true about random-access memory (RAM) as it is normally used inside a personal computer? A.Used for short term memory E. Is installed on the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data. As described in the chapter? A.The CPU tells the RAM which address holds data that the CPU wants to read. 6. A user file has opened a word processor‚ typed the numbers 123456789‚ and stored the
Premium Personal computer Hard disk drive Computer
Chapter 6 Switched Wired Networks 1) Baseband transmission dominates in LANs because it is ________ than broadband transmission. A) faster B) less expensive C) Both A and B D) Neither A nor B Answer: B 2) Using link aggregation with two or three trunk lines ________ going to a single faster Ethernet port. A) is less expensive than B) is just as fast as C) Both A and B D) Neither A nor B Answer: A 3) The 802.3 100BASETX standard is defined at the ________ layer. A) physical
Premium Computer network Local area network Ethernet
CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design‚ development‚ implementation‚ support‚ and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter‚ you will meet these objectives: * Explain IT industry certifications. * Describe a computer system
Premium Information technology Information Computer
Roman Katoliko NT1210 CHAPTER 3: Building TCP/IP Networks Lab 3.1: Network Reference Models Ex 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocol? What impact would this have on your personal life or business communications? If each vendor had their own standards and protocols‚ we would have a harder time making devices that we use every day to inter-operate. Imagine buying specific BRAND of ROUTER for
Premium OSI model Internet Protocol Suite Internet
Vance Campbell NT1210 – Intro to Networking Lab 3.1 to 3.4 3.1 1. Why would a three-layer model of communication that has the layers physical‚ network‚ and application be insufficient to adequately describe network communication? A. Because there is no transport or application layer. 2. What is the history of the OSI reference model? How did it come about and why was it created? Use your textbook and Internet research to support your answer. A. It was created to standardize the way
Free OSI model Internet Protocol Suite
5.2.6 Step 1: When a source device wants to communicate with another device‚ source device checks its Address Resolution Protocol (ARP) cache to find it already has a resolved MAC Address of the designation device. If it is there‚ it will use that MAC Address for communication. To view your Local ARP cache‚ Open Command Prompt and type command “arp-a” Step 2: If ARP resolution is not there in local cache‚ the source machine will generate an ARP request message‚ it puts its own data link layer address
Premium Address Resolution Protocol
Chapter 6 Summary ITT Technical Institute Introduction to Networking NT1210 October 28‚ 2013 The chapter starts out explaining how a BN (Backbone Network) works. Backbone Network: Connecting all of the LANs of an organization entails another type of network (BN). A properly designed backbone network provides a high-speed circuit that serves as the central conduit across which the LANs of an organization can communicate
Premium Ethernet Computer network Local area network
NT1210 Quiz 1 1. How many bits are in a byte? A. 8 B. 4 C. 2 D. 1 2. Electronic devices today use what numbering system? A. Decimal B. Octal C. Binary D. Electronic 3. Convert this decimal number to binary: 97 A. 01100001 B. 01100000 C. 10000001 D. 10010001 4. Convert this binary number to decimal: 00010000 A. 32 B. 24 C. 12 D. 16 5. Unlike earlier telecom networks‚ most modern networks are _____ end-to-end. A. cellular B. analog C. data D. digital 6. What is the typical
Premium IP address Internet Protocol Internet
Final Exam Review Using Table 10-1‚ review default port numbers used commonly with TCP and UDP purposes HTTP TCP Port 80 – used by web browsers and web servers Telnet TCP Port 23 – used for terminal emulation SSH TCP Port 22 – used for secure terminal emulation FTP TCP Port 20‚ 21 – used for file transfer DNS UDP Port 53 – used for name resolution SMTP TCP Port 25 – used to send and receive email POP3 TCP Port 110 – another email protocol IMAP TCP Port 143 – another email protocol SSL TCP
Premium IP address Transmission Control Protocol Internet Protocol
NT1210 Introduction to Networking Unit 2: Chapter 2‚ Introduction to Computer Networking 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks and how they are applied to various types of enterprises. Explain the functionality and use of typical network protocols. Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives Define a computer network. Identify
Premium World Wide Web Web browser Web page