Prepare a lan from a set of stand-alone computers, Computer Networking

Assignment Help:

Question 1:

Describe the following terms in your own words:
a. Internet
b. WWW
c. Intranet
d. Extranet
e. VPN

Question 2:

When the hotel completes a contract, the customer is asked to fill in a data capture form that asks about their satisfaction with aspects of the job. The intention is that the data on the forms should be input using OMR techniques.

i. Describe term OMR.

The customer data contains some personal information.

ii. Describe why legislation exists to protect this kind of data.

iii. Explain measures that are likely to be included in this legislation.

Question 3:

a. Describe the difference between a wide area network (WAN) and a local area network (LAN).

b. (i) State three pieces of hardware that are needed to create a LAN from a set of stand-alone computers.

(ii) Describe why the communication over a WAN differs from that across a LAN and state how the hardware necessary for communication would differ from that used in part (i).

c. By drawing a diagram, or otherwise, explain a ring network and state an advantage that a ring network has over a bus network.


Related Discussions:- Prepare a lan from a set of stand-alone computers

Describe the specific ip-qos schemes, State how the different IP-QoS needs ...

State how the different IP-QoS needs for controling traffic, data and voice applications can be supported in your technology choice from Q7. Describe the specific IP-QoS schemes -

Multiple activity charts, A multiple activity chart records the related ...

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between

Undesirable sharing - fundamentals of networks, Undesirable Sharing ...

Undesirable Sharing With  the good  comes  the bad  while  networking  allow  the easy  sharing  of useful  information it also  the sharing  of undesirable  data. One sign

What are the various security measures, What are the various security meas...

What are the various security measures A matter of prime concern to companies is the overheads in the form of huge investment on extra hardware and software. It is quite possi

Determine the level of fibre channel standard, Determine the level of Fibre...

Determine the level of Fibre Channel standard The Fibre Channel standard is organized into five levels: FC-0: The Physical Interface and Media Level handles a variety of phy

Describe mail access protocols, Q. Describe Mail Access Protocols? Mai...

Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited

What are the disadvantages of ospf protocol, Disadvantages of OSPF protocol...

Disadvantages of OSPF protocol i) Single Area ii) High Hardware Requirements iii) Troubleshooting

Operating systems, What everyday object is the same as The RAM function to ...

What everyday object is the same as The RAM function to the computer?

Ftp and ftp application layer protocols, What is the difference between TFT...

What is the difference between TFTP and FTP application layer protocols? Ans) TFTP - Trivial File Transfer Protocol A stripped down version of FTP, easy to use and fast. TFTP

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd