What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above

1 Answer

Answer :

D. All of the Above

Related questions

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : If I relocate a Backups.backupdb file from one Time Machine drive onto another blank drive, will the Mac simply continue backing up to the volume as normal?

Last Answer : answer:oooh, good question, can’t test it at the moment, im not sure if time machine also identifies the volume of the drive, i’d have to get back on that one, currently not at home i mean, i could relocate it for you on the fly and test, i started fresh so i don’t care if it gets lost

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above

Last Answer : 1 Real time system

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following are benefit of IaaS? A. Flexible and efficient renting of computer hardware. B. Portability, interoperability with legacy applications. C. Full control of the computing resources through administrative access to VMs. D. All of the above

Last Answer : All of the above

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following benefit is related to create resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which country created the most used networking software in 1980's ? Sun IBM Novell Microsoft Collection From: www.cs-mcqs.blogspot.com

Last Answer : Microsoft

Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above

Last Answer : b. DHCP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD

Last Answer : B. CONFIG_INET

Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c

Last Answer : A. Network

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : Physical or logical arrangement of network is __________ a) Topology b) Routing c) Networking d) Control

Last Answer : a) Topology

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : How many layers are there in the OSI reference model of networking? a. 8 b. 7 c. 5 d. 4

Last Answer : b. 7

Description : The acronym OSI stands for in computer networking. a. Open Systems Interconnection b. Organization for Standards Institute c. Organizing Systems Interconnection d. Open Systems Interworking

Last Answer : a. Open Systems Interconnection

Description : A group of computers and other devices connected together is called ……………. a. Intranet b. Network c. None of these d. Networking

Last Answer : b. Network

Description : Which of these is a benefit of social networking?

Last Answer : (Apex) Developing and expressing your identity.

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : Terminals are required for a. real-time, batch processing & time-sharing b. real time, time-sharing & distributed message processing c. real time, distributed processing & manager inquiry d. real-time, time sharing & message switching

Last Answer : real-time, time sharing & message switching

Description : The interactive transmission of data within a time sharing system may be best suited to a. simplex lines b. half-duplex lines c. full duplex lines d. biflex-lines

Last Answer : half-duplex lines

Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing

Last Answer : multiplexing

Description : The simultaneousprocessing of twoor more programs by multiple processors is– (A) multiprogramming (B) multitasking (C) time-sharing (D) multiprocessing (E) None of these

Last Answer : multiprocessing

Description : Which one of the following is NOT a benefit of multiple packaging? A)Facilitates special price offers B)Increases demand C)Increases consumer acceptance of the product D)Makes handling or storage easier E)Provides an overall image of the firm

Last Answer : E)Provides an overall image of the firm

Description : Wireless Access Points For Home Networking?

Last Answer : To improve or expand an existing home or office wireless internet network, an access point comes in handy. A wireless access point basically allows additional Ethernet and Wi-Fi ready ... capabilities, and encryption security. In general, access points cost less than wireless internet routers.

Description : What is the problem and its solution in multiple access transmission in networking?

Last Answer : that of determining who gets to talk (i.e., transmit into the channel), and when.Computer networks similarly have protocols - so-called multiple access protocols - by which nodes regulate their transmission onto the shared broadcast channel.

Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network

Last Answer : Answer : B

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking