3
.pdf
keyboard_arrow_up
School
Central Piedmont Community College *
*We aren’t endorsed by this school
Course
120
Subject
Computer Science
Date
Feb 20, 2024
Type
Pages
9
Uploaded by Vinny1994
1/18/24, 9
:
58 PM
Individual Response
Page 1 of 9
about:srcdoc
3.1.7 Practice Questions
Candidate:
Joseph Vincent (jvince13)
Date:
1/18/2024, 9:58:21 PM •
Time Spent:
02:11
Score: 100%
Passing Score: 80%
Question 1.
Correct
You're installing network wiring for a new Ethernet network at your company's main office
building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks.
Near the end of the project, you run out of wire before the last few runs are complete. You
have a spool of Cat 3 network cable in storage. Upon closer inspection, it appears very
similar to the Cat 5e wiring.
To finish the project, should you use the Cat 3 cabling as a substitute for the Cat 5e cabling?
No. Cat 5e cabling uses a thicker copper wire
than Cat 3 cabling, enabling higher data
transmission rates.
No. Cat 5e cabling has more twists per inch
than Cat 3 cabling, reducing crosstalk and
supporting higher data rates.
No. The sheath surrounding Cat 5e cabling is
much thicker than the Cat 3 sheath, creating
an extra layer of shielding that reduces
crosstalk and supports higher data rates.
Yes. You can use Cat 3 cabling as a substitute
for Cat 5e cabling since they're electrically
identical.
Explanation
1/18/24, 9
:
58 PM
Individual Response
Page 2 of 9
about:srcdoc
While Cat 3 and Cat 5e cabling may appear physically similar, they're electrically different.
Cat 5e cabling is twisted much more tightly than Cat 3 cabling. This reduces crosstalk and
enables Cat 5e wiring to support much faster data transmission rates.
References
3.1.1 Twisted Pair
3.1.2 Twisted Pair Facts
3.3.4 Use Punchdown Blocks
q_twisted_pair_cat5e_np6.question.fex
Question 2.
Correct
Which of the following cable types often includes a solid plastic core that keeps the twisted
pairs separated?
Cat 3
Cat 5
Cat 6
Cat 5e
Explanation
Cat 6 cables include a solid plastic core that keeps the twisted pairs separated and prevents
the cable from being bent too tightly.
Cat 3, Cat 5, and Cat 5e don't include a solid plastic core that keeps the twisted pairs
separated.
References
3.1.1 Twisted Pair
3.1.2 Twisted Pair Facts
3.3.4 Use Punchdown Blocks
1/18/24, 9
:
58 PM
Individual Response
Page 3 of 9
about:srcdoc
q_twisted_pair_cat6_np6.question.fex
Question 3.
Correct
You're adding new wires in your building for some new offices. The building has a false
ceiling that holds the lights and provides an air path for heating and air conditioning. You'd
like to run your Ethernet cables in this area.
Which type of cable must you use?
STP cables
Cat 5e or Cat 6a cables
Plenum-rated cable
Fiber optic cables
Explanation
Plenum-rated cable is fire resistant and non-toxic. You must use plenum-rated cable to wire
in air spaces used by heating and air conditioning systems.
Cat 5e cables provide better EMI protection than Cat 5 cables, and Cat 6a cables are an
improvement over Cat 6 specifications. However, neither of these qualities are a
requirement for use in a ceiling area.
If an area has a lot of EMI, you might consider using STP or fiber optic cables, but this isn't
a requirement in a ceiling area. Typically, you can avoid EMI sources by re-routing cables.
References
3.1.1 Twisted Pair
3.1.2 Twisted Pair Facts
3.4.1 Troubleshoot Copper Wiring Issues
3.4.2 Copper Wiring Troubleshooting Facts
q_twisted_pair_plenum_np6.question.fex
1/18/24, 9
:
58 PM
Individual Response
Page 4 of 9
about:srcdoc
q_twisted_pair_plenum_np6.question.fex
Question 4.
Correct
Why might you use an RJ11 connector?
You want to connect a 10GBaseT network to a
switch card using a Cat 6 cable.
You want to connect your computer to the
internet with a DSL modem.
You want to upgrade your 10BaseT network to
100BaseTX.
You want to connect your computer to a
network using a Cat 7 cable.
Explanation
RJ11 connectors are typically used for telephones and modems.
RJ45 connectors are used for 100BaseTX.
RJ45 connectors are used for 10GBaseT using Cat 6 cables.
GG45 or TERA connectors are used with Cat 7 cables.
References
3.1.1 Twisted Pair
3.1.2 Twisted Pair Facts
q_twisted_pair_rj11_01_np6.question.fex
Question 5.
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Packet tracer file please
Your end of year project will be designing a network using packet tracer. Spend the next six weeks learning Packet Tracer. I will provide amble time for you to work on the lab assignment so there will be fewer graded assignments than you have been submitting during the first half of the semester.
You will need to include the following in your project.
Load this information in the Report Upload Link - Create a report and provide a description of the Network Topology. Describe your network and all its components and functions including cabling. When describing the components, include the model of the devices being used, for example, Cisco Router 2900, ethernet cable or fiber. What devices and cabling are you using, how is it connected, IPs used, gateway and anything you feel deemed to include. 2. Design your network using Packet Tracer. The following list provides a list of devices and things to consider and apply in your network design.
Switch Cabling…
arrow_forward
Q4
You will undertake the role of an IT Support and Network Technician working in a help-desk environment. You tasked to create a small wireless network to test the software and equipment that you have recommended by your manager (NOS, Applications, etc.). Therefore, you have to Install and configure all of the necessary hardware and software to allow two PCs, one laptop, a print server and a printer to be attached to the network. You will be required to complete four tasks as part of this role. You will be assessed on how safely you conduct the required activities and your overall performance will be observed. This will include how you present and conduct yourself in the manner of an IT Support Technician, throughout all parts of the assessment.
You are going to scheme a small wireless network consists of at least 2 Laptops and one network printer, beside of two subnets network that already exist consists of 4 PC’s on each one, and connect them together, to access the equipment that…
arrow_forward
Assignment: The Evolution of Mobile Technologies
Learning Objectives and Outcomes
▪ Describe the features of the generations (1G to 5G) of mobile technology.
▪ Describe the security challenges of each generation and how those challenges have been addressed.
Assignment Requirements
You are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS has been asked to make a presentation to a high school computer programming club. The company president, Thomas, encourages employees to become involved in the community, and Claire, a senior manager at SSS, has asked you to create a brief PowerPoint presentation.
The programming club has an interest in old technology as well as new. The presentation should focus on how mobile technologies have evolved over the years, from 1G to 5G.
For this assignment:
1. Research the generations (1G to 5G) of mobile technology to date.
2. Develop a PowerPoint presentation that describes each…
arrow_forward
Which high availability DHCP solutions do you feel would be most beneficial for your firm to implement, and why do you feel this way? What makes it better is it? Exist any potential drawbacks to this? What are the advantages that it has over the other options? How soon do you think it would be before you realised that DHCP wasn't working on your network? How soon would you become aware if the DHCP server in your house was malfunctioning?
arrow_forward
Self-Assessment Checklist▪ I determined the best network design to ensure the security of internal access while retaining public website availability.▪ I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.▪ I created a plan that ensures communications are available 24/7.▪ I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.▪ I created a basic network diagram that illustrates the current network and enhancements.▪ I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.▪ I followed the guidelines.
arrow_forward
Network troubleshooting skills are normally developed when you are faced with network issues. So for this activity, your job is to locate, discover and fix the issue.
https://drive.google.com/file/d/1Sa6NMellmuuIMF9uIMUU-DHvnMkWqKlP/view?usp=sharing
arrow_forward
Select the appropriate response
Question 45
True or False: To verify the fiber closure requirements, a 10 to 20-foot water head test shall be
completed.
O True
O False
Submit Response
Select the appropriate response
Question 46
What is the typical source of post amplifier noise in a LASER transmitter?
O dark current
O statistical deviation of arriving photons
ODC test points
OPIN photodiode
O random variations in the LASER output amplitude
Submit Response
arrow_forward
What exactly is a hot spot, and what are the advantages and disadvantages of using one?
arrow_forward
What are some notable examples of legitimate and suitable use of peer-to-peer (P2P) technology?
In any discussion of P2P, students will invariably bring up the topic of torrent-based P2P file sharing. What are
some of the applications that have been developed, and what sorts of interfaces do they provide, from the
perspective of web technology? What are the dangers of employing them?
arrow_forward
computer science
dont post copied answer posting mutliple times and no plagiarism
multiple dislikes for sure
arrow_forward
What are some well-known instances of legal and suitable P2P use?
Whenever we talk about peer-to-peer file sharing, students will always bring up torrent-based P2P file sharing. What are some of the programs that have been built in terms of web technology, and what interfaces do they provide? What are the dangers of using them?
arrow_forward
Is there a standard procedure for requesting approval to make a network change?
arrow_forward
Doing periodic wireless audits and the duties that should be included in a wireless audit should be explained to the reader
arrow_forward
What are your suggestions for network repair?
arrow_forward
Can you describe what a hot spot is, how it works, and the risks you run if you connect to one even if it's not your own network?
arrow_forward
Describe what a hot zone is, how it functions, and any potential restrictions it may have.
arrow_forward
What role does PACS play in the Internet of Things?
arrow_forward
rapid miner ROC curve
arrow_forward
what are performance parameters use used to evaluate the network performance.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Packet tracer file please Your end of year project will be designing a network using packet tracer. Spend the next six weeks learning Packet Tracer. I will provide amble time for you to work on the lab assignment so there will be fewer graded assignments than you have been submitting during the first half of the semester. You will need to include the following in your project. Load this information in the Report Upload Link - Create a report and provide a description of the Network Topology. Describe your network and all its components and functions including cabling. When describing the components, include the model of the devices being used, for example, Cisco Router 2900, ethernet cable or fiber. What devices and cabling are you using, how is it connected, IPs used, gateway and anything you feel deemed to include. 2. Design your network using Packet Tracer. The following list provides a list of devices and things to consider and apply in your network design. Switch Cabling…arrow_forwardQ4 You will undertake the role of an IT Support and Network Technician working in a help-desk environment. You tasked to create a small wireless network to test the software and equipment that you have recommended by your manager (NOS, Applications, etc.). Therefore, you have to Install and configure all of the necessary hardware and software to allow two PCs, one laptop, a print server and a printer to be attached to the network. You will be required to complete four tasks as part of this role. You will be assessed on how safely you conduct the required activities and your overall performance will be observed. This will include how you present and conduct yourself in the manner of an IT Support Technician, throughout all parts of the assessment. You are going to scheme a small wireless network consists of at least 2 Laptops and one network printer, beside of two subnets network that already exist consists of 4 PC’s on each one, and connect them together, to access the equipment that…arrow_forwardAssignment: The Evolution of Mobile Technologies Learning Objectives and Outcomes ▪ Describe the features of the generations (1G to 5G) of mobile technology. ▪ Describe the security challenges of each generation and how those challenges have been addressed. Assignment Requirements You are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS has been asked to make a presentation to a high school computer programming club. The company president, Thomas, encourages employees to become involved in the community, and Claire, a senior manager at SSS, has asked you to create a brief PowerPoint presentation. The programming club has an interest in old technology as well as new. The presentation should focus on how mobile technologies have evolved over the years, from 1G to 5G. For this assignment: 1. Research the generations (1G to 5G) of mobile technology to date. 2. Develop a PowerPoint presentation that describes each…arrow_forward
- Which high availability DHCP solutions do you feel would be most beneficial for your firm to implement, and why do you feel this way? What makes it better is it? Exist any potential drawbacks to this? What are the advantages that it has over the other options? How soon do you think it would be before you realised that DHCP wasn't working on your network? How soon would you become aware if the DHCP server in your house was malfunctioning?arrow_forwardSelf-Assessment Checklist▪ I determined the best network design to ensure the security of internal access while retaining public website availability.▪ I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.▪ I created a plan that ensures communications are available 24/7.▪ I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.▪ I created a basic network diagram that illustrates the current network and enhancements.▪ I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.▪ I followed the guidelines.arrow_forwardNetwork troubleshooting skills are normally developed when you are faced with network issues. So for this activity, your job is to locate, discover and fix the issue. https://drive.google.com/file/d/1Sa6NMellmuuIMF9uIMUU-DHvnMkWqKlP/view?usp=sharingarrow_forward
- Select the appropriate response Question 45 True or False: To verify the fiber closure requirements, a 10 to 20-foot water head test shall be completed. O True O False Submit Response Select the appropriate response Question 46 What is the typical source of post amplifier noise in a LASER transmitter? O dark current O statistical deviation of arriving photons ODC test points OPIN photodiode O random variations in the LASER output amplitude Submit Responsearrow_forwardWhat exactly is a hot spot, and what are the advantages and disadvantages of using one?arrow_forwardWhat are some notable examples of legitimate and suitable use of peer-to-peer (P2P) technology? In any discussion of P2P, students will invariably bring up the topic of torrent-based P2P file sharing. What are some of the applications that have been developed, and what sorts of interfaces do they provide, from the perspective of web technology? What are the dangers of employing them?arrow_forward
- computer science dont post copied answer posting mutliple times and no plagiarism multiple dislikes for surearrow_forwardWhat are some well-known instances of legal and suitable P2P use? Whenever we talk about peer-to-peer file sharing, students will always bring up torrent-based P2P file sharing. What are some of the programs that have been built in terms of web technology, and what interfaces do they provide? What are the dangers of using them?arrow_forwardIs there a standard procedure for requesting approval to make a network change?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning