Cancel
TopicsDown
Products Down
Follow Us:
FacebookTwitter
Advertisement

Computer Network Questions and Answers (Q&A)

J. Emmerich, Web Content Writer
Answered: Aug 07, 2019
WWAN and WLAN are both forms of wireless networks which provide connectivity on the run. So far one is within range, the network can be connected to, and services like email, internet connection,...Read More

2 Answers

2263 views
K.Paul
Answered: Dec 11, 2017
The correct answer to the question “Which network topology requires terminators?” is letter A or bus network. Before we delve into that, it is worthy to mention that there are two...Read More

3 Answers

874 views
H. Jones, Web Content Writer
Answered: Sep 20, 2018
There are different network topologies that you can find right now but the most common one has to be the star network. This means that the answer to this question is C. Star network. If in case...Read More

2 Answers

653 views
Ben Evers
Answered: Sep 08, 2017

Could someone demonstrate how i can share my optical mouse, my monitor and my keyboard on the network? The persen than can do that, wins a dollar!

2 Answers

315 views
Ben Evers
Answered: Sep 08, 2017

First of all, we don't use a HUB anymore. We use a (small) switch.

We don's need a hub or switch to share things on a network. This can be done Wireless.

2 Answers

294 views
Owenc
Answered: Sep 29, 2020
Security, interoperability, supportability, sustainability, and usability (SISSU).

1 Answer

282 views
Abnerbugeja
Answered: Sep 29, 2020
Peripherals can be shared
Software & files can be shared
It is easily expandable

2 Answers

257 views
Ben Evers
Answered: Sep 08, 2017

We can use the air (WiFi, satelite)

We can use copper (Twisted pair, coaxial,)

We can use Fiber optics (Single mode, multimode)

2 Answers

246 views
John Smith
Answered: Sep 29, 2020
The process is called IP (internet protocol) spoofing: he word spoofing was popularized in the air-force. when a fighter jet notices an enemy missile (air-to-air or surface-to-air) coming, the...Read More

1 Answer

246 views
I. Klose, Accountant
Answered: Jul 17, 2019
SFP+ module and XFP module are both working at 10G data rate but have different specification and power. XFP was released in 2002 that works as a pluggable transceiver and is used with a fiber...Read More

2 Answers

244 views
B.Lisa
Answered: Feb 26, 2018
A honeypot is a computer security system set up to deliberately bait and attract attackers. It is designed to act as part of the system and be invisible. In this way, they gather information to...Read More

2 Answers

235 views
O.Olivia
Answered: Feb 12, 2020
The main reason for this is the Service Host: Local System is composed of different bundle processes. They would be operating directly through the system. There is a chance that there are a lot...Read More

1 Answer

217 views
M. Pollock, Photographer
Answered: Jun 18, 2020
FTP and SFTP are known to be two different types of file transfer protocols. You can use them depending on your needs. FTP was the first file protocol that was created first. This explains why...Read More

2 Answers

10 views

Related Topics Of Computer Network

Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.