Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) Data is distorted during transmission by electrical interferences called as:

A. Electrical problem
B. Virus
C. Communication Gap
D. Noise

problem 2) TCP/IP stand for:

A. Transmission Control Protocol/ Internet Protocol
B. Transmission Communication Protocol/ Internet Protocol
C. Transmission Connection Protocol/ Internet Protocol
D. Transmission Communication Protocol/ Internet Program

problem 3) Circuit switching is also termed as:

A. Sequence-oriented networks
B. Transmission-oriented networks
C. Connection-oriented networks
D. Switching-oriented networks

problem 4) PSTN is what kind of network?

A. Circuit switched network
B. Public switched network
C. Packet switched network
D. Private switched network

problem 5) Which of the following search engine is focus on subject-specific website:

A. Meta Search Engine
B. Specialised Search Engine
C. Specific Search Engine
D. None of the above

problem 6) What does URL stands for:

A. United Reform Locator
B. Uniform Resource Locator
C. Unified Resource Locator
D. United Resource Locator

problem 7) A _____ _______ is whereby dedicated servers for various services and servers are found at different geographical places:

A. Centralised Architecture
B. Distributed Architecture
C. Decentralised Architecture
D. None of the above

problem 8) The internet is based on a:

A. Peer-to-peer Architecture
B. Centralised Client/Server Architecture
C. Decentralised Client/Server Architecture
D. Distributed Client/Server Architecture

problem 9) FTP stands for:

A. File Transaction Protocol
B. File Transaction Procedure
C. File Transfer Procedure
D. None of the above

problem 10) Which of the following kinds of connection enables the client to use modem to connect to the ISP over a normal telephone line:

A. Dial-up
B. Leased Line
C. Wi-Fi

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95820

Have any Question? 

Related Questions in Computer Network & Security

Words 400-500 wordsharvard referencing4 references or

Words: 400-500 Words Harvard Referencing 4 References or more At least one website reference Must have in-text citation for all the references used Compare 2-tier and 3-tier client/server system configurations and analyz ...

Ten immutable laws of security please respond to the

"Ten Immutable Laws of Security" Please respond to the following: • From the e-Activity, read the full article posted at titled "Ten Immutable Laws of Security (V ...

A cipher can be created by using a keyword for example if

A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows: Method I. Write the word "statistic" without the repeated letters. Then complet ...

Network troubleshooting knowledgebasecreate knowledgebase

Network Troubleshooting Knowledgebase Create knowledgebase documentation/article(s) covering the topics below. These would be documents that you could store in a department knowledgebase that would provide a quick refere ...

Assignment xyz company troubleshooting and maintenance

Assignment: XYZ Company Troubleshooting and Maintenance Plan In XYZ Company is heavily invested in e-Commerce with all retail locations' Point of Sale systems connected so that it maintains a dynamic inventory and automa ...

You will be given an ip address block 183200100024 your

You will be given an IP address block Your task is to devise a feasible network addressing scheme for a large company with a number of geographically distributed offices around the country. There are fi ...

Management is pleased with the progress that has been made

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, it was asked, has everything been done that is possib ...

Describe the role and purpose of the router firewall dmz

Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network - include a specific focus on how each helps protect the network from being hacked from both inside and outside the network. ...

Exercise sheet1 let l be a 9 bit lfsr with connection

Exercise Sheet 1. Let L be a 9 bit LFSR with connection polynomial c(x) = x 8 + x 4 + x + 1 and seed s = [1, 0, 1, 1, 1, 0, 0, 1, 0] (i.e. the last bit of s, 0, is the next keystream bit). Compute 10 bits of the keystrea ...

Assignmentoverviewyou will provide a detailed network

Assignment Overview You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria: • Each Classroom Computer Lab will be on a separate network ( ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate