Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Data communication needs a sending device, a receiving device and a _________:

A. Network Administrator
B. Telephone Line
C. Server
D. Communication Channel

problem 2) A WAN spans normally:

A. Over a large area
B. From one room to another
C. Within a single building
D. None of the above

problem 3) Data transmission is meant in which format:

A. Analogue
B. Digital
C. Both of the above
D. None of the above

problem 4) ____ are attached to computer systems using USB or serial ports, and uses dial-up technology:

A. Internal Modems
B. External Modems
C. PCMCIA’s
D. NIC

problem 5) The two types of twisted pair are:

A. STP and UTP
B. SFP and UFP
C. STP and UFP
D. SFP and UTP

problem 6) ____ transmit data using light and are immune to electrical noise:

A. Twisted Pair
B. Coaxial Cable
C. Optical Fibre
D. None of the above

problem 7) A satellite receiving signals from the earth station is called as:

A. Upload
B. Download
C. Downlink
D. Uplink

problem 8) A device connected to network is referred to as:

A. Computer
B. Server
C. Node
D. Switch

problem 9) A ____ topology has central device for managing the network:

A. Ring
B. Star
C. Bus
D. Mesh

problem 10) Distortion in a signal is known as:

A. Phase
B. Frequency
C. Fluctuation
D. Noise

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96064

Have any Question? 


Related Questions in Computer Engineering

1 what is the most common form of violation of intellectual

1. What is the most common form of violation of intellectual property? How does an organization protect against it? What agencies fight it? 2. What are the various types of force majeure? Which type might be of greatest ...

1 which management groups are responsible for implementing

1. Which management groups are responsible for implementing information security to protect the organization's ability to function? 2. Has the implementation of networking technology created more or less risk for busines ...

A company develops a new security product using the extreme

A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, then add more code, then test, and continue this iteration. Every day, they test the ...

1 in the sandpile model the sand grains are distributed one

1. In the Sandpile model, the sand grains are distributed, one to each neighbor. Modify the model so that grains are distributed to neighbors randomly. How does this change the model behavior? 2. The Sandpile model exhib ...

An arithmetic expression can be stored in a binary search

An arithmetic expression can be stored in a binary search tree. Modify the BinarySearchTree class so that an expression such as 2 + 3 ∗ 4/5 can be properly evaluated using the correct operator precedence rules.

1 in an internet we change the lan technology to a new one

1. In an internet, we change the LAN technology to a new one. Which layers in the TCP/IP protocol suite need to be changed? 2. Assume that an application-layer protocol is written to use the services of UDP. Can the appl ...

1 why do many organizations ban port scanning activities on

1. Why do many organizations ban port scanning activities on their internal networks? Why would ISPs ban outbound port scanning by their customers? 2. What is an open port? Why is it important to limit the number of open ...

1 what do we mean when we say that a link-layer switch can

1. What do we mean when we say that a link-layer switch can filter traffic? Why is filtering important? 2. Which one has more overhead, a switch or a router? Explain your answer. 3. Which one has more overhead, a hub or ...

1 from the knowledge you have acquired in this chapter

1. From the knowledge you have acquired in this chapter about virtualization, discuss the future of virtualization as a business model. 2. Compare and contrast the security concerns in a virtual network infrastructure an ...

Standards are very important part of industry benchmarks

Standards are very important part of industry benchmarks, regulations, and quality systems.  Explain the following in details: The purpose and need of standards.  Give at least three example List at least three sets of U ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro