Textbook questions

chapter 1: Networks

Test your knowledge

4. what compelling reason wouldc an organisation use to justify recourse sharing? A companning reason for an organisation to justify recourse sharing is money! By sharing recourses the company has more money to upgrade their recourses than buying hundreds or printers, scanners, etc.
 * 1) A network connects computers and other devices together so that they can share data, information and resources
 * 2) Groupware allows users on a network to work together on the same project. Each member of the group can view the same document and immediately see the changes made by a colleague.
 * 3) The advantages of using a network are in resource sharing, accessing remote services, facilitating communications and sharing data and information
 * 4) Resource sharing allows users to access a resource on the network only when they need it, thus not requiring each workstation to have its own connected resource.

5. what resources other than printing can be shared on a network? You can share dozens of devices on a network, such as file server to help with data storage and to prevent duplicated data

6. describe the benefit to an organisation in providing a remote ordering service for customers over the internet. The benefit for an organisation to provide a remote ordering service for the customers over the internet is they can have a larger client base, people from other states or countries could buy an item that’s on sale from the company.

7. how does file sharing on a network avoid problems associated with data duplication? If a file is on the same file server under the same name and file type you get a warning as to whether you want to save it or change its name, preventing data duplication.

8. under what circumstances would it be more appropriate to set up a blog rather than a wiki. When you want to write things in a diary context and where you don’t want people to be able to edit just read and comment, and in most circumstances this is better than wiki because if its your wiki you don’t want people to edit what you say.

9. how do wikis sites cope with the visitors intent on causing damage or being a nuisance? Wiki sites save after every edit and the administrators check whats happened and if it gets spammed and deleted the administrators just revert the changes to what it was before the attack.

10. what is a thread on an online forum? How are threads established? Threads in an online forum are topics, something to talk about. Threads are generally made by members of an online forum of which you have to sign up to 90% to be elegable to make posts.

11. what type of social networking site would be appropriate for someone who wants to share stories thoughts and photos with friends? Facebook would be an ideal social networking site for such acts, as its easy to nagivate, easy to use, and easy to do anything required for a person and much more

12. what are they key differences between wans and lans? The main difference is the sheer size of the network! A wan is a wide area network that can go over hundreds of meters and is generally made of 2 local are networks put together.

13. why are network points called nodes rather than being called computers? Network points are called nodes rather than computers because its not always a computer, it can be a laptop, notebook, anything that can be connected to a network. Thus generalising everything to being a computer would be wrong and node would be a more accurate term.

14. explain the difference between a client and a server on a network. The difference between a client and a server is that a client receives the data that is sent from the server.

15. describe the roles of the following on a network: database server, domain name server, proxy server, active directory domain controller. The role of a database server is A database server is a computer program that provides database services to other computer programs or computers. the Domain Name System (DNS) is a hierarchical naming system built on a distributed database for computers services or anything connected to the internet or private network. A proxy server sends a proxy code with the packet of information so that it can get through the firewall without incident. Active Directory uses a number of standardized protocols to provide a variety of network services,

16. would a peer to peer network be worthwhile on a small business? A peer to peer has its advantages and disadvantages, but it would be suggested, because it’s a small company and if it were 20+ people id go for a client server network but as its probably less than that its not really worth paying for a server.

17. kazaa was a good example of a peer to p;eer network. It was slower than web servers that use a client server model. What are the problems with peer to peer networks? The problem with peer to peer networks is you cannot access other peoples files you have to walk over to their desk and get them to either print the file off or put it on a flash drive.

18. what is a switch? A switch is a tool in a network so you can connect over 20 computers within the one room to the network.

19. what is an intranet? An intranet is the internal website for the company, generally has recourses that can be used on it.

20. why do manufacturers bujild products based on the network standards? Manufacturers build products based on the network standards because the product may only work in a specific standards so they have to build their products custom to a network.

21. list four functions included in a network protocol. Networking protocols, such as TCP/IP, enable computers to exchange data with each other in a meaningful, organized, and efficient way. Computer protocols are similar to human language - if you speak English and you meet someone who speaks German, the protocols (languages) you use to exchange information are incompatible with each other. It is only when you both speak the same language that you can understand each other. Similarly, computers rely on protocols to ensure each computer "understands" what the other computer is sending it. Just as with humans, both computers must use the same protocol if they are to exchange information with each other successfully.

22. identify four components of all Ethernet frames

23. describe how data flows over an Ethernet network from source to the intended destination. Data flows from the source through the internet to a router which sends it to its intended destination, hits the firewall goes through a hole, gets sent to its intended person, all in the blink of an eye.

24. how does a collision occur on a network? How does Ethernet avoid repeated collisions of the same transmissions? A network collision occurs when two devices attempt to transmit data on a shared circuit. In a shared circuit where multiple devices are listening, only a single device can transmit data at a single point in time which requires the rest of the devices to be listening to the transmission. In an hub environments, multiple devices are connected to a single transmission stream, so collisions tend to happen. Switches break up collision domains to have single devices on their own network segment, which eliminates collisions.

25. tcp/ip uses smaller packets than other protocols why is this an advantage on the internet? Its known that smaller packets reach their destination faster and if the packages were larger then the time taken to reach the destination would take longer.

26. what standards does wi fi network use? Wi fi networks have a password that changes every few days to prevent people from leeching off their network, this is effective because the people within the company are the only ones who know the network password.

27. list a number of tasks undertaken by a network operating system. A network operating system (NOS) is a software program that controls other software and hardware that runs on a network. It also allows multiple computers, also known as network computers, to communicate with one main computer and each other, so as to share resources, run applications, and send messages, among other things.

28. What are three components of a uniform resource location a Uniform Resource Locator (URL) is a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.

29. how does a domain name server assist a web browser in connecting to a website? The dns assists a web browser in connecting to a website by registering all the websites’ information making it easier to load, a unregistered page takes longer to load as the information has to be retrieved.

30. what does the web server software when it receives a GET request from a clients web browser? The web server software is when a person overrides the web server softwares decision to block a website and continues on.

31. what are three reasons for using a proxy server on a network that will be used to connect to the internet? People could be accessing inappropriate sites in which could be wasting valuable data allowances. Viruses could get into the server and infect every computer. Hackers could hack into the server and get financial information from the companies servers and hack their bank accounts losing the clients a lot of money!

32.

33. what do we mean by cross platform software? Describe an example of cross platform software? Cross platform software is where software can be used on linux computers, Microsoft computers, apple computers, and they are very good because the developers can make 3x the money from the one piece of software soley because there is a much wider client range, an example of this would be windows 7 on mac.

34. what is the role of a network interface card? The purpose of a network interface card is to be able to connect the computer to the internet wirelessly and through Ethernet cables. Although now Ethernet ports are now getting more common to be built into the computers motherboard, so network interface cards are almost becoming obsolete.

35. describe the process of roaming on a wi-fi network. Roaming on a wi-fi network works by plugging in a 3g roaming device and you can access wirelessly from almost anywere around Australia.

36. why would a café establish a hot spot in the premesis? A café would establish a hot spot in the premesis because they can charge more for that spot because the pages will load faster and if they are gaming they will receive an advantage because they have a faster connection speed to anyone else.

37. what are routers used for? Routers are used to route the data packets to its intended destination, so it doesn’t cause problems in going to the wrong person or place.

38. how does a modem enable a computer to communicate with a network over a standard telephone line? The modem enables a computer to communicate with a network over a standard telephone line by sending small packets of information to the destination.

39. how does a digital modem differ from a dial up modem? the main differences between the two is that dialup is old, and has very slow connection speed wheras digital is reletivley new and can reach speeds of 100 mps. The other difference is the physical connection, the wires used to connect. The digital can use all types of wiring, wheras the dialup needs telephone lines to plug into the computer and the modem.

40. why do new networks use cat5 standard cable rather than cat 3? Companies use cat5 standard cable rather than cat3 because cat3 can only carry 10mbps reliably over 100 meters. Wheras the cat5 cables have more twists per meter and can reliably carry 100mbps over distances up to 85 meters.

41. what are some of the disadcantages of using cat5 cables? Why is cat5 cable used in so many installations? The main disadvantages of cat5 cabling is it only can only carry large blocks of data up to 85 meters. Its mainlu used in installations because its cheap, easy to get your hands on, and a lot of the times its installed the network is not even 85 meters in radius.

42. why is fibre optic cable often used to connect major switches inside buildings as well as between buildings? Fibre optic cabling is used to connect major switches because they are small, fast and can reach long distances and its very durable. Its used between buildings because as said before its durable and over 1000 different frequencies can be transmitted along a strang at the one time.

43.what advantages does wireless networking have over a network that uses physical transmission media? The main advantage is that there are no physical cables, and itll take up too much space which could be used for something more useful like a printer or scanner… or fridge.

44. what limitation applies to microwave transmissions? Interference can be a big factor on the connection as they require no obstruction between the sending dish and the receiving dish.

45. why is radio wireless networking preferable to infra red wireless networking? Radio waves can be transmitted over lon\g distances such as between cities or over short distance such as within a building. Infrared transmission is not as good because it doesn’t go as longer distances and its data transfer rate is slower than that of radio waves, And cables.

46. why does a wireless network pose a greater security threat than a wired network? It poses a greater security threat to a wired network because wired networks you need to physically have the cable plugged into the computer, and wireless networks can be hacked into by people with a wireless hacking program called a dictionary.

47. recommend a password strategy that an organisation could implement to avoid unauthorized access to their network. I would suggest a password flipper, a program that changes the password every few days as if it did get accessed by an unauthorised entity they could only do a small amount of damage and the password could be changed almost instantly

48. what are the main purposes of firewalls and how are these purposes achieve this? Any packet of data flagged by the filters as unwanted is not allowed to go through.

49. what added security feature should wireless networks employ? They should employ usernames and passwords, firewalls, malware protection, and encryption.

50. what is a network diagram? A network diagram is a schematic method of showing the physical devices and communicated in a network.

51. why is a network diagram not based on the building plans of the organisation? A network diagram is not based on the building plans of the organisation because the network shouldn’t be reliant on the building plan.[http://search.twitter.com/search?q=%20%20%201.%20A%20network%20connects%20computers%20and%20other%20devices%20together%20so%20that%20they%20can%20share%20data%2C%20information%20and%20resources%0D%0A%20%20%202.%20Groupware%20allows%20users%20on%20a%20network%20to%20work%20together%20on%20the%20same%20project.%20Each%20member%20of%20the%20group%20can%20view%20the%20same%20document%20and%20immediately%20see%20the%20changes%20made%20by%20a%20colleague.%0D%0A%20%20%203.%20The%20advantages%20of%20using%20a%20network%20are%20in%20resource%20sharing%2C%20accessing%20remote%20services%2C%20facilitating%20communications%20and%20sharing%20data%20and%20information%0D%0A%20%20%204.%20Resource%20sharing%20allows%20users%20to%20access%20a%20resource%20on%20the%20network%20only%20when%20they%20need%20it%2C%20thus%20not%20requiring%20each%20workstation%20to%20have%20its%20own%20connected%20resource.%0D%0A%0D%0A4.%20what%20compelling%20reason%20wouldc%20an%20organisation%20use%20to%20justify%20recourse%20sharing%3F%20A%20companning%20reason%20for%20an%20organisation%20to%20justify%20recourse%20sharing%20is%20money%21%20By%20sharing%20recourses%20the%20company%20has%20more%20money%20to%20upgrade%20their%20recourses%20than%20buying%20hundreds%20or%20printers%2C%20scanners%2C%20etc.%0D%0A%0D%0A5.%20what%20resources%20other%20than%20printing%20can%20be%20shared%20on%20a%20network%3F%20You%20can%20share%20dozens%20of%20devices%20on%20a%20network%2C%20such%20as%20file%20server%20to%20help%20with%20data%20storage%20and%20to%20prevent%20duplicated%20data%0D%0A%0D%0A6.%20describe%20the%20benefit%20to%20an%20organisation%20in%20providing%20a%20remote%20ordering%20service%20for%20customers%20over%20the%20internet.%20The%20benefit%20for%20an%20organisation%20to%20provide%20a%20remote%20ordering%20service%20for%20the%20customers%20over%20the%20internet%20is%20they%20can%20have%20a%20larger%20client%20base%2C%20people%20from%20other%20states%20or%20countries%20could%20buy%20an%20item%20that%E2%80%99s%20on%20sale%20from%20the%20company.%0D%0A%0D%0A7.%20how%20does%20file%20sharing%20on%20a%20network%20avoid%20problems%20associated%20with%20data%20duplication%3F%20If%20a%20file%20is%20on%20the%20same%20file%20server%20under%20the%20same%20name%20and%20file%20type%20you%20get%20a%20warning%20as%20to%20whether%20you%20want%20to%20save%20it%20or%20change%20its%20name%2C%20preventing%20data%20duplication.%0D%0A%0D%0A8.%20under%20what%20circumstances%20would%20it%20be%20more%20appropriate%20to%20set%20up%20a%20blog%20rather%20than%20a%20wiki.%20When%20you%20want%20to%20write%20things%20in%20a%20diary%20context%20and%20where%20you%20don%E2%80%99t%20want%20people%20to%20be%20able%20to%20edit%20just%20read%20and%20comment%2C%20and%20in%20most%20circumstances%20this%20is%20better%20than%20wiki%20because%20if%20its%20your%20wiki%20you%20don%E2%80%99t%20want%20people%20to%20edit%20what%20you%20say.%0D%0A%0D%0A9.%20how%20do%20wikis%20sites%20cope%20with%20the%20visitors%20intent%20on%20causing%20damage%20or%20being%20a%20nuisance%3F%20Wiki%20sites%20save%20after%20every%20edit%20and%20the%20administrators%20check%20whats%20happened%20and%20if%20it%20gets%20spammed%20and%20deleted%20the%20administrators%20just%20revert%20the%20changes%20to%20what%20it%20was%20before%20the%20attack.%0D%0A%0D%0A10.%20what%20is%20a%20thread%20on%20an%20online%20forum%3F%20How%20are%20threads%20established%3F%20Threads%20in%20an%20online%20forum%20are%20topics%2C%20something%20to%20talk%20about.%20Threads%20are%20generally%20made%20by%20members%20of%20an%20online%20forum%20of%20which%20you%20have%20to%20sign%20up%20to%2090%25%20to%20be%20elegable%20to%20make%20posts.%0D%0A%0D%0A11.%20what%20type%20of%20social%20networking%20site%20would%20be%20appropriate%20for%20someone%20who%20wants%20to%20share%20stories%20thoughts%20and%20photos%20with%20friends%3F%20Facebook%20would%20be%20an%20ideal%20social%20networking%20site%20for%20such%20acts%2C%20as%20its%20easy%20to%20nagivate%2C%20easy%20to%20use%2C%20and%20easy%20to%20do%20anything%20required%20for%20a%20person%20and%20much%20more%0D%0A%0D%0A%0D%0A12.%20what%20are%20they%20key%20differences%20between%20wans%20and%20lans%3F%20The%20main%20difference%20is%20the%20sheer%20size%20of%20the%20network%21%20A%20wan%20is%20a%20wide%20area%20network%20that%20can%20go%20over%20hundreds%20of%20meters%20and%20is%20generally%20made%20of%202%20local%20are%20networks%20put%20together.%0D%0A%0D%0A13.%20why%20are%20network%20points%20called%20nodes%20rather%20than%20being%20called%20computers%3F%20Network%20points%20are%20called%20nodes%20rather%20than%20computers%20because%20its%20not%20always%20a%20computer%2C%20it%20can%20be%20a%20laptop%2C%20notebook%2C%20anything%20that%20can%20be%20connected%20to%20a%20network.%20Thus%20generalising%20everything%20to%20being%20a%20computer%20would%20be%20wrong%20and%20node%20would%20be%20a%20more%20accurate%20term.%0D%0A%0D%0A14.%20explain%20the%20difference%20between%20a%20client%20and%20a%20server%20on%20a%20network.%20The%20difference%20between%20a%20client%20and%20a%20server%20is%20that%20a%20client%20receives%20the%20data%20that%20is%20sent%20from%20the%20server.%0D%0A%0D%0A15.%20describe%20the%20roles%20of%20the%20following%20on%20a%20network%3A%20database%20server%2C%20domain%20name%20server%2C%20proxy%20server%2C%20active%20directory%20domain%20controller.%20The%20role%20of%20a%20database%20server%20is%20A%20database%20server%20is%20a%20computer%20program%20that%20provides%20database%20services%20to%20other%20computer%20programs%20or%20computers.%20the%20Domain%20Name%20System%20%28DNS%29%20is%20a%20hierarchical%20naming%20system%20built%20on%20a%20distributed%20database%20for%20computers%20services%20or%20anything%20connected%20to%20the%20internet%20or%20private%20network.%20A%20proxy%20server%20sends%20a%20proxy%20code%20with%20the%20packet%20of%20information%20so%20that%20it%20can%20get%20through%20the%20firewall%20without%20incident.%20Active%20Directory%20uses%20a%20number%20of%20standardized%20protocols%20to%20provide%20a%20variety%20of%20network%20services%2C%0D%0A%0D%0A%0D%0A16.%20would%20a%20peer%20to%20peer%20network%20be%20worthwhile%20on%20a%20small%20business%3F%20A%20peer%20to%20peer%20has%20its%20advantages%20and%20disadvantages%2C%20but%20it%20would%20be%20suggested%2C%20because%20it%E2%80%99s%20a%20small%20company%20and%20if%20it%20were%2020%2B%20people%20id%20go%20for%20a%20client%20server%20network%20but%20as%20its%20probably%20less%20than%20that%20its%20not%20really%20worth%20paying%20for%20a%20server.%0D%0A%0D%0A%0D%0A17.%20kazaa%20was%20a%20good%20example%20of%20a%20peer%20to%20p%3Beer%20network.%20It%20was%20slower%20than%20web%20servers%20that%20use%20a%20client%20server%20model.%20What%20are%20the%20problems%20with%20peer%20to%20peer%20networks%3F%20The%20problem%20with%20peer%20to%20peer%20networks%20is%20you%20cannot%20access%20other%20peoples%20files%20you%20have%20to%20walk%20over%20to%20their%20desk%20and%20get%20them%20to%20either%20print%20the%20file%20off%20or%20put%20it%20on%20a%20flash%20drive.%0D%0A%0D%0A%0D%0A18.%20what%20is%20a%20switch%3F%20A%20switch%20is%20a%20tool%20in%20a%20network%20so%20you%20can%20connect%20over%2020%20computers%20within%20the%20one%20room%20to%20the%20network.%0D%0A%0D%0A%0D%0A19.%20what%20is%20an%20intranet%3F%20An%20intranet%20is%20the%20internal%20website%20for%20the%20company%2C%20generally%20has%20recourses%20that%20can%20be%20used%20on%20it.%0D%0A%0D%0A%0D%0A20.%20why%20do%20manufacturers%20bujild%20products%20based%20on%20the%20network%20standards%3F%20Manufacturers%20build%20products%20based%20on%20the%20network%20standards%20because%20the%20product%20may%20only%20work%20in%20a%20specific%20standards%20so%20they%20have%20to%20build%20their%20products%20custom%20to%20a%20network.%0D%0A%0D%0A%0D%0A21.%20list%20four%20functions%20included%20in%20a%20network%20protocol.%20Networking%20protocols%2C%20such%20as%20TCP%2FIP%2C%20enable%20computers%20to%20exchange%20data%20with%20each%20other%20in%20a%20meaningful%2C%20organized%2C%20and%20efficient%20way.%20Computer%20protocols%20are%20similar%20to%20human%20language%20-%20if%20you%20speak%20English%20and%20you%20meet%20someone%20who%20speaks%20German%2C%20the%20protocols%20%28languages%29%20you%20use%20to%20exchange%20information%20are%20incompatible%20with%20each%20other.%20It%20is%20only%20when%20you%20both%20speak%20the%20same%20language%20that%20you%20can%20understand%20each%20other.%20Similarly%2C%20computers%20rely%20on%20protocols%20to%20ensure%20each%20computer%20%22understands%22%20what%20the%20other%20computer%20is%20sending%20it.%20Just%20as%20with%20humans%2C%20both%20computers%20must%20use%20the%20same%20protocol%20if%20they%20are%20to%20exchange%20information%20with%20each%20other%20successfully.%0D%0A%0D%0A%0D%0A22.%20identify%20four%20components%20of%20all%20Ethernet%20frames%0D%0A%0D%0A%0D%0A23.%20describe%20how%20data%20flows%20over%20an%20Ethernet%20network%20from%20source%20to%20the%20intended%20destination.%20Data%20flows%20from%20the%20source%20through%20the%20internet%20to%20a%20router%20which%20sends%20it%20to%20its%20intended%20destination%2C%20hits%20the%20firewall%20goes%20through%20a%20hole%2C%20gets%20sent%20to%20its%20intended%20person%2C%20all%20in%20the%20blink%20of%20an%20eye.%0D%0A%0D%0A%0D%0A24.%20how%20does%20a%20collision%20occur%20on%20a%20network%3F%20How%20does%20Ethernet%20avoid%20repeated%20collisions%20of%20the%20same%20transmissions%3F%20A%20network%20collision%20occurs%20when%20two%20devices%20attempt%20to%20transmit%20data%20on%20a%20shared%20circuit.%20In%20a%20shared%20circuit%20where%20multiple%20devices%20are%20listening%2C%20only%20a%20single%20device%20can%20transmit%20data%20at%20a%20single%20point%20in%20time%20which%20requires%20the%20rest%20of%20the%20devices%20to%20be%20listening%20to%20the%20transmission.%20In%20an%20hub%20environments%2C%20multiple%20devices%20are%20connected%20to%20a%20single%20transmission%20stream%2C%20so%20collisions%20tend%20to%20happen.%20Switches%20break%20up%20collision%20domains%20to%20have%20single%20devices%20on%20their%20own%20network%20segment%2C%20which%20eliminates%20collisions.%0D%0A%0D%0A%0D%0A25.%20tcp%2Fip%20uses%20smaller%20packets%20than%20other%20protocols%20why%20is%20this%20an%20advantage%20on%20the%20internet%3F%20Its%20known%20that%20smaller%20packets%20reach%20their%20destination%20faster%20and%20if%20the%20packages%20were%20larger%20then%20the%20time%20taken%20to%20reach%20the%20destination%20would%20take%20longer.%0D%0A%0D%0A%0D%0A26.%20what%20standards%20does%20wi%20fi%20network%20use%3F%20Wi%20fi%20networks%20have%20a%20password%20that%20changes%20every%20few%20days%20to%20prevent%20people%20from%20leeching%20off%20their%20network%2C%20this%20is%20effective%20because%20the%20people%20within%20the%20company%20are%20the%20only%20ones%20who%20know%20the%20network%20password.%0D%0A%0D%0A%0D%0A27.%20list%20a%20number%20of%20tasks%20undertaken%20by%20a%20network%20operating%20system.%20A%20network%20operating%20system%20%28NOS%29%20is%20a%20software%20program%20that%20controls%20other%20software%20and%20hardware%20that%20runs%20on%20a%20network.%20It%20also%20allows%20multiple%20computers%2C%20also%20known%20as%20network%20computers%2C%20to%20communicate%20with%20one%20main%20computer%20and%20each%20other%2C%20so%20as%20to%20share%20resources%2C%20run%20applications%2C%20and%20send%20messages%2C%20among%20other%20things.%0D%0A%0D%0A%0D%0A28.%20What%20are%20three%20components%20of%20a%20uniform%20resource%20location%20a%20Uniform%20Resource%20Locator%20%28URL%29%20is%20a%20Uniform%20Resource%20Identifier%20%28URI%29%20that%20specifies%20where%20an%20identified%20resource%20is%20available%20and%20the%20mechanism%20for%20retrieving%20it.%0D%0A%0D%0A%0D%0A29.%20how%20does%20a%20domain%20name%20server%20assist%20a%20web%20browser%20in%20connecting%20to%20a%20website%3F%20The%20dns%20assists%20a%20web%20browser%20in%20connecting%20to%20a%20website%20by%20registering%20all%20the%20websites%E2%80%99%20information%20making%20it%20easier%20to%20load%2C%20a%20unregistered%20page%20takes%20longer%20to%20load%20as%20the%20information%20has%20to%20be%20retrieved.%0D%0A%0D%0A%0D%0A30.%20what%20does%20the%20web%20server%20software%20when%20it%20receives%20a%20GET%20request%20from%20a%20clients%20web%20browser%3F%20The%20web%20server%20software%20is%20when%20a%20person%20overrides%20the%20web%20server%20softwares%20decision%20to%20block%20a%20website%20and%20continues%20on.%0D%0A%0D%0A%0D%0A31.%20what%20are%20three%20reasons%20for%20using%20a%20proxy%20server%20on%20a%20network%20that%20will%20be%20used%20to%20connect%20to%20the%20internet%3F%20People%20could%20be%20accessing%20inappropriate%20sites%20in%20which%20could%20be%20wasting%20valuable%20data%20allowances.%20Viruses%20could%20get%20into%20the%20server%20and%20infect%20every%20computer.%20Hackers%20could%20hack%20into%20the%20server%20and%20get%20financial%20information%20from%20the%20companies%20servers%20and%20hack%20their%20bank%20accounts%20losing%20the%20clients%20a%20lot%20of%20money%21%0D%0A%0D%0A%0D%0A32.%0D%0A%0D%0A%0D%0A33.%20what%20do%20we%20mean%20by%20cross%20platform%20software%3F%20Describe%20an%20example%20of%20cross%20platform%20software%3F%20Cross%20platform%20software%20is%20where%20software%20can%20be%20used%20on%20linux%20computers%2C%20Microsoft%20computers%2C%20apple%20computers%2C%20and%20they%20are%20very%20good%20because%20the%20developers%20can%20make%203x%20the%20money%20from%20the%20one%20piece%20of%20software%20soley%20because%20there%20is%20a%20much%20wider%20client%20range%2C%20an%20example%20of%20this%20would%20be%20windows%207%20on%20mac.%0D%0A%0D%0A%0D%0A34.%20what%20is%20the%20role%20of%20a%20network%20interface%20card%3F%20The%20purpose%20of%20a%20network%20interface%20card%20is%20to%20be%20able%20to%20connect%20the%20computer%20to%20the%20internet%20wirelessly%20and%20through%20Ethernet%20cables.%20Although%20now%20Ethernet%20ports%20are%20now%20getting%20more%20common%20to%20be%20built%20into%20the%20computers%20motherboard%2C%20so%20network%20interface%20cards%20are%20almost%20becoming%20obsolete.%0D%0A%0D%0A%0D%0A35.%20describe%20the%20process%20of%20roaming%20on%20a%20wi-fi%20network.%20Roaming%20on%20a%20wi-fi%20network%20works%20by%20plugging%20in%20a%203g%20roaming%20device%20and%20you%20can%20access%20wirelessly%20from%20almost%20anywere%20around%20Australia.%0D%0A%0D%0A%0D%0A36.%20why%20would%20a%20caf%C3%A9%20establish%20a%20hot%20spot%20in%20the%20premesis%3F%20A%20caf%C3%A9%20would%20establish%20a%20hot%20spot%20in%20the%20premesis%20because%20they%20can%20charge%20more%20for%20that%20spot%20because%20the%20pages%20will%20load%20faster%20and%20if%20they%20are%20gaming%20they%20will%20receive%20an%20advantage%20because%20they%20have%20a%20faster%20connection%20speed%20to%20anyone%20else.%0D%0A%0D%0A%0D%0A37.%20what%20are%20routers%20used%20for%3F%20Routers%20are%20used%20to%20route%20the%20data%20packets%20to%20its%20intended%20destination%2C%20so%20it%20doesn%E2%80%99t%20cause%20problems%20in%20going%20to%20the%20wrong%20person%20or%20place.%0D%0A%0D%0A%0D%0A38.%20how%20does%20a%20modem%20enable%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%3F%20The%20modem%20enables%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%20by%20sending%20small%20packets%20of%20information%20to%20the%20destination.%0D%0A%0D%0A%0D%0A39.%20how%20does%20a%20digital%20modem%20differ%20from%20a%20dial%20up%20modem%3F%20the%20main%20differences%20between%20the%20two%20is%20that%20dialup%20is%20old%2C%20and%20has%20very%20slow%20connection%20speed%20wheras%20digital%20is%20reletivley%20new%20and%20can%20reach%20speeds%20of%20100%20mps.%20The%20other%20difference%20is%20the%20physical%20connection%2C%20the%20wires%20used%20to%20connect.%20The%20digital%20can%20use%20all%20types%20of%20wiring%2C%20wheras%20the%20dialup%20needs%20telephone%20lines%20to%20plug%20into%20the%20computer%20and%20the%20modem.%0D%0A%0D%0A40.%20why%20do%20new%20networks%20use%20cat5%20standard%20cable%20rather%20than%20cat%203%3F%20Companies%20use%20cat5%20standard%20cable%20rather%20than%20cat3%20because%20cat3%20can%20only%20carry%2010mbps%20reliably%20over%20100%20meters.