Prepare a lan from a set of stand-alone computers, Computer Networking

Assignment Help:

Question 1:

Describe the following terms in your own words:
a. Internet
b. WWW
c. Intranet
d. Extranet
e. VPN

Question 2:

When the hotel completes a contract, the customer is asked to fill in a data capture form that asks about their satisfaction with aspects of the job. The intention is that the data on the forms should be input using OMR techniques.

i. Describe term OMR.

The customer data contains some personal information.

ii. Describe why legislation exists to protect this kind of data.

iii. Explain measures that are likely to be included in this legislation.

Question 3:

a. Describe the difference between a wide area network (WAN) and a local area network (LAN).

b. (i) State three pieces of hardware that are needed to create a LAN from a set of stand-alone computers.

(ii) Describe why the communication over a WAN differs from that across a LAN and state how the hardware necessary for communication would differ from that used in part (i).

c. By drawing a diagram, or otherwise, explain a ring network and state an advantage that a ring network has over a bus network.


Related Discussions:- Prepare a lan from a set of stand-alone computers

What is the routing metric used by igrp, IGRP is a distance vector routing ...

IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255, and it uses a combination of variables to verify a composite metric. IGRP has an adminis

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol

Explain a transaction server, With a transaction server, the client request...

With a transaction server, the client requests remote procedures that reside on the server with an SQL database engine. These remote processes on the server execute a group of SQL

What is protocol data unit, What is Protocol Data Unit? The data unit i...

What is Protocol Data Unit? The data unit in the LLC level is known as the protocol data unit (PDU). The PDU having of four fields a destination service access point (DSAP), a

Commands and responses - application layer, Commands SMTP uses comma...

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re

Parts count method, PARTS COUNT METHOD This prediction method is appli...

PARTS COUNT METHOD This prediction method is applicable at preliminary stages, during bid proposal and early design phases; when insufficient information is available regardin

Relevance and protection regarding dns attacks, Relevance and Protection re...

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd