Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
COMPUTER & NETWORK TECHNOLOGY SECTION AAnswer 2 questions (out of 4). A1All information inside a computer is represented in the form of strings of 1s and 0s.There are many ways of representing numeric values in everyday life; for example,Integer 123Negative integer -32Fraction 0.123Floating-point 1.124 x 10-6How is a computer able to represent each of these values in binary form? Explain the advantage and disadvantage of each system of numeric representation and its limitations.Your answer should include considerations such as word-length, accuracy, range, and the complexity of performing operations in each system.A2a) The inner (dot) product S of two vectors A and B is defined as S =Σai.bi for i = 0 to n-1; that is, S = a0.b0 + a1.b1 + … + an-1.bn-1Assuming that vectors A and B are located in main memory, write an assembly language program to calculate S. Note that a vector is a sequence of consecutive values; for example, A = a0, a1, a2, … , an-1.You may use any assembly language, although you must explain the action of each instruction you use. Your program should be documented. b) Year by year, microprocessors have become faster and faster. Part of the increase in speed is due to advances in semiconductor manufacturing technology and part of the increase in speed is due to advances in computer architecture and organization. Briefly explain two of the advances in computer architecture and organization that have significantly improved computer performance. A3Computer networks are associated with various types of hardware. A modern home or office may include the following items of hardware:ModemHubWi-Fi routerExplain what role each of these devices performs in a typical installation and why they are needed to provide safe networking facilities.A4a) Computer performance is regarded as important today; users want the best performance possible for the computers they buy.Discuss the factors that contribute to the overall performance of a desk-top computer.Explain how the performance of computers is measured today and how different computers are compared. Your answer should include several ways by which computer performance can be measured and you should comment on the accuracy/relevance of each of the measurement techniques. b) Why has power dissipation (i.e., heat) become one of the principal limiting factors of modern computer performance? SECTION BAnswer 5 questions (out of 8). B5a) Briefly explain the role of TCP/IP in network management.b) Describe the different layers of the TCP/IP model. B6a) Describe THREE security threats that computer users face today. b) Give THREE measures that can be taken to deal with these threats. B7 Describe the characteristics and typical uses of the following:a) VLAN b) Intranet B8 Briefly describe the features and uses of the following:a) DRAM b) USB drive (flash memory) c) Hard disk B9 Briefly describe the features and uses of the following in the context of networking:a) RJ45 b) HDMI c) Fibre optics d) CAT5 B10 What would an IT technician understand by the following terms:a) Bandwidth b) Ipconfig c) FAT32 d) Proxy server B11a) Explain why a hierarchical file structure is needed in a computer system. b) Describe THREE file formats that might be used in a typical computer. B12 Describe the key functions of a modern operating system.
What is the encryption algorithm? How secure is it?
Is the size of the ARP packet fixed? Explain. What is the size of an Ethernet frame carrying an ARP packet? What is the broadcast address for Ethernet?
What are the limitations of powerline networks?
Your network is experiencing an excessive amount of pings to your network server. The pings are from outside the network.
Survey users at your site to determine if they send sensitive information in e-mail. Are users aware that SMTP transfers messages in ASCII.
In Bullnheimer et al. (1999a) the authors applied the ant colony optimization algorithm in several instances of the vehicle routing problem (VRP) extracted.
Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model
How would you utilize this information in the decision-making process to help the company grow?
Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram). Provide justifications for each element of your network design (numbers 1-4 above).
Find that distance with which the tasks are feasibly scheduled and Show the working of LDCR and MDCR protocol on the given message set
Depict a network topology graphical model of the initial environment of 10 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.
For this assignment you will analyze the performance of the HTTP and Ethernet protocols with Riverbed Modeler in a LAN depending on the number of client nodes.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd