0% found this document useful (0 votes)
36 views1 page

Care For Network and Computer Hardware Assignment

Uploaded by

Abeni Burka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views1 page

Care For Network and Computer Hardware Assignment

Uploaded by

Abeni Burka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Individual Assignment

For ICT (HNS)


Program: - Regular
Weight Mark: - 40%
Unit of Competence: - Care for Network and Computer Hardware
1. There are several ways to obtain Internet access.
2. __________________________the word asymmetric describes different channels on the line: One
channel is responsible for analog traffic, the second channel is used to provide upload access, and
the third channel is used for downloads.
3. Connectivity is achieved by using a device called a__________________________________
4. Two different types of Internet satellite services are deployed?
5. In a _______________________, the encryption key and the decryption keys are separate.
6. _______________________is the ability of a system or a product to work with other systems or
products without special effort on the part of the customer.
7. ______________________refers to the physical parts of a computer and related devices.
8. ________________________________is a symmetric technology that offers identical transmission
rates in both directions.
9. There are different ways to monitor threats to the network?
10. ____________________________requirements vary, depending on the size of software
installation, temporary files created and maintained while installing or running the software, and
possible use of swap space (if RAM is insufficient).
11. __________________________ provides connectivity between your computer and the Internet, a
network, or another computer?
12. Write is the plain text on this ARE YOU READY into convert cipher text?
13. ____________________When power levels drop to virtually zero, or in other words there is NO
power.
14. _______________________________is a system in which computers are connected to share
information and resources.
15. Write Some of Network threats?
16. ______________________Events or attacks that steal, damage, or destroy equipment, such as
servers, switches, and wiring?
17. _________________________involves the authorization of access to data in a network which is
controlled by the network administrator and the organization policies?
18. _________________ is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes?
19. ____________________________is a program in which malicious or harmful code is contained
inside it appears that harmless programming or data in such a way that it can get control and do its
chosen form of damage, such as corrupted the file allocation table on your hard disk?
20. Write Use the following Physical threats controlling?

You might also like