Recommended textbook solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Engineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions
C++ Programming: Program Design Including Data Structures7th EditionD. S. Malik 867 solutions Upgrade to remove ads Only A$47.99/year
Terms in this set (47)Network A ________ is a group of two or more computers, or nodes, configured to share information and resources. Ease of maintenance and administration Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? Network A ________ allows multiple users to connect to the Internet through one connection. Client/server ________ networks contain servers as well as computers that individual users access Peer-to-peer In a(n) ________ network, each node connected to the network communicates directly with every other node. 10 P2P networks become difficult to manage when they are expanded beyond ________ users Pan A ________ is a network used by one person connected via wireless media. Vpn A ________ uses the public Internet communications infrastructure to build a secure, private network. intranet A(n) ________ is used exclusively within a corporation or organization. authentication A(n) ________ server tracks who is logging on to the network as well as which All networks require at least two servers Which of the following is FALSE about servers? Files A(n) ________ server is a server that stores and manages files for network users. Queue A print server uses a print ________ as a software holding area for printing jobs Application When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer. Cluster Which of the following is NOT a common network topology? Protocol A ________ is a set of rules for how information and communication are exchanged. Token Ring networks use the ________ method to avoid data collisions Terminator The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is Bis Which of the following networks is most known for data collisions? Token A _____ is passed from computer to computer around the ring of a ring topology network. Star Which of the following is the most commonly used client/server network topology? Switch The star topology uses a central ________ to connect all network nodes. Ring If fair allocation of network access is a major requirement of the network, choose a(n) A method used to avoid data collisions What is CSMA/CD? Jam In a network that uses the star topology, the signal that is sent to indicate a signal collision is Hybrid A ________ topology is created when more than one topology is used to build a network. Star Which of the following networks has high scalability? Duplex For business networks, which of the following is NOT a main cable type? Cable diameter Which of the following is NOT a factor to consider when selecting network Emi Which of the following causes interference when a cable is exposed to strong electromagnetic fields? Fiber-optic ________ cable is NOT subject to electromagnetic interference or radio frequency interference. Cladding ________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. Fiber optic Which cable type is the most costly to install? Electromagnetic ________ interference is a type of signal interference in wired transmission HyperText transfer protocol Which is NOT a networking protocol? Network operating system A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. (It verifies that all information transmitted from the computer is correctly received by the) Which of the following is something a network adapter does NOT do? Ethernet The standard communications protocol used on most client/server networks is ______. Media access control What is another name for the physical
address assigned to each IP A(n) ________ address is the address external entities use to communicate with your network. Bridge Which of the following devices sends data from one collision domain to another? Routers ________ are devices used to send data between two networks. Firewall A ________ keeps your computer safe by confirming who is trying to access it. Routers ________ are often equipped to act as hardware firewalls. Screening Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. Bastion host A(n) ________ server is a heavily secured server located on a special perimeter network between a company's secure internal network and its firewall. Biometric Facial recognition is an example of ________ authentication. Sets with similar termsIntro to computers Ch 1247 terms M_Shelton TIA Chapter 12 Exam44 terms tseward Ch 1245 terms kathrynoliva MISY chapter 1229 terms jljacob Sets found in the same folderCHAPTER 1295 terms coleen1347 CHAPTER 1393 terms coleen1347 Technology in Action Chapter 12212 terms sarah_koch2 tech 746 terms kymdunca Other sets by this creatorChapter 1340 terms novelhellsing Chapter 11 (notes 1)54 terms novelhellsing Verified questions
COMPUTER SCIENCE Recall, in our discussion of the Church–Turing thesis, that we introduced the language $D=\{\langle p\rangle | p$ is a polynomial in several variables having an integral root}. We stated, but didn’t prove, that D is undecidable. In this problem, you are to prove a different property of D-namely, that D is NP-hard. A problem is NP-hard if all problems in NP are polynomial time reducible to it, even though it may not be in NP itself. So you must show that all problems in NP are polynomial time reducible to D. Verified answer COMPUTER SCIENCE The RC 4000 system, among others, has defined a tree of processes (called a process tree) such that all the descendants of a process can be given resources (objects) and access rights by their ancestors only Thus, a descendant can never have the ability to do anything that its ancestors cannot do. The root of the tree is the operating system, which has the ability to do anything. Assume that the set of access rights is represented by an access matrix, A. A(x, y) defines the access rights of process x to object y. If x is a descendant of z, what is the relationship between A(x, y) and Z(z, y) for an arbitrary object y? Verified answer
COMPUTER SCIENCE Device that reads and writes on a hard disk Verified answer
COMPUTER SCIENCE True/False: Python does not allow the input of multiple values with a single statement. Verified answer Recommended textbook solutions
Engineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Fundamentals of Database Systems6th EditionRamez Elmasri, Shamkant B. Navathe 596 solutions C Programming: A Modern Approach2nd EditionK N King 495 solutions C++ Programming: From Problem Analysis to Program Design7th EditionD. S. Malik 835 solutions Other Quizlet setsUnit 3 Review - Bio208 terms kkondelis20 NUR 125 Maternity and Newborn Medications50 terms bchu224 OT Midterm58 terms kayleenvd Economics Exam Module 311 terms erindempsey06 Related questionsQUESTION An aggregation switch can be placed between a router and multiple switches on the network if a router doesn't have sufficient number of physical ports to establish communication links with all the switches used on the network. 15 answers QUESTION In PGP, confidentiality procedures are applied first, then authentication procedures. (T or F) 3 answers QUESTION Printer, IP phone, Server, tablet computer. End devices form the interface between users and the underlying communication network. 2 answers QUESTION List the characteristics of a projector 2 answers Which of the following is a common network topology?Star topology is by far the most common. Within this framework, each node is independently connected to a central hub via a physical cable—thus creating a star-like shape. All data must travel through the central node before it reaches its destination.
Which one is not a type of topology?Explanation: The types of topology are bus topology, ring topology, star topology, mesh topology and hybrid topology. Connect is not one of them.
|