3hub computer virus8/7/2023 On small networks, a workstation that can double as a server is know as nondedicated server it is not completely dedicated to the cause of serving. Messages are passed to HTTP in a format similar to that used by internet mail & multipurpos e Internet Mail Extensions (MIME). It builds on the discipline of reference provided by the uniform Resource Identifier (URI), as a location URL or name (URN) for indicating the resource on which a method is to be applied. HTTP allows an open-ended set of methods to be used to indicate the purpose of a request. Collaborative, hypermedia intormation system. The Hypertext Transfer protocol (HTTP) is an application level protocol with the lightness & speed necessary for distributed. 2nd PUC Computer Science Networking Concepts Three Marks Questions and Answers This means a maximum bit rate of 48 kbps per time slot. In fact, EDGE was formerly called GSM 384. It allows data transmission speeds of 384 kbps to be achieved when all eight-time slots are used. But this convinces and endless benefits are not free from risks as there are many a risks to network security.Įnhanced Data rates for Glodab Evolution (EDGE) are a ratio based mobile high speed data standard. The networking offers endless possibilies & opportunities to every user of it, alone with convince. It has memory, a processor & the ability to interact with the user. A SIM is a tiny computer chip that gives a cellular device its unique phone number. The SIM – Subscriber Identity Module – is a chip card, the SIZE of a postage stamp. The cables that connect two or more workstations are the communication channels.Ĭircuit switching. Communication medium: using a network, it is possible for managers, working far apart, to prepare financial report of the company.īy transmission media or communication channels of network, it is meant that the connecting cables or connecting media are being talked about.Cost factor: Personal computers have better price/ performance ratio than micro computers.So if one of them is unviable, the other copies could be used. Reliability: A file can have copies on two or three different machines.Resource sharing: The aim is to make all the program, data 4 peripherals available to anyone on the network irrespective of the physical location of the resources & the user.2nd PUC Computer Science Networking Concepts Two Marks Questions and Answers A topology is the actual appearance or layout of network.Ĭomputer virus is a malicious program that requires a host & is designed to make a system sick.Ĭhatting is a waey for people to communicate love with each other by typing the text messages which is immediately seen by the person who is online.Ĭyber Law is a generic term, which refers to all the legal and regulatory aspects of internet & the Hackers are more interested in gaining knowledge about compute systems & possible using this knowledge for playful pranks.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |