-
Difference between contention-based and controlled media access methods
Date posted:
November 30, 2021
-
Explain two circumstances under which coaxial cables are most applicable in a network installation
Date posted:
November 30, 2021
-
State four types of Internet connections used in business firms
Date posted:
November 30, 2021
-
Figure 2 shows typical tools in browser, Outline the function of each of the tools labelled (i), (ii), (iii) and (iv)
Date posted:
November 30, 2021
-
Outline four parts of an email address
Date posted:
November 30, 2021
-
Issues that commonly cause network problems at the physical layer of a network
Date posted:
November 30, 2021
-
Common symptoms of network problems at the physical layer
Date posted:
November 30, 2021
-
Describe any three layers of TCP/IP model
Date posted:
November 30, 2021
-
Basic Network Troubleshooting Steps
Date posted:
November 30, 2021
-
Describe two types of user interfaces in network operating systems
Date posted:
November 30, 2021
-
Wireless networks are commonly used in business firms. Outline four benefits of the network
Date posted:
November 30, 2021
-
Use of passwords expiration feature in data communication systems is unpopular. Explain two limitations of this feature
Date posted:
November 30, 2021
-
Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request
Date posted:
November 30, 2021
-
Explain two types of cookies as used in the Internet
Date posted:
November 30, 2021
-
With aid of a diagram, describe TCP handshake
Date posted:
November 30, 2021
-
Copper cables offer different throughputs in data communication. Outline four factors that influence the cables
Date posted:
November 30, 2021
-
With the aid of a diagram, describe a time-division multiplexing (TDM)
Date posted:
November 30, 2021
-
Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these protocols
Date posted:
November 30, 2021
-
Differentiate between information security and network infrastructure security
Date posted:
November 30, 2021
-
A network design should meet several user needs. Outline four examples of such needs
Date posted:
November 30, 2021
-
Explain three advantages of extranet networks in organizations
Date posted:
November 30, 2021
-
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted:
November 30, 2021
-
Explain two types of UTP cables used during network installation
Date posted:
November 30, 2021
-
Describe the email protocols
Date posted:
November 30, 2021
-
Outline four requirements for internet installation in organizations
Date posted:
November 30, 2021
-
Describe two categories of communication software
Date posted:
November 30, 2021
-
Outline uses of computer networks in an organization
Date posted:
November 30, 2021
-
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted:
November 30, 2021
-
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted:
November 30, 2021
-
Outline two weaknesses of CSMA/CD
Date posted:
November 30, 2021