Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Transmission Control Protocol model
B) client / server model
C) Open Systems Interconnection model
D) basic input / output model
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An n-tier architecture tests software easily.
B) An n-tier architecture helps improve network performance.
C) A two-tier architecture allows easy upgrades of applications.
D) A two-tier architecture requires minor modifications in case of any changes in application logic.
Correct Answer
verified
Multiple Choice
A) Internet Protocol
B) Transmission Control Protocol
C) User Datagram Protocol
D) Extensible Authentication Protocol
Correct Answer
verified
Multiple Choice
A) Transport layer
B) Physical layer
C) Data Link layer
D) Network layer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) It helps in exercising tight control over system operations and applications.
B) It is highly responsive to users' needs.
C) It has the highest fault tolerance.
D) It is highly compatible with organizational growth because workstations can be added easily.
Correct Answer
verified
Multiple Choice
A) It makes fault diagnosis easy.
B) It detects problems easily due to its centralized control.
C) It handles steady traffic well.
D) It is effective even when network traffic is heavy.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) nodes on a network
B) the IP address of a router
C) the protocols that each node understands
D) packets to be sent
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) centralized processing
B) decentralized processing
C) distributed processing
D) interconnected processing
Correct Answer
verified
Multiple Choice
A) It is suitable for large networks with high bandwidths.
B) It is the most secure system for wireless networks.
C) In WEP, keys are dynamically generated based on the user's ID and password.
D) In WEP, a key must be entered manually into the access point and the client computer.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) meters per second
B) bits per second
C) amperes per second
D) moles per second
Correct Answer
verified
Showing 1 - 20 of 105
Related Exams