%20Wheras%20the%20cat5%20cables%20have%20more%20twists%20per%20meter%20and%20can%20reliably%20carry%20100mbps%20over%20distances%20up%20to%2085%20meters.%0D%0A%0D%0A41.%20what%20are%20some%20of%20the%20disadcantages%20of%20using%20cat5%20cables%3F%20Why%20is%20cat5%20cable%20used%20in%20so%20many%20installations%3F%20The%20main%20disadvantages%20of%20cat5%20cabling%20is%20it%20only%20can%20only%20carry%20large%20blocks%20of%20data%20up%20to%2085%20meters.%20Its%20mainlu%20used%20in%20installations%20because%20its%20cheap%2C%20easy%20to%20get%20your%20hands%20on%2C%20and%20a%20lot%20of%20the%20times%20its%20installed%20the%20network%20is%20not%20even%2085%20meters%20in%20radius.%0D%0A%0D%0A42.%20why%20is%20fibre%20optic%20cable%20often%20used%20to%20connect%20major%20switches%20inside%20buildings%20as%20well%20as%20between%20buildings%3F%20Fibre%20optic%20cabling%20is%20used%20to%20connect%20major%20switches%20because%20they%20are%20small%2C%20fast%20and%20can%20reach%20long%20distances%20and%20its%20very%20durable.%20Its%20used%20between%20buildings%20because%20as%20said%20before%20its%20durable%20and%20over%201000%20different%20frequencies%20can%20be%20transmitted%20along%20a%20strang%20at%20the%20one%20time.%0D%0A%0D%0A43.what%20advantages%20does%20wireless%20networking%20have%20over%20a%20network%20that%20uses%20physical%20transmission%20media%3F%20The%20main%20advantage%20is%20that%20there%20are%20no%20physical%20cables%2C%20and%20itll%20take%20up%20too%20much%20space%20which%20could%20be%20used%20for%20something%20more%20useful%20like%20a%20printer%20or%20scanner%E2%80%A6%20or%20fridge.%0D%0A%0D%0A44.%20what%20limitation%20applies%20to%20microwave%20transmissions%3F%20Interference%20can%20be%20a%20big%20factor%20on%20the%20connection%20as%20they%20require%20no%20obstruction%20between%20the%20sending%20dish%20and%20the%20receiving%20dish.%0D%0A%0D%0A45.%20why%20is%20radio%20wireless%20networking%20preferable%20to%20infra%20red%20wireless%20networking%3F%20Radio%20waves%20can%20be%20transmitted%20over%20lon%5Cg%20distances%20such%20as%20between%20cities%20or%20over%20short%20distance%20such%20as%20within%20a%20building.%20Infrared%20transmission%20is%20not%20as%20good%20because%20it%20doesn%E2%80%99t%20go%20as%20longer%20distances%20and%20its%20data%20transfer%20rate%20is%20slower%20than%20that%20of%20radio%20waves%2C%20And%20cables.%0D%0A%0D%0A46.%20why%20does%20a%20wireless%20network%20pose%20a%20greater%20security%20threat%20than%20a%20wired%20network%3F%20It%20poses%20a%20greater%20security%20threat%20to%20a%20wired%20network%20because%20wired%20networks%20you%20need%20to%20physically%20have%20the%20cable%20plugged%20into%20the%20computer%2C%20and%20wireless%20networks%20can%20be%20hacked%20into%20by%20people%20with%20a%20wireless%20hacking%20program%20called%20a%20dictionary.%0D%0A%0D%0A47.%20recommend%20a%20password%20strategy%20that%20an%20organisation%20could%20implement%20to%20avoid%20unauthorized%20access%20to%20their%20network.%20I%20would%20suggest%20a%20password%20flipper%2C%20a%20program%20that%20changes%20the%20password%20every%20few%20days%20as%20if%20it%20did%20get%20accessed%20by%20an%20unauthorised%20entity%20they%20could%20only%20do%20a%20small%20amount%20of%20damage%20and%20the%20password%20could%20be%20changed%20almost%20instantly%0D%0A%0D%0A48.%20what%20are%20the%20main%20purposes%20of%20firewalls%20and%20how%20are%20these%20purposes%20achieve%20this%3F%20Any%20packet%20of%20data%20flagged%20by%20the%20filters%20as%20unwanted%20is%20not%20allowed%20to%20go%20through.%0D%0A%0D%0A49.%20what%20added%20security%20feature%20should%20wireless%20networks%20employ%3F%20They%20should%20employ%20usernames%20and%20passwords%2C%20firewalls%2C%20malware%20protection%2C%20and%20encryption.%0D%0A%0D%0A50.%20what%20is%20a%20network%20diagram%3F%20A%20network%20diagram%20is%20a%20schematic%20method%20of%20showing%20the%20physical%20devices%20and%20communicated%20in%20a%20network.%0D%0A%0D%0A51.%20why%20is%20a%20network%20diagram%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%3F%20A%20network%20diagram%20is%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%20because%20the%20network%20shouldn%E2%80%99t%20be%20reliant%20on%20the%20building%20plan.][http://www.google.com/search?q=%20%20%201.%20A%20network%20connects%20computers%20and%20other%20devices%20together%20so%20that%20they%20can%20share%20data%2C%20information%20and%20resources%0D%0A%20%20%202.%20Groupware%20allows%20users%20on%20a%20network%20to%20work%20together%20on%20the%20same%20project.%20Each%20member%20of%20the%20group%20can%20view%20the%20same%20document%20and%20immediately%20see%20the%20changes%20made%20by%20a%20colleague.%0D%0A%20%20%203.%20The%20advantages%20of%20using%20a%20network%20are%20in%20resource%20sharing%2C%20accessing%20remote%20services%2C%20facilitating%20communications%20and%20sharing%20data%20and%20information%0D%0A%20%20%204.%20Resource%20sharing%20allows%20users%20to%20access%20a%20resource%20on%20the%20network%20only%20when%20they%20need%20it%2C%20thus%20not%20requiring%20each%20workstation%20to%20have%20its%20own%20connected%20resource.%0D%0A%0D%0A4.%20what%20compelling%20reason%20wouldc%20an%20organisation%20use%20to%20justify%20recourse%20sharing%3F%20A%20companning%20reason%20for%20an%20organisation%20to%20justify%20recourse%20sharing%20is%20money%21%20By%20sharing%20recourses%20the%20company%20has%20more%20money%20to%20upgrade%20their%20recourses%20than%20buying%20hundreds%20or%20printers%2C%20scanners%2C%20etc.%0D%0A%0D%0A5.%20what%20resources%20other%20than%20printing%20can%20be%20shared%20on%20a%20network%3F%20You%20can%20share%20dozens%20of%20devices%20on%20a%20network%2C%20such%20as%20file%20server%20to%20help%20with%20data%20storage%20and%20to%20prevent%20duplicated%20data%0D%0A%0D%0A6.%20describe%20the%20benefit%20to%20an%20organisation%20in%20providing%20a%20remote%20ordering%20service%20for%20customers%20over%20the%20internet.%20The%20benefit%20for%20an%20organisation%20to%20provide%20a%20remote%20ordering%20service%20for%20the%20customers%20over%20the%20internet%20is%20they%20can%20have%20a%20larger%20client%20base%2C%20people%20from%20other%20states%20or%20countries%20could%20buy%20an%20item%20that%E2%80%99s%20on%20sale%20from%20the%20company.%0D%0A%0D%0A7.%20how%20does%20file%20sharing%20on%20a%20network%20avoid%20problems%20associated%20with%20data%20duplication%3F%20If%20a%20file%20is%20on%20the%20same%20file%20server%20under%20the%20same%20name%20and%20file%20type%20you%20get%20a%20warning%20as%20to%20whether%20you%20want%20to%20save%20it%20or%20change%20its%20name%2C%20preventing%20data%20duplication.%0D%0A%0D%0A8.%20under%20what%20circumstances%20would%20it%20be%20more%20appropriate%20to%20set%20up%20a%20blog%20rather%20than%20a%20wiki.%20When%20you%20want%20to%20write%20things%20in%20a%20diary%20context%20and%20where%20you%20don%E2%80%99t%20want%20people%20to%20be%20able%20to%20edit%20just%20read%20and%20comment%2C%20and%20in%20most%20circumstances%20this%20is%20better%20than%20wiki%20because%20if%20its%20your%20wiki%20you%20don%E2%80%99t%20want%20people%20to%20edit%20what%20you%20say.%0D%0A%0D%0A9.%20how%20do%20wikis%20sites%20cope%20with%20the%20visitors%20intent%20on%20causing%20damage%20or%20being%20a%20nuisance%3F%20Wiki%20sites%20save%20after%20every%20edit%20and%20the%20administrators%20check%20whats%20happened%20and%20if%20it%20gets%20spammed%20and%20deleted%20the%20administrators%20just%20revert%20the%20changes%20to%20what%20it%20was%20before%20the%20attack.%0D%0A%0D%0A10.%20what%20is%20a%20thread%20on%20an%20online%20forum%3F%20How%20are%20threads%20established%3F%20Threads%20in%20an%20online%20forum%20are%20topics%2C%20something%20to%20talk%20about.%20Threads%20are%20generally%20made%20by%20members%20of%20an%20online%20forum%20of%20which%20you%20have%20to%20sign%20up%20to%2090%25%20to%20be%20elegable%20to%20make%20posts.%0D%0A%0D%0A11.%20what%20type%20of%20social%20networking%20site%20would%20be%20appropriate%20for%20someone%20who%20wants%20to%20share%20stories%20thoughts%20and%20photos%20with%20friends%3F%20Facebook%20would%20be%20an%20ideal%20social%20networking%20site%20for%20such%20acts%2C%20as%20its%20easy%20to%20nagivate%2C%20easy%20to%20use%2C%20and%20easy%20to%20do%20anything%20required%20for%20a%20person%20and%20much%20more%0D%0A%0D%0A%0D%0A12.%20what%20are%20they%20key%20differences%20between%20wans%20and%20lans%3F%20The%20main%20difference%20is%20the%20sheer%20size%20of%20the%20network%21%20A%20wan%20is%20a%20wide%20area%20network%20that%20can%20go%20over%20hundreds%20of%20meters%20and%20is%20generally%20made%20of%202%20local%20are%20networks%20put%20together.%0D%0A%0D%0A13.%20why%20are%20network%20points%20called%20nodes%20rather%20than%20being%20called%20computers%3F%20Network%20points%20are%20called%20nodes%20rather%20than%20computers%20because%20its%20not%20always%20a%20computer%2C%20it%20can%20be%20a%20laptop%2C%20notebook%2C%20anything%20that%20can%20be%20connected%20to%20a%20network.%20Thus%20generalising%20everything%20to%20being%20a%20computer%20would%20be%20wrong%20and%20node%20would%20be%20a%20more%20accurate%20term.%0D%0A%0D%0A14.%20explain%20the%20difference%20between%20a%20client%20and%20a%20server%20on%20a%20network.%20The%20difference%20between%20a%20client%20and%20a%20server%20is%20that%20a%20client%20receives%20the%20data%20that%20is%20sent%20from%20the%20server.%0D%0A%0D%0A15.%20describe%20the%20roles%20of%20the%20following%20on%20a%20network%3A%20database%20server%2C%20domain%20name%20server%2C%20proxy%20server%2C%20active%20directory%20domain%20controller.%20The%20role%20of%20a%20database%20server%20is%20A%20database%20server%20is%20a%20computer%20program%20that%20provides%20database%20services%20to%20other%20computer%20programs%20or%20computers.%20the%20Domain%20Name%20System%20%28DNS%29%20is%20a%20hierarchical%20naming%20system%20built%20on%20a%20distributed%20database%20for%20computers%20services%20or%20anything%20connected%20to%20the%20internet%20or%20private%20network.%20A%20proxy%20server%20sends%20a%20proxy%20code%20with%20the%20packet%20of%20information%20so%20that%20it%20can%20get%20through%20the%20firewall%20without%20incident.%20Active%20Directory%20uses%20a%20number%20of%20standardized%20protocols%20to%20provide%20a%20variety%20of%20network%20services%2C%0D%0A%0D%0A%0D%0A16.%20would%20a%20peer%20to%20peer%20network%20be%20worthwhile%20on%20a%20small%20business%3F%20A%20peer%20to%20peer%20has%20its%20advantages%20and%20disadvantages%2C%20but%20it%20would%20be%20suggested%2C%20because%20it%E2%80%99s%20a%20small%20company%20and%20if%20it%20were%2020%2B%20people%20id%20go%20for%20a%20client%20server%20network%20but%20as%20its%20probably%20less%20than%20that%20its%20not%20really%20worth%20paying%20for%20a%20server.%0D%0A%0D%0A%0D%0A17.%20kazaa%20was%20a%20good%20example%20of%20a%20peer%20to%20p%3Beer%20network.%20It%20was%20slower%20than%20web%20servers%20that%20use%20a%20client%20server%20model.%20What%20are%20the%20problems%20with%20peer%20to%20peer%20networks%3F%20The%20problem%20with%20peer%20to%20peer%20networks%20is%20you%20cannot%20access%20other%20peoples%20files%20you%20have%20to%20walk%20over%20to%20their%20desk%20and%20get%20them%20to%20either%20print%20the%20file%20off%20or%20put%20it%20on%20a%20flash%20drive.%0D%0A%0D%0A%0D%0A18.%20what%20is%20a%20switch%3F%20A%20switch%20is%20a%20tool%20in%20a%20network%20so%20you%20can%20connect%20over%2020%20computers%20within%20the%20one%20room%20to%20the%20network.%0D%0A%0D%0A%0D%0A19.%20what%20is%20an%20intranet%3F%20An%20intranet%20is%20the%20internal%20website%20for%20the%20company%2C%20generally%20has%20recourses%20that%20can%20be%20used%20on%20it.%0D%0A%0D%0A%0D%0A20.%20why%20do%20manufacturers%20bujild%20products%20based%20on%20the%20network%20standards%3F%20Manufacturers%20build%20products%20based%20on%20the%20network%20standards%20because%20the%20product%20may%20only%20work%20in%20a%20specific%20standards%20so%20they%20have%20to%20build%20their%20products%20custom%20to%20a%20network.%0D%0A%0D%0A%0D%0A21.%20list%20four%20functions%20included%20in%20a%20network%20protocol.%20Networking%20protocols%2C%20such%20as%20TCP%2FIP%2C%20enable%20computers%20to%20exchange%20data%20with%20each%20other%20in%20a%20meaningful%2C%20organized%2C%20and%20efficient%20way.%20Computer%20protocols%20are%20similar%20to%20human%20language%20-%20if%20you%20speak%20English%20and%20you%20meet%20someone%20who%20speaks%20German%2C%20the%20protocols%20%28languages%29%20you%20use%20to%20exchange%20information%20are%20incompatible%20with%20each%20other.%20It%20is%20only%20when%20you%20both%20speak%20the%20same%20language%20that%20you%20can%20understand%20each%20other.%20Similarly%2C%20computers%20rely%20on%20protocols%20to%20ensure%20each%20computer%20%22understands%22%20what%20the%20other%20computer%20is%20sending%20it.%20Just%20as%20with%20humans%2C%20both%20computers%20must%20use%20the%20same%20protocol%20if%20they%20are%20to%20exchange%20information%20with%20each%20other%20successfully.%0D%0A%0D%0A%0D%0A22.%20identify%20four%20components%20of%20all%20Ethernet%20frames%0D%0A%0D%0A%0D%0A23.%20describe%20how%20data%20flows%20over%20an%20Ethernet%20network%20from%20source%20to%20the%20intended%20destination.%20Data%20flows%20from%20the%20source%20through%20the%20internet%20to%20a%20router%20which%20sends%20it%20to%20its%20intended%20destination%2C%20hits%20the%20firewall%20goes%20through%20a%20hole%2C%20gets%20sent%20to%20its%20intended%20person%2C%20all%20in%20the%20blink%20of%20an%20eye.%0D%0A%0D%0A%0D%0A24.%20how%20does%20a%20collision%20occur%20on%20a%20network%3F%20How%20does%20Ethernet%20avoid%20repeated%20collisions%20of%20the%20same%20transmissions%3F%20A%20network%20collision%20occurs%20when%20two%20devices%20attempt%20to%20transmit%20data%20on%20a%20shared%20circuit.%20In%20a%20shared%20circuit%20where%20multiple%20devices%20are%20listening%2C%20only%20a%20single%20device%20can%20transmit%20data%20at%20a%20single%20point%20in%20time%20which%20requires%20the%20rest%20of%20the%20devices%20to%20be%20listening%20to%20the%20transmission.%20In%20an%20hub%20environments%2C%20multiple%20devices%20are%20connected%20to%20a%20single%20transmission%20stream%2C%20so%20collisions%20tend%20to%20happen.%20Switches%20break%20up%20collision%20domains%20to%20have%20single%20devices%20on%20their%20own%20network%20segment%2C%20which%20eliminates%20collisions.%0D%0A%0D%0A%0D%0A25.%20tcp%2Fip%20uses%20smaller%20packets%20than%20other%20protocols%20why%20is%20this%20an%20advantage%20on%20the%20internet%3F%20Its%20known%20that%20smaller%20packets%20reach%20their%20destination%20faster%20and%20if%20the%20packages%20were%20larger%20then%20the%20time%20taken%20to%20reach%20the%20destination%20would%20take%20longer.%0D%0A%0D%0A%0D%0A26.%20what%20standards%20does%20wi%20fi%20network%20use%3F%20Wi%20fi%20networks%20have%20a%20password%20that%20changes%20every%20few%20days%20to%20prevent%20people%20from%20leeching%20off%20their%20network%2C%20this%20is%20effective%20because%20the%20people%20within%20the%20company%20are%20the%20only%20ones%20who%20know%20the%20network%20password.%0D%0A%0D%0A%0D%0A27.%20list%20a%20number%20of%20tasks%20undertaken%20by%20a%20network%20operating%20system.%20A%20network%20operating%20system%20%28NOS%29%20is%20a%20software%20program%20that%20controls%20other%20software%20and%20hardware%20that%20runs%20on%20a%20network.%20It%20also%20allows%20multiple%20computers%2C%20also%20known%20as%20network%20computers%2C%20to%20communicate%20with%20one%20main%20computer%20and%20each%20other%2C%20so%20as%20to%20share%20resources%2C%20run%20applications%2C%20and%20send%20messages%2C%20among%20other%20things.%0D%0A%0D%0A%0D%0A28.%20What%20are%20three%20components%20of%20a%20uniform%20resource%20location%20a%20Uniform%20Resource%20Locator%20%28URL%29%20is%20a%20Uniform%20Resource%20Identifier%20%28URI%29%20that%20specifies%20where%20an%20identified%20resource%20is%20available%20and%20the%20mechanism%20for%20retrieving%20it.%0D%0A%0D%0A%0D%0A29.%20how%20does%20a%20domain%20name%20server%20assist%20a%20web%20browser%20in%20connecting%20to%20a%20website%3F%20The%20dns%20assists%20a%20web%20browser%20in%20connecting%20to%20a%20website%20by%20registering%20all%20the%20websites%E2%80%99%20information%20making%20it%20easier%20to%20load%2C%20a%20unregistered%20page%20takes%20longer%20to%20load%20as%20the%20information%20has%20to%20be%20retrieved.%0D%0A%0D%0A%0D%0A30.%20what%20does%20the%20web%20server%20software%20when%20it%20receives%20a%20GET%20request%20from%20a%20clients%20web%20browser%3F%20The%20web%20server%20software%20is%20when%20a%20person%20overrides%20the%20web%20server%20softwares%20decision%20to%20block%20a%20website%20and%20continues%20on.%0D%0A%0D%0A%0D%0A31.%20what%20are%20three%20reasons%20for%20using%20a%20proxy%20server%20on%20a%20network%20that%20will%20be%20used%20to%20connect%20to%20the%20internet%3F%20People%20could%20be%20accessing%20inappropriate%20sites%20in%20which%20could%20be%20wasting%20valuable%20data%20allowances.%20Viruses%20could%20get%20into%20the%20server%20and%20infect%20every%20computer.%20Hackers%20could%20hack%20into%20the%20server%20and%20get%20financial%20information%20from%20the%20companies%20servers%20and%20hack%20their%20bank%20accounts%20losing%20the%20clients%20a%20lot%20of%20money%21%0D%0A%0D%0A%0D%0A32.%0D%0A%0D%0A%0D%0A33.%20what%20do%20we%20mean%20by%20cross%20platform%20software%3F%20Describe%20an%20example%20of%20cross%20platform%20software%3F%20Cross%20platform%20software%20is%20where%20software%20can%20be%20used%20on%20linux%20computers%2C%20Microsoft%20computers%2C%20apple%20computers%2C%20and%20they%20are%20very%20good%20because%20the%20developers%20can%20make%203x%20the%20money%20from%20the%20one%20piece%20of%20software%20soley%20because%20there%20is%20a%20much%20wider%20client%20range%2C%20an%20example%20of%20this%20would%20be%20windows%207%20on%20mac.%0D%0A%0D%0A%0D%0A34.%20what%20is%20the%20role%20of%20a%20network%20interface%20card%3F%20The%20purpose%20of%20a%20network%20interface%20card%20is%20to%20be%20able%20to%20connect%20the%20computer%20to%20the%20internet%20wirelessly%20and%20through%20Ethernet%20cables.%20Although%20now%20Ethernet%20ports%20are%20now%20getting%20more%20common%20to%20be%20built%20into%20the%20computers%20motherboard%2C%20so%20network%20interface%20cards%20are%20almost%20becoming%20obsolete.%0D%0A%0D%0A%0D%0A35.%20describe%20the%20process%20of%20roaming%20on%20a%20wi-fi%20network.%20Roaming%20on%20a%20wi-fi%20network%20works%20by%20plugging%20in%20a%203g%20roaming%20device%20and%20you%20can%20access%20wirelessly%20from%20almost%20anywere%20around%20Australia.%0D%0A%0D%0A%0D%0A36.%20why%20would%20a%20caf%C3%A9%20establish%20a%20hot%20spot%20in%20the%20premesis%3F%20A%20caf%C3%A9%20would%20establish%20a%20hot%20spot%20in%20the%20premesis%20because%20they%20can%20charge%20more%20for%20that%20spot%20because%20the%20pages%20will%20load%20faster%20and%20if%20they%20are%20gaming%20they%20will%20receive%20an%20advantage%20because%20they%20have%20a%20faster%20connection%20speed%20to%20anyone%20else.%0D%0A%0D%0A%0D%0A37.%20what%20are%20routers%20used%20for%3F%20Routers%20are%20used%20to%20route%20the%20data%20packets%20to%20its%20intended%20destination%2C%20so%20it%20doesn%E2%80%99t%20cause%20problems%20in%20going%20to%20the%20wrong%20person%20or%20place.%0D%0A%0D%0A%0D%0A38.%20how%20does%20a%20modem%20enable%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%3F%20The%20modem%20enables%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%20by%20sending%20small%20packets%20of%20information%20to%20the%20destination.%0D%0A%0D%0A%0D%0A39.%20how%20does%20a%20digital%20modem%20differ%20from%20a%20dial%20up%20modem%3F%20the%20main%20differences%20between%20the%20two%20is%20that%20dialup%20is%20old%2C%20and%20has%20very%20slow%20connection%20speed%20wheras%20digital%20is%20reletivley%20new%20and%20can%20reach%20speeds%20of%20100%20mps.%20The%20other%20difference%20is%20the%20physical%20connection%2C%20the%20wires%20used%20to%20connect.%20The%20digital%20can%20use%20all%20types%20of%20wiring%2C%20wheras%20the%20dialup%20needs%20telephone%20lines%20to%20plug%20into%20the%20computer%20and%20the%20modem.%0D%0A%0D%0A40.%20why%20do%20new%20networks%20use%20cat5%20standard%20cable%20rather%20than%20cat%203%3F%20Companies%20use%20cat5%20standard%20cable%20rather%20than%20cat3%20because%20cat3%20can%20only%20carry%2010mbps%20reliably%20over%20100%20meters.%20Wheras%20the%20cat5%20cables%20have%20more%20twists%20per%20meter%20and%20can%20reliably%20carry%20100mbps%20over%20distances%20up%20to%2085%20meters.%0D%0A%0D%0A41.%20what%20are%20some%20of%20the%20disadcantages%20of%20using%20cat5%20cables%3F%20Why%20is%20cat5%20cable%20used%20in%20so%20many%20installations%3F%20The%20main%20disadvantages%20of%20cat5%20cabling%20is%20it%20only%20can%20only%20carry%20large%20blocks%20of%20data%20up%20to%2085%20meters.%20Its%20mainlu%20used%20in%20installations%20because%20its%20cheap%2C%20easy%20to%20get%20your%20hands%20on%2C%20and%20a%20lot%20of%20the%20times%20its%20installed%20the%20network%20is%20not%20even%2085%20meters%20in%20radius.%0D%0A%0D%0A42.%20why%20is%20fibre%20optic%20cable%20often%20used%20to%20connect%20major%20switches%20inside%20buildings%20as%20well%20as%20between%20buildings%3F%20Fibre%20optic%20cabling%20is%20used%20to%20connect%20major%20switches%20because%20they%20are%20small%2C%20fast%20and%20can%20reach%20long%20distances%20and%20its%20very%20durable.%20Its%20used%20between%20buildings%20because%20as%20said%20before%20its%20durable%20and%20over%201000%20different%20frequencies%20can%20be%20transmitted%20along%20a%20strang%20at%20the%20one%20time.%0D%0A%0D%0A43.what%20advantages%20does%20wireless%20networking%20have%20over%20a%20network%20that%20uses%20physical%20transmission%20media%3F%20The%20main%20advantage%20is%20that%20there%20are%20no%20physical%20cables%2C%20and%20itll%20take%20up%20too%20much%20space%20which%20could%20be%20used%20for%20something%20more%20useful%20like%20a%20printer%20or%20scanner%E2%80%A6%20or%20fridge.%0D%0A%0D%0A44.%20what%20limitation%20applies%20to%20microwave%20transmissions%3F%20Interference%20can%20be%20a%20big%20factor%20on%20the%20connection%20as%20they%20require%20no%20obstruction%20between%20the%20sending%20dish%20and%20the%20receiving%20dish.%0D%0A%0D%0A45.%20why%20is%20radio%20wireless%20networking%20preferable%20to%20infra%20red%20wireless%20networking%3F%20Radio%20waves%20can%20be%20transmitted%20over%20lon%5Cg%20distances%20such%20as%20between%20cities%20or%20over%20short%20distance%20such%20as%20within%20a%20building.%20Infrared%20transmission%20is%20not%20as%20good%20because%20it%20doesn%E2%80%99t%20go%20as%20longer%20distances%20and%20its%20data%20transfer%20rate%20is%20slower%20than%20that%20of%20radio%20waves%2C%20And%20cables.%0D%0A%0D%0A46.%20why%20does%20a%20wireless%20network%20pose%20a%20greater%20security%20threat%20than%20a%20wired%20network%3F%20It%20poses%20a%20greater%20security%20threat%20to%20a%20wired%20network%20because%20wired%20networks%20you%20need%20to%20physically%20have%20the%20cable%20plugged%20into%20the%20computer%2C%20and%20wireless%20networks%20can%20be%20hacked%20into%20by%20people%20with%20a%20wireless%20hacking%20program%20called%20a%20dictionary.%0D%0A%0D%0A47.%20recommend%20a%20password%20strategy%20that%20an%20organisation%20could%20implement%20to%20avoid%20unauthorized%20access%20to%20their%20network.%20I%20would%20suggest%20a%20password%20flipper%2C%20a%20program%20that%20changes%20the%20password%20every%20few%20days%20as%20if%20it%20did%20get%20accessed%20by%20an%20unauthorised%20entity%20they%20could%20only%20do%20a%20small%20amount%20of%20damage%20and%20the%20password%20could%20be%20changed%20almost%20instantly%0D%0A%0D%0A48.%20what%20are%20the%20main%20purposes%20of%20firewalls%20and%20how%20are%20these%20purposes%20achieve%20this%3F%20Any%20packet%20of%20data%20flagged%20by%20the%20filters%20as%20unwanted%20is%20not%20allowed%20to%20go%20through.%0D%0A%0D%0A49.%20what%20added%20security%20feature%20should%20wireless%20networks%20employ%3F%20They%20should%20employ%20usernames%20and%20passwords%2C%20firewalls%2C%20malware%20protection%2C%20and%20encryption.%0D%0A%0D%0A50.%20what%20is%20a%20network%20diagram%3F%20A%20network%20diagram%20is%20a%20schematic%20method%20of%20showing%20the%20physical%20devices%20and%20communicated%20in%20a%20network.%0D%0A%0D%0A51.%20why%20is%20a%20network%20diagram%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%3F%20A%20network%20diagram%20is%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%20because%20the%20network%20shouldn%E2%80%99t%20be%20reliant%20on%20the%20building%20plan.][http://smarterfox.com/wikisearch/search?q=%20%20%201.%20A%20network%20connects%20computers%20and%20other%20devices%20together%20so%20that%20they%20can%20share%20data%2C%20information%20and%20resources%0D%0A%20%20%202.%20Groupware%20allows%20users%20on%20a%20network%20to%20work%20together%20on%20the%20same%20project.%20Each%20member%20of%20the%20group%20can%20view%20the%20same%20document%20and%20immediately%20see%20the%20changes%20made%20by%20a%20colleague.%0D%0A%20%20%203.%20The%20advantages%20of%20using%20a%20network%20are%20in%20resource%20sharing%2C%20accessing%20remote%20services%2C%20facilitating%20communications%20and%20sharing%20data%20and%20information%0D%0A%20%20%204.%20Resource%20sharing%20allows%20users%20to%20access%20a%20resource%20on%20the%20network%20only%20when%20they%20need%20it%2C%20thus%20not%20requiring%20each%20workstation%20to%20have%20its%20own%20connected%20resource.%0D%0A%0D%0A4.%20what%20compelling%20reason%20wouldc%20an%20organisation%20use%20to%20justify%20recourse%20sharing%3F%20A%20companning%20reason%20for%20an%20organisation%20to%20justify%20recourse%20sharing%20is%20money%21%20By%20sharing%20recourses%20the%20company%20has%20more%20money%20to%20upgrade%20their%20recourses%20than%20buying%20hundreds%20or%20printers%2C%20scanners%2C%20etc.%0D%0A%0D%0A5.%20what%20resources%20other%20than%20printing%20can%20be%20shared%20on%20a%20network%3F%20You%20can%20share%20dozens%20of%20devices%20on%20a%20network%2C%20such%20as%20file%20server%20to%20help%20with%20data%20storage%20and%20to%20prevent%20duplicated%20data%0D%0A%0D%0A6.%20describe%20the%20benefit%20to%20an%20organisation%20in%20providing%20a%20remote%20ordering%20service%20for%20customers%20over%20the%20internet.%20The%20benefit%20for%20an%20organisation%20to%20provide%20a%20remote%20ordering%20service%20for%20the%20customers%20over%20the%20internet%20is%20they%20can%20have%20a%20larger%20client%20base%2C%20people%20from%20other%20states%20or%20countries%20could%20buy%20an%20item%20that%E2%80%99s%20on%20sale%20from%20the%20company.%0D%0A%0D%0A7.%20how%20does%20file%20sharing%20on%20a%20network%20avoid%20problems%20associated%20with%20data%20duplication%3F%20If%20a%20file%20is%20on%20the%20same%20file%20server%20under%20the%20same%20name%20and%20file%20type%20you%20get%20a%20warning%20as%20to%20whether%20you%20want%20to%20save%20it%20or%20change%20its%20name%2C%20preventing%20data%20duplication.%0D%0A%0D%0A8.%20under%20what%20circumstances%20would%20it%20be%20more%20appropriate%20to%20set%20up%20a%20blog%20rather%20than%20a%20wiki.%20When%20you%20want%20to%20write%20things%20in%20a%20diary%20context%20and%20where%20you%20don%E2%80%99t%20want%20people%20to%20be%20able%20to%20edit%20just%20read%20and%20comment%2C%20and%20in%20most%20circumstances%20this%20is%20better%20than%20wiki%20because%20if%20its%20your%20wiki%20you%20don%E2%80%99t%20want%20people%20to%20edit%20what%20you%20say.%0D%0A%0D%0A9.%20how%20do%20wikis%20sites%20cope%20with%20the%20visitors%20intent%20on%20causing%20damage%20or%20being%20a%20nuisance%3F%20Wiki%20sites%20save%20after%20every%20edit%20and%20the%20administrators%20check%20whats%20happened%20and%20if%20it%20gets%20spammed%20and%20deleted%20the%20administrators%20just%20revert%20the%20changes%20to%20what%20it%20was%20before%20the%20attack.%0D%0A%0D%0A10.%20what%20is%20a%20thread%20on%20an%20online%20forum%3F%20How%20are%20threads%20established%3F%20Threads%20in%20an%20online%20forum%20are%20topics%2C%20something%20to%20talk%20about.%20Threads%20are%20generally%20made%20by%20members%20of%20an%20online%20forum%20of%20which%20you%20have%20to%20sign%20up%20to%2090%25%20to%20be%20elegable%20to%20make%20posts.%0D%0A%0D%0A11.%20what%20type%20of%20social%20networking%20site%20would%20be%20appropriate%20for%20someone%20who%20wants%20to%20share%20stories%20thoughts%20and%20photos%20with%20friends%3F%20Facebook%20would%20be%20an%20ideal%20social%20networking%20site%20for%20such%20acts%2C%20as%20its%20easy%20to%20nagivate%2C%20easy%20to%20use%2C%20and%20easy%20to%20do%20anything%20required%20for%20a%20person%20and%20much%20more%0D%0A%0D%0A%0D%0A12.%20what%20are%20they%20key%20differences%20between%20wans%20and%20lans%3F%20The%20main%20difference%20is%20the%20sheer%20size%20of%20the%20network%21%20A%20wan%20is%20a%20wide%20area%20network%20that%20can%20go%20over%20hundreds%20of%20meters%20and%20is%20generally%20made%20of%202%20local%20are%20networks%20put%20together.%0D%0A%0D%0A13.%20why%20are%20network%20points%20called%20nodes%20rather%20than%20being%20called%20computers%3F%20Network%20points%20are%20called%20nodes%20rather%20than%20computers%20because%20its%20not%20always%20a%20computer%2C%20it%20can%20be%20a%20laptop%2C%20notebook%2C%20anything%20that%20can%20be%20connected%20to%20a%20network.%20Thus%20generalising%20everything%20to%20being%20a%20computer%20would%20be%20wrong%20and%20node%20would%20be%20a%20more%20accurate%20term.%0D%0A%0D%0A14.%20explain%20the%20difference%20between%20a%20client%20and%20a%20server%20on%20a%20network.%20The%20difference%20between%20a%20client%20and%20a%20server%20is%20that%20a%20client%20receives%20the%20data%20that%20is%20sent%20from%20the%20server.%0D%0A%0D%0A15.%20describe%20the%20roles%20of%20the%20following%20on%20a%20network%3A%20database%20server%2C%20domain%20name%20server%2C%20proxy%20server%2C%20active%20directory%20domain%20controller.%20The%20role%20of%20a%20database%20server%20is%20A%20database%20server%20is%20a%20computer%20program%20that%20provides%20database%20services%20to%20other%20computer%20programs%20or%20computers.%20the%20Domain%20Name%20System%20%28DNS%29%20is%20a%20hierarchical%20naming%20system%20built%20on%20a%20distributed%20database%20for%20computers%20services%20or%20anything%20connected%20to%20the%20internet%20or%20private%20network.%20A%20proxy%20server%20sends%20a%20proxy%20code%20with%20the%20packet%20of%20information%20so%20that%20it%20can%20get%20through%20the%20firewall%20without%20incident.%20Active%20Directory%20uses%20a%20number%20of%20standardized%20protocols%20to%20provide%20a%20variety%20of%20network%20services%2C%0D%0A%0D%0A%0D%0A16.%20would%20a%20peer%20to%20peer%20network%20be%20worthwhile%20on%20a%20small%20business%3F%20A%20peer%20to%20peer%20has%20its%20advantages%20and%20disadvantages%2C%20but%20it%20would%20be%20suggested%2C%20because%20it%E2%80%99s%20a%20small%20company%20and%20if%20it%20were%2020%2B%20people%20id%20go%20for%20a%20client%20server%20network%20but%20as%20its%20probably%20less%20than%20that%20its%20not%20really%20worth%20paying%20for%20a%20server.%0D%0A%0D%0A%0D%0A17.%20kazaa%20was%20a%20good%20example%20of%20a%20peer%20to%20p%3Beer%20network.%20It%20was%20slower%20than%20web%20servers%20that%20use%20a%20client%20server%20model.%20What%20are%20the%20problems%20with%20peer%20to%20peer%20networks%3F%20The%20problem%20with%20peer%20to%20peer%20networks%20is%20you%20cannot%20access%20other%20peoples%20files%20you%20have%20to%20walk%20over%20to%20their%20desk%20and%20get%20them%20to%20either%20print%20the%20file%20off%20or%20put%20it%20on%20a%20flash%20drive.%0D%0A%0D%0A%0D%0A18.%20what%20is%20a%20switch%3F%20A%20switch%20is%20a%20tool%20in%20a%20network%20so%20you%20can%20connect%20over%2020%20computers%20within%20the%20one%20room%20to%20the%20network.%0D%0A%0D%0A%0D%0A19.%20what%20is%20an%20intranet%3F%20An%20intranet%20is%20the%20internal%20website%20for%20the%20company%2C%20generally%20has%20recourses%20that%20can%20be%20used%20on%20it.%0D%0A%0D%0A%0D%0A20.%20why%20do%20manufacturers%20bujild%20products%20based%20on%20the%20network%20standards%3F%20Manufacturers%20build%20products%20based%20on%20the%20network%20standards%20because%20the%20product%20may%20only%20work%20in%20a%20specific%20standards%20so%20they%20have%20to%20build%20their%20products%20custom%20to%20a%20network.%0D%0A%0D%0A%0D%0A21.%20list%20four%20functions%20included%20in%20a%20network%20protocol.%20Networking%20protocols%2C%20such%20as%20TCP%2FIP%2C%20enable%20computers%20to%20exchange%20data%20with%20each%20other%20in%20a%20meaningful%2C%20organized%2C%20and%20efficient%20way.