A computer stores its operating system, as well as data intended for permanent storage, on its _________:
Question 1 options:
Modem |
|
router |
|
IP address |
|
hard disk |
Question 2 (1 point)
The database that contains the addresses of websites is known as the:
Question 2 options:
Internet Service Provider |
|
domain name server |
|
internet switchboard |
|
IP directory |
Question 3 (1 point)
An IP address is comprised of four groups of numbers. These number groups are known as:
Question 3 options:
Octets |
|
binaries |
|
domain names |
|
router code |
Question 4 (1 point)
A computer’s unique identifier is known as its:
Question 4 options:
IP address |
|
router code |
|
domain name |
|
ISP |
Question 5 (1 point)
Devices that connect networks together in order to deliver data are known as:
Question 5 options:
ISPs |
|
mail centers |
|
digital switchboards |
|
routers |
******************************************************************************************
Please Upvote the answer as it matters to me a lot :)
*****************************************************************************************
As per HomeworkLib expert answering guidelines,Experts are supposed to
answer only certain number of questions/sub-parts in a post.Please
raise the remaining as a new question as per HomeworkLib
guidelines.
******************************************************************************************
1)
since the memory of ram will be erased when the computer is shut
down, the core programs
such as os code and data intended for permanent storage are stored
in hard disk
so the answer is option d
2)
The database that contains the addresses of websites is known as
the:
domain name server
for example if you type www.google.com DNS is the one which tell
the IP address corresponding to the given URL
3)
since 32-bit IP is divided into 4 parts where each part will have 8
bits,
its called octet
option a
4)
A computer’s unique identifier is known as its: IP address
A computer stores its operating system, as well as data intended for permanent storage, on its...
PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...
please give me clear picture Section 1: DNS nslookup The Domain Name System (DNS) translates hostnames to IP addresses, fulfilling a critical role in the Internet infrastructure. In this lab, we’ll take a closer look at the client side of DNS. Recall that the client’s role in the DNS is relatively simple – a client sends a query to its local DNS server, and receives a response back. Much can go on “under the covers,” invisible to the DNS clients,...
check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....
TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...