Free Essay

Computer Porgramming

In:

Submitted By John2205
Words 850
Pages 4
Chapter 1 Solutions

Review Questions 1. Which of the following is an advantage of using a client/server network over using a peer-to-peer network? a. A client/server network is simpler to set up. b. A client/server network allows resources to be managed centrally. c. A client/server network does not require a network operating system. d. A client/server network is less expensive to set up. 2. What is the primary function of a file server on a client/server network? e. It monitors how many users are logged on to a WAN. f. It manages access and use of shared applications and data. g. It prevents unauthorized remote users from connecting to a LAN. h. It routes traffic between two or more LANs. 3. Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software? i. Word-processing software j. Remote authentication software k. Mail client software l. Operating system software 4. The first services widely used by networks were: m. Fax services n. Network management services o. Mail services p. File and print services 5. On a client/server network, clients and servers usually require what to communicate? q. A connectivity device r. A Web site s. A remote access server t. A mail server 6. Your colleague, in describing the benefits of a client/server network, mentions that it’s more scalable than a peer-to-peer network. What does she mean by this? u. The client/server network can be more easily expanded. v. The client/server network is simpler to set up. w. The client/server network can be run on free software. x. The client/server network allows more users to log on at one time. 7. In which of the following environments would a WAN be most appropriate? y. A large data center in which each employee’s access is centrally controlled z. A global hotel chain connecting its reservation desks to a central call center {. A home office connecting its personal computers between the den, living room, and bedroom |. A local newspaper connecting to a global news agency's Web site 8. Which of the following refers to the combination of voice (such as telephone), video, and data signals sent over the same network? }. Switching ~. Remote access . Convergence . Network management 9. In networking, what does a packet refer to? . An electrical signal . A unit of data . An alarm . A way to connect a node with a network 10. How can a server distinguish between many clients on a network? . Each client is identified by a unique network address. . Each client regularly transmits a signal that indicates its network location and unique client characteristics. . Each client has a different electromagnetic characteristic to its signal, similar to differences in human voices. . Each client uses uniquely modified versions of the same network protocol. 11. What device connects a client computer to a network's medium, such as a wire? . Network line extender . Network terminator . Network junction clip . Network interface card 12. What elements of a network ensure that data arrive at their intended destination in the correct sequence? . Rings . Backbones . Protocols . File servers 13. The physical layout of nodes on a network is known as the network's: . Topology . Schematic . Formation . Grid 14. Which of the following is an example of a mail service? . Preventing unauthorized users from gaining access to the network and, in particular, to its mail server . Ensuring that users are not running more copies of an e-mail client than have been purchased . Exchanging messages between mail servers on different networks . Enabling users to print messages from their e-mail client software 15. Which of the following network topologies is most common on today's networks? . Ring . Fan . Star . Bus 16. Security is a concern when using remote access servers on a network because: . Access servers enable computers to connect to a network and obtain access to its resources, thereby exposing the network to the outside world. . Access servers have poor password enforcement capabilities and rely on users to choose good passwords. . Access servers cannot accept encoded data transfers, requiring users to transmit plain text to and from the network. . Access servers are difficult to understand and support, and so many networks are using them incorrectly and perhaps insecurely. 17. Which of the following is an example of asset management on a client/server network? . Ensuring that sensitive data is secured from unauthorized access . Assessing the peak activity times on a server and ensuring extra processing power is available at those times . Backing up critical data files on a regular basis . Determining how many handheld computers are in a company’s warehouse 18. Distributing data transfer activity equally over several devices or components belongs to which category of network management services? . Traffic monitoring . Load balancing . Address management . File and print services 19. Apache is a popular example of what type of networking software? . License tracking . Web server . Backup . Mail server 20. What organization sponsors the CCNA and CCIE certifications? . Cisco . CompTIA . IEEE . WITI

Similar Documents

Free Essay

Disaster Plan

...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...

Words: 1273 - Pages: 6

Premium Essay

How a New Strategy Saved and Created a Bright Future for Ibm in 90s.

...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...

Words: 319 - Pages: 2

Free Essay

Technology Emergence Papaer

... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...

Words: 1786 - Pages: 8

Premium Essay

Computer as a Catalyst for Change

...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...

Words: 9206 - Pages: 37

Premium Essay

Capstone Wbs Dictionary

...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...

Words: 655 - Pages: 3

Free Essay

Information Technology

...1. what is e-classroom? 2. what is industrial robot? Explain that. 3. Describe about the process that Mubin told about his parents. 4. ICT used for doing many dangerous situation succesfully. Explain that. Answers: 1. main book. 2. Industrial robot is a robot that is used in many dangerous work. Now all the industrial work in industry are done by industrial robot. Human become tired,bored but robot never. Robot can do work for long time. In the big industry of the world now robot is uses as labor. 3. Mubin told his parents about the use of computer in operating phone. He also told about the drone system. Mubin works in air force thats why his parents always anxious for him.They think about the airplane accident. Then mubin told them about the latest technology that used in aircraft. Now all the airplane are opetated by computer. Now pilot dont have to do many things. So the posibility of the plane accident now become less. Now a days there is no pilot in the fighter plane. The drone system is used normally in war. 4. Besides the use in aircraft ICT also used in many dangerous sector for doing many dangerous work. Now most of the work in the big industry is done by robot bacuase robot dont get tired or bored like human. Now human just observe the work either its right or wrong. Now in transportation the use of ICT increased a lot. In future if car dmis driven by robot then the number of road accidents will definately less. So now ICT is used in many dangerous sector...

Words: 679 - Pages: 3

Free Essay

Lg Michael Ahn on Becoming a Global Player in the Consumer Electronics

...LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market: Knowledge@Wharton ( http://knowledge.wharton.upenn.edu/article.cfm?articleid=2667) LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market Published : January 06, 2011 in Knowledge@Wharton In 2000, executives at South Korea-based LG Electronics set the goal of becoming a top-three player globally by the close of the decade. One year early, in 2009, the company achieved its goal. Meanwhile, revenue has jumped from $5.6 billion in 2004 to more than $13 billion in 2010. Michael Ahn guided the branding effort for LG Electronics North America before stepping down as regional president and CEO last year to become a senior adviser at LG Electronics USA. In a recent conversation with Knowledge@Wharton, Ahn -- who was visiting the University of Pennsylvania to make a speech as part of the Wharton Leadership Lecture series -- named patience, consumer-targeted marketing and achieving synergy among the firm's different divisions as the factors catapulting LG Electronics from a relatively obscure maker of commodity goods to a premium global brand. An edited version of the conversation appears below. This is a single/personal use copy of Knowledge@Wharton. For multiple copies, custom reprints, e-prints, posters or plaques, please contact PARS International: reprints@parsintl.com P. (212) 221-9595 x407. Knowledge@Wharton I would love to start by talking about the consumer electronics...

Words: 1692 - Pages: 7

Free Essay

A Horror Story

...Theme: Horror/Suspense Setting: A typical boy’s room- dirty and messy. The only light source would be the computer. Most used part would be the computer table/desktop. Characters: Gio- The main character, a slouchy procrastinator student who was writing and cramming a paper. Stranger- No fact was known other than he is implied to be a ghost or spirit a hint of it’s appearance. • Page 1 Panel 1: Paneling- 1/3 of the page horizontally (most of computer screens are horizontally oriented) A close up shot of a computer monitor, Microsoft word is the open application with only his name on it and a title “A Horror Story” Panel 2: Paneling- 1/3 of the page horizontally Gio leaning on his palm looking bored/thinking (shot from monitor’s POV), with a gleam of the only light source which is the monitor on his face. Thought Bubble: Ahhh, damn. I’ve been doing this for two days now. Panel 3: Paneling- 1/3 of the page horizontally A zoom up shot of the computer clock with “11:11pm” on it. Thought Bubble(top right side): 11:11 do you work, please send me a spirit and have him type his story! • Page 2 Panel 1: Paneling- 1/3 horizontally, 2/3 of the first tier. Gio face palming, same shot from page 1, panel 2. Thought Bubble(bottom left part): Who am I kidding? Wake up kid! Panel 2: inset, remaining of the first tier Gio reaching to the right for the coffee mug in the study table, back shot with him on the center. Thought Bubble(left side of the...

Words: 541 - Pages: 3

Premium Essay

Inventory Management

...KB Corporation PROPOSAL For Inventory Management System Table of Contents 1 Overview 2 Problem Situations Proposed and Purpose 3 Record methods 3.1 Recommendation for the forms design principles are: 3.2 Computer assisted-retrieval system (CAR) 3.3 Data Retrieval methods by Information Technologies 3.4 Policies for record storage 4 Organizing the record and the classification system. 5 Implementation. 6 Conclusion: Strategically Managing Inventory for Future Growth 1. Overview As the company are expecting to establish another 20 shops in the next 2 years, we have realized how important for the document system for different department. And our products are almost imported from Europe and Asia. We cannot keep to using the manual record for the document record system. This document will explain the requirement for management, inventory, provisioning, customer support, sales support, and book-to-bank systems. Where possible recommendations are given to understand and plan for interconnection, correlation, and data warehousing requirements. Emphasis is given to ensuring all databases will have a capability to provide input to decision support systems needed by both senior management, as well as operational levels of the business. 2 . Problem Situations Our company current operation has shown that the inventory document record is obvious inefficiency. In the aspect of inventory control, more and more errors were found...

Words: 1430 - Pages: 6

Premium Essay

Report

...INTRODUCTION Real Estate Management System is website which is helpful for Builders as well as a individual as Buyers or Seller. In the currently all the activities are done manually. It is very tough for person to contact a appropriate Buyer or Seller. Our Real Estate Management System deals with the various activities related to the students. There are mainly 3 modules in this software * Search * Post * List On this Website we can register as a Individual, Agent or Builder. Administrator has the power to activate and deactivate the user account Administrator can also add new user and can edit and delete a user. A Builder can register as user and can buy and sell Properties. An Agent can suggest for buying and selling Properties. An Individual can register as a user and can list, buy and sell properties. SYSTEM ANALYSIS EXISTING SYSTEM: System Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. Here the key question is- what all problems exist in the present system? What must be done to solve the problem? Analysis begins when a user begins its registration & starts to search, list & post property. During analysis, data collected on the various files, decision points and transactions handled by the present system. The commonly used tools in the system are Data Flow Diagram, activity diagram, sequence diagram, collaboration diagram, etc. Training, experience and common...

Words: 1885 - Pages: 8

Premium Essay

Operating Systems on the Internet

...Internet Operating Systems For years I thought that operating systems were simple little programs (lines of code) placed inside personal computers to help them run smoothly and efficiently (truth be known, an OS is needed to make any computer run at all). But not until recently did I discover that operating systems must also be used in larger mainframes and servers as well. After all, servers are computers too! And any computer, regardless of its size or purpose, needs internal instructions. It needs a set of executable code that makes the thing come alive. One might say that operating systems are the souls of computers everywhere. This begs a question or two: what types of OS’s are out there? And how do they differ from the one in my iPhone? Also, if I wanted to swap out my current operating system for a different one (after all, my friends keep telling me about all of the great things they’re doing with Linux), how easy of a task would that be? The most common OS for a desktop (or a laptop) in use today is Windows 7 ("Os Platform Statistics", 2012). But what about the operating systems which are used by small and large companies that host web pages? Or what about the large computers that store hundreds of thousands (if not millions) of large data files in a centralized data centers? Or what about those companies that provide search engine services? Companies like Google, facebook, and Yahoo!, maintain their own, internal OS’s, which are designed to serve...

Words: 572 - Pages: 3

Premium Essay

Hillman Group, Avnet and Quaker Chemical: Process Transformation Through Business Intelligence Deployments.

...in 1964, has enjoyed ever four decades serving the har dware/ home improvement industry. Which widely known for the outstanding service and quality products. Max Hillman Jr. and Richard Hillman are both helped to start the company and remains as leaders. Avnet is one of the world’s largest transnational electronics distributors of electronic parts, enterprise computing and storage products and embedded subsystems, Avnet provides a vital link in the technology supply chain. Market needs and trends drive Avnet’s product and service strategy, supported by a global infrastructure. It brings a breadth and depth of service capabilities, such as supply-chain and design- chin services, logistics solutions, product assembly, device programming, computer system configuration and integration, and technical seminars. Quaker chemical since 1918, they have been established and maintaining long term relationships with leading enterprise in primary metals, metalworking, and other basic process industries all over the world. Quaker is a $544.1 million dollar company. The company is publicly traded on the New York Stock exchange, and has a long track record of financial consistency and strength. Today, they have business and production presence in every major manufacturing country in the world. Business intelligence (BI) is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions...

Words: 400 - Pages: 2

Premium Essay

Computer Hardware Servicing Ncii

... | |Qualification: | |COMPUTER HARDWARE SERVICING NC II | |[pic] |Technical Education and Skills Development Authority | | |East Service Road, South Superhighway, Taguig City, Metro Manila | TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-73 • Basic Competencies 6 o Participating in workplace communication ………………… 7-10 o Working in a team environment ……………….... 11-13 o Practicing career professionalism .……………. 14-17 o Practicing occupational health and safety procedures 18-22 • Common Competencies 23 o Applying quality standards …………………………………… 24-27 o Performing computer operations 28-34 o Performing mensuration and calculation 35-38 o Preparing and interpreting technical drawing 39-42 o Using hand tools 43-47 o Terminating and connecting electrical...

Words: 8633 - Pages: 35

Free Essay

How Has Information Technology Transformed the Package Delivery Business?

...Week 1 – Chapter 1 Jiajun DU 1. Read Chapter 1 – Information Systems in Global Business Today –N/A 2. Weekly Online Discussion Question – completed online in the Discussion Forum Area (no need to copy and paste into document) 3. Chapter 1 Video Case – PDF file located in the Course Documents Area (answer the questions without retyping the question) (1). “Smart Labels” are data and computer based shipping labels. And it can be made byr personal computer. The barcodes can record a lot of data, so it can’t only decrease the transit time, but also increase reliability. UPS can use GPS to provide a better track serves. Once the package arrive a UPS station, the “Smart Labels” can record the information of package and update to the website. The customer can track their packages easier. The UPS can also use this system to control their deliver serves, make sure the package can deliver on time. (2). Costumer order –logistics center-DIAD-delivered-DIAD A. The customer places an order, the logistics center receive the package and updates tracking information. B. When UPS ship out the package, they will use DIAD to scan the “Smart Labels”, so they can update the tracking information in date center. C. When the package is delivered, the customer need to sign name and UPS will use DIAD to update information. (3). Wireless communication can make the express delivery services more flexible and update their information faster. And it makes UPS more efficient and lower the cost of operation...

Words: 360 - Pages: 2

Premium Essay

Importance of Technology in Society

...of time. Technology has allowed man-kind to obtain and create new desires. In this society, technological advancement has allowed our society to use enhanced goods to make our everyday life easier. Technology has made our civilization better in many ways. Technology has increased productivity, help people economically, create new advance technology to fulfill people’s desires and wants, and the invention of the computer which has created numerous effects that almost everyone uses in our current society. One of the major technological invention that has changed the way people live their life is the computer. The computer has changed the way our society works today. Currently in our society, people use computers for virtually anything. The internet was created so that the invention of a computer can reach new peaks. People use computers for their own benefits and desires. Computers have provided many different types of efficient data storage systems and amazing processor that is very informative (Oak). Something that has really become popular because of computers is online shopping. A decade ago, buying any type of good online seemed imaginary, but now it has brought tons of income across the world (Nickson). Instead of going to a store and being limited to what they have on stock, people in our society can now go online to places like Amazon.com, or even a certain to store that they wish to purchase something, and purchase products from limitless categories. Online shopping...

Words: 1054 - Pages: 5