%20Computer%20protocols%20are%20similar%20to%20human%20language%20-%20if%20you%20speak%20English%20and%20you%20meet%20someone%20who%20speaks%20German%2C%20the%20protocols%20%28languages%29%20you%20use%20to%20exchange%20information%20are%20incompatible%20with%20each%20other.%20It%20is%20only%20when%20you%20both%20speak%20the%20same%20language%20that%20you%20can%20understand%20each%20other.%20Similarly%2C%20computers%20rely%20on%20protocols%20to%20ensure%20each%20computer%20%22understands%22%20what%20the%20other%20computer%20is%20sending%20it.%20Just%20as%20with%20humans%2C%20both%20computers%20must%20use%20the%20same%20protocol%20if%20they%20are%20to%20exchange%20information%20with%20each%20other%20successfully.%0D%0A%0D%0A%0D%0A22.%20identify%20four%20components%20of%20all%20Ethernet%20frames%0D%0A%0D%0A%0D%0A23.%20describe%20how%20data%20flows%20over%20an%20Ethernet%20network%20from%20source%20to%20the%20intended%20destination.%20Data%20flows%20from%20the%20source%20through%20the%20internet%20to%20a%20router%20which%20sends%20it%20to%20its%20intended%20destination%2C%20hits%20the%20firewall%20goes%20through%20a%20hole%2C%20gets%20sent%20to%20its%20intended%20person%2C%20all%20in%20the%20blink%20of%20an%20eye.%0D%0A%0D%0A%0D%0A24.%20how%20does%20a%20collision%20occur%20on%20a%20network%3F%20How%20does%20Ethernet%20avoid%20repeated%20collisions%20of%20the%20same%20transmissions%3F%20A%20network%20collision%20occurs%20when%20two%20devices%20attempt%20to%20transmit%20data%20on%20a%20shared%20circuit.%20In%20a%20shared%20circuit%20where%20multiple%20devices%20are%20listening%2C%20only%20a%20single%20device%20can%20transmit%20data%20at%20a%20single%20point%20in%20time%20which%20requires%20the%20rest%20of%20the%20devices%20to%20be%20listening%20to%20the%20transmission.%20In%20an%20hub%20environments%2C%20multiple%20devices%20are%20connected%20to%20a%20single%20transmission%20stream%2C%20so%20collisions%20tend%20to%20happen.%20Switches%20break%20up%20collision%20domains%20to%20have%20single%20devices%20on%20their%20own%20network%20segment%2C%20which%20eliminates%20collisions.%0D%0A%0D%0A%0D%0A25.%20tcp%2Fip%20uses%20smaller%20packets%20than%20other%20protocols%20why%20is%20this%20an%20advantage%20on%20the%20internet%3F%20Its%20known%20that%20smaller%20packets%20reach%20their%20destination%20faster%20and%20if%20the%20packages%20were%20larger%20then%20the%20time%20taken%20to%20reach%20the%20destination%20would%20take%20longer.%0D%0A%0D%0A%0D%0A26.%20what%20standards%20does%20wi%20fi%20network%20use%3F%20Wi%20fi%20networks%20have%20a%20password%20that%20changes%20every%20few%20days%20to%20prevent%20people%20from%20leeching%20off%20their%20network%2C%20this%20is%20effective%20because%20the%20people%20within%20the%20company%20are%20the%20only%20ones%20who%20know%20the%20network%20password.%0D%0A%0D%0A%0D%0A27.%20list%20a%20number%20of%20tasks%20undertaken%20by%20a%20network%20operating%20system.%20A%20network%20operating%20system%20%28NOS%29%20is%20a%20software%20program%20that%20controls%20other%20software%20and%20hardware%20that%20runs%20on%20a%20network.%20It%20also%20allows%20multiple%20computers%2C%20also%20known%20as%20network%20computers%2C%20to%20communicate%20with%20one%20main%20computer%20and%20each%20other%2C%20so%20as%20to%20share%20resources%2C%20run%20applications%2C%20and%20send%20messages%2C%20among%20other%20things.%0D%0A%0D%0A%0D%0A28.%20What%20are%20three%20components%20of%20a%20uniform%20resource%20location%20a%20Uniform%20Resource%20Locator%20%28URL%29%20is%20a%20Uniform%20Resource%20Identifier%20%28URI%29%20that%20specifies%20where%20an%20identified%20resource%20is%20available%20and%20the%20mechanism%20for%20retrieving%20it.%0D%0A%0D%0A%0D%0A29.%20how%20does%20a%20domain%20name%20server%20assist%20a%20web%20browser%20in%20connecting%20to%20a%20website%3F%20The%20dns%20assists%20a%20web%20browser%20in%20connecting%20to%20a%20website%20by%20registering%20all%20the%20websites%E2%80%99%20information%20making%20it%20easier%20to%20load%2C%20a%20unregistered%20page%20takes%20longer%20to%20load%20as%20the%20information%20has%20to%20be%20retrieved.%0D%0A%0D%0A%0D%0A30.%20what%20does%20the%20web%20server%20software%20when%20it%20receives%20a%20GET%20request%20from%20a%20clients%20web%20browser%3F%20The%20web%20server%20software%20is%20when%20a%20person%20overrides%20the%20web%20server%20softwares%20decision%20to%20block%20a%20website%20and%20continues%20on.%0D%0A%0D%0A%0D%0A31.%20what%20are%20three%20reasons%20for%20using%20a%20proxy%20server%20on%20a%20network%20that%20will%20be%20used%20to%20connect%20to%20the%20internet%3F%20People%20could%20be%20accessing%20inappropriate%20sites%20in%20which%20could%20be%20wasting%20valuable%20data%20allowances.%20Viruses%20could%20get%20into%20the%20server%20and%20infect%20every%20computer.%20Hackers%20could%20hack%20into%20the%20server%20and%20get%20financial%20information%20from%20the%20companies%20servers%20and%20hack%20their%20bank%20accounts%20losing%20the%20clients%20a%20lot%20of%20money%21%0D%0A%0D%0A%0D%0A32.%0D%0A%0D%0A%0D%0A33.%20what%20do%20we%20mean%20by%20cross%20platform%20software%3F%20Describe%20an%20example%20of%20cross%20platform%20software%3F%20Cross%20platform%20software%20is%20where%20software%20can%20be%20used%20on%20linux%20computers%2C%20Microsoft%20computers%2C%20apple%20computers%2C%20and%20they%20are%20very%20good%20because%20the%20developers%20can%20make%203x%20the%20money%20from%20the%20one%20piece%20of%20software%20soley%20because%20there%20is%20a%20much%20wider%20client%20range%2C%20an%20example%20of%20this%20would%20be%20windows%207%20on%20mac.%0D%0A%0D%0A%0D%0A34.%20what%20is%20the%20role%20of%20a%20network%20interface%20card%3F%20The%20purpose%20of%20a%20network%20interface%20card%20is%20to%20be%20able%20to%20connect%20the%20computer%20to%20the%20internet%20wirelessly%20and%20through%20Ethernet%20cables.%20Although%20now%20Ethernet%20ports%20are%20now%20getting%20more%20common%20to%20be%20built%20into%20the%20computers%20motherboard%2C%20so%20network%20interface%20cards%20are%20almost%20becoming%20obsolete.%0D%0A%0D%0A%0D%0A35.%20describe%20the%20process%20of%20roaming%20on%20a%20wi-fi%20network.%20Roaming%20on%20a%20wi-fi%20network%20works%20by%20plugging%20in%20a%203g%20roaming%20device%20and%20you%20can%20access%20wirelessly%20from%20almost%20anywere%20around%20Australia.%0D%0A%0D%0A%0D%0A36.%20why%20would%20a%20caf%C3%A9%20establish%20a%20hot%20spot%20in%20the%20premesis%3F%20A%20caf%C3%A9%20would%20establish%20a%20hot%20spot%20in%20the%20premesis%20because%20they%20can%20charge%20more%20for%20that%20spot%20because%20the%20pages%20will%20load%20faster%20and%20if%20they%20are%20gaming%20they%20will%20receive%20an%20advantage%20because%20they%20have%20a%20faster%20connection%20speed%20to%20anyone%20else.%0D%0A%0D%0A%0D%0A37.%20what%20are%20routers%20used%20for%3F%20Routers%20are%20used%20to%20route%20the%20data%20packets%20to%20its%20intended%20destination%2C%20so%20it%20doesn%E2%80%99t%20cause%20problems%20in%20going%20to%20the%20wrong%20person%20or%20place.%0D%0A%0D%0A%0D%0A38.%20how%20does%20a%20modem%20enable%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%3F%20The%20modem%20enables%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%20by%20sending%20small%20packets%20of%20information%20to%20the%20destination.%0D%0A%0D%0A%0D%0A39.%20how%20does%20a%20digital%20modem%20differ%20from%20a%20dial%20up%20modem%3F%20the%20main%20differences%20between%20the%20two%20is%20that%20dialup%20is%20old%2C%20and%20has%20very%20slow%20connection%20speed%20wheras%20digital%20is%20reletivley%20new%20and%20can%20reach%20speeds%20of%20100%20mps.%20The%20other%20difference%20is%20the%20physical%20connection%2C%20the%20wires%20used%20to%20connect.%20The%20digital%20can%20use%20all%20types%20of%20wiring%2C%20wheras%20the%20dialup%20needs%20telephone%20lines%20to%20plug%20into%20the%20computer%20and%20the%20modem.%0D%0A%0D%0A40.%20why%20do%20new%20networks%20use%20cat5%20standard%20cable%20rather%20than%20cat%203%3F%20Companies%20use%20cat5%20standard%20cable%20rather%20than%20cat3%20because%20cat3%20can%20only%20carry%2010mbps%20reliably%20over%20100%20meters.%20Wheras%20the%20cat5%20cables%20have%20more%20twists%20per%20meter%20and%20can%20reliably%20carry%20100mbps%20over%20distances%20up%20to%2085%20meters.%0D%0A%0D%0A41.%20what%20are%20some%20of%20the%20disadcantages%20of%20using%20cat5%20cables%3F%20Why%20is%20cat5%20cable%20used%20in%20so%20many%20installations%3F%20The%20main%20disadvantages%20of%20cat5%20cabling%20is%20it%20only%20can%20only%20carry%20large%20blocks%20of%20data%20up%20to%2085%20meters.%20Its%20mainlu%20used%20in%20installations%20because%20its%20cheap%2C%20easy%20to%20get%20your%20hands%20on%2C%20and%20a%20lot%20of%20the%20times%20its%20installed%20the%20network%20is%20not%20even%2085%20meters%20in%20radius.%0D%0A%0D%0A42.%20why%20is%20fibre%20optic%20cable%20often%20used%20to%20connect%20major%20switches%20inside%20buildings%20as%20well%20as%20between%20buildings%3F%20Fibre%20optic%20cabling%20is%20used%20to%20connect%20major%20switches%20because%20they%20are%20small%2C%20fast%20and%20can%20reach%20long%20distances%20and%20its%20very%20durable.%20Its%20used%20between%20buildings%20because%20as%20said%20before%20its%20durable%20and%20over%201000%20different%20frequencies%20can%20be%20transmitted%20along%20a%20strang%20at%20the%20one%20time.%0D%0A%0D%0A43.what%20advantages%20does%20wireless%20networking%20have%20over%20a%20network%20that%20uses%20physical%20transmission%20media%3F%20The%20main%20advantage%20is%20that%20there%20are%20no%20physical%20cables%2C%20and%20itll%20take%20up%20too%20much%20space%20which%20could%20be%20used%20for%20something%20more%20useful%20like%20a%20printer%20or%20scanner%E2%80%A6%20or%20fridge.%0D%0A%0D%0A44.%20what%20limitation%20applies%20to%20microwave%20transmissions%3F%20Interference%20can%20be%20a%20big%20factor%20on%20the%20connection%20as%20they%20require%20no%20obstruction%20between%20the%20sending%20dish%20and%20the%20receiving%20dish.%0D%0A%0D%0A45.%20why%20is%20radio%20wireless%20networking%20preferable%20to%20infra%20red%20wireless%20networking%3F%20Radio%20waves%20can%20be%20transmitted%20over%20lon%5Cg%20distances%20such%20as%20between%20cities%20or%20over%20short%20distance%20such%20as%20within%20a%20building.%20Infrared%20transmission%20is%20not%20as%20good%20because%20it%20doesn%E2%80%99t%20go%20as%20longer%20distances%20and%20its%20data%20transfer%20rate%20is%20slower%20than%20that%20of%20radio%20waves%2C%20And%20cables.%0D%0A%0D%0A46.%20why%20does%20a%20wireless%20network%20pose%20a%20greater%20security%20threat%20than%20a%20wired%20network%3F%20It%20poses%20a%20greater%20security%20threat%20to%20a%20wired%20network%20because%20wired%20networks%20you%20need%20to%20physically%20have%20the%20cable%20plugged%20into%20the%20computer%2C%20and%20wireless%20networks%20can%20be%20hacked%20into%20by%20people%20with%20a%20wireless%20hacking%20program%20called%20a%20dictionary.%0D%0A%0D%0A47.%20recommend%20a%20password%20strategy%20that%20an%20organisation%20could%20implement%20to%20avoid%20unauthorized%20access%20to%20their%20network.%20I%20would%20suggest%20a%20password%20flipper%2C%20a%20program%20that%20changes%20the%20password%20every%20few%20days%20as%20if%20it%20did%20get%20accessed%20by%20an%20unauthorised%20entity%20they%20could%20only%20do%20a%20small%20amount%20of%20damage%20and%20the%20password%20could%20be%20changed%20almost%20instantly%0D%0A%0D%0A48.%20what%20are%20the%20main%20purposes%20of%20firewalls%20and%20how%20are%20these%20purposes%20achieve%20this%3F%20Any%20packet%20of%20data%20flagged%20by%20the%20filters%20as%20unwanted%20is%20not%20allowed%20to%20go%20through.%0D%0A%0D%0A49.%20what%20added%20security%20feature%20should%20wireless%20networks%20employ%3F%20They%20should%20employ%20usernames%20and%20passwords%2C%20firewalls%2C%20malware%20protection%2C%20and%20encryption.%0D%0A%0D%0A50.%20what%20is%20a%20network%20diagram%3F%20A%20network%20diagram%20is%20a%20schematic%20method%20of%20showing%20the%20physical%20devices%20and%20communicated%20in%20a%20network.%0D%0A%0D%0A51.%20why%20is%20a%20network%20diagram%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%3F%20A%20network%20diagram%20is%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%20because%20the%20network%20shouldn%E2%80%99t%20be%20reliant%20on%20the%20building%20plan.&locale=en-US][http://www.oneriot.com/search?p=smarterfox&ssrc=smarterfox_popup_bubble&spid=8493c8f1-0b5b-4116-99fd-f0bcb0a3b602&q=%20%20%201.%20A%20network%20connects%20computers%20and%20other%20devices%20together%20so%20that%20they%20can%20share%20data%2C%20information%20and%20resources%0D%0A%20%20%202.%20Groupware%20allows%20users%20on%20a%20network%20to%20work%20together%20on%20the%20same%20project.%20Each%20member%20of%20the%20group%20can%20view%20the%20same%20document%20and%20immediately%20see%20the%20changes%20made%20by%20a%20colleague.%0D%0A%20%20%203.%20The%20advantages%20of%20using%20a%20network%20are%20in%20resource%20sharing%2C%20accessing%20remote%20services%2C%20facilitating%20communications%20and%20sharing%20data%20and%20information%0D%0A%20%20%204.%20Resource%20sharing%20allows%20users%20to%20access%20a%20resource%20on%20the%20network%20only%20when%20they%20need%20it%2C%20thus%20not%20requiring%20each%20workstation%20to%20have%20its%20own%20connected%20resource.%0D%0A%0D%0A4.%20what%20compelling%20reason%20wouldc%20an%20organisation%20use%20to%20justify%20recourse%20sharing%3F%20A%20companning%20reason%20for%20an%20organisation%20to%20justify%20recourse%20sharing%20is%20money%21%20By%20sharing%20recourses%20the%20company%20has%20more%20money%20to%20upgrade%20their%20recourses%20than%20buying%20hundreds%20or%20printers%2C%20scanners%2C%20etc.%0D%0A%0D%0A5.%20what%20resources%20other%20than%20printing%20can%20be%20shared%20on%20a%20network%3F%20You%20can%20share%20dozens%20of%20devices%20on%20a%20network%2C%20such%20as%20file%20server%20to%20help%20with%20data%20storage%20and%20to%20prevent%20duplicated%20data%0D%0A%0D%0A6.%20describe%20the%20benefit%20to%20an%20organisation%20in%20providing%20a%20remote%20ordering%20service%20for%20customers%20over%20the%20internet.%20The%20benefit%20for%20an%20organisation%20to%20provide%20a%20remote%20ordering%20service%20for%20the%20customers%20over%20the%20internet%20is%20they%20can%20have%20a%20larger%20client%20base%2C%20people%20from%20other%20states%20or%20countries%20could%20buy%20an%20item%20that%E2%80%99s%20on%20sale%20from%20the%20company.%0D%0A%0D%0A7.%20how%20does%20file%20sharing%20on%20a%20network%20avoid%20problems%20associated%20with%20data%20duplication%3F%20If%20a%20file%20is%20on%20the%20same%20file%20server%20under%20the%20same%20name%20and%20file%20type%20you%20get%20a%20warning%20as%20to%20whether%20you%20want%20to%20save%20it%20or%20change%20its%20name%2C%20preventing%20data%20duplication.%0D%0A%0D%0A8.%20under%20what%20circumstances%20would%20it%20be%20more%20appropriate%20to%20set%20up%20a%20blog%20rather%20than%20a%20wiki.%20When%20you%20want%20to%20write%20things%20in%20a%20diary%20context%20and%20where%20you%20don%E2%80%99t%20want%20people%20to%20be%20able%20to%20edit%20just%20read%20and%20comment%2C%20and%20in%20most%20circumstances%20this%20is%20better%20than%20wiki%20because%20if%20its%20your%20wiki%20you%20don%E2%80%99t%20want%20people%20to%20edit%20what%20you%20say.%0D%0A%0D%0A9.%20how%20do%20wikis%20sites%20cope%20with%20the%20visitors%20intent%20on%20causing%20damage%20or%20being%20a%20nuisance%3F%20Wiki%20sites%20save%20after%20every%20edit%20and%20the%20administrators%20check%20whats%20happened%20and%20if%20it%20gets%20spammed%20and%20deleted%20the%20administrators%20just%20revert%20the%20changes%20to%20what%20it%20was%20before%20the%20attack.%0D%0A%0D%0A10.%20what%20is%20a%20thread%20on%20an%20online%20forum%3F%20How%20are%20threads%20established%3F%20Threads%20in%20an%20online%20forum%20are%20topics%2C%20something%20to%20talk%20about.%20Threads%20are%20generally%20made%20by%20members%20of%20an%20online%20forum%20of%20which%20you%20have%20to%20sign%20up%20to%2090%25%20to%20be%20elegable%20to%20make%20posts.%0D%0A%0D%0A11.%20what%20type%20of%20social%20networking%20site%20would%20be%20appropriate%20for%20someone%20who%20wants%20to%20share%20stories%20thoughts%20and%20photos%20with%20friends%3F%20Facebook%20would%20be%20an%20ideal%20social%20networking%20site%20for%20such%20acts%2C%20as%20its%20easy%20to%20nagivate%2C%20easy%20to%20use%2C%20and%20easy%20to%20do%20anything%20required%20for%20a%20person%20and%20much%20more%0D%0A%0D%0A%0D%0A12.%20what%20are%20they%20key%20differences%20between%20wans%20and%20lans%3F%20The%20main%20difference%20is%20the%20sheer%20size%20of%20the%20network%21%20A%20wan%20is%20a%20wide%20area%20network%20that%20can%20go%20over%20hundreds%20of%20meters%20and%20is%20generally%20made%20of%202%20local%20are%20networks%20put%20together.%0D%0A%0D%0A13.%20why%20are%20network%20points%20called%20nodes%20rather%20than%20being%20called%20computers%3F%20Network%20points%20are%20called%20nodes%20rather%20than%20computers%20because%20its%20not%20always%20a%20computer%2C%20it%20can%20be%20a%20laptop%2C%20notebook%2C%20anything%20that%20can%20be%20connected%20to%20a%20network.%20Thus%20generalising%20everything%20to%20being%20a%20computer%20would%20be%20wrong%20and%20node%20would%20be%20a%20more%20accurate%20term.%0D%0A%0D%0A14.%20explain%20the%20difference%20between%20a%20client%20and%20a%20server%20on%20a%20network.%20The%20difference%20between%20a%20client%20and%20a%20server%20is%20that%20a%20client%20receives%20the%20data%20that%20is%20sent%20from%20the%20server.%0D%0A%0D%0A15.%20describe%20the%20roles%20of%20the%20following%20on%20a%20network%3A%20database%20server%2C%20domain%20name%20server%2C%20proxy%20server%2C%20active%20directory%20domain%20controller.%20The%20role%20of%20a%20database%20server%20is%20A%20database%20server%20is%20a%20computer%20program%20that%20provides%20database%20services%20to%20other%20computer%20programs%20or%20computers.%20the%20Domain%20Name%20System%20%28DNS%29%20is%20a%20hierarchical%20naming%20system%20built%20on%20a%20distributed%20database%20for%20computers%20services%20or%20anything%20connected%20to%20the%20internet%20or%20private%20network.%20A%20proxy%20server%20sends%20a%20proxy%20code%20with%20the%20packet%20of%20information%20so%20that%20it%20can%20get%20through%20the%20firewall%20without%20incident.%20Active%20Directory%20uses%20a%20number%20of%20standardized%20protocols%20to%20provide%20a%20variety%20of%20network%20services%2C%0D%0A%0D%0A%0D%0A16.%20would%20a%20peer%20to%20peer%20network%20be%20worthwhile%20on%20a%20small%20business%3F%20A%20peer%20to%20peer%20has%20its%20advantages%20and%20disadvantages%2C%20but%20it%20would%20be%20suggested%2C%20because%20it%E2%80%99s%20a%20small%20company%20and%20if%20it%20were%2020%2B%20people%20id%20go%20for%20a%20client%20server%20network%20but%20as%20its%20probably%20less%20than%20that%20its%20not%20really%20worth%20paying%20for%20a%20server.%0D%0A%0D%0A%0D%0A17.%20kazaa%20was%20a%20good%20example%20of%20a%20peer%20to%20p%3Beer%20network.%20It%20was%20slower%20than%20web%20servers%20that%20use%20a%20client%20server%20model.%20What%20are%20the%20problems%20with%20peer%20to%20peer%20networks%3F%20The%20problem%20with%20peer%20to%20peer%20networks%20is%20you%20cannot%20access%20other%20peoples%20files%20you%20have%20to%20walk%20over%20to%20their%20desk%20and%20get%20them%20to%20either%20print%20the%20file%20off%20or%20put%20it%20on%20a%20flash%20drive.%0D%0A%0D%0A%0D%0A18.%20what%20is%20a%20switch%3F%20A%20switch%20is%20a%20tool%20in%20a%20network%20so%20you%20can%20connect%20over%2020%20computers%20within%20the%20one%20room%20to%20the%20network.%0D%0A%0D%0A%0D%0A19.%20what%20is%20an%20intranet%3F%20An%20intranet%20is%20the%20internal%20website%20for%20the%20company%2C%20generally%20has%20recourses%20that%20can%20be%20used%20on%20it.%0D%0A%0D%0A%0D%0A20.%20why%20do%20manufacturers%20bujild%20products%20based%20on%20the%20network%20standards%3F%20Manufacturers%20build%20products%20based%20on%20the%20network%20standards%20because%20the%20product%20may%20only%20work%20in%20a%20specific%20standards%20so%20they%20have%20to%20build%20their%20products%20custom%20to%20a%20network.%0D%0A%0D%0A%0D%0A21.%20list%20four%20functions%20included%20in%20a%20network%20protocol.%20Networking%20protocols%2C%20such%20as%20TCP%2FIP%2C%20enable%20computers%20to%20exchange%20data%20with%20each%20other%20in%20a%20meaningful%2C%20organized%2C%20and%20efficient%20way.%20Computer%20protocols%20are%20similar%20to%20human%20language%20-%20if%20you%20speak%20English%20and%20you%20meet%20someone%20who%20speaks%20German%2C%20the%20protocols%20%28languages%29%20you%20use%20to%20exchange%20information%20are%20incompatible%20with%20each%20other.%20It%20is%20only%20when%20you%20both%20speak%20the%20same%20language%20that%20you%20can%20understand%20each%20other.%20Similarly%2C%20computers%20rely%20on%20protocols%20to%20ensure%20each%20computer%20%22understands%22%20what%20the%20other%20computer%20is%20sending%20it.%20Just%20as%20with%20humans%2C%20both%20computers%20must%20use%20the%20same%20protocol%20if%20they%20are%20to%20exchange%20information%20with%20each%20other%20successfully.%0D%0A%0D%0A%0D%0A22.%20identify%20four%20components%20of%20all%20Ethernet%20frames%0D%0A%0D%0A%0D%0A23.%20describe%20how%20data%20flows%20over%20an%20Ethernet%20network%20from%20source%20to%20the%20intended%20destination.%20Data%20flows%20from%20the%20source%20through%20the%20internet%20to%20a%20router%20which%20sends%20it%20to%20its%20intended%20destination%2C%20hits%20the%20firewall%20goes%20through%20a%20hole%2C%20gets%20sent%20to%20its%20intended%20person%2C%20all%20in%20the%20blink%20of%20an%20eye.%0D%0A%0D%0A%0D%0A24.%20how%20does%20a%20collision%20occur%20on%20a%20network%3F%20How%20does%20Ethernet%20avoid%20repeated%20collisions%20of%20the%20same%20transmissions%3F%20A%20network%20collision%20occurs%20when%20two%20devices%20attempt%20to%20transmit%20data%20on%20a%20shared%20circuit.%20In%20a%20shared%20circuit%20where%20multiple%20devices%20are%20listening%2C%20only%20a%20single%20device%20can%20transmit%20data%20at%20a%20single%20point%20in%20time%20which%20requires%20the%20rest%20of%20the%20devices%20to%20be%20listening%20to%20the%20transmission.%20In%20an%20hub%20environments%2C%20multiple%20devices%20are%20connected%20to%20a%20single%20transmission%20stream%2C%20so%20collisions%20tend%20to%20happen.%20Switches%20break%20up%20collision%20domains%20to%20have%20single%20devices%20on%20their%20own%20network%20segment%2C%20which%20eliminates%20collisions.%0D%0A%0D%0A%0D%0A25.%20tcp%2Fip%20uses%20smaller%20packets%20than%20other%20protocols%20why%20is%20this%20an%20advantage%20on%20the%20internet%3F%20Its%20known%20that%20smaller%20packets%20reach%20their%20destination%20faster%20and%20if%20the%20packages%20were%20larger%20then%20the%20time%20taken%20to%20reach%20the%20destination%20would%20take%20longer.%0D%0A%0D%0A%0D%0A26.%20what%20standards%20does%20wi%20fi%20network%20use%3F%20Wi%20fi%20networks%20have%20a%20password%20that%20changes%20every%20few%20days%20to%20prevent%20people%20from%20leeching%20off%20their%20network%2C%20this%20is%20effective%20because%20the%20people%20within%20the%20company%20are%20the%20only%20ones%20who%20know%20the%20network%20password.%0D%0A%0D%0A%0D%0A27.%20list%20a%20number%20of%20tasks%20undertaken%20by%20a%20network%20operating%20system.%20A%20network%20operating%20system%20%28NOS%29%20is%20a%20software%20program%20that%20controls%20other%20software%20and%20hardware%20that%20runs%20on%20a%20network.%20It%20also%20allows%20multiple%20computers%2C%20also%20known%20as%20network%20computers%2C%20to%20communicate%20with%20one%20main%20computer%20and%20each%20other%2C%20so%20as%20to%20share%20resources%2C%20run%20applications%2C%20and%20send%20messages%2C%20among%20other%20things.%0D%0A%0D%0A%0D%0A28.%20What%20are%20three%20components%20of%20a%20uniform%20resource%20location%20a%20Uniform%20Resource%20Locator%20%28URL%29%20is%20a%20Uniform%20Resource%20Identifier%20%28URI%29%20that%20specifies%20where%20an%20identified%20resource%20is%20available%20and%20the%20mechanism%20for%20retrieving%20it.%0D%0A%0D%0A%0D%0A29.%20how%20does%20a%20domain%20name%20server%20assist%20a%20web%20browser%20in%20connecting%20to%20a%20website%3F%20The%20dns%20assists%20a%20web%20browser%20in%20connecting%20to%20a%20website%20by%20registering%20all%20the%20websites%E2%80%99%20information%20making%20it%20easier%20to%20load%2C%20a%20unregistered%20page%20takes%20longer%20to%20load%20as%20the%20information%20has%20to%20be%20retrieved.%0D%0A%0D%0A%0D%0A30.%20what%20does%20the%20web%20server%20software%20when%20it%20receives%20a%20GET%20request%20from%20a%20clients%20web%20browser%3F%20The%20web%20server%20software%20is%20when%20a%20person%20overrides%20the%20web%20server%20softwares%20decision%20to%20block%20a%20website%20and%20continues%20on.%0D%0A%0D%0A%0D%0A31.%20what%20are%20three%20reasons%20for%20using%20a%20proxy%20server%20on%20a%20network%20that%20will%20be%20used%20to%20connect%20to%20the%20internet%3F%20People%20could%20be%20accessing%20inappropriate%20sites%20in%20which%20could%20be%20wasting%20valuable%20data%20allowances.%20Viruses%20could%20get%20into%20the%20server%20and%20infect%20every%20computer.%20Hackers%20could%20hack%20into%20the%20server%20and%20get%20financial%20information%20from%20the%20companies%20servers%20and%20hack%20their%20bank%20accounts%20losing%20the%20clients%20a%20lot%20of%20money%21%0D%0A%0D%0A%0D%0A32.%0D%0A%0D%0A%0D%0A33.%20what%20do%20we%20mean%20by%20cross%20platform%20software%3F%20Describe%20an%20example%20of%20cross%20platform%20software%3F%20Cross%20platform%20software%20is%20where%20software%20can%20be%20used%20on%20linux%20computers%2C%20Microsoft%20computers%2C%20apple%20computers%2C%20and%20they%20are%20very%20good%20because%20the%20developers%20can%20make%203x%20the%20money%20from%20the%20one%20piece%20of%20software%20soley%20because%20there%20is%20a%20much%20wider%20client%20range%2C%20an%20example%20of%20this%20would%20be%20windows%207%20on%20mac.%0D%0A%0D%0A%0D%0A34.%20what%20is%20the%20role%20of%20a%20network%20interface%20card%3F%20The%20purpose%20of%20a%20network%20interface%20card%20is%20to%20be%20able%20to%20connect%20the%20computer%20to%20the%20internet%20wirelessly%20and%20through%20Ethernet%20cables.%20Although%20now%20Ethernet%20ports%20are%20now%20getting%20more%20common%20to%20be%20built%20into%20the%20computers%20motherboard%2C%20so%20network%20interface%20cards%20are%20almost%20becoming%20obsolete.%0D%0A%0D%0A%0D%0A35.%20describe%20the%20process%20of%20roaming%20on%20a%20wi-fi%20network.%20Roaming%20on%20a%20wi-fi%20network%20works%20by%20plugging%20in%20a%203g%20roaming%20device%20and%20you%20can%20access%20wirelessly%20from%20almost%20anywere%20around%20Australia.%0D%0A%0D%0A%0D%0A36.%20why%20would%20a%20caf%C3%A9%20establish%20a%20hot%20spot%20in%20the%20premesis%3F%20A%20caf%C3%A9%20would%20establish%20a%20hot%20spot%20in%20the%20premesis%20because%20they%20can%20charge%20more%20for%20that%20spot%20because%20the%20pages%20will%20load%20faster%20and%20if%20they%20are%20gaming%20they%20will%20receive%20an%20advantage%20because%20they%20have%20a%20faster%20connection%20speed%20to%20anyone%20else.%0D%0A%0D%0A%0D%0A37.%20what%20are%20routers%20used%20for%3F%20Routers%20are%20used%20to%20route%20the%20data%20packets%20to%20its%20intended%20destination%2C%20so%20it%20doesn%E2%80%99t%20cause%20problems%20in%20going%20to%20the%20wrong%20person%20or%20place.%0D%0A%0D%0A%0D%0A38.%20how%20does%20a%20modem%20enable%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%3F%20The%20modem%20enables%20a%20computer%20to%20communicate%20with%20a%20network%20over%20a%20standard%20telephone%20line%20by%20sending%20small%20packets%20of%20information%20to%20the%20destination.%0D%0A%0D%0A%0D%0A39.%20how%20does%20a%20digital%20modem%20differ%20from%20a%20dial%20up%20modem%3F%20the%20main%20differences%20between%20the%20two%20is%20that%20dialup%20is%20old%2C%20and%20has%20very%20slow%20connection%20speed%20wheras%20digital%20is%20reletivley%20new%20and%20can%20reach%20speeds%20of%20100%20mps.%20The%20other%20difference%20is%20the%20physical%20connection%2C%20the%20wires%20used%20to%20connect.%20The%20digital%20can%20use%20all%20types%20of%20wiring%2C%20wheras%20the%20dialup%20needs%20telephone%20lines%20to%20plug%20into%20the%20computer%20and%20the%20modem.%0D%0A%0D%0A40.%20why%20do%20new%20networks%20use%20cat5%20standard%20cable%20rather%20than%20cat%203%3F%20Companies%20use%20cat5%20standard%20cable%20rather%20than%20cat3%20because%20cat3%20can%20only%20carry%2010mbps%20reliably%20over%20100%20meters.%20Wheras%20the%20cat5%20cables%20have%20more%20twists%20per%20meter%20and%20can%20reliably%20carry%20100mbps%20over%20distances%20up%20to%2085%20meters.%0D%0A%0D%0A41.%20what%20are%20some%20of%20the%20disadcantages%20of%20using%20cat5%20cables%3F%20Why%20is%20cat5%20cable%20used%20in%20so%20many%20installations%3F%20The%20main%20disadvantages%20of%20cat5%20cabling%20is%20it%20only%20can%20only%20carry%20large%20blocks%20of%20data%20up%20to%2085%20meters.%20Its%20mainlu%20used%20in%20installations%20because%20its%20cheap%2C%20easy%20to%20get%20your%20hands%20on%2C%20and%20a%20lot%20of%20the%20times%20its%20installed%20the%20network%20is%20not%20even%2085%20meters%20in%20radius.%0D%0A%0D%0A42.%20why%20is%20fibre%20optic%20cable%20often%20used%20to%20connect%20major%20switches%20inside%20buildings%20as%20well%20as%20between%20buildings%3F%20Fibre%20optic%20cabling%20is%20used%20to%20connect%20major%20switches%20because%20they%20are%20small%2C%20fast%20and%20can%20reach%20long%20distances%20and%20its%20very%20durable.%20Its%20used%20between%20buildings%20because%20as%20said%20before%20its%20durable%20and%20over%201000%20different%20frequencies%20can%20be%20transmitted%20along%20a%20strang%20at%20the%20one%20time.%0D%0A%0D%0A43.what%20advantages%20does%20wireless%20networking%20have%20over%20a%20network%20that%20uses%20physical%20transmission%20media%3F%20The%20main%20advantage%20is%20that%20there%20are%20no%20physical%20cables%2C%20and%20itll%20take%20up%20too%20much%20space%20which%20could%20be%20used%20for%20something%20more%20useful%20like%20a%20printer%20or%20scanner%E2%80%A6%20or%20fridge.%0D%0A%0D%0A44.%20what%20limitation%20applies%20to%20microwave%20transmissions%3F%20Interference%20can%20be%20a%20big%20factor%20on%20the%20connection%20as%20they%20require%20no%20obstruction%20between%20the%20sending%20dish%20and%20the%20receiving%20dish.%0D%0A%0D%0A45.%20why%20is%20radio%20wireless%20networking%20preferable%20to%20infra%20red%20wireless%20networking%3F%20Radio%20waves%20can%20be%20transmitted%20over%20lon%5Cg%20distances%20such%20as%20between%20cities%20or%20over%20short%20distance%20such%20as%20within%20a%20building.%20Infrared%20transmission%20is%20not%20as%20good%20because%20it%20doesn%E2%80%99t%20go%20as%20longer%20distances%20and%20its%20data%20transfer%20rate%20is%20slower%20than%20that%20of%20radio%20waves%2C%20And%20cables.%0D%0A%0D%0A46.%20why%20does%20a%20wireless%20network%20pose%20a%20greater%20security%20threat%20than%20a%20wired%20network%3F%20It%20poses%20a%20greater%20security%20threat%20to%20a%20wired%20network%20because%20wired%20networks%20you%20need%20to%20physically%20have%20the%20cable%20plugged%20into%20the%20computer%2C%20and%20wireless%20networks%20can%20be%20hacked%20into%20by%20people%20with%20a%20wireless%20hacking%20program%20called%20a%20dictionary.%0D%0A%0D%0A47.%20recommend%20a%20password%20strategy%20that%20an%20organisation%20could%20implement%20to%20avoid%20unauthorized%20access%20to%20their%20network.%20I%20would%20suggest%20a%20password%20flipper%2C%20a%20program%20that%20changes%20the%20password%20every%20few%20days%20as%20if%20it%20did%20get%20accessed%20by%20an%20unauthorised%20entity%20they%20could%20only%20do%20a%20small%20amount%20of%20damage%20and%20the%20password%20could%20be%20changed%20almost%20instantly%0D%0A%0D%0A48.%20what%20are%20the%20main%20purposes%20of%20firewalls%20and%20how%20are%20these%20purposes%20achieve%20this%3F%20Any%20packet%20of%20data%20flagged%20by%20the%20filters%20as%20unwanted%20is%20not%20allowed%20to%20go%20through.%0D%0A%0D%0A49.%20what%20added%20security%20feature%20should%20wireless%20networks%20employ%3F%20They%20should%20employ%20usernames%20and%20passwords%2C%20firewalls%2C%20malware%20protection%2C%20and%20encryption.%0D%0A%0D%0A50.%20what%20is%20a%20network%20diagram%3F%20A%20network%20diagram%20is%20a%20schematic%20method%20of%20showing%20the%20physical%20devices%20and%20communicated%20in%20a%20network.%0D%0A%0D%0A51.%20why%20is%20a%20network%20diagram%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%3F%20A%20network%20diagram%20is%20not%20based%20on%20the%20building%20plans%20of%20the%20organisation%20because%20the%20network%20shouldn%E2%80%99t%20be%20reliant%20on%20the%20building%20plan.]

apply your knowledge:

1. A.) Client server network would work better because you are connecting 3 separate network into one big network.

B.) Each computer can sent messages to each other and each computer can send a word document to the printer they want to.

C.) use a switch to reduce ‘traffic’ from the separate LAN’s.

2. A) types of servers used.


 * (i.) Proxy server- make sure participants don’t go on any unnecessary sites (youtube) sites.


 * (ii.) Web server- computer can get internet.


 * (iii.) Mail server.

B.) students: restricted in web use. (proxy server)

3. A.) because an UTP cable is usually quite small in length and would not make the distance.

b.) because fibre-optic is much longer.

c.) two advantages of optic cable comparted to unshielded twisted pair.

(i) can take more damage

(ii) more reliable

D.) It would cost more to make a wireless network but would not have to worry about the cables getting damaged and therefore the entire network going down. Also nelson sc requires a very long wire.

4.) use radiowaves.

5. username and firewall

6. A.) proxy server.

b.) an animation about why the website is great.

7. A.) blog.

b.) Dreamweaver.

8. A.) wiki? Not sure. Or maybie a social network. Eg facebook.

b.) not if it’s a wiki.

chapter 2-online communities

test your knowledge:

1.) Social networks

· professional networks

· Interest-based networks.

2) Employees can waste time and spread private information, breaking the law.

3) Three differences are:

a) Needs

b) Services

c) Structure/Hardware.

4) When you want the posted information to not to be changed, you would choose a blog, rather than a wiki.

5) Ban them or password protect your wiki.

6) Threads are collections of information on a particular topic, similar to a wiki page except everyone posts only their own contribution, under their name.

7) Social Networking sites such as facebook, twitter or myspace that have photosharing and text interaction services.

8) Open: Wikipedia

9) Examples of broadcasting possibilities include RSS, News feed, Shoutbox.

10) People who share an interest in a specific something can be placed in a group or ‘collective identity’

11) Have the website created by someone with an understanding of the required material.

12) CAPTCHA

13) An example is 4chan.

14) Large amounts of images and public access.

15)

16) A – Analyse

D – Design

D – Develop

E – Evaluate

17) It outlines the problems that need to be solved and becomes an answerable format.

18) A) Mock-up Diagrams

B) Storyboard Designs

C) Layout Diagram

19) A) Functionality

B) Speed

C) Accessibility

20) Function ß Concise answer right here.

Q21-24 (can only work on word)

24) To provide ease of use and accessibility to the important functions.

25) Templates, but other than that adhering to convention is for the weak minded.

26) before.

27) It allows the client to see/inspect the proposed design and make changes accordingly, before hours have been put into making each bit of the website functional.

28) Cropping/Animation.

29) It allows for more detailed designing.

30) There isn’t any, be imaginative.

  Apply your knowledge: 

1.) The outdoor education club at the Nelson secondary college wishes to establish a website as a means of communicating with past and present members. The website is planned to have several pages that provide information regarding the types of activities performed by the club, the mission of the club, membership enquires, a past members page, and contact details.

a.) The club will locate its website on the college’s network, making use of the college’s hardware, software and internet connection. What hardware and software specifically belonging belonging to the college’s network would the club’s website make use of?

· Network operating system

· Web server software

· Proxy server

· Web server

· Domain name server

· NOS

· Web server software

· Web software applications that ebable blogs, wikis and forums

· Animation and interactive tools such as Flash and Java.

B.) A member has suggested that the website dewveloper use Flash to make the site more interesting. Describe some of the effects the developer could build could build into the website using Flash? What are the limitations of Flash?

Flash could be used to create an interactive webpage and navigation tools for the website. However the website developer might need to take into consideration the devices which access the website as not every device within a school is flash enabled.

2.) The leader of the club wishes to provide regular information and reports on his trips that members can read if they wish. It would faction as a type of journal and will include some photos from the trips.

A.) What type of site would you recommend?

You could recommend the use of broadcasting tool, such as a blog, to record the ‘leaders’ regular reports on their trips. That way the information would be displayed in chronological order and it would be easy to read back though their reports.

B.) What software is required to establish this site?

If the school wanted to put the blog on the schools server, then they might use typeface or moveable type. If they wanted to locate it offsite than they might use blogger.

<p style="margin-left: 19.5pt; text-indent: -18pt;">3.) Another member wishes to create a website that features the club’s major trip to the Grampians. She hopes that members will be able to contribute to the site with comments, pictrures and pehapes videos. Members should be able to edit comments made by other members if they think they are wrong.

<p style="margin-left: 37.5pt; text-indent: -18pt;">A.) What type of site would you recommend? Why?

<p style="margin-left: 37.5pt;">A wiki would be suitable since it allows groups of people to individually enter comments, links to other sites and add pictures and other forms of media.

<p style="margin-left:37.5pt;mso-add-space: auto">4. A local Philanthropist, Mrs oricio, wants to create a website that encourages the community to contribute to the local history of multicultural, a suburb south-east of Melbourne. Over the last 100 yrs Springvale has gone though tremendous change, as a migrant centre for refuges is an active part of the community. Mrs Orcio wants people to be able to create an account an account and login to the website and add their stories of how they came to live in Springvale. She also thinks that it would a good idea if they could upload old photos of how the suburb looked when they arrived.

<p style="margin-left:37.5pt;mso-add-space: auto">A) Identity the purpose of this site.

<p style="margin-left:37.5pt;mso-add-space: auto">The purpose of the site is to exchange information about the suburb of springvale and create a knowledge bank of the stories about the migrants that are living in the area.

<p style="margin-left:37.5pt;mso-add-space: auto">b) Identify the features that could be incorporated into this website to fufil Mrs Oricio’s dreanm.

<p style="margin-left:37.5pt;mso-add-space: auto">The features that could be incorporated could be a space where people can upload their stoires and old photos of the suburb.

<p style="margin-left:37.5pt;mso-add-space: auto">C.) Are there any constraints that she needs to be aware of when creating this website?

<p style="margin-left:37.5pt;mso-add-space: auto">The constraints might be the age of the contributors and whenether they feel confident using a website. Older users might also find a ‘busy’ website hard to understand, so a clean, simple design is needed.

<p style="margin-left:37.5pt;mso-add-space: auto">D.) Which three design tools would you use to plan out the function of this website?

<p style="margin-left:37.5pt;mso-add-space: auto">1. flowchart

<p style="margin-left:37.5pt;mso-add-space: auto">2. website diagram.

<p style="margin-left:37.5pt;mso-add-space: auto">e.) Which three design tools would you use to plan ou the appearance of this website?

<p style="margin-left:37.5pt;mso-add-space: auto">1. Layout diagram

<p style="margin-left:37.5pt;mso-add-space: auto">2. Storyboard

<p style="margin-left:37.5pt;mso-add-space: auto">3. prototype website.

<p style="margin-left:37.5pt;mso-add-space: auto">f.) Explain the advantage of first developing a prototype website for Mrs Oricio to look at.

<p style="margin-left:37.5pt;mso-add-space: auto">Developing a prototype website for Mrs Orico will give her a chance to get a feel for how the the website might look before fully developing the website. This gives her the opportunity to make changes without the whole needing to be changed.

<p style="margin-left:37.5pt;mso-add-space: auto">g.) What evaluation criteria would you use to ensure that the website would meet the needs of Mrs Oricio?

<p style="margin-left:73.5pt;mso-add-space: auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1">1. Can members of the community create a account on the website?

<p style="margin-left:73.5pt;mso-add-space: auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1">2. Can they easily login to the wesite?

<p style="margin-left:73.5pt;mso-add-space:auto; text-indent:-18.0pt;mso-list:l1 level1 lfo1">3. Can they easily navigate though the website and upload their stories and photos?

H.) Identify three essential tests for function and three essential tests for appearance that you would perform to ensure that the solution worked.

<p style="text-indent:-18.0pt;mso-list:l0 level1 lfo2">1. Ability to login to the website with a password

<p style="text-indent:-18.0pt;mso-list:l0 level1 lfo2">2. Do the pages load up properly on different sized screens and browsers.

<p style="text-indent:-18.0pt;mso-list:l0 level1 lfo2">3. That consistent formats and conventions are used on every page

<p style="text-indent:-18.0pt;mso-list:l0 level1 lfo2">4. That images load up properly on each page

<p style="text-indent:-18.0pt;mso-list:l0 level1 lfo2">5. That the appearance of the website is not compromised by the change in screen size.

<p style="text-align: center"> Chapter 4- Organisations and information needs

<p style="text-align: center"> Test your knowledge

<p style="text-align: center"> 1. Equipment, Data, personal and procedures.

[20]&amp;locale=en-US [21]&amp;ssrc=smarterfox_popup_bubble&amp;spid=8493c8f1-0b5b-4116-99fd-f0bcb0a3b602&amp;q=%5B20%5D%5B21%5D%5B22%5D%5B23%5D [22]

2.

<p style="text-align: center"> 2. (i) Transaction Processing systems

<p style="text-align: center"> (ii) Office automation systems

<p style="text-align: center"> (iii) Management information systems

<p style="text-align: center"> (iv) Decision- support systems

<p style="text-align: center"> (v) Expert systems

<p style="text-align: center"> 3. improving the effectiveness and efficiency of that organization

<p style="text-align: center"> 4. so the computer knows how to manipulate data and information

<p style="text-align: center"> 5. is system software that performs a specific task. E.g converting data into different formats.

<p style="text-align: center"> 6. RAM is necessary to open any program e.g word. It is even needed to start up your computer.

<p style="text-align: center"> 7. soft copy is the electronic copy. E.g word doc. Hard copy is the printed copy.

<p style="text-align: center"> 8. to give humans the ability to communicate with computers.

<p style="text-align: center"> 9. The CPU stands for Central Processing Unit. It does all the processing for the entire system. Without it, your computer can't do anything. It has nothing to process information. It's just dead without it.

<p style="text-align: center"> 10. either via network cable or analogue carrier signal

11. because Data is the foundations of a computer system. Their cannot be an information system without data.

12.

- users

-System analysis

-Programmers

- ICT manages

- network administers


 * 1) Procedures exist so that tasks are performed uniformly and consistently.


 * 1) information systems:

<p style="text-indent: -0.5in; margin-left: 0.75in; tab-stops: list .75in"> (i) Transaction Processing system = A TPS collects, stores, modifies, and retrieves the transactions of an organization. A transaction is an event that generates or modifies data that is eventually stored in an information system

<p style="text-indent: -0.5in; margin-left: 0.75in; tab-stops: list .75in"> (ii) Office automation system= Office automation refers to the varied computer machinery and software used to digitally create, collect, store, manipulate, and relay office information needed for accomplishing basic tasks. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an office automation system. Office automation helps in optimizing or automating existing office procedures.

<p style="text-indent: -0.5in; margin-left: 0.75in; tab-stops: list .75in"> (iii) management information system (MIS)= is a system that provides information needed to manage organizations effectively. Management information systems involve three primary resources: technology, information, and people.

<p style="text-indent: -0.5in; margin-left: 0.75in; tab-stops: list .75in"> (iv) Decision-support system (DSS)= a Decision-support system serves as the management and operations of an organization and help to make decisions.

<p style="text-indent: -0.5in; margin-left: 0.75in; tab-stops: list .75in"> (v) Expert system= is a type of software that uses knowledge based on human expertise for problem solving, or to clarify uncertainties where normally one or more human experts would need to be consulted. and are a traditional application of an expert system is artificial intelligence (AI).
 * 1) I don’t understand


 * 1) Knowledge base is established by a human gaining and putting it into an information system which will organize the knowledge in a meaningful way.

17 Senior management makes strategic decisions directly affecting lower management and operational workers such as closing a branch, shop or factory.

18.Operational workers make day-to-day decisions that help the efficient running of the business. The workers are usually the first point of contact with the public and need to make decisions such as:

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Who is next in the queue?

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Should a complaint go to management

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Where can I direct a particular customer query?

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · What kind of software is going to be required for a specific task.

19. Middle management makes tactical decisions to solve problems that affect the running of the organisation. The managers of each department within the organisation are responsible for the running of their own department, whether it be human resources, sales, marketing, accounts or information and communications technology. They are also responsible for making sure that the strategic decisions made by senior management are successfully carried out.

20. Operational management makes operational decisions that affect the day-to-day running of an organisation.

21. Some examples of strategic decisions are:

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Studying market trends.

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Choosing new products to manufacture or market.

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Analysing social, legal and environmental concerns.

<p style="text-indent: -0.25in; margin: 0in 0in 0pt 0.75in; tab-stops: list .75in"> · Determining site locations and adjusting management structure.

22. Some examples of tactical decisions are:
 * Human resources


 * Sales


 * Marketing


 * Accounts


 * information and communications technology.

23. It takes too long to find the customer details and this could drive customers away.

<p style="text-align: center;">AYK chapter 7 page 282-283

<p style="margin: 0in 0in 0pt">2a) The document in sent to the clients because in the privacy principle they must send them to the clients, so they are informed of there rights.

<p style="margin: 0in 0in 0pt">2b) You would include the statements in the documents because all clients need to know.

<p style="margin: 0in 0in 0pt">2c) Organisation should inform and get the consent of the client that their data will be sent overseas.

<p style="margin: 0in 0in 0pt">3. The privacy Amendment act has forced all schools to evaluate how they collect and manage information about both students and parents.

<p style="margin: 0in 0in 0pt">4) Human rights and spam act

<p style="margin: 0in 0in 0pt">b) Your commercial messages must only be sent when you have consent

<p style="margin: 0in 0in 0pt">c) yes because there is no law stopping her from being able to do so.

<p style="margin: 0in 0in 0pt">5.) the file which is located on a computer with little anti-virus software could contain a virus.

<p style="margin: 0in 0in 0pt">6.) a physical threat could be a patient stealing or destroying a computer. A logical way could be a hacker getting information.

<p style="margin: 0in 0in 0pt">b.) an example would be a boss wanting to know his employers medical state.

<p style="text-indent: -18.75pt; margin: 0in 0in 0pt 36.75pt; mso-list: l0 level1 lfo2; tab-stops: list 36.75pt">7.) a.) first name, surname, age, address, parent’s name, parent’s address, contact number

<p style="margin: 0in 0in 0pt 0.25in">b.) first name, surname, address, email address, contact number

<p style="margin: 0in 0in 0pt 0.25in">c.) to be able to identify it’s members and for emergency reasons.

<p style="margin: 0in 0in 0pt 0.25in">d.) to provide children with the opportunity to develop self confidence in creative ways

<p style="margin: 0in 0in 0pt 0.25in">e.) give child and parents consent so they know where their information is going

<p style="margin: 0in 0in 0pt 0.25in">f) that all scrips from their students are originally and are not a copy of someone else’s script on the internet

<p style="margin: 0in 0in 0pt 0.25in">g.) data needs to be backed up offsite (e.g. usb)

<p style="text-align: center; margin: 0in 0in 0pt"> Test you knowledge 


 * 1) Mission statement what the company is trying to achieve and the organisational goal explains how the organisation will achieve its mission.


 * 1) System Goal

<p style="margin: 0in 0in 0pt 0.5in">b.) make sure your prices match competition of customers might drop
 * 1) A.) pay employers extra on weekends to make employers happy.

<p style="margin: 0in 0in 0pt 0.5in">c.) improve advertisement and make sure your airline company is well known to improve profit.

<p style="margin: 0in 0in 0pt 0.5in">d.) make sure security is tight so there are no serious fights

<p style="margin: 0in 0in 0pt 0.5in">e.) to make sure you have a good selection of books.

<p style="margin: 0in 0in 0pt 0.5in">4.) because the company can be either fined or disbanded.

<p style="margin: 0in 0in 0pt 0.5in">5.) privacy, information privacy, copyright, spam

<p style="margin: 0in 0in 0pt 0.5in">6.) to decrease the exercise of arrack towards privet information.

<p style="margin: 0in 0in 0pt 0.5in">7.) Police

<p style="margin: 0in 0in 0pt 0.5in">8.) fines ranging up to 100,000

<p style="margin: 0in 0in 0pt 0.5in">9.) code of practice is a set of rules made by a party or organisation that the employers are expected to follow.

<p style="margin: 0in 0in 0pt 0.5in">10.) (I) privacy act 1988

<p style="margin: 0in 0in 0pt 0.5in">(ii) Health records act 2001

<p style="margin: 0in 0in 0pt 0.5in">(iii) privacy act 1988

<p style="margin: 0in 0in 0pt 0.5in">(iv)privacy act 1988

<p style="margin: 0in 0in 0pt 0.5in">(v) spam act 2001

<p style="margin: 0in 0in 0pt 0.5in">(vi) copyright act 1968

<p style="margin: 0in 0in 0pt 0.5in">11.) data can be stolen or encrypted. (loss of intellectual property)

<p style="margin: 0in 0in 0pt 0.5in">12.) viruses, tampering of files and theft of hardware. Also equipment failure and damage.

<p style="margin: 0in 0in 0pt 0.5in">13.) when someone accesses your computer without your express permission

<p style="margin: 0in 0in 0pt 0.5in">14.) it pretends to be a harmless file gets behind the computers defences and infects the computer.

<p style="margin: 0in 0in 0pt 0.5in">15.) Hackers access confidential files and sometimes delete them where crackers prefer to tamper with files so the user can no longer open it.

<p style="margin: 0in 0in 0pt 0.5in">16.) accessing organisational databases and editing values e.g. salary amount.

<p style="margin: 0in 0in 0pt 0.5in">17.) the theft of hardware is stealing for example a entire hardrive instead of a particular file.

<p style="margin: 0in 0in 0pt 0.5in">18.) forgetting to save changes or losing storage hardware (e.g usb)

<p style="margin: 0in 0in 0pt 0.5in">19.) descriptive filenames are important so you know what each file contains and file extensions are important because if you use the wrong one, for example give a word document a jpeg extension the text will no longer be able to be opened.

<p style="margin: 0in 0in 0pt 0.5in">20.) if for example hardrive suffers high level of magnetic waves the data becomes unreadable for any type of computer.

<p style="margin: 0in 0in 0pt 0.5in">21.) a consequence is an effect of your behaviour/action while penalty is a action by a supiour to punish you for your action

<p style="margin: 0in 0in 0pt 0.5in">22.) The consequences are financial involved. For example the property owner misses out on revenue and the government may lose tax revenue.

Chapter 8: test your knowledge pages 322-324

1.) biometric security cannot be hacked, it reads the individual’s biological structure while password is just a code name which can be typed into the computer by anyone.

2.) misuse of the data that a biometric security station can gather.

3.) any secret files on your computer which is protected by biometric security

4.) it can be easily damaged by magnetic fields and if stolen they offer little protection the thief capturing data from it.

5.) <span style="font-size: 9.0pt;line-height:115%;font-family:"Verdana","sans-serif";color:black">‘Card skimming’ is the illegal copying of information from the magnetic strip of a credit or ATM card

<span style="font-size:9.0pt; line-height:115%;font-family:"Verdana","sans-serif";color:black">6.)When a user wishes to access information, they need to enter their password, account name and authentication code displayed on a security token.

<span style="font-size:9.0pt; line-height:115%;font-family:"Verdana","sans-serif";color:black">7.) The security token code changes every 1-5 minutes adding more security to your information.

<span style="font-size:9.0pt; line-height:115%;font-family:"Verdana","sans-serif";color:black">8.) a surge protector has the ability to protect your system against power spikes

<span style="font-size:9.0pt; line-height:115%;font-family:"Verdana","sans-serif";color:black">9.)a fault-tolerant system is a system with multiple hard drives.

<span style="font-size:9.0pt; line-height:115%;font-family:"Verdana","sans-serif";color:black">10.) why would an organi have mirrored machine or server? An organisation which stores data online will want a raid system to recover data quickly and cheaply. If it was a big company it would want to use a mirrored server which is more expensive then raid but also much faster.

<span style="font-size:9.0pt; line-height:115%;font-family:"Verdana","sans-serif";color:black">11.) how does RAID protect data? A RAID array holds fragments of data over several hardrives so if one fails the others can peiece together the missing data and rebuild the file using error-checking codes. ==<span style="font-size: 9pt; line-height: 115%; font-family: Verdana, sans-serif; color: black; font-style: normal; ">12.) <span style="font-size: 11pt; line-height: 115%; font-family: Calibri, sans-serif; font-style: normal; ">3 back up devices: == ==<span style="font-size: 11pt; line-height: 115%; font-family: Calibri, sans-serif; font-style: normal; ">(i) Multiple hard drives == ==<span style="font-size: 11pt; line-height: 115%; font-family: Calibri, sans-serif; font-style: normal; ">(ii) Raid == ==<span style="font-size: 11pt; line-height: 115%; font-family: Calibri, sans-serif; font-style: normal; ">(iii)mirrored server == ==<span style="font-size: 11pt; line-height: 115%; font-family: Calibri, sans-serif; font-style: normal; ">13.) <span style="font-size:11.0pt; line-height:115%;font-family:"Calibri","sans-serif";mso-bidi-font-weight:normal; mso-bidi-font-style:normal"> <span style="font-size: 11pt; line-height: 115%; font-family: Calibri, sans-serif; font-style: normal; ">(i) magnetic media == (ii) optical drives

(iii)solid state drives

14.)big organisations require data warehouses. Big rooms which hold all the backup data for the company.

15.) slow data transfer and cannot store much data: cd=700MB,DVD=17GB,blue-ray=50GB

16.) (i) packed sniffers

(ii)desktop monitoring programs

(iii) log files

(iv)closed-circut-televison(CCTV)

(v)telephones

17.) log files make it easy for the organisations to keep track of what employees are up to.(everything you do is traced)

18.) to know if the employee is doing anything unexpected.

19.) Data can be easily protected from physical data. An example of this is when you use lockable disk box to protect your CD/DVD’s.

20.) there is 4 steps in public key inscription

1. Sender creates a document to be emailed to receiver

2. sender uses receiver’s public key to encrypt the message

3. Receiver uses his or her private key to decrypt the message

4 .receiver can read or print the decrypted message.

21.) Network policy is used on large companies who have people around the world accessing one fie. They are required to both put in a username and password and then are matched to various resources to make sure they should be accessing the file.

22.) (i) long password

(ii) different types of characters

(iii) no

(iii)nothing that can be easily predicted (famous place or pets name)

23.) they could recommend password which follow the 3 criteras.

24.) it stops any uninvited people from accessing confidential files aswell as protecting the network from most viruses.

25.) when an exe file is run, when document are accessed or when files are copied the program scans for virus signatures or virus like activity.

26.) security procedures help companies keep track of documents and ultimately reduce the chance of user error.

27.) An organisation would have a file-maagement policy to define hwo users of an information system access and delete files.

28.) The forms of tecnolgy are mobile phones and networked mobile devices. A communication policy would govern how these could be used within an oraganisation.

29.) (portable document format) allows users to share and print files without needing the program that created them

30.) good file naming convention has as much information about the document in the name. e.g chapter8TYK.docx.

31.) enhance data security because as they reduce the chance of lost files or files being accidently deleted because generally good file naming leads file management being more organised.

32.) Sequential file naming might be used for a finished document where variation fiel naming is used on a working file.

33.) A full backup copies all of the files from a device to a storage medium whereas a differential backup only copies only those files that have been changed since the last full backup.

34.) A backup log contains infoamtion about the type of backup performed, what was backed up, the software used, the number type and storage location of the backup media and the date for the individual backups.

35.) – the workstation or system recovered

- date of restoration

-list of files and folders stored

-backup media used

-reason for restoration

36.)so that the organisation can quickly and painlessly recover files.

37.) ?

38.) because tyou want to make sure you store your backup files offsite. In case of a fire you lose both original files and backup files. Also so you can retrieve them if necessary.

39.) A legacy system makes it possible to retrieve and open old really old files.

40.) backup is more recent where archiving is more long-term storage.

41.) that they cannot completely delete confidential files from old computers.

42.) in involves using the internet to store files and help your computer load more demanding applications

43.) Amazon, Google docs and zoho are applications that can be opened by cloud

44.) (i) via third party organisations

(ii) the business might pay a set cost per month

(iii) might access software with restrictive features for free.

(45) Organizations with similar needs so they can share the infrastructure

46.) it would make sure the data is secure and help the medical institution adhere to the Health records act.

47.) cloud computing is more secure because the data is distributed across a wide range of locations.

48.) it is much cheaper because there is no need to buy software licences.

49.) ethical requirements are expected but legal requirement is forced and involves punishment

50.) ethical requirements are as follows:
 * 1) responsibility of employers and employees treat and respect each other
 * 2) codes of conduct
 * 3) computer use polices
 * 4) employee monitoring
 * 5) fee speech on the internet.

51.) to make sure that employees in the company don’t act unethically.

52.) it might be ethical if you are suspicious of a employees work ethic to make sure that they are working and not wasting time.

53.) it is only ethical if you monitoring only for a short time and that you are monitoring the computer because you believe the employee is not working hard enough and therefore damaging the company.

54.) Because if there was no policies on company network usage. Their usage could overload and therefore the network unusable for a short period of time or and inappropriate user could accidently download a virus onto the network which would spread to all the computer which are connected to the computer.

55.) that employees don’t accesss any websites that are noy related to their work to their business.

56.) a disaster recovery plan is a backup plan to receive data if a disaster happens (e.g. workplace goes on fire)

57.)(i) preparing an emergency plan

(ii)preparing a backup plan

(iii) preparing a recovery plan

(iv) test plan

58.) a backup plan refers to creating backup files for equipment failure of theft while an emergency plan refers to taking the specific steps in preparation of a natural disaster (lighting strikes, floods, fire or earthquakes.)

59.) (i) identification of critical ict services.(first priority)

(ii) use of a secondary (or secondary) site for data-processing needs until the primary site has been recovered.

60.) a test plan is important so that the organisation is confident that there disaster recovery plan works.

61.) you must make sure that the data be evaluated in storage, communication and disposal.

<p style="margin-top:12.0pt">62.) you need to be certin that the system is hacker-proof and need to make sure that it is harder for the system to suffer physical damage with the new system.

<p style="margin-top:12.0pt">63.) because people will quickly become frustrated if they cannot easily access files.

64.) after a disaster you find out if the backup files was important to recovering the workplace back to normal.

 Chapter 8 apply your knowledge 

<p style="margin-left:36.75pt;text-indent:-18.75pt;mso-list: l0 level1 lfo1;tab-stops:list 36.75pt">1.)  a.) there could be risk of both vandalism and the computer security could be hacked.

<p style="margin-left:18.0pt"> b .) it is a possibility that cretin individuals might want to find out if their employee has any physical defects    

<p style="margin-left:18.0pt">c.) the company should use Isis security as well as making sure that the computer cannot access by the wrong people.

<p style="margin-left:18.0pt">2.) Use anti-virus software and the user must not open unknown attachment files from an email address they do not recognise.

<p style="margin-left:18.0pt">3.) a.) They will need to both store the jpeg files on the home computer and store it offsite. E.g. put the file on a friend’s computer.

<p style="margin-left:18.0pt">b.) justright signs would have to make sure the clients designs are always safe and that there is no danger of the file disappearing.

<p style="margin-left:18.0pt">4.) becaused these employers are likely for the mind to be thinking about Friday night game while they should be working hard.

<p style="margin-left:18.0pt">b.) that he is playing the game after work hours and therefore is not distracted from the work at hand.

<p style="margin-left:18.0pt">5.) because they could be wasting network download usage.

<p style="margin-left:18.0pt">6.) no because it does not perform any real problems to the computer

<p style="margin-left:18.0pt">7.) a.) they will be able to host a lot of information without having to worry about storage. Also won;t have to worry very much about compatability.

<p style="margin-left:18.0pt">b.) that their clients need an internet connection to access information

<p style="margin-left:18.0pt">c.) clients will be able to access information offsite(via website on their laptop at home/work)

d.) all their data would be done online and therefore procedures would relay more heavily on the cloud company provider. (confused with this question)