web analytics

Define Delivery? Explain various delivery concepts or methods.

Delivery:  Delivery refers to the way a packet is handled by the underlying network under the control of the network layer. Various delivery concepts are explained below. Connection Types:  Delivery of a packet in the network layer is accomplished by either a connection oriented service or a connection-less service. Connection Oriented Service:  At first a … Read more

What is connecting device? Describe 4 connecting devices.

Connecting Devices:  Devices that are used to connect other devices are called connecting devices. That is, connecting device is a device that connects. There are 4 types of connecting devices. They are as follows, i. Repeater:  A repeater is a device that receives signals and before it become too weak or corrupted the repeater regenerates … Read more

Describe CSMA/CA or Carrier Sense Multiple Access with Collision Avoidance.

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): This is a wireless network multiple access method defined by IEEE 802.11 standard. CSMA/CA is a modification to CSMA/CD. Collision detection as in CSMA/CD is not applicable for several reason, one reason is Hidden Terminal Problem. To understand this problem, considering that we have three stations 1, … Read more

Describe CSMA/CD or describe the access method of Ether LANs.

CSMA/CD (Carrier Sense Multiple Access with Collision Detection):  The IEEE 802.3 defines the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the standard access method for traditional Ethernet. Stations in a traditional Ethernet can be connected using a physical bus or star topology, but the logical topology is always a bus. It means that … Read more

What is computer threat? Describe 6 computer threats.

Computer Threats: A threat, in general, is a person or a thing likely to cause damage or danger. In computer security, a computer threat is a possible danger that might exploit vulnerability to breach security and therefore cause possible harm. A computer threat is any activity that can cause damage to private or any data … Read more

What is malware? Describe any 5 types of computer malware with an example.

Malware Malicious Software or Malware is any piece of software that disrupts computer operation, steal information, gain access to private systems or display unwanted advertising. Malware causes intentional harm, direct or indirect, to the computer by damaging files etc. or to the user by stealing sensitive information of the user from the computer etc. A … Read more

What are the 6 steps followed by CPU in computer to Execute an Instruction?

CPU (Central Processing Unit)

CPU or central processing unit in computer is an electronic circuitry that carries out the instruction given by a computer program. CPU in computer execute instruction by performing basic arithmetic, logical, control and I/O operations as required per instruction. CPU in computer is considered to be the brain of the computer. The speed and efficiency of a computer mostly depends on it’s CPU.

Read more

What is Motherboard? What are the role or functions of motherboard?

Motherboard: A motherboard is a printed circuit board (PCB) that holds other modular devices, both required and additional, and facilitate communication among the devices to actually have the computer be functional. Motherboard is like a backbone to a computer system. Components like CPU, RAM, Harddisks along with additional devices like TV Cards, graphics etc. all … Read more

Define Instruction Set Architecture. What are the main objectives of ISA in computer systems.

Instruction Set Architecture (ISA): An instruction set is the interface between a computer’s software and its hardware, and thereby enables the independent development of these two computing realms. ISA is the set of basic instructions that a processor understands. ISA includes functional definition of operations, modes, and storage locations supported by hardware and precise description of … Read more