a) Why the business organization choose computer network for its employee computers? List down the different topologies which are used for computer networks. Is MAC address responsible for communication among computers within same LAN.
b) If a computer manufacturer called Apex created a home page for the Web, what would its URL likely be? Also, provide appropriate e-mail address for yourself, assuming that you are employed by that company.
c) What factors made Pakistan Telecommunication Company Limited (PTCL) to convert its network from circuit switching to packet switching?
d) The ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but misuse of new improvements to this technology result in the loss of that convenience and other problems? Justify this statement.
a) Why the business organization chooses a computer network for its employee computers?
i) Computer networks help employees work more efficiently.
ii) Helps employees share ideas easily.
iii) Improves the way companies offer their services to the world.
iv) Increase productivity.
Network topologies;
i) Star topology
ii) Mesh topology
iii) Bus topology
iv) Hybrid topology
v) Ring topology
Yes, the MAC address is responsible for communication among computers within the same LAN.
b) URL - https://www.apex.com
Email -john.doe@apex.com
c) Advantages of packet switching over circuit switching
i) Packet switching is efficient in resource utilization because it allows simultaneous usage of the same channel by multiple users.
ii) Packet switching improves reliability because data delivery can continue even if some parts of the network faces link failure.
d) The ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but misuse of new improvements to this technology result in the loss of that convenience and other problems such as;
i) Data in mobile phones is stored at a server making it vulnerable to malicious users, hence leading to violation of privacy.
ii) With the advancement in technology it has become a norm for almost everyone to own a mobile phone, scammers have taken advantage to reach a large number of people and con via social engineering e.g. via calls.
Comments
Leave a comment