-
Outline uses of computer networks in an organization
Date posted:
November 30, 2021
-
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted:
November 30, 2021
-
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted:
November 30, 2021
-
Outline two weaknesses of CSMA/CD
Date posted:
November 30, 2021
-
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
Date posted:
November 30, 2021
-
Difference between broadcast and collision domains as used in data transmission
Date posted:
November 30, 2021
-
Differentiate between pre-shared key and digital signature
Date posted:
November 30, 2021
-
Explain uses of internet in business firms
Date posted:
November 30, 2021
-
TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement
Date posted:
November 30, 2021
-
) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment
Date posted:
November 30, 2021
-
Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established
Date posted:
November 30, 2021
-
Distinguish between multicast and broadcast IP addresses
Date posted:
November 30, 2021
-
Outline two parts of to a point point protocol (PPP)
Date posted:
November 30, 2021
-
Explain two characteristics of a Storage Area Network
Date posted:
November 30, 2021
-
Computer networks are vulnerable to various types of physical threats. Outline four types of these threats
Date posted:
November 30, 2021
-
Rene was required to select a network operating system (NOS) for his company’s network. Explain two categories of NOS that he could make his choice
Date posted:
November 30, 2021
-
Anne recommended a converged network design for a client. Explain three benefits of the design that could influence the decision
Date posted:
November 30, 2021
-
John was troubleshooting a computer that was not connecting to network. Outline four possible causes of the problem
Date posted:
November 30, 2021
-
Functions of Intermediary Devices
Date posted:
November 30, 2021
-
Distinguish between intermediary and host devices
Date posted:
November 30, 2021
-
Explain two circumstances under which unshielded twisted pair (UTP) cables are most applicable in network installation
Date posted:
November 30, 2021
-
Outline two factors that should be considered when selecting an Internet bandwidth, other than cost
Date posted:
November 30, 2021
-
Data communication system should exhibit distinctive features. Explain two desirable features that could be exhibited by the system
Date posted:
November 30, 2021
-
Define the term node as applied in data transmission
Date posted:
November 30, 2021
-
Figure 2 shows a typical tool bar of a browser program. Outline the functions of
each of the tools labelled (i), (ii), (iii) and (iv)
Date posted:
November 30, 2021
-
Outline four roles of user agent as used in email software
Date posted:
November 30, 2021
-
Describe two modes of licensing for network software
Date posted:
November 30, 2021
-
Figure 1 shows an Ethernet frame. Outline the parts labelled
Date posted:
November 30, 2021
-
Explain three circumstances that would necessitate the installation of a point-to-point protocol in corporate networks
Date posted:
November 30, 2021
-
Cloud computing is widely used in business firms. Explain two benefits that could be influencing the trend
Date posted:
November 30, 2021