2
.pdf
keyboard_arrow_up
School
Central Piedmont Community College *
*We aren’t endorsed by this school
Course
120
Subject
Computer Science
Date
Feb 20, 2024
Type
Pages
11
Uploaded by Vinny1994 on coursehero.com
1/14/24, 3
:
47 PM
Individual Response
Page 1 of 11
about:srcdoc
2.1.7 Practice Questions
Candidate:
Joseph Vincent (jvince13)
Date:
1/14/2024, 3:46:46 PM •
Time Spent:
01:37
Score: 100%
Passing Score: 80%
Question 1.
Correct
You've implemented a network where hosts are assigned specific roles, such as file sharing
and printing roles. Other hosts access those resources, but they don't host services of their
own.
Which type of network do you have?
Intranet
Extranet
Peer-to-peer
Client-server
Explanation
1/14/24, 3
:
47 PM
Individual Response
Page 2 of 11
about:srcdoc
In a client-server network, hosts have specific roles. For example, some hosts are assigned
server roles, which allow them to provide network resources to other hosts. Other hosts
are assigned client roles, which allow them to consume network resources.
In a peer-to-peer network, each host can provide network resources to other hosts or
access resources located on other hosts, and each host is in charge of controlling access to
those resources.
An intranet is a private network that uses internet technologies. Services on an intranet are
only available to hosts that are connected to the private network.
An extranet is a private network that uses internet technologies, but whose resources are
made available to external (but trusted) users. For example, you might create a website on
a private network that only users from a partner company can access.
References
2.1.4 Networking Facts
q_intro_network_client_server_np6.question.fex
Question 2.
Correct
Which of the following geographic network types is typically managed by a city as a public
utility?
Metropolitan area network (MAN)
Personal area network (PAN)
Wide area network (WAN)
Local area network (LAN)
Explanation
A metropolitan area network (MAN) is a network that can cover an entire city. A city
1/14/24, 3
:
47 PM
Individual Response
Page 3 of 11
about:srcdoc
A metropolitan area network (MAN) is a network that can cover an entire city. A city
typically owns and manages a MAN as a public utility.
A PAN is a small network for communication between personal devices. A LAN is contained
to an office and managed by a business.
A WAN is a collection of LANs that are connected together to form a large internetwork.
WAN connections are typically managed by an ISP.
References
2.1.4 Networking Facts
q_intro_network_man_np6.question.fex
Question 3.
Correct
You've implemented a network where each device provides all other devices on the
network with access to shared files.
Which type of network do you have?
Multiple access
Client-server
Polling
Peer-to-peer
Explanation
1/14/24, 3
:
47 PM
Individual Response
Page 4 of 11
about:srcdoc
In a peer-to-peer network, each host can provide network resources to other hosts or
access resources located on other hosts, and each host is in charge of controlling access to
those resources.
In a client/server network, hosts have specific roles. For example, some hosts are assigned
server roles, which allow them to provide network resources to other hosts. Other hosts
are assigned client roles, which allow them to consume network resources.
Polling is a media access method where a single device grants permission to other devices
to access the network.
Multiple access describes a media access method where each device determines when the
medium is free.
References
2.1.4 Networking Facts
q_intro_network_peer_to_peer_np6.question.fex
Question 4.
Correct
You have a network that uses a logical bus topology. How do messages travel through the
network?
Messages are sent directly to the correct
destination device.
Messages are sent to a central device that
forwards them to the destination devices.
Messages travel from one device to the next
until they reach the destination device.
Messages are broadcast to all devices
connected to the network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Q2 Smart-Toys-Smart Kids CEO (Part 2)
Smart-Toys-Smart Kids has decided to install a new e-mail package to streamline communications within the company. Fred would like to have one common calendar for his all 200 employees. The expected features of the new e-mail package are “background processing” that doesn't get a great deal of attention. This includes managing connections, checking for errors in commands and e-mail messages, and reacting accordingly. The e-mail software vendors offered two different e-mail system for solution. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one.
a) Briefly explain to Fred, in layman's terms, the differences between the two.
b) Outline the pros and cons of the two alternatives
c) Make a recommendation to Fred about which is better for his company
ANSWER
Classification
SMTP-based two-tier client server…
arrow_forward
create a Login and registration page using python and mysql
please TYPE the code
The one I recieved befor was all images
arrow_forward
Graduation Project
* SSH connection:- Setting up github with server to connect via setting a ssh connection using public and private keys.
arrow_forward
locations: one in the United States, one in South America, and one in Europe. Each location has approximately 1000 users who need certificates. About 75% of the users in each location are domain members running Windows 8.1 and Windows 10. The others are running a non-Windows OS and aren't domain members. Some features of the PKI should include the following:• Web enrollment• Autoenrollment• Smart card enrollment in which designated users can enroll other users• EFS• Automatic key archival• Network device certificates• Real-time query for certificate revocation statusDesign the CA hierarchy, and label each CA according to its function and status (standalone, enterprise, root, intermediate, issuing, online, offline). The design should include a drawing showing the hierarchy as well as a detailed description, including how users and clients interact with the systems you selected. In addition, list the role services that need to be installed and the certificate template types that must be…
arrow_forward
SNMPv2 Manager sending a getRequest message to SNMPv1agent through a proxy sever will:
A) Setting the value of error status to 0
B) Setting the value for max-repetitions field to 0
C) Change the sysUpTime to 0
D) Pass Through without any changes
arrow_forward
Facebook is one of the most popular social networks where users can post posts to different (text or image) and comment on them • Each user must register beforehand in order to use the system. The user is identified by a name, surname, date of birth, email address (which will also serve for authentication) and a password. • Any user can make a post which contains a text and/or image. Post is identified by a unique code, text used, an identification code for the image and date of post. • A user (including the author of the post) can comment on the post. The comment is characterized by an identification code, text, and date of post. Also, a user may like a comment or post. The system should keep track which user has liked the post/comment, etc. • Users can also exchange messages with each other. Each message is characterized from the unique code, text, date and time of sending as well as information if the recipient has seen the message or not. Write the rational schema, normalization -…
arrow_forward
Data file:
736.2 731.6 829.8 875.8 568.3 292.2 231.1 868.9 66.7 811.9 292.0 967.6 419.3 578.1 322.5 471.7 980.0 378.8 784.1 116.8 900.4 355.3 645.7 603.6 409.1 652.1 144.1 590.6 953.1 954.0 502.0 689.3 685.6 331.9 565.1 253.9 624.1 796.2 122.8 690.7 608.0 414.8 658.3 27.3 992.9 980.8 499.0 972.8 359.7 283.1 89.7 260.1 638.4 735.4 863.6 47.5 387.5 7.7 638.1 340.6 961.7 140.1 29.8 647.3 471.9 594.9 901.2 96.0 391.1 24.0 786.7 999.1 438.7 445.0 26.4 431.6 425.9 525.4 404.4 785.6 808.5 494.1 45.7 447.0 229.5 909.3 494.4 617.0 917.0 132.5 957.5 878.8 272.6 987.4 526.1 744.5 582.3 427.3 840.5 973.3
arrow_forward
What are some of the drawbacks of having pages that are fragmented?
arrow_forward
Ethics
Robert, a case manager, has decided to create a list on the listserv from his own Internet service at home for his various patients' illnesses. He establishes one list for each of the following chronic conditions: asthma, diabetes, and congestive heart failure (CHF). He automatically enrolls all of his patients that he has email addresses for into their appropriate list with the intention that they can share information and support among themselves, as well as making it easier for him to share information with his patients. Everything is going well for the first month of the listserv exchange. However, a virus is introduced to the lists and everyone is contaminated. This virus has damaged the patients' hard drives on their home computers and some patients' work computers have been harmed.
The patients contact Robert's employer and demand to be reimbursed for all damages to their machines and are very upset that these lists were created in the first place. Robert's employer was…
arrow_forward
DNS queries, authoritative and root server DNS records, as well as iterated and non-iterated GET requests, are comprehensively covered.
arrow_forward
1- A microservice is a web service that only responds to specific requests and cannot consume any other services.
True or false
2- Implementing a web application using SOA architecture depends on the programming languages that have been used to build the application.
True or false
3- SOAP Attachment may contain XML or non XML message.
True or false
arrow_forward
java scrpit code1 the statement that is found in a typical Router module that enables the module to be used by code in other files. 2JavaScript statement that sets the public subfolder as the web server's default folder when the endpoint path is the root path.
arrow_forward
Hands-On Project 9-4
In this project you will work with cookies that stores the fastest time to complete a sliding block puzzle.
Much of the code for the puzzle has already been written. Your task is to write the code that records
the user's best time and stores it within a persistent cookie with a 90-day lifetime.
To complete this task you will have to load your project onto a web server placed on a remote site or
installed on your own computer. If you need to install your own server, you can download free server
software like XAMPP from the web or you can use software supplied by your instructor.
NOTE: If you are unable to get access to a server, you can complete this project using local web
storage by modifying the steps to store data in the localStorage object rather than in a cookie.
Hands-on Project 9-4
Sliding Eight Puzzle
Arrange the blocks in numeric order from 1 to 8. To move a block into the blank space, click a block
adjacent to the space. Click the Start button to scramble…
arrow_forward
12- IP address resolution works by retrieving the domain name based on a given IP address.TrueFalse
13- XHTML 1.0 Transitional is a very strict version of HTML, allowing web designers to build standardized websites.TrueFalse
14- All domain names must include both a TLD and a ccTLD.TrueFalse
15- dynamic website content is created based on a script developed by the programmer but the content must be equivalent for all the site users.TrueFalse
16- IPv6 allows far more hosts to be assigned with unique addresses compared to IPv4.TrueFalse
arrow_forward
Computer Ethics Questions:
We explored some of the ways websites are served to a user when that user makes a request to access a server. This question focuses on the DNS part of that process.
This is a course in tech ethics. Why is it important for a user to understand how DNS lookups work, and what does it have to do with ethics in tech? Be as specific as you can be. Make the connections here.
arrow_forward
How do cookies and sessions work in web applications, and what are their use cases?
arrow_forward
Draw a diagram illustrating the structure of an HTTP request. Provide a detailed explanation for each
component within the request, encompassing methods, headers, the endpoint, and the body.
arrow_forward
CASE STUDY 1: AW GUIDE
John Morris recently became a marketing manager of AW Guide, a tour guide
company. Nine months earlier, the company had established a new service: sending a
newsletter through emails to customers notifying them of tour updates and inviting
them to download the latest tours and travel information. The same information is made
available on their corporate website. Customers initially expressed delight with the
service. But in the past month, many customers have complained that the travel
information they received in the emails was out of date. Since then, the company has
received many cancellation requests and had affected the company sales performance.
John realizes that something is wrong with the content-updating and distribution
process he uses for emails and website. But he is unsure how to address the problem.
The lack of use of IT applications in current business processes has also contributed to
a loss of efficiency and customer focus. John has proposed to…
arrow_forward
14 of 65
R Comment
A Flag for Review
A company hosts its product information webpages on AWS. The existing solution uses multiple Amazon EC2 instances behind an Application Load Balancer in an Auto Scaling group. The website
also uses a custom DNS name and communicates with HTTPS only using a dedicated SSL certificate. The company is planning a new product launch and wants to be sure that users from around
the world have the best possible experience on the new website.
What should a solutions architect do to meet these requirements?
O A.
Redesign the application to use Amazon CloudFront.
O B.
Redesign the application to use AWS Elastic Beanstalk.
OC.
Redesign the application to use a Network Load Balancer.
OD.
Redesign the application to use Amazon S3 static website hosting.
arrow_forward
In computers, what is the compressed form of Microsoft Developer Network?
arrow_forward
CASE STUDY 1: AW GUIDE
John Morris recently became a marketing manager of AW Guide, a tour guide
company. Nine months earlier, the company had established a new service: sending a
newsletter through emails to customers notifying them of tour updates and inviting
them to download the latest tours and travel information. The same information is made
available on their corporate website. Customers initially expressed delight with the
service. But in the past month, many customers have complained that the travel
information they received in the emails was out of date. Since then, the company has
received many cancellation requests and had affected the company sales performance.
John realizes that something is wrong with the content-updating and distribution
process he uses for emails and website. But he is unsure how to address the problem.
The lack of use of IT applications in current business processes has also contributed to
a loss of efficiency and customer focus. John has proposed to…
arrow_forward
1:51
a docs.google.com
Q1:HTTP is a protocol that was originally
designed for transmitting hypermedia *
True
False
Q2:Gray-Scale Images are the simplest type
of images and can take on two values *
True
False
Q3: Multiplication of pixel values by a
number greater than one will darken the
image *
True
False
Q4: Tagged Image File Format is a typically
loss format. *
True
False
arrow_forward
Computer Science
show a list of stores available. Create a small store json file
URL: /storeHTTP verb: GETAccept HTTP header of the request: text/html
get response 200 for successful, 404 for dne, or 500 for other errors
arrow_forward
95%) Monday March 15th @ 6 pm-7:05 (page 31 of 43)- Profile 1- Microsoft Edge
earn.squ.edu.om/mod/quiz/attempt.php?attempt3D1746337&cmid%3872704&page%3D30
NING SYSTEM (ACADEMIC)
duction to Management Information Systems (4-
Time left 0:3
It is illegal and unethical to download and install a pirated copy of Microsoft Office on your own laptop.
Select one:
O True
O False
PAGE
NEXT PAG
ere to search
立
arrow_forward
Write Python code to run an NMAP SYN scan on your own computer
Write Python code to run an OS discovery scan on almost.hckbl.net
Write Python code to live capture HTTP traffic between your computer and google dot c o m
Write Python code to capture DNS queries from your computer
arrow_forward
Windows DNS includes the "main," "secondary," and "stub" zones.Windows DNS supports a primary zone, a secondary zone, and a stub zone.
arrow_forward
Refer to the activity Life Cycle. What functions are called when:
In a social networking app, a user clicks a link to a news, and the browser is launched to
show the news. What function is called in the social networking app?
Resumed
(visible)
onResume()
onPause()
onResume()
Started
Paused
(visible)
(partially visible)
onStart()
onStop()
onStart()
Stopped
(hidden)
Created
-onRestart()-
onCreate()
onDestroy()
Destroyed
arrow_forward
Q) Write a detailed explanation on how cookies work in web
technologies. In your explanation, please address the following points:
Definition: Define what cookies are in the context of web technologies.
Creation and Storage: Explain how cookies are created and where they
are stored.
Usage: Discuss how cookies are used by websites for session
management, personalization, and tracking user behavior.
Security Concerns: Discuss any security concerns associated with the use
of cookies and how they can be mitigated.
Alternatives: Are there any alternatives to cookies in modern web
development? If so, discuss them.
arrow_forward
Code in python Brute Force Attack
You will take an encrypted msg and the code will search for the keys for decrypting the message.
Please ONLY upload SCREENSHOTS of code and output of the code. No explanation please or i will vote down. Thank you.
arrow_forward
A Moving to the next question prevents changes to this answer.
Question 5 of 27
Question 5
Save Answer
If you have a 2:3:2 FFNN, how many weights does the network need to tune by the BP? (write the answer in number, e.g., 10, without any space or any characters)
Question 5 of 27
A Moving to the next question prevents changes to this answer.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Q2 Smart-Toys-Smart Kids CEO (Part 2) Smart-Toys-Smart Kids has decided to install a new e-mail package to streamline communications within the company. Fred would like to have one common calendar for his all 200 employees. The expected features of the new e-mail package are “background processing” that doesn't get a great deal of attention. This includes managing connections, checking for errors in commands and e-mail messages, and reacting accordingly. The e-mail software vendors offered two different e-mail system for solution. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one. a) Briefly explain to Fred, in layman's terms, the differences between the two. b) Outline the pros and cons of the two alternatives c) Make a recommendation to Fred about which is better for his company ANSWER Classification SMTP-based two-tier client server…arrow_forwardcreate a Login and registration page using python and mysql please TYPE the code The one I recieved befor was all imagesarrow_forwardGraduation Project * SSH connection:- Setting up github with server to connect via setting a ssh connection using public and private keys.arrow_forward
- locations: one in the United States, one in South America, and one in Europe. Each location has approximately 1000 users who need certificates. About 75% of the users in each location are domain members running Windows 8.1 and Windows 10. The others are running a non-Windows OS and aren't domain members. Some features of the PKI should include the following:• Web enrollment• Autoenrollment• Smart card enrollment in which designated users can enroll other users• EFS• Automatic key archival• Network device certificates• Real-time query for certificate revocation statusDesign the CA hierarchy, and label each CA according to its function and status (standalone, enterprise, root, intermediate, issuing, online, offline). The design should include a drawing showing the hierarchy as well as a detailed description, including how users and clients interact with the systems you selected. In addition, list the role services that need to be installed and the certificate template types that must be…arrow_forwardSNMPv2 Manager sending a getRequest message to SNMPv1agent through a proxy sever will: A) Setting the value of error status to 0 B) Setting the value for max-repetitions field to 0 C) Change the sysUpTime to 0 D) Pass Through without any changesarrow_forwardFacebook is one of the most popular social networks where users can post posts to different (text or image) and comment on them • Each user must register beforehand in order to use the system. The user is identified by a name, surname, date of birth, email address (which will also serve for authentication) and a password. • Any user can make a post which contains a text and/or image. Post is identified by a unique code, text used, an identification code for the image and date of post. • A user (including the author of the post) can comment on the post. The comment is characterized by an identification code, text, and date of post. Also, a user may like a comment or post. The system should keep track which user has liked the post/comment, etc. • Users can also exchange messages with each other. Each message is characterized from the unique code, text, date and time of sending as well as information if the recipient has seen the message or not. Write the rational schema, normalization -…arrow_forward
- Data file: 736.2 731.6 829.8 875.8 568.3 292.2 231.1 868.9 66.7 811.9 292.0 967.6 419.3 578.1 322.5 471.7 980.0 378.8 784.1 116.8 900.4 355.3 645.7 603.6 409.1 652.1 144.1 590.6 953.1 954.0 502.0 689.3 685.6 331.9 565.1 253.9 624.1 796.2 122.8 690.7 608.0 414.8 658.3 27.3 992.9 980.8 499.0 972.8 359.7 283.1 89.7 260.1 638.4 735.4 863.6 47.5 387.5 7.7 638.1 340.6 961.7 140.1 29.8 647.3 471.9 594.9 901.2 96.0 391.1 24.0 786.7 999.1 438.7 445.0 26.4 431.6 425.9 525.4 404.4 785.6 808.5 494.1 45.7 447.0 229.5 909.3 494.4 617.0 917.0 132.5 957.5 878.8 272.6 987.4 526.1 744.5 582.3 427.3 840.5 973.3arrow_forwardWhat are some of the drawbacks of having pages that are fragmented?arrow_forwardEthics Robert, a case manager, has decided to create a list on the listserv from his own Internet service at home for his various patients' illnesses. He establishes one list for each of the following chronic conditions: asthma, diabetes, and congestive heart failure (CHF). He automatically enrolls all of his patients that he has email addresses for into their appropriate list with the intention that they can share information and support among themselves, as well as making it easier for him to share information with his patients. Everything is going well for the first month of the listserv exchange. However, a virus is introduced to the lists and everyone is contaminated. This virus has damaged the patients' hard drives on their home computers and some patients' work computers have been harmed. The patients contact Robert's employer and demand to be reimbursed for all damages to their machines and are very upset that these lists were created in the first place. Robert's employer was…arrow_forward
- DNS queries, authoritative and root server DNS records, as well as iterated and non-iterated GET requests, are comprehensively covered.arrow_forward1- A microservice is a web service that only responds to specific requests and cannot consume any other services. True or false 2- Implementing a web application using SOA architecture depends on the programming languages that have been used to build the application. True or false 3- SOAP Attachment may contain XML or non XML message. True or falsearrow_forwardjava scrpit code1 the statement that is found in a typical Router module that enables the module to be used by code in other files. 2JavaScript statement that sets the public subfolder as the web server's default folder when the endpoint path is the root path.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education