Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1) Which of the following protocols are exs of TCP/IP transport layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP

problem2) Which of the following protocols are exs of TCP/IP network access layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

problem3) The process of HTTP asking TCP to send some data and make sure that it is received correctly is an ex of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. The OSI model
d. All the other answers are correct.

problem4) The process of TCP on one computer marking a segment as segment 1, and the receiving computer then acknowledging the receipt of segment 1, is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. The OSI model
e. None of these answers are correct.

Qustion5) The process of a web server adding a TCP header to a web page, followed by adding an IP header, and then a data link header and trailer is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. The OSI model
d. All of these answers are correct.

problem6) Which of the following terms is used specifically to identify the entity that is created when encapsulating data inside data link layer headers and trailers?

a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
f. None of these—there is no encapsulation by the data link layer.

problem7) Which OSI layer defines the functions of logical network-wide addressing and routing?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem8) Which OSI layer defines standards for cabling and connectors?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem9) Which OSI layer defines standards for data formats and encryption?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem10) Which of the following terms are not valid terms for the names of the seven OSI layers?

a. Application
b. Data link
c. Transmission
d. Presentation
e. Internet
f. Session

Fill In The Blanks:

1. Number of links to connect n nodes in a mesh topology is = _______.

2. Mesh Topology is _______ flexible and has a ________ expandability

3. In BUS topology, at each end of the bus is a ____________, which absorbs any signal, removing it from the bus. 

4. In BUS topology, One could easily add any new node or delete any node with-out affecting other nodes; this makes this topology easily _____________. 

5. _________ and ______________ would force a maximum length of shared medium which could be used in BUS topology. 

6. The two alternatives for the operation of the central node in STAR topology are: __________ and ___________. 

7. In Ring Topology, the links are _____________; that is, data are transmitted in __________ direction only and all are oriented in a same way

8. In Ring Topology, Repeater works in 3 modes: ____________, _____________ and ______________.

9. ___________ topology could be considered as an extension to BUS topology.

10. ______________ is appropriate for use in star and ring topologies

11. Coaxial cable is appropriate for use in __________ topology.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93001
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Corporate profile cybersecurity risk profilefor this paper

Corporate Profile: Cybersecurity Risk Profile For this paper, you will construct a cybersecurityrisk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which inclu ...

As the chief technology officer cto at your company you are

As the Chief Technology Officer (CTO) at your company you are being asked by the Chief Executive Officer (CEO) to propose a technology upgrade solution to move your company's corporate offices into the 21st Century. Once ...

Goals1 to understand the challenges of protocol design2 to

Goals: 1. To understand the challenges of protocol design. 2. To discover and appreciate the challenges of developing complex, real-world network applications. 3. Make sense of real-world sockets programming APIs. 4. To ...

Assignment submissionyour assignment must be in microsoft

Assignment Submission Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1 -Cryptographic Operations with GPG Objective: gain experience ...

Assignment a complete home networkdevelop an entire home

Assignment: A Complete Home Network Develop an entire home network with a budget of $5,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a br ...

Ten immutable laws of security please respond to the

"Ten Immutable Laws of Security" Please respond to the following: • From the e-Activity, read the full article posted at https://technet.microsoft.com/en-us/library/hh278941.aspx titled "Ten Immutable Laws of Security (V ...

Task sheettask scenarioan information security management

Task Sheet TASK SCENARIO: An information security management system (ISMS) represents a systematic approach to designing, implementing, maintaining, and auditing an organization's information system security objectives. ...

Assignment xyz company troubleshooting and maintenance

Assignment: XYZ Company Troubleshooting and Maintenance Plan In XYZ Company is heavily invested in e-Commerce with all retail locations' Point of Sale systems connected so that it maintains a dynamic inventory and automa ...

Instructionsresponses to each question are expected to be

Instructions: Responses to each question are expected to be between 100 and 200 words. Will not be penalized for exceeding 200 words, but they should strive to reach a minimum of 100 words when constructing the response ...

Write answer to each question - two paragraphs for each

Write answer to each question - two paragraphs for each question with single spaces. Format : Single Spaced Strong Paragraphs Two paragraphs for each question Times New Roman - 12 subject: Data Communication and Network ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate