Hingna Road‚ Nagpur-16. Department of Computer Science & Engg. Question Bank Session 2011-12 Year/Branch/Sem/Sec : 3rd/CSE/ B Subject: Computer Architecture & Organization ____________________________________________________________ _______________ UNIT 1. 1. Explain the three major design levels in a computer system. 2. What are the different standard
Premium Computer Central processing unit
Security 4th Edition Questions Chapter 6 Questions 1. What is the typical relationship among the untrusted network‚ the firewall‚ and the trusted network? The relationship is that data is only limited to what firewalls allow via specific places called “ports”. There is the untrusted network on the outside‚ then the firewall which prevents unwanted or suspicious connections‚ and the trusted network is what lies within the bounds of the firewall. 2. What is the relationship between a TCP and UDP packet
Premium Computer network security Transport Layer Security IP address
Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering In The Department of Electrical and Computer Engineering By Tribuvan Kumar Prakash Bachelor of Engineering in Electronics and Communication Engineering Visveswaraiah Technological University‚ Karnataka‚ 2004. August 2007 Acknowledgements I would like to express my gratitude to my advisor
Premium Central processing unit
Chapter 11 Enterprise Resource Planning Systems 1. Closed database architecture is a. a control technique intended to prevent unauthorized access from trading partners. b. a limitation inherent in traditional information systems that prevents data sharing. c. a data warehouse control that prevents unclean data from entering the warehouse. d. a technique used to restrict access to data marts. e. a database structure that many of the leading ERPs use to support OLTP applications. 2. Each of the following
Premium Computer network Internet Enterprise resource planning
AWARDS……………………………………………... 5-6 1. INTRODUCTION…………………………………….. 7 1.1 Views of Networks 7-8 1.2 History of Computer Networks
Premium OSI model Computer network Local area network
EKT 422: Computer Architecture Answer Scheme: Tutorial 2 1. A set associative cache consists of 64 lines or slot divided into four-line sets. Main memory contains 4K blocks of 128 words each. Show the format of main memory addresses. The cache is divided into 16 sets of 4 lines each. Therefore‚ 4 bits are needed to identify the set number. Main memory consists of 4K = 212 blocks. Therefore‚ the set plus tag lengths must be 12 bits and therefore the tag length is 8 bits. Each block contains
Premium Computer Computer program Computer data storage
Version 4 Intro to LAN Technologies Copyright © 2012‚ 2009‚ 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking‚ the open systems interconnection (OSI) model‚ common network topologies and architecture‚ client/server concepts‚ basic hardware devices and usage‚ and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and
Premium Computer network Network topology
I am proposing to write about becoming a network and computer systems administrator‚ one of the reasons I chose this field to do my final project on is I am already in this field of work and feel that I have a fairly good background and plenty of information to share with others. I started in the Information Technology field in 2000 as a System Support Specialist for a fairly good sized Insurance Company. I have always like computer and figuring out what makes them work so when I had the chance
Premium Computer Management Computer science
3.1.3 Computer Network Topologies Network Topology is a network specification that determines the network arrangement‚ connecting the senders and receivers through lines of connection. Topologies are of both physical and logical aspect of the network. The physical topology describes the network’s physical wiring layout or shape. The logical topology describes the path through which the data moves. Both logical and physical topologies could be same or different in a same network. The physical and
Premium Computer network Ethernet OSI model
COMPUTER NETWORKS Assignment NAME: __________________________________________ SEAT #_______ SCORE:____ CASE STUDY: Analyzing Physical Layer Part 1` Mining Enterprise is a small company with 15 employees. They have just opened shop in a small office complex. They need to install a LAN‚ because they have an information database that all the employees use‚‚ for purpose of payroll‚ accounting‚ and for the geological informational database. Because money is fairly tight‚ the company decides
Premium Computer network Small business