Is589 Chapter 1: Questions 7, 14, and 17

In: Computers and Technology

Submitted By maryartis
Words 570
Pages 3
Chapter 1: Questions 7, 14, and 17
Question 7
How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)?
Answer:
A Local Area Network (LAN) is a group of microcomputers or terminals located in the same general area.
A Backbone Network (BN) is a large central network that connects most everything on a single company site.
A Metropolitan Area Network (MAN) encompasses a city or county area.
A Wide Area Network (WAN) spans cities, states, or national boundaries.
Question 14
Explain how a message is transmitted from one computer to another using layers.
Answer: -
When a message is transmitted from one computer to another through these seven layer protocols are wrapped around the data, the layers in the network use a formal language or protocol that is a set of instructions of what the layer will do to the message, these protocols are labeled or encapsulated onto the data. Think of the protocols as layers of paper with a message that only the individual layer understands. The application layer is the application software used by the network user.
The transport layer is responsible for obtaining the address of the end user (if needed), breaking a large data transmission into smaller packets (if needed), ensuring that all the packets have been received, eliminating duplicate packets, and performing flow control to ensure that no computer is overwhelmed by the number of messages it receives.
The network layer takes the message generated by the application layer and if necessary, breaks it into several smaller messages. It then addresses the message(s) and determines their route through the network, and records message accounting information before passing it to the data link layer.
The data link layer formats the message to indicate where it starts and ends, decides when to…...

Similar Documents

Chapter 1 Questions Ans Application

...Eva Diaz Chapter 1 Questions and applications #1,2,3,5,6,7,10,15,16 1. a. Some of the agency problems encountered with the MNC come with the conflict of goals between a firm’s managers and shareholders when making decisions. Agency costs are larger for an MNC than for a purely domestic firm because managers of foreign subsidiaries may be tempted to focus on making decisions to serve their subsidiaries rather than the overall MNC. b. MNC’s with subsidiaries scattered around the world may experience more agency costs because it is much more difficult to monitor managers in foreign countries, foreign subsidiaries may not follow the same uniform goals, the size of the subsidiaries themselves leads to more conflicts, as well as the beliefs that employees should come first in decision making prior to shareholders. 2. a. Explain how the theory of comparative advantage relates to the need for international business. The theory of comparative advantage relates to the need for international business because it suggests that each country should use its comparative advantage to specialize in its production and rely on other countries to meet other needs. Therefore all countries would need to trade with each other competitively for the products they are not able to produce. b. Explain how the product cycle theory relates to the growth of the MNC. The product cycle theory suggests that after firms are established in their home......

Words: 858 - Pages: 4

Chapter 1 Review Question

...Robert Jones Chapter 1 Review 1. Which of the following is true about 1 bit? 2. Which of the following terms means approximately 106 bytes 3. Which answer list the correct number of bits associated with each term 4. Which of the following answer are true about random-access memory (RAM) as it normally used inside a personal computer (Chose two answers) 5. This Chapter describes the concepts how a CPU reads the contents from RAM. Which of the following is true about the process off read data, as described in the chapter? 6. A user has opened up a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores the file to represent the text typed into the report? 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problems using this number. Which of the following determines, in part, what bits the computer stores in RAM to represents the number 123456789? 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of......

Words: 645 - Pages: 3

Chapter 1 Review Questions

...1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet | c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte | b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word | c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) | a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable |e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. |d. The CPU must first find the file in the file system before reading the data. 6. A user has......

Words: 1372 - Pages: 6

Chapter 7 Review Questions

...Chapter 7 Review Questions 1. What is a knowledge management system? a. A Knowledge management system attempt to help organizations achieve their goals. They usually help in means of increasing profits or reducing costs. 2. What is a chief knowledge officer? What are his or her duties? b. A chief knowledge officer is a top level executive who helps the organization work with a knowledge management system to create, store, and use knowledge to achieve organizational goals. The duties that the CKO is responsible for are to work with other executives and vice presidents, including the chief executive officer, chief financial offer and others. 3. What is natural language processing? What are the three levels of voice recognition? c. Natural language processing allows a computer to understand and react to statements and commands made in a “natural” language, like English. The three levels of voice recognition are converting sound waves into words, then the natural language system processing system reacts to the words or commands by performing different tasks. 4. What is a learning system? Give a practical example of such a system. d. A learning system is a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on the feedback it receives. A practical example of such a system would be, some computerized games have learning abilities. If the computer loses a game, it......

Words: 605 - Pages: 3

Chapter 1 Questions

...Chapter 1: Introduction to Project Management TRUE/FALSE 1. Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. ANS: T Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. Today’s project management involves much more, and people in every industry and every country manage projects. PTS: 1 DIF: Difficulty: Easy REF: p.2 OBJ: LO: 1-1 NAT: BUSPROG: Technology TOP: Introduction KEY: Bloom's: Knowledge 2. A difference between operations and projects is that operations end when their objectives have been reached, whereas projects do not. ANS: F Projects are different from operations in that they end when their objectives have been reached or the project has been terminated. PTS: 1 DIF: Difficulty: Moderate REF: p.4 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Comprehension 3. Every project should have a well-defined objective. ANS: T A project has a unique purpose. Every project should have a well-defined objective. PTS: 1 DIF: Difficulty: Easy REF: p.6 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Knowledge 4. Projects should be developed in increments. ANS: T A project is developed using progressive elaboration. Projects are often defined......

Words: 7714 - Pages: 31

Chapter 1 Assessment Questions

...Chapter 1 Assessment Questions 1. Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information. A. True 2. Software manufacturers limit their liability when selling software using which of the following? A. End-User License Agreement 3. The ___ tenet of information systems security is concerned with the recovery time objective. C. Availability 4. Encrypting data on storage devices or hard drives is a main strategy to ensure data integrity. B. False 5. Organizations that require customer-service representatives to access private customer data can best protect customer privacy and make it easy to access other customer data by using which of the following security controls? B. Blocking out customer private data details and allowing access only to the last four digits of Social Security numbers or account numbers. 6. The ___ is the weakest link in an IT infrastructure. E. User Domain 7. Which of the following security controls can help mitigate malicious e-mail attachments? E. All of the above 8. You can help ensure confidentiality by implementing ___. D. A virtual private network for remote access 9. Encrypting e-mail communication is needed if you are sending confidential information within an e-mail message through the public Internet. A. True 10. Using security policies, standards, procedures, and......

Words: 311 - Pages: 2

Chapter 1 Assignment #1 Capt. 1 Exercises 14, 17, 20, 22, 23

...Assignment #1 Capt. 1 exercises 14, 17, 20, 22, 23 Assignment #1 Capt. 1 exercises 14, 17, 20, 22, 23 1-14 Gina Fox has started her own company, Foxy Shirts, which manufactures imprinted shirts for special occasions. Since she has just begun this operation, she rents the equipment from a local printing shop when necessary. The cost of using the equipment is $350. The materials used in one shirt cost $8, and Gina can sell these for $15 each. (a) If Gina sells 20 shirts, what will her total revenue be? What will her total variable cost be? (b) How many shirts must Gina sell to break even? What is the total revenue for this? The various costs which Gina Fox incurs are; Fixed Cost (cost of using the equipment), FC = $350 Variable Cost (Material cost per short), VC = $8 per shirt and the Selling price of Foxy Shirts, P = $15 per unit f  350 s  15v  8 Total revenue  20(15)  $300 Total variable cost  20(8)  $160 BEP  f/(s  v)  350/ (15  8)  50 units Total revenue  50(15)  $750 1-17 Katherine D’Ann is planning to finance her college education by selling programs at the football games for State University. There is a fixed cost of $400 for printing these programs, and the variable cost is $3. There is also a $1,000 fee that is paid to the University for the Right to sell these programs. If Katherine was able to sell programs for $5 each, how many would she have to sell in order to break even? f  400  1,000  1,400 s  5 v  3 BEP ......

Words: 654 - Pages: 3

Homework Assignment: Chapters 1 Questions 4 and 7

...Week 1 Homework Assignment: Chapters 1 Questions 4 and 7 Cruz A. Morin II Devry University Chapter 1 4. Why does word – of – mouth “advertising” work so effectively? Word – of – mouth advertising works of effectively because it is the simplest way to advertise. When people receive either excellent service or a good deal on a product they will talk about to everyone they know. Companies know this really well and want to ensure that is what is delivered to each customer weather it is a new customer or someone that has been a customer for a long time. Every company wants positive word – of – mouth advertising because it is free to them. The other way that word – of – mouth advertising is being updated now is with the use of social media by everyone. Besides regular social media sites you also have review sites that people post both good and bad reviews on (ex. YELP). 7. What do we mean by an “engaged” customer, and how does this relate to customer loyalty? An “engaged” customer is someone who feels that they have an emotional tie to the company that they are doing business with. Most companies will use loyalty programs to in a way entice customers to keep returning. When extremely satisfied customers have been asked if they felt an emotional tie and many said no. If a company wants to truly rise the level of customer loyalty they have to increase the emotional tie in that each customer fills and at the end of the day if there is no tie in with the emotions then...

Words: 298 - Pages: 2

Nt1230 Chapter 1 Questions

...NT1230 Chapter 1 questions. Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except Starter, Home Basic, and Enterprise 2. The core module that provides all of the Windows 7 capability that isn’t language- or edition-specific is called minwin. 3. When you copy a file to a library, Windows Explorer writes the file to the folder desig- nated as the save location. 4. To use federated search, you must download or create XML files for specific sites called Search connectors. 5. The only operating system edition that you can upgrade in-place to Windows 7 Professional is windows Vista Business. 6. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires 0 megabytes of additional hard disk space. 7. To migrate a computer running Windows XP to Windows 7, you can use a utility called User State Migration Tool. 8. The new Windows 7 feature that renders all of the windows on the desktop transparent when you mouse over the right end of the taskbar is called Aero Peek. 9. The Windows 7 Starter edition is only available in a 32-bit version. 10. The maximum amount of system memory supported by Windows 7 Enterprise is 4 (32) & 192 (64). True / False Circle T if the statement is true or F if the statement is false. T F 1.......

Words: 520 - Pages: 3

Topic 7 Chapter Discussion Question

...MANAGEMENT CONCEPT 1.      Discuss the differences between supply chain and supply chain management. A supply chain refers to the activities associated with the flow and transformation of goods from the raw material stage, through to the end user, as well as the associated information flows. Supply chains are not a new concept in the sense that through the years organizations have been dependent on suppliers and organizations have served customers. Although any organization can be part of a supply chain, supply chain management requires overt management efforts by the organizations in the supply chain. Moreover, supply chain management cannot be successful unless the participating companies adopt an enterprise-to-enterprise perspective. 2.      Discuss the SCOR and GSCF models of supply chain management. The SCOR model identifies five key processes—plan, source, make, deliver, and return—associated with supply chain management. Each of the five processes indicates the important role of logistics in supply chain management. There are eight relevant processes in the GSCF model—customer relationship management, customer service management, demand management, order fulfillment, manufacturing flow management, supplier relationship management, product development management, and returns management. Logistics also plays an important role in the supply chain processes in the GSCF model. 3.      What are four key attributes of supply chain management? The chapter discussed......

Words: 1568 - Pages: 7

Chapter 7 Review Questions

...1. They’re most like burglar alarms, because they’re both setup to detect intruders and alert users when a threat is detected. 2. A false positive seems like an alert. False negatives seem like normal activity. False positives are just a problem, and false negatives are failures in the systems. 3. A network-based IDPS monitors traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer cause...

