题目内容

Which form of FTTX configuration uses existing coaxial or twisted-pair infrastructure to provide last mile service ( )?

A. FTTH.
B. FTTN.
C. FTTLA
D. ALL ABOVE

查看答案
更多问题

Services rely on FTTC except ( ).

A. Power line networking deployments
B. Power over Ethernet.
C. High-speed internet.
D. Wireless Wi-Fi technology

Factors would make FTTC deployments more likely in areas uneconomic except ( )?

A. Increased competitive cost pressure
B. Smart grid deployment requirements.
C. Hybrid networking tools
D. Load Balance in broadband.

Information technology security sometimes referred to ( )?

A. Computer security
B. Automatic security
Content security.
Data security.

In information technology security field, computer could be treat as ( ).

A. Computing devices with network connected only.
B. Typical device which is unmovable such as home desktop.
C. Any device with a processor and some memory.
D. Any device with a processor and storage.

答案查题题库