Network Architecture refers to the layout of the network consisting of the
hardware, software, connectivity, communication protocols and mode of
transmission, such as ____:
a) Wired
b) Wireless
c) Wired or Wireless
d) None of These

1 Answer

Answer :

c) Wired or Wireless

Related questions

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : What are wired and wireless transmission systems? Explain the mechanisms of propagation of radio communication.

Last Answer :  Transmission Systems: Modern long distance transmission systems can be placed under three broad categories: 1. Radio Systems 2. Coaxial cable systems 3. Optical fibre systems  ... microwave communication limited by horizon. 3. Troposphere scatter communication 4. Satellite communication. 

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Which one of these refers to all objects that have sensors,network connectivity,software,and so on to connect to the network ? :- a) Internet of Things b) Artificial Intelligence c) Machine Learning d) Deep Learning -Technology

Last Answer : internet of things is the correct answer option a

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ) WSN stands for:- a) Wide Sensor Network b) Wireless Sensor Network c) Wired Sensor Network d) None of these

Last Answer : b) Wireless Sensor Network

Description : What are the differences between wired and wireless communication channels? -Technology

Last Answer : Wired Communication ChannelWireless Communication ChannelIt is more secure.More security measures need to be considered for providing security.It is faster than wireless communication.It is slower than wired ... device cannot be moved.User device can be moved easily within the wireless range.

Description : What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication d) security algorithm for emails

Last Answer : b) security algorithm for wireless networks

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : A _____is defined as "some sort of hardware architecture or software framework (including application frameworks), that allows software to run: a) Antalogy b) Platforms c) Toylogy d) None of These

Last Answer : b) Platforms

Description : How to solve networking problem -- one wireless and one wired pc to talk to each other on a network?

Last Answer : answer:A permissions problem? Something odd about the driver on the XP side? Try downloading a free program from Cisco called Network Magic. It helps people set up small home networks just like the one you are describing. Edit: Are the drives explicitly shared?

Description : What is the access point (AP) in a wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) all the nodes in the network

Last Answer : a) device that allows wireless devices to connect to a wired network

Description : WSN stands for A. Wide Sensor Network B. Wireless Sensor Network C. Wired Sensor Network D. None of these

Last Answer : B. Wireless Sensor Network 

Description : If you have more than one computer connected in the home, it is important to protect every computer. You should have a ____firewall (such as a router) to protect your network: a) Hardware b) Software c) HTML d) None of These

Last Answer : a) Hardware

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : New Market has employed Aryan Kumar to manage and maintain their networking architecture and wide area connectivity -Technology

Last Answer : Networking Engineer will best describe his job profile.

Description : WIMAX stands for (1) Wireless Interoperability for Microwave Access (2) Wired Interoperability for Microwave Access (3) Worldwide Interoperability for Microwave Access (4) Worldwide Infrastructure for Microwave Access

Last Answer : Worldwide Interoperability for Microwave Access

Description : In Networks, WEP stands for (1) Wireless Equivalent Privacy (2) Wired Extra Privacy (3) Wired Equivalent Privacy (4) Wireless Embedded Privacy

Last Answer : Wired Equivalent Privacy

Description : The term ODBC stands tor: (1) Object Database Communication. (2) Open Database Communication. (3) Open Database Connectivity. (4) Object Database Connectivity.

Last Answer :  Open Database Connectivity.

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description :  ________ in IoT as one of the key characteristics, devices have different hardware platforms and networks. A. Sensors B. Heterogeneity C. Security D. Connectivity

Last Answer : B. Heterogeneity 

Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect

Last Answer : c.ping

Description : 'Blue tooth' technology allows - 1) Landline phone to mobile phone communication 2) Signal transmission on mobile phones only 3) Wireless communication between equipments 4) Satellite television communication

Last Answer : 3) Wireless communication between equipments

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : MapReduce engine has a master/slave architecture consisting of a single ______ as the master and a number of _______ as the slaves a) Name Node, Data Node b) JobTracker, TaskTrackers c) TaskTrackers, JobTracker d) Data Node, Name Node

Last Answer : JobTracker, TaskTrackers

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system

Last Answer : b) protocol stack

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Why does resetting a wireless router often result in improved wireless connectivity?

Last Answer : One thing you can do is download a simple wifi sniffer on your smartphone. It's the quickest way I know to see what wifi channels are in use. It's not uncommon for networks to be walking ... devices connecting through it try turning all of them off except for one and see if your connection improves.

Description : Which among the following is incorrect about PAN (Personal Area Network): a) PAN is for one person only. . b) Example of PAN is wireless communication network. c) Some of the PAN applications include mobile commerce d) None of These

Last Answer : d) None of These

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above