Question

State the difference between a local area network (LAN) and a wide area network (WAN).                            &

State the difference between a local area network (LAN) and a wide area network (WAN).                                 (Ch. 6)

Group of answer choices

1. A WAN is a group of computers and network devices connected together usually within the same building, while a LAN connects several WAN’s and may be limited to a corporation or organization or accessible to the public.

2.A LAN is a communication protocol for Wide Area Network (WAN) using the same media interfaces over longer distances, including packet switching networks.

3.A LAN is a group of computers and network devices connected together usually within the same building, while a WAN connects several LAN’s and may be a corporation, organization, or country accessible by the public.

4.A LAN refers to your “internet cable” or physical connection whereas WAN is usually a wireless connection that is convenient and at faster speeds.

5.A LAN is a unique communication protocol for a FLAN (Fusion Latin Area Network), while a Wide Area Network (WAN) uses the same media interfaces as FLAN over longer distances, including specially formulated packet switching networks called CUSTARD

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The correct option is 3.A LAN is a group of computers and network devices connected together usually within the same building, while a WAN connects several LAN’s and may be a corporation, organization, or country accessible by the public as LAN is a local area network which connects systems within a small area like home, school or office whereas WAN is Wide area network and consists of multiple LANs and covers a wider area.

Do give a positive rating if you think this answer helped

Add a comment
Know the answer?
Add Answer to:
State the difference between a local area network (LAN) and a wide area network (WAN).                            &
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The most common protocol in use is TCP/IP, which is a group of protocols that functions...

    The most common protocol in use is TCP/IP, which is a group of protocols that functions together to permit __________ communication. telephone email LAN web-based __________ is a type of network software that allows administrators to define the location of data storage in a network and determine user access to that data. Wired software User management software Application software File management software Which of the following describes extranet? A private LAN only accessible to those with permissions A LAN that...

  • ANY ANSWER IS GREATLY APPRECIATED QUESTION 1 Match each WAN technology with the correct connection type...

    ANY ANSWER IS GREATLY APPRECIATED QUESTION 1 Match each WAN technology with the correct connection type (more than one technology can use the same connection type)                 Frame Relay                 ATM                 ISDN                 T1                 T3 A.            Packet switched connection B.            Packet switched connection C.            Circuit switched connection D.            Dedicated leased line E.            Dedicated leased line QUESTION 2 Why is it that a service provider could be considered the most important WAN component?                                 They will be the ones...

  • 8. What are the relationships that the relational database is named for? Relationships between entities Relationships...

    8. What are the relationships that the relational database is named for? Relationships between entities Relationships between databases b. Relationships between rows and Relationships between fields and columns records 9. A characteristic or quality describing an entity is called a (n): a. attribute c. Field b. Key field d uple __10. In a table for customers, the information about a single customer would reside in a single: a TOW c. field b. table. d. column 11. The device that acts...

  • Group B Word Pool IL. A computer application that allows the user to enter demographic information,...

    Group B Word Pool IL. A computer application that allows the user to enter demographic information, schedule appointments, maintain lists of computer network data server local area network dumb terminal. insurance payers, perform billing tasks, and generate reports 12 Asystem that links personal computers and peripheral devices to share information and resources router practice management software redundancy Ethernet wide area network 13. Peripheral computer hardware that connects to the router to provide Internet access to the network or computer modem...

  • I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the...

    I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the Link layer in TCP/IP model. Figure 1-11 shows four steps, in the first step Larry encapsulates the IP packet between an Ethernet header and Ethernet trailer, creating an Ethernet frame. Larry encapsulates the IP packet, what does this mean? Is it like compressing a file into a zip and compressing the IP packet into a frame? I've read the previous pages about the upper...

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • Consider the Textbook Management Focus 9-4 below. What other alternatives do you think Cisco considered for their wide a...

    Consider the Textbook Management Focus 9-4 below. What other alternatives do you think Cisco considered for their wide area networks (WANs)? Why do you think they did what they did? For years, Cisco Systems Inc. had supported its Europe/Middle East/Africa (EMEA) offices with a series of star networks connected to stars (called a hub-and-spoke design). The WAN core was three offices (London, Amsterdam, and Brussels) connected to each other in a full mesh using OC-3 circuits. Each of these three...

  • F 2. Data mining provides management with daily operational reports: True or False? 3. A Data...

    F 2. Data mining provides management with daily operational reports: True or False? 3. A Data Base Management System (DBMS) function is to-provide a company with F 1. A computer's Operating System (O/s) is always in volatile mode: True or access and control of its Operating System software 4. A computer's Operating System performs the Data Mining function: True or False? ru 5. Data travels via the Internet at 186,282 megabytes per second: Trus or False? 6. The World Wide...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT