Prepare a lan from a set of stand-alone computers, Computer Networking

Assignment Help:

Question 1:

Describe the following terms in your own words:
a. Internet
b. WWW
c. Intranet
d. Extranet
e. VPN

Question 2:

When the hotel completes a contract, the customer is asked to fill in a data capture form that asks about their satisfaction with aspects of the job. The intention is that the data on the forms should be input using OMR techniques.

i. Describe term OMR.

The customer data contains some personal information.

ii. Describe why legislation exists to protect this kind of data.

iii. Explain measures that are likely to be included in this legislation.

Question 3:

a. Describe the difference between a wide area network (WAN) and a local area network (LAN).

b. (i) State three pieces of hardware that are needed to create a LAN from a set of stand-alone computers.

(ii) Describe why the communication over a WAN differs from that across a LAN and state how the hardware necessary for communication would differ from that used in part (i).

c. By drawing a diagram, or otherwise, explain a ring network and state an advantage that a ring network has over a bus network.


Related Discussions:- Prepare a lan from a set of stand-alone computers

Determine in detail about the world wide web, Determine in detail about the...

Determine in detail about the world wide web The latest has been Web commerce that is currently making big news, and many businesses are setting up electronic shops on the Inte

Layer, what is end to end and host to host?

what is end to end and host to host?

Task of changing the ip address, 1. Bob has been given the task of changing...

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is 10.10.10.2/8 the new IP address

How does a firewall protect, How Does a Firewall Protect Firewalls work...

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Control flow in distributed enrollment protocol , Control Flow: Once the c...

Control Flow: Once the client has established a network connection with a server, the server must instantiate a new, empty, BasicEnrollmentManager implementation for this client,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd