Preview

Cyber Crime

Satisfactory Essays
Open Document
Open Document
308 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime
Q.1 Answer the following questions
1. What is the need for MIME?
2. What is the need for DNS in the Internet?
3. Mention uses of a computer network.
4. What is meant by : a) WAN b) PAN
5. Differentiate between half duplex and full duplex channel.
6. What is the major difference between a hub and a switch?
7. What is meant by security by obscurity?
8. Differentiate between symmetric and asymmetric ciphers.
9. Differentiate between routing process and forwarding process.
10. Differentiate between a cipher and a code.
11. What is the major drawback of Single Bit Parity check method for error detection?
12. What is the use of acknowledgement timer in data link layer protocols? 13. What is meant by Attenuation with respect to signals?
14. Differentiate between flow control and congestion control.
14
Q.2 (a) 1. Compute the Hamming code for the bit pattern 1100001 05
2. What is the advantage of Piggybacking and Pipelining? 02
(b) 1. Explain the TCP/IP layered architecture. 05
2. What is the advantage of using Negative acknowledgement (NAK) in data link layer protocols?
02
OR
(b) 1. Differentiate between wireless and mobile systems with example 05
2. Briefly explain any two forms of E-Commerce 02
Q.3 (a) 1. Write a note on: UTP (Unshielded Twisted Pair) Cables 03
2. Explain the working of fiber optic networks with diagram 04
(b) 1. Differentiate between packet switching and circuit switching 05
2. Briefly explain the need and application of ISM band in wireless communications 02
OR
Q.3 (a) 1. Write a note on: Co-axial Cables 03
2. Compare and contrast satellite systems with fiber optic systems 04
(b) 1. Briefly explain transport service primitives with respect to transport
Layer
03
2. Explain the blue army problem in connection release in transport layer

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2) The 2 methods of packet switching are firstly Datagram approach and secondly Virtual circuit approach…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw410 Week 3 Lab

    • 629 Words
    • 3 Pages

    3. Should fiber optic horizontal cabling be installed but not terminated as future proofing for a future higher-speed network? What is the cost difference between copper UTP cable and fiber optic cable? Use this model to compute the relative cost - http://www.fols.org/cost_model/…

    • 629 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    1) You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics, and wireless for this application. You should create a table or flow chart which would facilitate choosing between these options depending on circumstances. The table or flow chart should be submitted as part of your document. You may not submit a separate file…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Describe the three modes of communication available on a network. (Minimum word count: 60)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    7. How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It 222

    • 395 Words
    • 2 Pages

    I. Connection Oriented Protocol – Establishes a network connection, manages the delivery of data, and terminates the connection.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MSIS 605 exercise 3

    • 452 Words
    • 2 Pages

    Exercises –Chapter 3 Chapter 3- Physical Layer 1 Q1 • How does a multipoint circuit differ from a point-to-point circuit? • A point-to-point configuration is so named because it goes from one point to another (e.g., one computer to another computer). These circuits sometimes are called dedicated circuits because they are dedicated to the use of these two computers. • In a multipoint configuration (also called a shared circuit), many computers are connected on the same circuit. This means that each must share the circuit with the others, much like a party line in telephone communications.…

    • 452 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 3 Review

    • 316 Words
    • 2 Pages

    1. What is different about the method used to boost a digital signal’s strength, compared with the method of boosting an analog signal’s strength?…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    List five facilities that are provided by an operating system to a user or to a program. Draw a flow chart to add integer between 2 to (n+1) where n>2. Explain the terms : Subroutine and function with the help of an example. Consider two IP addresses 160. 10. 11. 25 160. 10. 12. 35 Do they belong to the same network , if (i) The subnet mask is 255.255.0.0 (ii) The subnet mask is 255.255.255.0 Justify your answer. (h) What is a Wide Area Network (WAN) ? What are the characteristics of WAN ? How are they different from LANs ? Is Internet a WAN ? Justify your answer. What is the need of memory hierarchy in a computer system ? Explain with the help of various trade offs like cost, speed, size etc. What is perverse software ? List various types of perverse software. Give four ways to counter perverse software. What are cookies in the context of Browser software ? Are cookies bad ? Explain. List four precautions for safe browsing. BCS-011 2 7…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ccna

    • 1059 Words
    • 5 Pages

    Step 1: Double click on the “Packet Tracer .exe” file and start the setup by clicking NEXT.…

    • 1059 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Internet Crimes

    • 975 Words
    • 4 Pages

    | The approach that an organization takes to providing service and addressing the needs of customers.…

    • 975 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cybercrime

    • 557 Words
    • 3 Pages

    NATO enlargement is desirable because it will promote stability in Europe and in the world. There are several concerns regarding possible expansion of NATO membership, but the basic question is whether or not NATO should expand its membership. The following sections address the negative and positive sides of the argument.…

    • 557 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crimes

    • 778 Words
    • 4 Pages

    What are cybercrimes and what do they consist of? Cybercrimes are defined as any illegal activity that uses a computer. The justice department goes a little more in depth and describes cybercrimes as using a computer for the storage of evidence. Cybercrimes have increased over time to something more than we could have ever imagined.…

    • 778 Words
    • 4 Pages
    Good Essays