Words: 541 - Pages: 3

Chapter 1 Question

...Chapter 1 Problems 1, 2, 3 = straightforward, intermediate, challenging Section 1.2 Matter and Model-Building Note: Consult the endpapers, appendices, and tables in the text whenever necessary in solving problems. For this chapter, Appendix B.3 may be particularly useful. Answers to odd-numbered problems appear in the back of the book. 1. A crystalline solid consists of atoms stacked up in a repeating lattice structure. Consider a crystal as shown in Figure P1.1a. The atoms reside at the corners of cubes of side L = 0.200 nm. One piece of evidence for the regular arrangement of atoms comes from the flat surfaces along which a crystal separates, or cleaves, when it is broken. Suppose this crystal cleaves along a face diagonal, as shown in Figure P1.1b. Calculate the spacing d between two adjacent atomic planes that separate when the crystal cleaves. [pic] Figure P1.1 Section 1.3 Density and Atomic Mass 2. Use information on the endpapers of this book to calculate the average density of the Earth. Where does the value fit among those listed in Tables 1.5 and 14.1? Look up the density of a typical surface rock like granite in another source and compare also to it. 3. The standard kilogram is a platinum-iridium cylinder 39.0 mm in height and 39.0 mm in diameter. What is the density of the material? 4. A major motor company displays a die-cast model of its first automobile, made from 9.35 kg of iron. To celebrate its......

Words: 4296 - Pages: 18

Chapter 14 Questions Fin370

...14-1. what are financial markets? What function do they perform? How would an economy be worse off without them? Financial markets are institutions and procedures that facilitate transactions in all types of financial claims. (Financial Management: Principles and Applications) This is a mechanism that is used to facilitate the transfer of savings from those economic units with a surplus to those with a deficit. If we didn’t have financial markets people or companies couldn’t buy houses, life insurance policies, governments or firms couldn’t spend more money than what they actually earned. The text says that the economy would suffer without a developed financial market system. That the rate of capital formation would not be as high if financial markets did not exist. 14-2. Define in a technical sense what we mean by financial intermediary. Give an example of your definition. The financial intermediary collects the savings of individuals and issues its own (indirect) securities in exchange for these savings. The intermediary then uses the funds collected from the individual savers to acquire the business firm’s (direct) securities, such as stocks and bonds. I think an example would be a business giving a direct payment in a savings bond that the employee can match and put the same amount into the same savings plan. 14-3. Distinguish between the money and capital markets. Money market refers to all institutions and procedures that provide for transactions in......

Words: 587 - Pages: 3

End of Chapter Questions #1, 3-5, 7-8,12-14, 18

...end of chapter Questions #1, 3-5, 7-8,12-14, 18 1. Which of the following is true about 1 bit? c. Represents one binary digit 2. Which of the following terms means approximately 106 bytes? b. Megabyte 3. Which answer lists the correct number of bits associated with each term? d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? C Used to process data E. Is installed on the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer store in RAM to represent the number 123456789? b. Pixel grid 8. Which of the following is not a feature of a file system that might be used with a hard disk dirve? a. An actuator arm 12. Which of the following are true about random-access memory (RAM) as it is normally used inside a personal computer? a. Used for short-term memory e. Is installed onto the motherboard 13. Which of the following are components of an internal hard disk drive (HDD)? (Choose two answers.) a. Actuator arm c. Platters 14. Which of the following......

Words: 306 - Pages: 2

Chapter 17 Primary Source 1

...Industrial Supremacy Primary Source #1 ← Refer back to the section of the chapter under the heading "Capitalism and its Critics." The great industrialist Andrew Carnegie built his fortune on steel, but he also built a lasting reputation as a philanthropist because he spent millions of dollars on the establishment of libraries. Carnegie's Gospel of Wealth was a call for other rich people to share their wealth with the worthy poor. Consider the following questions: How does Carnegie's view exemplify Social Darwinism? What is the essence of Carnegie's argument against socialism? On what social values and assumptions about human nature was the gospel of wealth based? The price which society pays for the law of competition, like the price it pays for cheap comforts and luxuries, is also great; but the advantages of this law are also greater still, for it is to this law that we owe our wonderful material development, which brings improved conditions in its train. But, whether the law be benign or not, we must say of it, as we say of the change in the conditions of men to which we have referred: It is here; we cannot evade it; no substitutes for it have been found; and while the law may be sometimes hard for the individual, it is best for the race, because it insures the survival of the fittest in every department. We accept and welcome, therefore, as conditions to which we must accommodate ourselves, great inequality of environment, the concentration of business,......

Words: 575 - Pages: 3