Prepare a lan from a set of stand-alone computers, Computer Networking

Assignment Help:

Question 1:

Describe the following terms in your own words:
a. Internet
b. WWW
c. Intranet
d. Extranet
e. VPN

Question 2:

When the hotel completes a contract, the customer is asked to fill in a data capture form that asks about their satisfaction with aspects of the job. The intention is that the data on the forms should be input using OMR techniques.

i. Describe term OMR.

The customer data contains some personal information.

ii. Describe why legislation exists to protect this kind of data.

iii. Explain measures that are likely to be included in this legislation.

Question 3:

a. Describe the difference between a wide area network (WAN) and a local area network (LAN).

b. (i) State three pieces of hardware that are needed to create a LAN from a set of stand-alone computers.

(ii) Describe why the communication over a WAN differs from that across a LAN and state how the hardware necessary for communication would differ from that used in part (i).

c. By drawing a diagram, or otherwise, explain a ring network and state an advantage that a ring network has over a bus network.


Related Discussions:- Prepare a lan from a set of stand-alone computers

Packet, a transperent switch is inserted between two local area networks AB...

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Illustrate the bellman-ford algorithm, Illustrate the Bellman-Ford algorith...

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

Metropolitan area network ( man)- fundamentals of networks , Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE Metropolitan area Network ( MAN) Metropoli

Explanation of internetworking terms and concepts, Question: (a) Outlin...

Question: (a) Outline the main interactions that take place when a user requests a valid web resource in the Address Bar of a modern web client till the resource is eventually

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Define what is the mac address, When you move the NIC cards from one PC to ...

When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well? Yes, that's because MAC addresses are hard-wired into the NIC circuitry, n

What is man, What is MAN? MAN - Metropolitan Area Networks. MAN is b...

What is MAN? MAN - Metropolitan Area Networks. MAN is bigger than a LAN and as its name implies, covers the area of a single city. MANs rarely extend beyond 100 KM and frequ

Inductor, #clasification of inductor

#clasification of inductor

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd