FORM TP22230 Test Code 012299020 Mock Exam (March) 2013 CARIBBEAN EXAMINATIONS COUNCIL Caribbean Secondary Education Examination INFORMATION TECHNOLOGY PAPER 2 2 Hours DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO SECTION A THEORY – 60 marks Answer ALL questions. 1. Figure 1 illustrates the components of a computer system with letters A‚ B‚ C‚ D‚ E and F representing hardware components. a. Name the components A‚ B‚ C‚ D‚ E and F
Free Metropolitana di Napoli Madrid Metro Osaka Municipal Subway
After all business requirements have been gathered for a proposed network‚ they must be modeled. Models are created to visually represent the proposed network so that business requirements can easily be associated with network objects to ensure that all requirements have been completely and accurately gathered. Basically data modeling can fall into two types of categories: Physical modeling and Logical modeling. Logical modeling deals with gathering business requirements and converting those
Premium Entity-relationship model Unified Modeling Language Process management
Patton-Fuller Community Hospital Networking Introduction: Patton-Fuller Community Hospital has been serving the needs of its community since 1975. To maintain functionality over such a long span of time‚ Patton-Fuller has had to adapt to changing technologies. Today‚ Patton-Fuller utilizes Information Technology to its fullest‚ establishing a network in which vital data can be transferred both internally and externally with ease and speed. The communication of this data can be visualized via
Premium OSI model Data Link Layer Internet Protocol Suite
Week 8 Assignment: Wireless Signals For a while in the past‚ we refer the wireless technology as cellular phones. But now‚ the term "wireless" refers to more varied devices & technologies‚ like smartphones‚ computers‚ printers‚ headphones and even speakers that connects together in different ways. Today’s wireless phones for example‚ may include data packets like 3G & 4G cellular radio signals‚ Wi-Fi and even Bluetooth technologies‚ these technologies have advance in a fast pace that investing
Premium Bluetooth Mobile phone Wi-Fi
Curriculum Vitae Firose M Jabbar Mobile Number: 00966546997768 Email Address: firozmjabbar@gmail.com Date of Birth: 28-Oct-83 Nationality: Indian Religion: Islam Iqama : Transferable Objective To seek a challenging career in Information Technology were I’m able to utilize my professional & technical skills and practice experience. Skills Management skills – Data Center Management‚ Vendor Compliance‚ Technical Support Manager‚ Facilities Management‚ Telecommunications‚ Disaster Recovery‚
Premium Microsoft
SYSTEM PROPOSAL : TITLE : Student Monitoring System ABSTRACT : The computerized Students monitoring system that we developed is specifically for ID and Student’s verification only. The main objective of our system is to check wether the student have an authorized ID or a falsificated one and to verify whether the student is officially enrolled in the school. The application of RFID Matrix card system as a boarding students monitoring system were proposed to improve management system And to
Premium RFID
1000Base-LX‚ MM fiber‚ 550 meters 5. B) The links could use any Ethernet LAN standard. 6. E) None of the answers is correct 7. D) 802.3z 8. A) Overall download trend for computer technology prices overtime. D) A decrease in prices of fiber-optic cabling. 9. A) Autonegotiation works on the switch-to-PC A link‚ causing PC A to run at 100 Mbps. C) Autonegotiation fails to work on the switch-to-PC B link‚ causing the switch to run at 10 Mbps. 10. A) PC A uses full duplex as the result of the autonegotiation
Premium Ethernet
This came from the cisco site and is not my own: Introduction This document describes the procedure for recovering an enable password or replacing enable-secret passwords on Cisco 801‚ 802‚ 803‚ 804‚ 805‚ 811‚ and 813 Series Routers. These passwords are used to protect access to privileged EXEC and configuration modes. The enable password can be recovered because it is displayed in plain text in the configutaion file. The enable-secret password is encrypted in the configuration file and therefore
Premium Cryptography Cisco Systems Computer security
communications medium can represent a logical 1 and a low voltage of can represent a logical 0. Different methods of encoding exist these are used for different types of communication between electrical devices. Distortion‚ noise‚ and cross talk on a cabling medium are factors that prevent the accuracy of transmitted data to be intact. For these reasons different encoding methods exist. An example is when 2 wires are used to transmit music data to a speaker Digital signals don’t always have to be
Premium Modulation Data transmission
specific area for security and back up purposes. If a servers can’t be placed on multiple VLANs. A router would be necessary to allow other VLANs to access resources. Workstations can be shifted from one department to another without adding software or cabling. VLANs can be used to create secure user groups. It can also prevent outside hackers from receiving sensitive data because of the VLANs ability to enhance firewall functions. Implementing a VLAN will benefit the company with increased security‚ improved
Premium Ethernet