Prepare a lan from a set of stand-alone computers, Computer Networking

Assignment Help:

Question 1:

Describe the following terms in your own words:
a. Internet
b. WWW
c. Intranet
d. Extranet
e. VPN

Question 2:

When the hotel completes a contract, the customer is asked to fill in a data capture form that asks about their satisfaction with aspects of the job. The intention is that the data on the forms should be input using OMR techniques.

i. Describe term OMR.

The customer data contains some personal information.

ii. Describe why legislation exists to protect this kind of data.

iii. Explain measures that are likely to be included in this legislation.

Question 3:

a. Describe the difference between a wide area network (WAN) and a local area network (LAN).

b. (i) State three pieces of hardware that are needed to create a LAN from a set of stand-alone computers.

(ii) Describe why the communication over a WAN differs from that across a LAN and state how the hardware necessary for communication would differ from that used in part (i).

c. By drawing a diagram, or otherwise, explain a ring network and state an advantage that a ring network has over a bus network.


Related Discussions:- Prepare a lan from a set of stand-alone computers

Circuit switched networks, Question 1 Write about                       Ci...

Question 1 Write about                       Circuit Switched Networks                       Packet Switched Networks Question 2 Write about                       Protocol Indep

Name the two types of oltp, a) TP lite , based on stored procedures. b)...

a) TP lite , based on stored procedures. b) TP heavy , based on the TP monitors.

Routing and routed protocols, What is difference among routing and routed p...

What is difference among routing and routed protocols? Ans) i) Routing use for top path selection ii) Routed protocol carries on source and destination information.

#tit, objective practical questios answers

objective practical questios answers

State the example of security audit as case study, State the Example of sec...

State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain

Unused reserved - trannsport layer, Unused Reserved This  is a 6 bi...

Unused Reserved This  is a 6 bite field  reserved for future use.

Determine the term- cyberspace, Determine the term- Cyberspace The c...

Determine the term- Cyberspace The conceptual or virtual area where pages, data, images, and all the rest are stored. It is the area from where requests are accepted and ful

Verify passwords - ccna, Verify Passwords Step 1 : Telnet to the route...

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd