Which of the following broadband technologies is the fastest

Broadband provides the fastest connections today, making it the most common type of residential internet service. Broadband (short for “broad bandwidth”) is a type of high-speed internet connection that is always “on.” There are several types of connections including DSL, fiber, wireless, and 4G/5G LTE.

Broadband was introduced in the late 1990’s, replacing some older types of internet connections such as dial-up, which used the audible frequency of telephone lines. Because broadband uses a separate frequency than your voice line, it’s always connected, making it easier than ever to stay online.

Broadband internet provides fast connections, allowing users to quickly upload, stream and download large files. Let’s take a closer look at how this technology works. 

How does broadband internet work?

Types of broadband internet

There are four primary types of broadband connections available today. CenturyLink provides DSL, fiber and 4G, varied by location.

DSL (Digital Subscriber Line) was one of the earliest forms of broadband to be introduced and is still a common service today. DSL uses a single pair of copper wires in a telephone line for high-speed data connection. The DSL signal uses different frequencies from the voice lines, making it possible to use your internet and phone at the same time. Using a modem to bring the connection from your telephone line to your computer allows for DSL to get more “bandwidth,” which increases speeds. DSL speeds can be as high as 100 Mbps.

Pair bonding is an option for some DSL connections that generally provides double the bandwidth as compared to single line DSL service. With typical DSL service, there is only one pair of copper wires being used to deliver internet service. With pair bonding, two copper wire pairs (four individual wires) are used, thereby doubling your internet speed.  When using pair bonding, speeds can reach up to 140 Mpbs. Pair bonding services are subject to availability within CenturyLink’s internet coverage.

Fiber internet uses a special type of fiber-optic cable, which allows data to be sent as pulses of light over thousands of tiny, transparent fiber strands. Because light is the fastest way to transmit data, fiber-optic internet is incredibly fast, and results in a high-quality and reliable connection. It can provide connections of up to 1 Gbps, and this is expected to get even higher over time. Fiber is an expanding technology that will soon become more widely avalible.

Cable internet is about as common as DSL. It uses the same coaxial cables that transmits TV service to carry a high-speed internet connection. Using a modem, you can connect to these cable lines and enjoy a high-speed, uninterrupted data connection. Cable internet speeds can be up to 940 Mbps for downloading and up to 50 Mbps for uploading.

Wireless internet is available via satellite. It’s most common in rural areas lacking the infrastructure of wired internet (DSL, cable or fiber) and is typically provided by wireless phone companies.

Satellite internet transmits data directly from a satellite orbiting the Earth. It’s not as fast or consistent as other types of broadband internet, but it can be used anywhere in the world. Satellite speeds for downloading are usually between 25 Mbps to 100 Mbps,  with an average of 25 Mbps for uploading. 

What's the difference between broadband and WiFi?

Broadband is a type of high-speed internet connection, while WiFi refers to an in-home wireless connection. Once you have broadband service, it's converted to a wireless signal in your home from a modem to a wireless router, allowing you to connect multiple devices wirelessly to the internet.

How do I get a broadband internet connection?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only SGD 41.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (134)

What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input, verification, or decision making?

autonomous system

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)

firewall.

Networks that use electrical lines are sometimes called ________.

power-line networks

The most common form of computer crime is theft.
a. True
b. False

TRUE

Downloadable software extensions that add new features to a browser are known as ________.

plug-ins

Asynchronous communication is when the sender and recipient
a. directly connect to share files.
b. do not use the same operating system.
c. do not have to be online at the same time.
d. use different software but are able to communicate through the Internet.

c. do not have to be online at the same time

A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web site.

phishing

All of the following statements are true EXCEPT:
a. Wireless networks are convenient for people on the move.
b. Wireless networks are easier to install because they don't require drilling or digging.
c. Wireless networks use radio transmitters.
d. Wireless networks are faster than wired networks.

Wireless networks are faster than wired networks.

T3 connections transmit data at this speed:

45 Mbps

A ________ stores data and software that can then be shared by several users.

file server

Adobe Reader and Adobe Acrobat display PDF documents.
a. True
b. False

TRUE

One example of a synchronous method of communication is...

instant messaging.

The following are all examples of broadband access EXCEPT ________.
a. DSL
b. cable
c. satellite
d. dial-up

Dial-Up

What is the name of the storage technology that enables multiple hard disks to operate as single logical units?

RAID

All of the following are essential components of every computer system EXCEPT:

Networks

The majority of computer crimes are committed by

Company Employees

When a business can legally copy software to all of the computers they own, the company has a ________ license.

Site

The primary difference between a LAN and a WAN is the

geographical area

Internet connections that work through the same network of coaxial cables that deliver television signals work through a ________ modem.

Cable

Which of the following domains is restricted?

.edu

Examples of broadband technologies include all of the following EXCEPT:
a. DSL.
b. dial-up.
c. fiber-optic.
d. All are broadband connections

Dial-Up

TCP/IP protocols define how information can be transferred between machines and how machines on the network can be identified with ________ addresses.
a. unique
b. similar
c. identical
d. multiple

unique

What markup language includes all of the features of HTML and includes customized tags that give information more meaning?

XML

According to the FBI, how much identity theft begins with email?
a. all
b. one-half
c. one-quarter
d. two-thirds

Two-thirds 2/3

All of the following are top-level domains EXCEPT ________.
a. .com
b. .net
c. .info
d. .bus

.bus

What is the major light principle fiberoptic cables are based on?

Total Reflection

Each unique Internet addresses had an applet.

FALSE

The Web was built with push technology.

FALSE

Bluetooth technology can reach a range of 10 meters.

TRUE

When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as

denial-of-service attack

Worms execute until

there is a lack of free memory or disk space

Many phone companies offer ________, a technology for bringing broadband connections to homes and small businesses by sharing the copper telephone lines that carry voice calls.

DSL

Combining other people's works in to one Web page is known as a podcast.

TRUE

A(n) ________ converts a message from digital to analog or from analog to digital.

Modem

A single fiber-optic cable can replace ________ copper telephone cables.

10,000

Smart cards and biometrics are two ways companies may add physical security to computer systems.

TRUE

A voice message must be converted to a(n) ________ signal so it can be stored on a computer's hard drive.

Digital

The Code Red worm attacked

Microsoft server software

Yahoo!, MSN, and AOL/Netscape are examples of ________.

Portals

Data traveling from a home computer to the Internet is called

Upstream Traffic

This IP address doesn't change every day:

static IP address

A ________ stores data and software that can then be shared by several users.

file server

After an HTML document is completed, it needs to be uploaded onto a ________ server before it's visible on the Web.

Web

The Telecommunications Act of 1996 prohibits employers from listening to their employees' phone conversations.

TRUE

Over ________ were spent by businesses and government to repair problems in regard to Y2K.

100 billion dollars

Each individual computer and networked peripheral attached to a LAN is a

Node

Computer forensics is a form of computer crime.

FALSE

In 1999, the Melissa virus was a widely publicized

Email Virus

Which of the following is NOT a true statement about IPv6?

IPv6 is supported on all machines

Networks that use electrical lines are sometimes called ________.

power-line networks

Most computer systems rely solely on ________ for authentication.

passwords

A(n) ________ server maintains look-up tables that map domain names to IP addresses.

DNS

The World Wide Web is a distributed browsing and searching system originally developed at ________.

CERN

________ uses high-bandwidth connections to communicate multimedia over wireless networks, but lacks true broadband speed.

3G

An autonomous system can assume almost complete responsibility for a task and minimizes risk because of its absolute reliability.

FALSE

Large organizations may operate a ________ network to connect its LANs and transmit data at more than 1 gigabit per second.

Backbone

A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly connect to an Ethernet network.

Port

Bandwidth is measured in bits.

TRUE

Information can be recovered from a hard drive even after file have been deleted.

TRUE

The name for harassment on the Internet is

cyberstalking

A hard-wired Internet connection through a LAN is called a(n) ________ connection.

dedicated

Broadband connections include all of the following EXCEPT:

telephone modems

If one attempts to send a message to an email address which does not exist, it will return to you, or ________.

Bounce

MMORPGs are

online role-playing games involving hundreds of thousands of players

Bill Gates was the original developer of the World Wide Web.

FALSE

The first part of a URL refers to the ________ that must be used to access information, for example http.

Protocol

The system of satellites used to determine any position on the Earth is known as

GPS

Net neutrality is the principle that Internet access should be free from restrictions related to the type of communication taking place on it.

TRUE

The typical computer criminal is a(n)

trusted employee with no criminal record

A ________ is a network of computers in a close physical area.

LAN

_______ is another term for millions of bits.

Megabits

A DSL connection can share signals with a telephone line.

TRUE

Of the following, which one is NOT a way to protect yourself from identity theft?

Make all online purchases with a debit card

When radio or TV broadcasts are streaming at the same time they are happening, it is called

Real-Time

TCP/IP was developed as an experiment in ________, connecting different types of networks and computer systems.

internetworking

In the Web address www.bbc.co.uk, "uk" is a(n) ________.

Country Code

To prevent loss of data during power failures, use a(n)

UPS

________ refers to the quantity of data that can be transmitted through a communication medium in a given amount of time.

Bandwidth

All e-mail addresses consist of a user name, followed by the @ sign, followed by a host address.

TRUE

Every host computer on the Internet has a(n) ________.

unique IP address

A ________ stores data and software that can then be shared by several users.

File Server

Bluetooth technology can reach a range of 10 meters.

TRUE

T1 and T3 connections are considered ________ connections.

Direct

_______ are hardware devices or software programs that direct messages as they travel between networks.

Routers

A ________ is a code embedded as a one-pixel graphics file in an email message which notifies the sender that the message was opened.

Web Bug

All of these are suggestions for safe computing EXCEPT:

Pirate Software

The .gov domain might be used by ________.

US Senate

Information from the Internet to the subscriber, called ________ traffic, sometimes approaches speeds similar to a T1.

Downstream

A content-management system allows users to edit Web sites without having to deal with HTML and FTP.

TRUE

To register a business name and create a unique URL, a business pays a fee that goes to ________.

domain name registry company

In a client/server model, a client program ________.

asks for information

A(n) ________ network is often used to set up a temporary communications system that requires no centralized router.

Mesh

________ is the measurement of things such as fingerprints and retinal scans used for security access.

Biometrics

A(n) ________ cable uses light waves to transmit multimedia and voice data.

fiber-optic

________ is defined as any crime completed through the use of computer technology.

Computer Crime

Experts debate whether Internet addiction is a true addiction or simply a compulsion.

TRUE

In the 1970s, Xerox developed ________, which continues to be a popular networking architecture.

Ethernet

In what decade was ARPANET developed?

1960s

Which of the following is a popular scripting language for programming Web servers?

PHP

Which type of virus uses computer hosts to reproduce itself?

Worm

The Internet is controlled by ________.

no one in particular

Another name for the original Ethernet standard is ________.

10BASE-T Ethernet

A public key is only available to the user originating a message.

FALSE

T1 connections transmit data at this speed:

1.5 Mbps

Placing a phone call pretending to be someone else, in order to trick someone into doing something is also known as

Spoofing

Using a PC to copy software or data from a server, is known as

Downloading

What is a coaxial cable made of?

Mostly copper and aluminum

The Digital Millennium Act of 1998 allows users copying music CD content for personal use, but not DVD content.

TRUE

RSS-reading applications which periodically visit Web sites, examine the feeds, and display new content are known as ________.

Aggregators

The digital divide separates people in the world with access to technology and digital information from those who do not.

TRUE

The most widely used data recovery technique is making regular backups.

TRUE

The latest version of the Internet Protocol is IPv9.

FALSE

The more secure an authentication system gets, the more __________ it becomes.

Inconvenient

The protocol used to transfer Web pages is ________.

http

Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?

Melissa

________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or eavesdropping.

VPN

The fastest Ethernet devices today follow the ________ standard.

Gigabit Ethernet

Software programs that close potential security breaches in an operating system or application are known as

Security Patches

"Cracker" is the correct term for the term "hacker" we use today.

TRUE

Which of the following is an example of social engineering?

Spoofing

Remote access means that a(n)

user is connecting to a network through a phone line, television cable, or wireless link

________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps speeds to a 25-square mile area.

WiMAX

When the term "hacker" came to be in the sixties, it was meant for evil programmers.

FALSE

The backbone of the Internet is made up of physical connections between specific locations?

TRUE

A personal area network is possible because of the wireless technology known as

Bluetooth

A Web server receives incoming mail, stores it, and provides it to the email client program when requested.

FALSE

Most email messages are junk email, also known as

SPAM

Using deception to get individuals to reveal sensitive information is also known as a(n) ________ attack.

social engineering

What is the name of an application program that gathers user information and sends it to someone through the Internet?

Spybot

From the ground, a GPS ________ interacts with signals from a satellite to determine its position.

Reciever

Web authoring software includes all of the following EXCEPT ________.

Adobe Acrobat

Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server.

POP

All of the following are advantages of using a computer network EXCEPT that it

promotes independence so users have exclusive control over their own data and applications.

When you visit certain Web sites, spyware may be automatically downloaded. This is called a

drive-by download

Sets with similar terms

Digital Planet: Tomorrows Technology and You ch. 8…

63 terms

WRJOIV

IT exam

98 terms

andria_garza

CMPE 3 Final

54 terms

dakota_marquel

ass

120 terms

aashywashy

Sets found in the same folder

Personal Computers

47 terms

miiszxuy3nx3

Personal Computers Chapter 8

57 terms

miiszxuy3nx3

Intro to Computing Final Exam Review

288 terms

hpinocci

IS EXAM 3

208 terms

hcleeee

Verified questions

COMPUTER SCIENCE

Let the rotational closure of language A be $R C(A)=\{y x | x y \in A\}$. a. Show that for any language A, we have RC(A)=RC(RC(A)). b. Show that the class of regular languages is closed under rotational closure.

Verified answer

COMPUTER SCIENCE

Write a program with a loop that lets the user enter a series of integers. The user should enter −99 to signal the end of the series. After all the numbers have been entered, the program should display the largest and smallest numbers entered.

Verified answer

COMPUTER SCIENCE

T F You can use the new operator to dynamically allocate an instance of a class.

Verified answer

COMPUTER SCIENCE

A palindrome is a nonempty string over some alphabet that reads the same for ward and backward. Examples of palindromes are all strings of length 1, civic, racecar, and aibohphobia (fear of palindromes). Give an efficient algorithm to find the longest palindrome that is a subsequence of a given input string. For example, given the input character, your algorithm should return carac. What is the running time of your algorithm?

Verified answer

Recommended textbook solutions

Which of the following broadband technologies is the fastest

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which of the following broadband technologies is the fastest

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which of the following broadband technologies is the fastest

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which of the following broadband technologies is the fastest

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

Policing 302: chapter 2

10 terms

klawre2

DPS Road Rules 1

10 terms

jdeverna04

8.1-8.3 gov study guide

21 terms

nettiephilips

Driver's Ed Test Review Flashcards #3

34 terms

Joe_Cenizal

Related questions

QUESTION

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.

15 answers

QUESTION

a small network that consist of devices connected by Bluetooth, such as a smartphone and a computer is referred to as a

3 answers

QUESTION

What is the standard Internet protocol that provides the technical foundation for the public Internet?

8 answers

QUESTION

Bob Silver loves playing a game called World of Warcraft where he has the capability to create his own character and even his own life-like environment. Which AI system would you categorize World of Warcraft?

10 answers