Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 (0.2 points per answer): Define the following data-related terminologies, viz: (i) Database (ii) Metadata (iii) Data Aggregation (iv) Data Cleansing (v) Data Anonymization

Question 1 (0.2 points per answer): Define the following data-related terminologies, viz: (i) Database (ii) Metadata (iii) Data Aggregation (iv) Data Cleansing (v) Data Anonymization Question 2 (0.2 points per answer): Encode the following text: Welcome to my World using native ASCII; and show all the layers of abstraction used in your encoding scheme. P.S.: Native ASCII table is available on Blackboard via: Resources Miscellaneous Table of ASCII Code Question 3 (0.2 points per answer): How many code points are obtainable using the following binary digits: (i) 1 byte (ii) 8 bits (iii) 16 bits (iv) 32 bits (v) 64 bits Question 4 (0.2 points per answer): Differentiate between the following pairs of terminologies, viz: (i) Local Area Network (LAN) and Personal Area Network (PAN) (ii) Radio-wave and Microwave (iii) Internet and World Wide Web (WWW) (iv) Intranet and Extranet (v) Modem and Router c Bonaventure C. Molokwu: All Rights Reserved. No part of this booklet may be duplicated without explicit permission.

COMP-2057-30: Introduction to the Internet (Winter 2021) page 2 of 2

Question 5 (1.0 point): Given a monochromatic screen of resolution: 13 x 13. Create the image formed using the following Pixel-Address Color-Code mappings:

Pixel-Address Color-Code Hardware (1, 3, black)

0 = OFF 1 = ON

(1, 4, black) (1, 8, black) (1, 9, black) (2, 2, black) (2, 5, black) (2, 7, black) (2, 10, black) (3, 1, black) (3, 6, black) (3, 11, black) (4, 1, black) (4, 11, black) (5, 1, black) (5, 11, black) (6, 2, black) (6, 10, black) (7, 3, black) (7, 9, black) (8, 4, black) (8, 8, black) (9, 5, black) (9, 7, black) (10, 6, black)

Question 6 (1.0 point): Describe the Internet Protocol Suite with regard to its constituent layers; and list at least two (2) protocols used in each layer. Question 7 (1.0 point): How does Internet Protocol verstion 4 (IPv4) differ from Internet Protocol verstion 6 (IPv6)? Question 8 (1.0 point): How does a HTTP-Request message differ from a HTTP-Response message? Question 9 (1.0 point): Differentiate between a Security Threat and an Integrity Threat Question 10 (1.0 point): A hacker and a cracker are two (2) separate entities; explain the differences.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems Design Implementation And Management

Authors: Peter Rob, Carlos Coronel

3rd Edition

0760049041, 978-0760049044

More Books

Students also viewed these Databases questions