Get premium membership and access questions with answers, video lessons as well as revision papers.
- Copper cables offer different throughputs in data communication. Outline four factors that influence the cables(Solved)
Copper cables offer different throughputs in data communication. Outline four factors that influence the cables
Date posted: November 30, 2021. Answers (1)
- With the aid of a diagram, describe a time-division multiplexing (TDM)(Solved)
With the aid of a diagram, describe a time-division multiplexing (TDM)
Date posted: November 30, 2021. Answers (1)
- Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these...(Solved)
Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these protocols
Date posted: November 30, 2021. Answers (1)
- Differentiate between information security and network infrastructure security(Solved)
Differentiate between information security and network infrastructure security
Date posted: November 30, 2021. Answers (1)
- A network design should meet several user needs. Outline four examples of such needs(Solved)
A network design should meet several user needs. Outline four examples of such needs
Date posted: November 30, 2021. Answers (1)
- Explain three advantages of extranet networks in organizations(Solved)
Explain three advantages of extranet networks in organizations
Date posted: November 30, 2021. Answers (1)
- Explain two circumstances under which unshielded fibre optic cables are used to build a LAN(Solved)
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted: November 30, 2021. Answers (1)
- Outline two roles of a browser(Solved)
Outline two roles of a browser
Date posted: November 30, 2021. Answers (1)
- Explain two types of UTP cables used during network installation(Solved)
Explain two types of UTP cables used during network installation
Date posted: November 30, 2021. Answers (1)
- Define the term throughput as used in data transmission(Solved)
Define the term throughput as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Describe the email protocols(Solved)
Describe the email protocols
Date posted: November 30, 2021. Answers (1)
- Outline four requirements for internet installation in organizations(Solved)
Outline four requirements for internet installation in organizations
Date posted: November 30, 2021. Answers (1)
- Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply(Solved)
Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply
Date posted: November 30, 2021. Answers (1)
- Describe two categories of communication software(Solved)
Describe two categories of communication software
Date posted: November 30, 2021. Answers (1)
- Outline uses of computer networks in an organization(Solved)
Outline uses of computer networks in an organization
Date posted: November 30, 2021. Answers (1)
- Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted: November 30, 2021. Answers (1)
- Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology(Solved)
Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology
Date posted: November 30, 2021. Answers (1)
- Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays(Solved)
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted: November 30, 2021. Answers (1)
- Outline two weaknesses of CSMA/CD(Solved)
Outline two weaknesses of CSMA/CD
Date posted: November 30, 2021. Answers (1)
- User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP(Solved)
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
Date posted: November 30, 2021. Answers (1)