Suppose you have a high-capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider's obtaining free network access by intruding into your wireless network

What will be an ideal response?

(a)
Visibility
of
your
own
personal
data
on
your
network.
(b)
Potential
for
modification
of
your
own
personal
data.
(c)
Potential
flooding
of
your
network,
preventing
your
having
full
use
of
the
connection
for
which
you
are
paying.
(d)
Legal
and
ethical
reasons—for
example,
you
leased
your
connection,
perhaps
having
signed
some
agreement
that
it
was
for
your
family's
own
residential
use
only.

Computer Science & Information Technology

You might also like to view...

A toolbar with common formatting buttons is the ________

A) KeyTip B) Clipboard C) Mini toolbar D) ScreenTip

Computer Science & Information Technology

If a language is portable, what does that imply?

A. It can be used on a laptop. B. It can be compiled and run on all types of machines. C. It can be compiled and run on anything but Mac OS. D. There are no portable languages.

Computer Science & Information Technology