's

 

E.

The last 8 bits of the IPv4 address are 1's

A passphrase is considered one of the most secure passwords.

 True  False

As frequencies get higher (e.g., 2.4GHz to 5GHz), signal attenuation over distance:

 

A.

Increases faster

 

B.

Decreases faster

 

C.

Remains neutral

 

D.

Propagates Faster

 

E.

Does nothing

Why do most switches run Spanning Tree Protocol by default?

 

A.

It monitors how the network is functioning

 

B.

It manages the VLAN database

 

C.

It prevents switching loops

 

D.

It provides connections between border gateways

 

E.

It stops data from forwarding until all devices are updated

 

How many non-overlapping frequency bands does 2.4 GHz service band in 802.11 have?

 

A.

3

 

B.

5

 

C.

7

 

D.

32

 

E.

68

 

 

How many slave devices can a master have in Bluetooth?

 

A.

1

 

B.

2

 

C.

5

 

D.

6

 

E.

7

 

 

If a network mask of 255.128.0.0 is applied to 128.171.0.0 what are the number of bits in the network part (Excel might come in handy)?

 

A.

9

 

B.

12

 

C.

16

 

D.

37

 

E.

42

If Access Point A is on Channel 1, Access Point B on Channel 6, Access Point C on Channel 11, and Access Point D on Channel 4 and all are in proximity with each other. Which will cause interference?

 

A.

Access Points B and D

 

B.

Access Points A and B

 

C.

Access Points A and C

 

D.

Access Pooints B and C

 

E.

No access points will cause interference because they are all on different channels.

In IPv4 the version number is represented by what bits at the beginning of the IP header?

 

A.

0100

 

B.

1000

 

C.

1110

 

D.

0110

 

E.

0011

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme