
1. Local-Area Network (LAN); is a computer network located in a single building or in nearby buildings e.g. a school, a department, or a number of offices. Typically the computers are connected by copper cables.
2. Wide-Area Network (WAN); is a network which serves computers located at far away distances - across towns and countries. Communication between the various computers is usually carried out via telephone lines, fibre-optic links, radio link, satellite etc.
3. Virtual Private Network (VPN); is a private network that is built over a public infrastructure typically the Internet. A VPN is similar to a WAN in that it enables users to connect to a private network that may be located at far away distances, however VPN uses the Internet for such connections. Several companies enable their employees to connect to the company’s private network (LAN) from their homes via VPN connections. Employees will be able to access data and other resources securely on the company’s network as if they are at the office.
Dominic M answered the question on May 16, 2018 at 09:48
-
What is social Engineering?
(Solved)
What is social Engineering?
Date posted:
May 16, 2018
.
Answers (1)
-
Explain characteristics of information security within an organization?
(Solved)
Explain characteristics of information security within an organization?
Date posted:
May 16, 2018
.
Answers (1)
-
Giving examples explain threats to data security
(Solved)
Giving examples explain threats to data security.
Date posted:
May 16, 2018
.
Answers (1)
-
What is a cyber crime?
(Solved)
What is a cyber crime?
Date posted:
May 16, 2018
.
Answers (1)
-
Describe the difference between an internal and an external hyperlink
(Solved)
Describe the difference between an internal and an external hyperlink
Date posted:
May 14, 2018
.
Answers (1)
-
What’s the difference between encoding, encryption, and hashing?
(Solved)
What’s the difference between encoding, encryption, and hashing?
Date posted:
May 13, 2018
.
Answers (1)
-
Expand on Claude Shannon’s theorem. Differentiate the term confusion and diffusion as envisaged by Shannon to strengthen crypto-algorithm.
(Solved)
Expand on Claude Shannon’s theorem. Differentiate the term confusion and diffusion as envisaged by Shannon to strengthen crypto-algorithm.
Date posted:
May 13, 2018
.
Answers (1)
-
In DES, the encryption and decryption algorithms are the same. Is that also the case in AES?
(Solved)
In DES, the encryption and decryption algorithms are the same. Is that also the case in AES?
Date posted:
May 13, 2018
.
Answers (1)
-
What do we mean by public-key cryptography?
(Solved)
What do we mean by public-key cryptography?
Date posted:
May 13, 2018
.
Answers (1)
-
What is a certificate and why are certificates needed in public key cryptography?
(Solved)
What is a certificate and why are certificates needed in public key cryptography?
Date posted:
May 13, 2018
.
Answers (1)
-
To illustrate exactly when an object is constructed and destructed when returned from a function, create a C++ class called who. Have who's constructor take...
(Solved)
To illustrate exactly when an object is constructed and destructed when returned from a function, create a C++ class called who. Have who's constructor take one character argument that will be used to identify an object.Have the constructor display a message similar to this when constructing an object:
Constructing who #X
where x is the identifying character associated with each object when an object is destroyed, have a message similar to this displayed:
Destroying who #x
where, again, x is the identifying character. Finally, create a function called make_who() that returns a who object. Give each object a unique name.Note the output displayed by the program.
Date posted:
May 12, 2018
.
Answers (1)
-
other than the incorrect freeing of dynamically allocated memory, think of a situation in which it would be improper to return an object from a...
(Solved)
other than the incorrect freeing of dynamically allocated memory, think of a situation in which it would be improper to return an object from a function.
Date posted:
May 12, 2018
.
Answers (1)
-
As you know, when an object is passed to a function, a copy of that object is made.Further, when that function returns, the copy's destructor...
(Solved)
As you know, when an object is passed to a function, a copy of that object is made.Further, when that function returns, the copy's destructor function is called.Keeping this in mind, what is wrong with the following program?
// This program contains an error.
#include
#include
using namespace std;
class dyna {
int *p;
public:
dyna(int i);
~dyna() { free(p); cout << "freeing \n"; }
int get() { return *p; }
};
dyna::dy*) malloc(sizeof(int));
if(!p) {
cout << "Allocation failure\";
exit(1);
}
*p = i;
}
// Return negative value of *ob.p
int neg(dyna ob)
{
retur.get();
}
int main()
{
dyna 0(-10);
cout << o.get() << "\n";
cout << neg(o) << "\n";
dyna o2(20);
cout << o2.get () << "\n";
cout << neg (o2)\n";
cout << o.get () << "\n";
cout << neg (o) << "\n";
return 0;
}
Date posted:
May 12, 2018
.
Answers (1)
-
If a queue dynamically allocates memory to hold the queue, explain the reason for that occurence and state whether in such a situation it...
(Solved)
If a queue dynamically allocates memory to hold the queue, explain the reason for that occurence and state whether in such a situation it is possible to block one queue from being assigned to another.
Date posted:
May 12, 2018
.
Answers (1)
-
Create a class called dice that contains one private integer variable.Create a function called roll() that uses the standard randomn number generator, rand(), to generate...
(Solved)
Create a class called dice that contains one private integer variable.Create a function called roll() that uses the standard randomn number generator, rand(), to generate a number between 1 and 6. Then have roll() display that value.
Date posted:
May 12, 2018
.
Answers (1)
-
Create a class called prompt in C++ language.Pass its constructor function a prompting string of your choice.Have the constructor display the string and then input...
(Solved)
Create a class called prompt in C++ language.Pass its constructor function a prompting string of your choice.Have the constructor display the string and then input an integer.Store this value in a private variable called count.When an object of type prompt is destroyed, ring the bell on the terminal as many times as the user entered.
Date posted:
May 12, 2018
.
Answers (1)
-
Create a C++ class called line that draws a line on the screen.Store the line length in a private integer variable called len.Have line's constructor...
(Solved)
Create a C++ class called line that draws a line on the screen.Store the line length in a private integer variable called len.Have line's constructor take one parameter: the line length.Have the constructor store the length and actually draw the line .If the system does not support graphics, display the line by using *. Give the line a destructor that erases the line.
Date posted:
May 12, 2018
.
Answers (1)
-
Explain what an anonymous union is and how it differs from a normal union.
(Solved)
Explain what an anonymous union is and how it differs from a normal union.
Date posted:
May 12, 2018
.
Answers (1)
-
Use a C++ union class to swap the low- and high-order bytes of an integer (assuming 16-bit integer; if the computer uses 32-bit integers, swap...
(Solved)
Use a C++ union class to swap the low- and high-order bytes of an integer (assuming 16-bit integer; if the computer uses 32-bit integers, swap the bytes of a short int)
Date posted:
May 12, 2018
.
Answers (1)
-
Given the following base C++ class,
class area_cl {
public:
double height;
double width;
};
Create two derived classes called rectangle and isosceles that inherit area_cl. Have each class include a...
(Solved)
Given the following base C++ class,
class area_cl {
public:
double height;
double width;
};
Create two derived classes called rectangle and isosceles that inherit area_cl. Have each class include a function called area()
that returns the area of a rectangle or isosceles triangle, as appropriate. Use parameterized constructors to initialize height and width.
Date posted:
May 12, 2018
.
Answers (1)