Which network component extends from a computer's NIC to a switchC) Network Medium · Which network component extends from a computer's NIC to a switch? A) Network interface B) Device Driver C) Network Medium D) Network Protocol C) WAN · Your company has just opened an office in another state and you need the computers to communicate between offices. What type of network should you create? A) SAN B) LAN C) WAN...

Read more

The most common multiplexing technology used in conjunction

The most common multiplexing technology used in conjunctionSimplex, simplex, half-duplex · When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable uses _____ transmissions, the receive pair in the cable uses ____ transmissions, and the twisted-pair cable uses ______ transmissions. Ethernet · Which of the following is not an example of a broadband transmission? ...

Read more

Each organization that provides host services

Each organization that provides host servicesThe 1024 - 65535 range of ports is also known as the "well-known" range. A. True b. False · b. False An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. A. True b. False · b. False Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS author...

Read more

Which Carrier Sense technology is used on wireless networksLayer 3 · What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? Wi-Fi · Which one of the following wireless transmission types doe NOT require a clear LOS to function? Class 1 · Which Bluetooth class has the highest power output? Bluesnarfing · A hacker takes advantage of a Bl...

Read more

Fiber-optic cable comes in two types: single-mode

Fiber-optic cable comes in two types: single-modeEach type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission. True or False · True The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice. True or False · True Cable that is coated with flame-resistant...

Read more

Application Programming Interface (API)

Application Programming Interface (API)Application layer · Combines the features of the top three layers of the OSI model. It consists of the process that applications use to initiate,control, and disconnects from a remote system. Application Programming Interface (API) · Share functions, subroutines, and libraries that allow programs on a machine to communicate with the OS and other programs. Broadcast ·...

Read more

fluorescent lights or other sources of EMI should cable be installedNoise · What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?​ 1.4​ · ​One watt is equal to how many volt-amps? 100 m · ​What is the maximum allowable distance for horizontal wiring? bend radius​ · The radius of the maximum arc into which you can loop a cable wit...

Read more

ETHC 232 Week 5 Discussion | Devry UniversityWeek 5: Ethical Dilemma Project: Peer ReviewThis week you will share your Introduction and Background of the Case with your fellow students, and then you will provide peer feedback to the responses of two other students.For your initial post, due by Wednesday, follow this format:IntroductionTell us about your topic and chosen case. Why did you choose this particular case? Why is it important to you...

Read more

ETHC 232 Week 4 Assignment |Devry UniversityWeek 4: Ethical Dilemma Project: Ethical Dilemma and Application of Ethical TheoryIn the Week 3 discussion you selected and described the case for your Ethical Dilemma Project. This week you are to identify the ethical dilemma(s) in the caseyou chose and apply ethical theory to analyze and resolve the problem(s) you identified in the case.The completed assignment is due at the end of Week 4and is w...

Read more

Fundamental distinctions between a MAN and WAN

Fundamental distinctions between a MAN and WANIn the client-server model, what is the primary protocol used for communication between a browser and Web server? · HTTP Which two-encryption protocols might be used to provide secure transmissions for browser and Web server communication? · SSL and TLS Apache is a popular example of what type of network software? · Web Server Which email protocol all...

Read more

Consist of a select statement that's stored as an object

Consist of a select statement that's stored as an objectconsist of a select statement that's stored as an object in the database · view the tables referenced in the select statement · base tables another term for a view · viewed table provides a view to the underlying base tables · viewed table lists all of the system objects that define a database, including tables, views, columns,...

Read more

Apache is a popular example of what type of networking software

Apache is a popular example of what type of networking softwareIn the client-server model what is the primary protocol used for communication between a browser and a Web server? · HTTP Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications? · SSL and TLS Apache is a popular example of what type of networking software? · Web server Whi...

Read more

hen EnCase 7 is used to create a new case

hen EnCase 7 is used to create a new caseIn the EnCase Windows environment, must an examiner first create a new case before adding a device to examine? · Yes When EnCase 7 is used to create a new case, which files are created automatically in the case folder under the folder bearing the name of the case? · Email, Export, Tags, and Temp From the EnCase 7 Home screen, which of the following cannot be carried out?...

Read more

A method of remapping one IP address

Amethod of remapping one IP addressWhat layer of the OSI Model is IPv4? · Layer 3, the Network Layer How many bits is IPv4? · 32-bits What is the range for class a? · 1 - 126 What is the range for class b? · 128 - 191 What is the range for class c? · 192 - 223 What is the range for class d? · 224 - 239 What is the range for class e? · 240 - 25...

Read more

Allow hosts to participate on IP based networks

Allow hosts to participate on IP based networksIP Address · allow hosts to participate on IP based networks and it is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period. IP Address · can be represented in one of two ways: Decimal or Binary Decimal · (for example 131.107.2.200). In decimal notation, each octet must be between 0 and 255 Binary ...

Read more

Physical Router Interfaces (Inter-VLAN Routing)

Trunk · A switch port that can carry multiple traffic types, each tagged with a unique VLAN ID. Switchport · Command (only required on Layer 3-capable or Multilayer switches) that configures the desired interface as a Layer 2 switch port. DISL (Dynamic Inter-Switch Link Protocol) · Simplifies the creation of an ISL trunk from two interconnected FastEthernet devices. Minimizes VLAN trunk configuration pr...

Read more

Starting from the bottom-layer of the OSI model and working your way up to the topApplication · OSI Layer #7 - Provides services such as e-mail, web browsing, and file transfer services: determines resource availability. Presentation · OSI Layer #6 - Presents data to the application layer: Multimedia, encryption, decryption, and data compression. Session · OSI Layer #5 - Set up, manage, and terminate ses...

Read more

Requires a classes routing protocol to work

Requires a classes routing protocol to workNetwork Address · An address that cannot be used for a host because it represents the network (host bits off). Broadcast Address · An address that cannot be used for a host because it represents broadcasts (host bits on). Class A (Private Address Range) · 10.x.x.x Class B (Private Address Range) · 172.16.x.x - 172.31.x.x Class C (Private A...

Read more

Network topology is the most redundant and the most expensive

Network topology is the most redundant and the most expensiveWhat is the most common central device used today to connect computers to a network? · switch What is the most common adapter or connector used to connect a computer to a wired network? · RJ45 Which of the following does a switch use for increased performance? A.simplex B.half duplex C.full duplex D.sliding duplex C.full duplex · A switch sw...

Read more

The interface ID exit interface

The interface ID exit interfacestatic routing is more secure because it does not advertise over the network static routing uses fewer router resources than dynamic routing. · what are two advantages of static routing over dynamic routing? (Choose two.) ip route 209.165.200.228 255.255.255.248 10.0.0.1 120 · what is the correct syntax of a floating static route? it identifies the gateway IP address to which th...

Read more
Showing 1 to 20 of 617144 entries

Invite Tutor