Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Identify and address concerns on virtual platforms
Preparing and sharing of management of virtual platform report

a) Distinguish between local area network (LAN), metropolitan area network

(MAN), wide area network (WAN), personal area network (PAN), campus area

network (CAN). Outline the roles each play in helping a business organization

increase return on investment. AN [7 marks]

b) i. With a well-designed diagram, differentiate between client-server computer

network architecture and peer-to-peer network architecture

ii. Distinguish between cloud computing technology and network attached

storage.

EV [8 marks]

c) Discuss social engineering and describe five (5) impacts it has on modern

business organization. Also, evaluate five (5) software security threats and how

it affects return on investment of a business organization.


The motorway management perceives that the waiting time computed in (a) above is not acceptable and it wishes to reduce it, first, by adding an extra tollbooth assistant to help improve the service rate to 250 motorists every 8-hour-day. The tollbooth attendant will be paid a monthly salary of GH¢400. The second option is that management can add a toll-operated machine which will cost GH¢3,000 and this amount is a free gift from the Minister. This option will reduce the arrival rate to 35 motorists every 2 hours. However, management will have to pay the operator who will man the toll-operated machine a monthly salary of GH¢550. Whichever option management adopts; they avoid lost sales of GH¢1,200.00 per month for every minute that average waiting time is reduced. Advise management which option it must adopt?


Discuss, in detail, reasons why an operating system is considered as

a resource manager; and explain how it manages the various

resources in the context of computer-based information systems

in use at a financial institution


A technician is setting up a new wireless network at a branch office that previously had only wired

connectivity with statically assigned IP addresses. After setting up the network, the technician 

configures a server to provide IP addresses to wireless clients. During testing, the technician is 

unable to access the Internet or named network resources. The technician receives a valid IP 

address from the DHCP server and can ping the default gateway.

Explain various steps that can be taken to resolve this issue. (each step highlighted MUST be 

accompanied by the intended solution the step hopes to achieve)


A firewall is Network security device that monitors incoming and outgoing network traffic as well 

as permits or blocks data packets based on a set of security rules”. 

Critically discuss how a firewall operates and the various types of firewalls (Use appropriate 

diagram to corroborate your discussion)


5. Operating systems protect the computer hardware and its

components. They also perform many responsibilities and/or

provide services to manage various resources of the computer

system as well as promote the efficiency of use of the computer

systems.

(i). Discuss how an operating system protects computer

hardware, processor, main memory, and input-output

devices of a computer system; and provide

appropriate practical examples to illustrate your

answer.

(ii). Explain practical issues that an operating system may

encounter in its attempt to accomplish the

protections you discussed in (i) above.

(iii). In your own words, explain the responsibilities and/or

services that an operating system provides for efficient

operation of the computer systems and/or embedded

systems in hospitals.

(iv). Discuss design objectives that you consider paramount to

Input-output (I/O) device management in operating

systems.

 


3(a). Mr Rushdy is a systems administrator at Ecobank Ghana Ltd. The

bank’s server and many application software have been

encountering persistent problems and he is getting a bit glittery

and frustrated. His initial investigation of the server and the

application software reveals that several processes get

terminated daily while some also get suspended in the system.

(i). Discuss reasons for each of the following situations to help Mr.

Rushdy in his research/investigation:

(α). why a process may be suspended in computer

systems.

(β). why a process may be terminated from a

computer system. 

(ii). Discuss how Mr. Rushdy can possibly resolve the problems

(regarding process suspension and termination) to enable

the server and application software run smoothly for his

organization.

(b). These days, many computer users (individuals and

organizations) prefer to buy and use symmetric

multiprocessing systems for their operations.


 


Operating systems have substantially evolved over the years (from serial

processing systems to today’s robust time-sharing, multiprocessing and

real-time systems).

(i). Discuss the reasons why you consider modern operating systems to

be better, more robust and more efficient than the earlier ones.

(ii). Discuss, in detail, reasons why an operating system is considered as

a resource manager; and explain how it manages the various

resources in the context of computer-based information systems

in use at a financial institution like Access Bank.

(iii). Data coherence problem and starvation cause a lot of havoc in

computer systems. As an Operating System designer and/or

developer, you are required to do the following:

(α)…Distinguish between data coherence problem and

starvation in the context of concurrency in operating

systems. Give practical examples to illustrate your answer.

(β).…Discuss how the two problems in (α) can be solved in

computer systems. 


how computer networks is beneficial in your field of study



LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS