Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CST3507 Quie No. 1 Spring 2020 Name 1. The pad fell in the packet Is used to bring the total number of bytes up to

image text in transcribed
CST3507 Quie No. 1 Spring 2020 Name 1. The pad fell in the packet Is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes b. Isused to bring the total number of bytes up to 64 if the data fe is less than 64 bytes so required with C CD d. Provides progofthematice for 2. The IP address 10.10.20.250 is an example of select all that apply) a. Class A address b. Class address AIP d. Arouble IP address e. A no routable Internet IP address 3. Network interface card has a MAC address of 00-00-86-15-7 A. From this information, specify the OUL There is no sufficient information to specify the OUL b. The OUT is 86-15.7A c. The OUT is 86-00-00 d. The OUTis00.00.86 4. What working protocol does Ethernet use? a. Ethernet uses a token ring passing scheme. The computer devices must possess the ring to be able to pass a token. b. Ethernet uses Carrier Access - Multiple Sensing - Collision Detection c. Ethernet uses Carrier Sense - Multiple Access-Collision Detection d. Ethernet uses Collision Sense - Carrier Access - Multiple Pairing 5. In terms of computer security, a switch offers better security than a hub. Why is this? 2. A hub requires a special pin to activate the connection b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible. c. A switch forwards the data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible. d. The use of the switch guarantees that all devices connected to it will share link integrity pulses This sharing of the pulses strengthens the security of the connection. 6. What does RJ-45 represent? a. A 45-pin connector for CAT6 b. An IEEE standard for data speed c. An 8-pin modular connector for twisted-pair Ethernet d. Protocol used to verify a communications link

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 15th International Conference Dasfaa 2010 Tsukuba Japan April 2010 Proceedings Part 1 Lncs 5981

Authors: Hiroyuki Kitagawa ,Yoshiharu Ishikawa ,Wenjie Li ,Chiemi Watanabe

2010th Edition

3642120253, 978-3642120251

Students also viewed these Databases questions

Question

Strings are compared using ASCII ordering.

Answered: 1 week ago