web analytics

Explanation

Define Delivery? Explain various delivery concepts or methods.

Delivery:  Delivery refers to the way a packet is handled by the underlying network under the control of the network layer. Various delivery concepts are explained below. Connection Types:  Delivery of a packet in the network layer is accomplished by either a connection oriented service or a connection-less service. Connection Oriented Service:  At first a …

Define Delivery? Explain various delivery concepts or methods. Read More »

What is connecting device? Describe 4 connecting devices.

Connecting Devices:  Devices that are used to connect other devices are called connecting devices. That is, connecting device is a device that connects. There are 4 types of connecting devices. They are as follows, i. Repeater:  A repeater is a device that receives signals and before it become too weak or corrupted the repeater regenerates …

What is connecting device? Describe 4 connecting devices. Read More »

Describe CSMA/CA or Carrier Sense Multiple Access with Collision Avoidance.

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): This is a wireless network multiple access method defined by IEEE 802.11 standard. CSMA/CA is a modification to CSMA/CD. Collision detection as in CSMA/CD is not applicable for several reason, one reason is Hidden Terminal Problem. To understand this problem, considering that we have three stations 1, …

Describe CSMA/CA or Carrier Sense Multiple Access with Collision Avoidance. Read More »

Describe CSMA/CD or describe the access method of Ether LANs.

CSMA/CD (Carrier Sense Multiple Access with Collision Detection):  The IEEE 802.3 defines the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the standard access method for traditional Ethernet. Stations in a traditional Ethernet can be connected using a physical bus or star topology, but the logical topology is always a bus. It means that …

Describe CSMA/CD or describe the access method of Ether LANs. Read More »

What is computer threat? Describe 6 computer threats.

Computer Threats: A threat, in general, is a person or a thing likely to cause damage or danger. In computer security, a computer threat is a possible danger that might exploit vulnerability to breach security and therefore cause possible harm. A computer threat is any activity that can cause damage to private or any data …

What is computer threat? Describe 6 computer threats. Read More »

What is malware? Describe any 5 types of computer malware with an example.

Malware Malicious Software or Malware is any piece of software that disrupts computer operation, steal information, gain access to private systems or display unwanted advertising. Malware causes intentional harm, direct or indirect, to the computer by damaging files etc. or to the user by stealing sensitive information of the user from the computer etc. A …

What is malware? Describe any 5 types of computer malware with an example. Read More »

Explain Software Design & Implementation Activity

Software Design & Implementation Activity: The implementation stage of software development is the process of converting a system specification into an executable system. A software design is a description of the structure of the software to be implemented, the data which is part of the system, the interfaces between system components and, sometimes, the algorithms …

Explain Software Design & Implementation Activity Read More »

What is Software Specification Activity? Describe the four main phases of software specification activity?

Software specification or requirements engineering is one of the four activities of software process. In software specification, the task is to identifying and defining the services to be provided from the system and what are the constraints in the operations of the system and in the development of the system.

Scroll to Top