1. Contact the network expert at your school or place of work. Find out which topology, communication links, and configuration are used in the network. IS it a LAN, MAN, or WAN?
-LAN or Local Area Networks is the type of topology communication links and configuration is used in our school. Because LAN covers only small geographical areas like in our school.
2. Discuss the primary difference between a bridge and a gateway and give real life example that uses each one?
3. Name three commercially-available operating systems for LANs and their vendor names. Explain the topology that each designed to manage and describe the access protocol it uses.
4. Explain the similarities and differences between a file infecter virus and a macro virus, including the types of files each infects.
File infector virus
Virus that infects other files on a system or network
Macro virus (computing)
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
5. Give three examples of inadequate passwords and explain why each would be a poor choice to protect a system from unauthorized users.