Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
questiona outline the main interactions that take place when a user requests a valid web resource in the address bar of a modern web client till the
questiona what is network address translation nat why is it usedb given a following information by your isp about your newly acquired frame relay
questiona there are two basic approaches to dealing with errors in the presence of pipelining one way is go-back-n and the other strategy is
a calculate the crc for the frame belowframe 1101011011generator 10011message after appending 4 zero bits 11010110110000b osi refers to a system in
questiona explain what the following intermediate systems are and how they worki repeater ii bridgeb a service is formally specified by a set of
questionhuman telephone conversations are characterized by irregular pauses alternating with irregular bursts of speechin contrast communication via
questiona state briefly three reasons why computer networks are usedb differentiate between simplex half-duplex and full-duplex mode of transmissionc
questiona explain the following terms information communication technology operating system and application softwareb define what a computer is give
problema what is the minimum length of a password that could be considered to be strong in the context of todays computing powerb the security of a
questiona what do you understand by the term integrityb which type of attack denies authorized users access to network resourcesc you have
questiona how can you prevent someone from accessing your computer when you leave your office for some timeb what is the difference between a
questiona what is the main security vulnerability of ipv4b which protocol can be used for secure remote loginc distinguish between the transport
questiona mention three limitations of a firewallb compare packet-filtering and proxy-base firewalls give advantages and drawbacks of bothc
questiona state whether the following statements are true or false justify your answeri a good site security policy will require that users use
questiona which of the following is not a goal of securityi detection ii prevention iii recovery iv prosecutionb you are an honest student one day
question 1 write a long note on computers in television developmentquestion 2 write a long note on the lsquosteadicamquestion 3 write a long note on
question 1 how can one set up internet on a pc and test it explainsetting up a new connectiontesting internet connectionquestion 2 what are the rules
question 1 explain the process of components identification and call establishmentquestion 2 discuss on basic services in gsmquestion 3 explain the
question 1 explain the types of threats attacksquestion 2 what are the characteristics of good encryption techniquequestion 3 write a note on digital
problema what is a firewall and which are its most important tasksb what is the difference between default deny and default permit which advantages
questiona besides privacy what other security functions does pretty good privacy pgp providesb what is the post office protocol pop used for why
questiona what is the use of digital certificateb what is meant by a hierarchical trust model in a public key infrastructure how does the pretty
questiona what is the minimum length of a password that could be considered to be strong in the context of todays computing powerb the security of
question 1 videoconferencing is used to conduct meetings with the people who are located in far distance videoconferencing is an example of which
question 1 describe any five different types of computers question 2 explain bus type lan its advantages and disadvantages and examples question 3