comunication and technology

User Generated

fnonjb

Computer Science

Description

hi i have questions need to choose answer for them but i need to be 90% correct please                         choosing answers.docx

Unformatted Attachment Preview

Select the two true statements from the following list. Select one or more: Magnetic storage devices are resistant to temperatures as high as 40 °C. A 10-bit word can represent 2048 different code words. Text data saved in a native file format can be read in any word processor. A data rate of 4 gigabits per second means that 4 × 109 bits are transmitted in one second. A relational database cannot hold more than one table. mp4, mpg and bmp are all examples of video file extensions. A 20 MB file is to be transmitted over a 2 megabits per second connection. How long should the complete transmission take, to the nearest 0.1 seconds? Select one: 10 s 10.5 s 80 s 0.01 s 0.1 s 83.9 s If a 10 MB file is compressed using a compression ratio of 4, what would be the size of the resulting compressed file? Select one: 0.5 MB 0.4 MB 0.25 MB 2.5 MB 25 MB 40 MB Select the two true statements from the following list. Select one or more: In a network that uses DHCP, devices connecting to the network are assigned a temporary IP address by the DHCP service. In the TCP/IP model, the Network Access layer is responsible for placing data on the medium at the source and taking it off at the destination. FTP, UDP and DHCP are all Application Layer protocols. The process of interleaving several packets of data from different hosts for transmission together over the network is known as segmenting. HTTP uses GET message types to collect messages from users for uploading to the web server. FTP requires three connections between server and client: one for commands, one for replies and one for file transfer. From the sets of terms given in each of the drop-down boxes, choose the option that is the most appropriate in the following statement. UDP is a (connection orented or connectionless) protocol that operates at(transport, internet,network acces) the layer; compared with TCP, it has (a significantly lower, significantly higher, or same)voverhead. From the sets of terms given below, select the option that correctly describes the IPv4 address 192.168.3.5/24. Number of bytes in host portion A 1 B 3 C 4 D 1 E 3 F 4 G 1 H 3 Select one: Network portion of address 168.3.5 192.168.3 192.168.3.5 192.168.3 5/24 24 168.3.5 192 Host portion of address 5/24 5 24 5 168.3.5 192.168.3.5 192 168.3.5 A B C D E F G H Select the two true statements from the following list. Select one or more: Contention-based media access has higher overheads than controlled media access. The header of a Data Link layer frame includes a CRC: a value that gives a logical summary of the contents of a frame. Frame addressing at layer 2 does not include a network address. In a half-duplex point-to-point media access link, both devices can transmit data simultaneously. In a network that uses controlled media access, the more devices that are connected to the network, the longer each device will have to wait to send data. Data Link layer processes are implemented only in hardware, not in software. Select the two true statements from the following list. For statements that require frequency or bandwidth calculations, base your answer on values provided in the module materials, not internet sources as these may not always be reliable. Select one or more: The ISM band is the name given to a band of radio frequencies running from exactly 2.4 MHz to exactly 2.4835 MHz. An ad hoc wireless network does not require the services of a router, whereas router services are needed for a peer-to-peer network. As the frequency of a radio wave increases, the distance it can travel decreases. A wireless node with a single transmit/receive antenna is unable to use the CSMA/CD protocol. A node situated close to a Wi-Fi wireless access point will be subject to the same network management overheads as one on the outer edges of the network range. Channels 6, 8 and 10 are non-overlapping 802.11g Wi-Fi channels. Select the two true statements from the following list. Select one or more: If four users are connected to a wireless network that offers a maximum data rate of 11 Mbit/s and a throughput of 50%, the typical practical data rate available to each user in ideal conditions will be more than 1 Mbit/s. In a busy Wi-Fi network, a node may have to set a backoff random delay several times before it can send data. Channel bonding, frame aggregation and block acknowledgement are methods used to increase network efficiency in 802.11g networks. Transmit beamforming exploits the effects of spatial diversity to provide a stronger wireless signal at the receiver for mobile users. An increase in the noise present in a signal results in an increase in the signal-to-noise ratio. SISO stands for Standard Interrupt Signal Order. The following is a possible XML description of a calendar entry. From the options listed below choose the most appropriate statement about the accuracy of the use of XML in the description. 2012 March 2 Friday 12.00 noon TMA01 deadline Select one: Incorrect because the tags in one pair don’t match. Incorrect because a / missing in a closing tag. Incorrect because one start tag missing. Incorrect because a / included in an opening tag. Fully correct. Incorrect because one closing tag missing. Reminder: Questions 11 and 12 are formative, meaning that your score will not count towards your overall continuous assessment grade. The feedback provided on these two final questions will, however, help you with your writing skills development and so you are strongly encouraged to answer them. Questions 11 and 12 refer to Document C, which is an alternative response to the brief given in the box called ‘A brief and a document’ in Section 4.1 of Block 1, Part 7. Document C (186 words) Personal computers have a main memory which holds temporary programs and data – those programs and data that are currently being used to perform a task. Main memory is not a permanent memory and any instructions or data stored there will be lost when the computer is switched off therefore it is described as being volatile memory. It is important that any program or data of importance should be stored on some form of secondary memory. Secondary memory is retentive memory. Its purpose is to store programs, and also data that might have been created by the program enabling the user to read back this data. There are two types of secondary memory – permanent and removable. Permanent secondary memory as it suggests cannot be removed from the computer and comes in the form of a hard disk. Removable secondary memory comes in the form of DVDs, floppy disks, CDROMs and memory cards. Although programs and data may be stored on some form of secondary memory it must be copied to the computers main memory in order for the processor to execute the program and use the data. Question 11 Not yet answered Not graded Flag question Question text This question relates to whether Document C meets the brief. Select the three most valid statements about Document C from the list below. Choose three options. Select one or more: It adequately states what main memory is used for. It adequately states what secondary memory is used for. It adequately explains why there are various types of secondary memory used in connection with personal computers. It adequately explains why both types of memory are needed. It is within the stated word count. It clearly states that there are two major types of memory used in personal computers. Question 12 Not yet answered Not graded Flag question Question text This question relates to the structure, style, technical level and English of Document C. Select the three most valid statements from the list below. Choose three options. Select one or more: There is a missing apostrophe in the final paragraph. There is a good introductory sentence. The concerns are separated. It explains any technological terms that may not be understood by the audience. It is in a suitable style for the audience and purpose. The first paragraph contains a sentence that is long and difficult to read, so would be better separated into two sentences.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags