Question

Please answer the following questions: 1) Describe the main functions of a computer network (12 marks)...

Please answer the following questions:
1) Describe the main functions of a computer network (12 marks)

2) In your own words, compare the three types of files: directories, ordinary files, and special files. Explain what would happen if a user modified a directory file (10 marks)

3)What are the advantages of having a Windows system using the menu-driven interface, instead of typing commands. Give at least one example where having menus is an advantage (6 marks)

4) Identify at least five major types of threats to systems running Windows and the policies that system administrators must take to protect the system from unauthorized access. Compare the practical problems when balancing the need for accessibility with the need to restrict access and suggest the first action you would take to secure a Windows computer or network if you managed one, and why that would be your first choice (12 marks)

5) Google owns Android as well as the Chrome operating system. Compare the similarities and differences between the two systems (10 marks)

6) Describe in your own words how you would manage access control for a network with multiple system administrators (10 marks)

7) Give at least two advantages of installing a network operating system (NOS) instead of a distributed operating system (DO/S) for a small business. If it’s necessary to make assumptions about the small business for your answer, be sure to state them (6 marks)

8) Imagine that you are managing a university system that becomes CPU-bound at the conclusion of each school semester. If you were allowed to double the number of processors, what effect on throughput would you expect? If you could make one additional change to the system, what would it be? Explain why you’d expect your changes to improve performance

9) Without using jargon, explain the key advantages of a UNIX operating system as if you were explaining it to a high school student who is unfamiliar with a computer science terminology

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer.)

1) Computer Networks plays an important role in each and every aspects of our day to day activities, be it a small mobile based game or a company with various world wide users.
It provides support to each and every computing environment, within that network to stay connected in terms of working functionality and feasibility. The various main functions are :

  • Data Sharing Mechanism :

With the data sharing mechanism in computer networks, the ease to share or transfer data within the same network is more convenient and reduces time complexity. Now, within the same network various people can share and access various files as per requirement very easily.

  • Resource Sharing Mechanism :

With Data Sharing mechanism, Computer network also provides resource sharing mechanism, in which various I/o devices, internet connections, servers, etc can be share within the same network. Hence, enhancing flexibility of various resource accesses.

  • Network based inter communication :

In networking, it supports various computing devices within a same network to communicate with one another, hence, enabling network based inter communications.

  • Data Security :

Computer networks provide huge security over data into networks, by the process of data distribution. In this process, various copies of data are distributed over the networks into various computing devices. Hence, preventing data loss by achieving data security.

  • Reducing Complexity and saving power:

Various complex problems are broken down into multiple smaller operations and shared over the network with each small operation to be executed in various computing devices over the network, hence reducing complexity and saving power for highly recommended complex problems.

These are the various important functions of Computer networks.

Add a comment
Know the answer?
Add Answer to:
Please answer the following questions: 1) Describe the main functions of a computer network (12 marks)...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In your own words: The system you are developing for Berkeley School includes a computer network....

    In your own words: The system you are developing for Berkeley School includes a computer network. What is a network topology? What network topologies are you considering for Berkeley School? Why? Describe at least one network topology in detail.

  • In the following questions and activity, you demonstrate your understanding of the file-system interface and implementation....

    In the following questions and activity, you demonstrate your understanding of the file-system interface and implementation. These are critical features of the way we use computers. Questions: 1. Some operating systems keep track of the file type, while others leave it up to the user. Which is better and why? 2. In most operating systems, the subdirectories can be read and changed by users, just as ordinary files can be. What is a protection problem that could arise? How can...

  • connect ective stions LO 8-2 LO 8-12 LO 8-4 LO 8-4 Select questions are available with...

    connect ective stions LO 8-2 LO 8-12 LO 8-4 LO 8-4 Select questions are available with McGraw-Hill's Connect 8-29. Multiple Choice Questions Select the best answer for each of the following questions. Explain the reasons for your selection 4. LAN is the abbreviation for (1) Large Area Network. x (2) Local Area Network (3) Longitudinal Analogue Network (4) Low Analytical Nets. b. End user computing is most likely to occur on which of the following types of computers? (1) Mainframe....

  • Please Help with these Operating Systems questions thank you! 1. How is X-RAID or Hybrid RAID...

    Please Help with these Operating Systems questions thank you! 1. How is X-RAID or Hybrid RAID different than regular RAID levels? 2.Make a list of six security concerns for a bank’s computer system. Foreach item on your list, state whether this concern relates to physical,human, or operating-system security. 3. How would you protect against a port scan? 4. Calculate the total head movements for the following queues using: FCFS SSTF SCAN C-SCAN LOOK C-LOOK a. 76, 95, 73, 12, 150,...

  • In Option #1, you have been hired as an IT expert by a small firm to...

    In Option #1, you have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers and the remaining with laptop computers using wireless networks. The office will use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ wireless network to print and access the Internet. In...

  • Operating Systems Questions (Please help if you can) 1. A computer has cache, main memory, and...

    Operating Systems Questions (Please help if you can) 1. A computer has cache, main memory, and a disk used for virtual memory. If a referenced word is in the cache, 20ns are required to access it. If it is in main memory but not in the cache, 60ns are required to load it into the cache (this includes the time to originally check the cache), and then, the reference is started again. If the word is not in main memory,...

  • PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers...

    PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • Answer these follwong questiong in great detail for a cyber secuirty/computer science class. 1. Consider the...

    Answer these follwong questiong in great detail for a cyber secuirty/computer science class. 1. Consider the following firewall rule, and describe what this permits or denies: sudo /sbin/iptables -A INPUT --dport 23 -j DROP 2.If a service is allowed in one place and denied in another, what is the outcome? (For example, a service is listed in both hosts.allow and hosts.deny) Explain. 3.If a rule for a service does not exist in either one of the files hosts.deny or hosts.allow,...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT