Answer Posted / sridhar
A combination of hardware and software that protects a
network or computer.from unauthorized (outside) access.
| Is This Answer Correct ? | 6 Yes | 2 No |
Post New Answer View All Answers
If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
Explain any three error detection and correction techniques.
How kernal work in operating system?
what is the command to check how many port numbers are running with their specific protocols in linux pc
What are the other names of IEEE 802.11 protocol or standard?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
Explain Network Topologies and their uses.
What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
Write a short note on ISDN?
Compare the maximum window size in go-back-N and selective-repeat ARQs.
Contrast link state and distance vector routing protocols, giving an example of each.
When creating a static route, what is the gateway used to define?
Explain Attenuation?
How to communicate between difference process?