Questions From Chapter 7

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

MIS 107 NSU NWA

CHAPTER 7 Short Questions

1. What is a computer network? Draw a diagram of a P2P computer network.


Ans: Two or more computer connected with each other for the purpose of sharing
resources, that is called computer network.

2. What are the major functions of Hubs, Switches, and Routers in computer networks?
Router: Router connect devices in different network.
Switch: A switch sends a data packet to destination package only.
Hubs: A hub connects devices in network and sends data all other connected devices.

3. What is Client/Server Computing? Draw a diagram of Client/Server technology. (p-


293)
Ans: Client/server computing, is a distributed computing model in which clients linked
through network controlled by network server computer. Server sets rules of
communication for network and provides every client with an address so others can find
it on the network.

4. What is Packet Switching? Draw a diagram to show how it works. (p-293)


Ans: Packet switching is a method of slicing digital messages into parcels called
packets, sending the packets along different communication paths as they become
available, and then reassembling the packets once they arrive at their destinations.
MIS 107 NSU NWA

5. Define the followings:

1. Protocols: A protocol is a set of rules and procedures governing transmission of


information between two points in a network.

2. TCP/IP: 3 functions: TCP/IP, IP, TCP

TCP: refers to the Transmission Control Protocol, which handles the movement of
data between computers. TCP establishes a connection between the computers,
sequences the transfer of packets, and acknowledges the packets sent.

IP: refers to the Internet Protocol (IP), which is responsible for the delivery of packets
and includes the disassembling and reassembling of packets during transmission.

TCP/IP: Transmission Control Protocol/ Internet Protocol (TCP/IP) is a single,


common, worldwide protocol standard.

3. Analog signal: An analog signal is represented by a continuous waveform that


passes through a communications medium and has been used for voice
communication. The most common analog devices are the telephone handset.

4. Digital Signal: A digital signal is a discrete, binary waveform, rather than a


continuous waveform. Digital signals communicate information as strings of two
discrete states: one bit and zero bits, which are represented as on-off electrical
pulses.

5. Modem: A modem is a device that translates digital signals into analog form (and
vice versa) so that computers can transmit data over analog networks such as
telephone and cable networks

6. LAN: A local area network (LAN) is designed to connect personal computers and
other digital devices within a half-mile or 500-meter radius.

7. CAN: Campus area network (CAN) Up to 1,000 meters (a mile); a college campus or
corporate facility.

8. MAN: A metropolitan area network (MAN) is a network that spans a metropolitan


area, usually a city and its major suburbs. Its geographic scope falls between a WAN
and a LAN.

9. WAN: Wide area networks (WANs) span broad geographical distances—entire


regions, states, continents, or the entire globe. The most universal and powerful
WAN is the Internet. Computers connect to a WAN through public networks, such as
the telephone system or private cable systems, or through leased lines or satellites.

10. Bandwidth: The bandwidth is the difference between the highest and lowest
frequencies that can be accommodated on a single channel.

11. IP Address: Every computer on the Internet is assigned a unique, which currently is a
32-bit number represented by four strings of numbers ranging from 0 to 255
separated by periods is called Internet Protocol (IP) address. For instance, the IP
address of www.microsoft.com is 207.46.250.119.
MIS 107 NSU NWA

12. IPv6: New IP addressing system using 128-bit IP addresses. Stands for
Internet Protocol version 6.

13. DNS: The domain name is the English-like name that corresponds to the unique 32-
bit numeric IP address for each computer connected to the Internet.

14. VoIP: Voice over IP (VoIP) is a technology that delivers voice information in digital
form using packet switching, avoiding the tolls charged by local and long-distance
telephone networks.

15. VPN: A virtual private network (VPN) is a secure, encrypted, private network that has
been configured within a public network to take advantage of the economies of scale
and management facilities of large networks, such as the Internet.

16. URL: Uniform Resource Locator (URL) is the address of a specific resource on the
internet.
http://www.megacorp.com/content/features/082610.html,http
domain d.path document file format
name

17. SEO: Search engine optimization (SEO) is the process of improving the quality and
volume of Web traffic to a Web site by employing a series of techniques that help a
Web site achieve a higher ranking with the major search engines when certain
keywords and phrases are put into the search field.

18. Shopping Bots: Shopping bots is a software with built-in intelligence that help e-
commerce shoppers locate and evaluate products or service they might wish to
purchase. Shopping bots such as MySimon or PriceGrabber.

6. What is the Internet? Draw a diagram of the Internet.


Ans: Internet is the world’s largest implementation of client/server computing and
internetworking, linking millions of individual networks all over the world.

7. Draw the diagram of TCP/IP reference model by DOD. Briefly describe each layer in
the model. (p-294, 295)
Ans:
MIS 107 NSU NWA

1.Application layer: The Application layer enables client application programs to access
the other layers and defines the protocols that applications use to exchange data.
(HTTP) is used to transfer Web page files.

2. Transport layer: The Transport layer is responsible for providing the Application layer
with communication and packet services. This layer includes TCP and other protocols.

3. Internet layer: The Internet layer is responsible for addressing, routing, and packaging
data packets called IP datagrams. The IP is one of the protocols used in this layer.

4. Network Interface layer: The Network Interface layer is responsible for placing
packets on and receiving them from the network medium, which could be any
networking technology.

8. How do RFID systems work? (p-322)


Ans: Radio frequency identification (RFID). RFID systems use tiny tags with embedded
microchips containing data about an item and its location to transmit radio signals over
a short distance to RFID readers. The RFID readers then pass the data over a network to
a computer for processing. Unlike bar codes, RFID tags do not need line-of-sight
contact to be read. The RFID tag is electronically programmed with information that can
uniquely identify an item plus other information about the item, such as its location,
where and when it was made, or its status during production. Embedded in the tag is a
microchip for storing the data. The rest of the tag is an antenna that transmits data to
the reader.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy