1. What are the different types of fiber connectors? Cite their advantages and disadvantages.
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________.
2. List down the different types of connectors.
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
3. What are the characteristics of UTP, STP and coaxial cable?
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
What are the key factors to consider when planning the configuration of a computer system?
List at least five types of network topologies commonly used in computer networks.
Name three types of IP addressing methods used in network configuration.
What are the essential steps involved in configuring a wireless network?
List five common security measures used to protect a computer system.
What are the main components of a motherboard?
Enumerate the types of cables typically used in networking.
List three types of operating systems commonly used for computer system configuration.
Mention four common types of network devices used in configuring a network.
Identify five factors that affect network performance.
Discuss the process of planning and preparing a network configuration for a small office environment.
In your essay, describe the steps involved in designing the network, selecting the appropriate hardware (such as routers, switches, and cables), addressing security concerns, and setting up the network. Also, explain how to ensure the network can scale as the business grows.
Explain the importance of security in the configuration of computer systems and networks, and describe the best practices that should be followed to safeguard both.
Your essay should discuss the potential risks and threats to computer systems and networks, such as viruses, unauthorized access, and data breaches. Include a detailed explanation of the best security practices (such as using firewalls, encrypting data, and regular software updates) and how they protect the integrity and confidentiality of systems and data.