Module 7 Study Questions
Technology in Action (6th Ed.)
Pages 317 to 353

  1. Be able to define the following key terms:
    1. Bandwidth
    2. Computer network
    3. Computer virus
    4. Firewall
    5. Identity theft
    6. LAN (Local Area Network)
    7. NIC (Network Interface Card)
    8. Node
    9. NOS (Network Operating System)
    10. Packet
    11. Packet sniffer
    12. SSID (service set identifier)
    13. Throughput
    14. Trojan horse
    15. WAN (wide area network)
    16. Wireless access point

  2. What are three benefits to networking computers at home or the office?

  3. How are peer-to-peer networks and client/server networks fundamentally different?

  4. What is the practical upper limit to the number of computers connected together using a peer-to-peer network?

  5. Identify five types of transmission media used to connect network nodes.

  6. Identify two common network navigation devices and explain how they are different.

  7. What type of connector is used with Ethernet NICs?

  8. What are the maximum data transmission rates for the four most common types of unshielded twisted pair cables used by home-based Ethernet networks?

  9. Identify the three recommendations by the authors for protecting yourself from social engineering schemes.

  10. What are the two 802.11 WiFi standards and associated transfer rates commonly used in home networks?

NOTE: Another advantage of the 801.11n standard is that it transmits using two different radio frequencies which helps minimize interference with wireless phones and other wireless devices used at home.
  1. How is a wireless network adapter installed if it is not built into the motherboard?

  2. Identify three problems associated with wireless networks. NOTE: A fourth problem is that wireless networks are easier for unwanted people (hackers) to access.

  3. What are four factors you need to consider when selecting a peer-to-peer network for home?

  4. How can a hacker indirectly access your computer using the Internet and how do you prevent this from happening?

  5. What are five symptoms that your computer has a virus and what should you do if this happens?

  6. How do you make sure your antivirus software is up to date?

  7. What other security measures do the authors recommend?

  8. What did you find interesting in this week’s reading that was not part of a study guide question?


Syllabus Assignments Study Questions Competencies Dr. T.'s Homepage TTDK Homepage

Please send comments regarding this web page to: Tim.Trainor@ttdk.com