Which form of FTTX configuration uses existing coaxial or twisted-pair infrastructure to provide last mile service ( )?
A. FTTH.
B. FTTN.
C. FTTLA
D. ALL ABOVE
查看答案
Services rely on FTTC except ( ).
A. Power line networking deployments
B. Power over Ethernet.
C. High-speed internet.
D. Wireless Wi-Fi technology
Factors would make FTTC deployments more likely in areas uneconomic except ( )?
A. Increased competitive cost pressure
B. Smart grid deployment requirements.
C. Hybrid networking tools
D. Load Balance in broadband.
Information technology security sometimes referred to ( )?
A. Computer security
B. Automatic security
Content security.
Data security.
In information technology security field, computer could be treat as ( ).
A. Computing devices with network connected only.
B. Typical device which is unmovable such as home desktop.
C. Any device with a processor and some memory.
D. Any device with a processor and storage.